<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-733155551423588445</id><updated>2024-08-28T22:43:55.601-07:00</updated><category term="business model"/><category term="copyright infringement"/><category term="google"/><category term="government censorship"/><category term="megaupload"/><category term="online content"/><category term="piracy"/><category term="terrorism"/><category term="transparency"/><category term="transparency report"/><title type='text'>Ctrl-Alt-Del</title><subtitle type='html'>A simple, user-friendly blog that covers news, tests, opinions and advice related to software and hardware products. This is the English version of my &quot;elrompemaquinas&quot; blog.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://machinebreaker.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default'/><link rel='alternate' type='text/html' href='http://machinebreaker.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Machine Breaker</name><uri>http://www.blogger.com/profile/01198746302581389470</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidP3RUbZ_raZP83dwzFOMx7m4rBP5ziZhUmeupX0Iej6DpJ6oksyKEZYKZKY2HgjaRqrBoaaurh4I1P_BBsDS7ecHybVcmiEVZnQAZTXEDaKqjEEvHPjNwBYZtG9-nOA/s220/jbrias.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>19</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-733155551423588445.post-4057452657854458325</id><published>2019-07-07T09:34:00.001-07:00</published><updated>2019-07-07T09:53:21.003-07:00</updated><title type='text'>The communion of form and function with Thames Valley Windows</title><content type='html'>&lt;a href=&quot;https://www.youtube.com/watch?v=WbxcyzMmzQ4&quot;&gt;&lt;iframe align=&quot;middle&quot; allow=&quot;accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; src=&quot;https://www.youtube.com/embed/oyA7Ucnmje4&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;
Enter a new dimension of beauty and security&lt;/h2&gt;
&lt;br /&gt;
Windows and doors are not only architectural elements that allow light and access into your home. An integral part of good design, they convey your own personal style, well-being and security to all who enter your home.&lt;br /&gt;
&lt;br /&gt;
We at Thames Valley Windows are passionate about the design of our windows and doors. With over 30 experience in the business, we offer a wide selection of designs to fit every budget. All our products are FENSA certified and incorporate the latest technologies in energy efficient double glazing and locking security for peace of mind and lower your heating bills.&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;
Products choices designed to fit your budget&lt;/h2&gt;
&lt;div&gt;
We offer a range of products in three distinct categories.&amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3&gt;
Essentials&lt;/h3&gt;
Our Essentials line of entry-level products is designed to match beauty and budget for first-time home buyers.
&lt;br/&gt; 
&lt;button type=&quot;button&quot;&gt;&lt;a href=&quot;https://www.tvwindows.com/windows/upvc-windows&quot;&gt;Click here for our Essentials range&lt;/a&gt;&lt;/button&gt; 
&lt;br/&gt;
&lt;br /&gt;
&lt;h3&gt;
Heritage&lt;/h3&gt;
Our Heritage line is offers rich design, colours choices and exquisite materials for the discerning taste.
&lt;br/&gt; 
&lt;button type=&quot;button&quot;&gt;&lt;a href=&quot;https://www.tvwindows.com/windows/upvc-windows&quot;&gt;Click here for our Heritage range&lt;/a&gt;&lt;/button&gt;   
&lt;br/&gt;
&lt;br /&gt;
&lt;h3&gt;
Exclusive&lt;/h3&gt;
Our Exclusive line is the top of the line range. No expense is spared in the design of these products including electronic biometric locking systems.
&lt;br/&gt; 
&lt;button type=&quot;button&quot;&gt;&lt;a href=&quot;https://www.tvwindows.com/windows/upvc-windows&quot;&gt;Click here for our Exclusive range&lt;/a&gt;&lt;/button&gt; 
&lt;br/&gt;
&lt;br/&gt;
At Thames Valley Windows, we are here to serve you. Our Home Consultants are experts in their field and can advise you on the right product to fit your needs. Call us for a commitment-free assessment of your needs at 0800 181 698 or come visit our showroom in Bracknell or Guildford. 
  
</content><link rel='replies' type='application/atom+xml' href='http://machinebreaker.blogspot.com/feeds/4057452657854458325/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://machinebreaker.blogspot.com/2019/07/the-communion-of-form-and-function-with.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/4057452657854458325'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/4057452657854458325'/><link rel='alternate' type='text/html' href='http://machinebreaker.blogspot.com/2019/07/the-communion-of-form-and-function-with.html' title='The communion of form and function with Thames Valley Windows'/><author><name>Machine Breaker</name><uri>http://www.blogger.com/profile/01198746302581389470</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidP3RUbZ_raZP83dwzFOMx7m4rBP5ziZhUmeupX0Iej6DpJ6oksyKEZYKZKY2HgjaRqrBoaaurh4I1P_BBsDS7ecHybVcmiEVZnQAZTXEDaKqjEEvHPjNwBYZtG9-nOA/s220/jbrias.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/oyA7Ucnmje4/default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-733155551423588445.post-1546109714400622540</id><published>2017-05-05T03:54:00.000-07:00</published><updated>2018-06-14T03:14:45.148-07:00</updated><title type='text'>Why you should care that half of EU members are shirking the EC about data sharing rules</title><content type='html'>&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; font-style: italic; font-weight: 700; line-height: 1.38; white-space: pre-wrap;&quot;&gt;Ministers from half of the EU&#39;s 28 member states have signed a letter asking the EU Commission to drop its “barriers to the free flow of data”&lt;/span&gt;&lt;/div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.welivesecurity.com/wp-content/uploads/2014/01/data-privacy-meter-640.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://www.welivesecurity.com/wp-content/uploads/2014/01/data-privacy-meter-640.jpg&quot; height=&quot;225&quot; width=&quot;320&quot;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Ok, let’s get the facts out first. The Commission will publish the findings of its inquiry into online platforms (“search engines, social media, knowledge and video sharing websites, app stores, etc.”) which took place after the publication of the EU&#39;s Digital Single Market Strategy last year.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;In an article published by&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; font-weight: 700; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The Register&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;, ministers from Belgium, Bulgaria, Czech Republic, Denmark, Estonia, Finland, &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; font-weight: 700; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Great Britain&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;, Ireland, Latvia, Luxembourg, Lithuania, Poland, Slovenia and Sweden &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; font-weight: 700; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;decried the EU’s data protection legislation&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;. They “&lt;i&gt;encouraged the commission to move ambitiously forward in its efforts to &lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; font-weight: 700; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;i&gt;remove regulatory and non-regulatory barriers in the Digital Single Market&lt;/i&gt;”, so that data can be shared more easily&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; between and beyond member states.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Presently, data sharing across the EU is a complicated matter, with more complexity foreseen with the implementation of the General Data Protection Regulation (GDPR) in 2018. As a result of the new legislation, which brought about the collapse of &lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; font-weight: 700; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Safe Harbor (The Guardian, Oct 6, 2015)&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;, data localisation projects have picked up in Germany and France.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The authors of the &lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;letter&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; pleaded the commission and the Dutch incumbent in the EU&#39;s rotating presidency to take the following into account (only excerpts are shown):&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 11pt; margin-left: 22pt; margin-right: 22pt; margin-top: 11pt;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: italic; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Build a solid foundation for the digital economy.&lt;/span&gt;&lt;span style=&quot;background-color: transparent; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: italic; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; For the digital economy to flourish businesses and consumers must thrive in a trusted and connected digital environment...review of the e-Privacy directive with the aim to repeal all elements that are no longer fit...regulatory framework should be adapted to better spur investments…&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 11pt; margin-left: 22pt; margin-right: 22pt; margin-top: 11pt;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: italic; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Strengthen the framework for digital innovation and entrepreneurship. &lt;/span&gt;&lt;span style=&quot;background-color: transparent; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: italic; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Refrain from one-size-fits-all regulation which would reduce competition and hamper innovation...ensure that data can move freely across borders, both within and outside the EU, by removing all unjustified barriers to the free flow of data.&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 11pt; margin-left: 22pt; margin-right: 22pt; margin-top: 11pt;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: italic; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Move the single market into the digital age.&lt;/span&gt;&lt;span style=&quot;background-color: transparent; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: italic; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; As both consumers and businesses can benefit significantly from cross-border e-commerce within Europe we need to step up efforts to make it easier to trade online across the internal market and not impose new burdens on businesses.&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-right: 22pt; margin-top: 11pt;&quot;&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;In effect, the letter calls for the the outright repeal or heavy amendment of the e-Privacy directive using broadband business competitiveness as its justification to allow data to flow freely across borders. &lt;/span&gt;&lt;/div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-right: 22pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The veil of secrecy&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-right: 22pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;However, the “truth” is never what it seems and is usually shrouded in obfuscation and a foggy mist of vested interests. A regular bugbear for many governments, the EU&#39;s &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;e-Privacy directive &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;caused&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;some&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;distress in January when a legal opinion &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;determined&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; that it meant the &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;ongoing snooping &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;activities of many member states&#39; governments &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;were not strictly lawful.&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 11pt; margin-right: 22pt; margin-top: 11pt;&quot;&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The collapse of Safe Harbor also caused trouble for many of the US-based multinationals which had otherwise been able to promise they were following the European legal regime with Europeans&#39; data when held in the US. Of course, the &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Snowden disclosures proved this was not the case&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;. &lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-right: 22pt; margin-top: 11pt;&quot;&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Patriotic tech companies might complain about the stricter directives, but for the most part, multinationals, particularly American ones,&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;have only one concern - the bottom line. Besides, &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;of what use is European personal information in a US located database? &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Products and services offered on websites and social media are &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;location based&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;, i.e., a person is offered products and services based on that person’s geographical location, be it online or from a brick and mortar nearby. Even if that person were to login to Amazon, the majority of the products offered are locally sourced and, at best, they are pan-European handled by a local distributor. The exception (and it is a rare one as far as end-user shopping is concerned) is those products actually purchased in the US and shipped to Europe. So &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Americans have no real need or use for European personal information&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; even though they will tell you they need that information to better match personal online behaviour and product offers. All that &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;can be done just as efficiently right here &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;without any need for leftpondian interference as all it requires is the right analytical algorithm&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;. &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-right: 22pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Ulterior motives?&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 11pt; margin-right: 22pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Of greater concern is the state apparatus that requires tech companies to turn over their data under the&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; banner of national security&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;. And exactly whose national security are we talking about, America’s or Europe’s? Paris, Brussels, Oslo, The Sinai Jet Bombing, Ankara, Beirut...where were the state intelligence agencies? &amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-right: 22pt; margin-top: 11pt;&quot;&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;One might argue that only the metadata is scanned and inspected, and that no actual information is viewed or analysed. After all, state agencies have to scan millions of metadata tags daily making it impossible to detail each individual phone call or message. The problem lies in &lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; font-style: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;“three degrees of separation” or “the three hops,&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; font-style: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;”&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; (&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; font-style: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;b&gt;The Guardian, Oct 28, 2013&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;) that the NSA’s PRISM program uses to determine association. It’s that third hop of connection that &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;greatly expands the probability of innocent people worldwide being scooped up&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; into the NSA’s surveillance machine. As Ars Technica explain in an &lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; font-style: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;article&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; font-style: normal; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;from 2013, you’re only “&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;one hop from the author, and three hops from Hamid Karzai&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;.” And if you think it’s only happening in the US, guess again. Just yesterday, May 26, the UK’s independent biometrics commissioner, Alastair MacGregor, revealed that &lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; font-style: normal; font-weight: 700; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;53% of the 9,600&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; individuals on the counter terrorism databases have never been accused of a crime. &amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-right: 22pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;How we feel about it&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 11pt; margin-right: 22pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The simple truth is that national security agencies have drunk their own Kool-Aid and have ended up seeing terrorists under every rock. It’s called &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;tunnel vision which then morphs into collective paranoia&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;. Just look at what’s happening in the US with Patriot Act I and II, the FISA courts, the militarisation of police forces and the institutionalised racism of ethnic minorities. You think this is all crazy talk? Does the name Donald Trump ring a bell? The fact is security agencies are no more likely to stop a terrorist attack than you or me as evidenced in a series of articles: &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; font-style: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;b&gt;Business Insider&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;, The Most Interesting Revelations From Frontline&#39;s Powerful Exposé of the National Security Agency, May 20, 2014; &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; font-style: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;b&gt;The Intercept&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;, US Mass Surveillance Has No Record of Thwarting..., Nov 17, 2015; &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; font-style: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;b&gt;The Washington Post&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;, NSA Phone Record collection Does Little to Prevent Terrorist Attacks..., Jan 12, 2014.  &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;We take data security very seriously; it is the heart and soul of our business. So when a news article like this one is published, and entire governments seek to water down privacy laws, &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; font-weight: 700; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;we get very concerned&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;. That is not to say we don’t applaud the work of national security agencies, we do. It is a thankless and wearisome job. But we do ask state agencies to show some common sense judgement when it comes to privacy laws and data sharing. &lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 11pt; margin-right: 22pt; margin-top: 11pt;&quot;&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; font-style: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;We do nothing to further the cause of national security&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; font-style: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; by &lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; font-style: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;a href=&quot;https://www.hrw.org/video-photos/interactive/2016/04/18/guantanamo-facts-and-figures&quot; style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;indefinitely detaining, without due process&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #1155cc; font-weight: 700;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; font-style: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;(&lt;b&gt;Human Rights Watch, Apr 18, 2016&lt;/b&gt;)&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; font-style: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;,&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; a false positive suspected terrorist in Guantanamo while &lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; font-style: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;simultaneously arming ISIS rebels in Syria through Turkey’s back door&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; font-style: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;(&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; font-style: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;b&gt;The Guardian, Now The Truth Emerges..., June 3, 2015&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;) simply because they are against Bashar al-Assad. The farce is almost laughable. &amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-right: 22pt; margin-top: 11pt;&quot;&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Data security and privacy go hand in hand and one cannot be isolated from the other. If you don’t have privacy, you don’t have data security; if you don’t have data security, you don’t have privacy.&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; It’s that simple.&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; So, while entire governments seek to weaken the privacy rights of individuals in the guise of “increased commercial opportunities,” &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;the security industry takes an opposing view&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; because it negates everything we’re trying to accomplish for our clients - the possibility of safeguarding the integrity of their information assets from prying eyes, industrial espionage and data breaches. In fact, we in the cybersecurity subscribe to the opposite: only by guaranteeing data security do our clients feel more confident in expanding e-commerce opportunities.&lt;/span&gt;&lt;/div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-right: 22pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The Answer&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-right: 22pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Clearly, each side has its own agenda and motives, and never the twain shall meet. Or can they? We argue that both sides can achieve a workable solution to everyone’s satisfaction if each is willing to compromise. Do secret state security agencies really need to exchange data deemed “suspect” between each other? We already have Interpol for that. From a commercial point of view, European companies doing business on the continent already freely exchange customer information between marketing and financial organisations to offer targeted advertising. At the same time, cybersecurity vendors should provide more robust encryption of data packet transfers. In this day and age, &lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; font-weight: 700; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;we should offer the best of both worlds.&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; &amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;b&gt;Secon Cyber Security&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;At &lt;b&gt;&lt;a href=&quot;https://seconcyber.com/&quot;&gt;Secon Cyber Security&lt;/a&gt;&lt;/b&gt;, we take the matter of data privacy very seriously. Our whole purpose for being is cybersecurity. As such, we offer advice and services around &lt;/span&gt;&lt;a href=&quot;https://seconcyber.com/news/david-king-data-classification/&quot; style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: blue;&quot;&gt;GDPR compliance&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;span style=&quot;background-color: white;&quot;&gt;, &lt;/span&gt;&lt;b style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;https://seconcyber.com/wp-admin/post.php?post=7878&amp;amp;action=edit&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;network security&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;span style=&quot;background-color: white;&quot;&gt;, &lt;/span&gt;&lt;a href=&quot;https://seconcyber.com/2016/07/07/trend-micro-stops-the-macro-trend-in-office-365-ransomware/&quot; style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: blue;&quot;&gt;cloud security&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;span style=&quot;background-color: white;&quot;&gt;, &lt;/span&gt;&lt;b style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;https://seconcyber.com/2016/10/19/trend-micros-xgen-endpoint-security-just-name/&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;endpoint security&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;span style=&quot;background-color: white;&quot;&gt;, &lt;/span&gt;&lt;b style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;https://seconcyber.com/2016/10/05/protection-compromising-emails-bec-costs-nothing/&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;email archiving&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;span style=&quot;background-color: white;&quot;&gt;, &lt;/span&gt;&lt;b style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;https://seconcyber.com/2017/02/15/implications-forcepoint-skyfence-merger/&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;DLP (data loss prevention) solutions&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;span style=&quot;background-color: white;&quot;&gt;, &lt;/span&gt;&lt;b style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;https://seconcyber.com/2017/03/09/free-phishing-test-knowbe4/&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;user-awareness training and education&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;span style=&quot;background-color: white;&quot;&gt;, &lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://seconcyber.com/2017/04/06/immersive-labs-identifying-measuring-developing-practical-cyber-skills/&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: blue;&quot;&gt;cyber skills assessment and development&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;span style=&quot;background-color: white;&quot;&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; color: blue; font-family: &amp;quot;arial&amp;quot;; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://machinebreaker.blogspot.com/feeds/1546109714400622540/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://machinebreaker.blogspot.com/2016/05/why-you-should-care-that-half-of-eu.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/1546109714400622540'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/1546109714400622540'/><link rel='alternate' type='text/html' href='http://machinebreaker.blogspot.com/2016/05/why-you-should-care-that-half-of-eu.html' title='Why you should care that half of EU members are shirking the EC about data sharing rules'/><author><name>Machine Breaker</name><uri>http://www.blogger.com/profile/01198746302581389470</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidP3RUbZ_raZP83dwzFOMx7m4rBP5ziZhUmeupX0Iej6DpJ6oksyKEZYKZKY2HgjaRqrBoaaurh4I1P_BBsDS7ecHybVcmiEVZnQAZTXEDaKqjEEvHPjNwBYZtG9-nOA/s220/jbrias.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-733155551423588445.post-8917037561377108480</id><published>2016-10-05T03:12:00.002-07:00</published><updated>2016-10-05T03:12:45.698-07:00</updated><title type='text'></title><content type='html'>&lt;span style=&quot;font-size:4em; line-height: normal; word-spacing:0.3em;&quot;&gt;&lt;span style=&quot;background:#f15770;color:#000000;font-family:&#39;Comic Sans MS&#39;, cursive; font-size:x-large; font-weight:bold; line-height:125%; margin:0.1em; padding:0.2em; vertical-align:0.1em; &quot;&gt;y&lt;/span&gt;&lt;span style=&quot;background:#f15770;color:#000000;font-family:&#39;Times New Roman&#39;, Times, serif; font-size:xx-large; font-weight:bold; font-style:italic; line-height:75%; margin:0.1em; padding:0.1em; vertical-align:0.1em; &quot;&gt;o&lt;/span&gt;&lt;span style=&quot;background:#717732;color:#ffffff;font-family:&#39;Trebuchet MS&#39;, Helvetica, sans-serif; font-size:xx-large; font-weight:bold; font-style:italic; text-transform:uppercase; line-height:100%; margin:0.1em; padding:0.3em; vertical-align:-0.1em; &quot;&gt;u&lt;/span&gt;&lt;span style=&quot;background:#f15770;color:#000000;font-family:&#39;Arial&#39;, Helvetica, sans-serif; font-size:x-large; font-weight:bold; box-shadow:-1px 1px 2px #333; line-height:100%; margin:0.1em; padding:0.1em; vertical-align:0.1em; &quot;&gt;r&lt;/span&gt; &lt;span style=&quot;background:#803f1d;color:#ffffff;font-family:&#39;Courier&#39;, monospace; font-size:x-large; font-weight:lighter; font-style:italic; box-shadow:1px -1px 2px #333; text-transform:lowercase; line-height:100%; margin:0.1em; padding:0.1em; vertical-align:baseline; &quot;&gt;m&lt;/span&gt;&lt;span style=&quot;background:#006847;color:#ceffef;font-family:&#39;Verdana&#39;, Geneva, sans-serif; font-size:x-large; font-weight:bold; font-style:italic; box-shadow:1px -1px 2px #333; line-height:100%; text-decoration:underline; margin:0.1em; padding:0.3em; vertical-align:baseline; &quot;&gt;o&lt;/span&gt;&lt;span style=&quot;background:#f15770;color:#000000;font-family:&#39;Impact&#39;, Charcoal, sans-serif; font-size:xx-large; font-style:italic; box-shadow:1px -1px 2px #333; line-height:100%; margin:0.1em; padding:0.2em; vertical-align:baseline; &quot;&gt;n&lt;/span&gt;&lt;span style=&quot;background:#f9aa51;color:#000000;font-family:&#39;Impact&#39;, Charcoal, sans-serif; font-size:xx-large; font-weight:bold; font-style:italic; box-shadow:-1px -1px 2px #333; text-transform:lowercase; line-height:75%; margin:0.1em; padding:0.3em; vertical-align:-0.1em; &quot;&gt;e&lt;/span&gt;&lt;span style=&quot;background:#717732;color:#ffffff;font-family:&#39;Courier&#39;, monospace; font-size:xx-large; font-weight:bold; box-shadow:1px 1px 2px #333; text-transform:uppercase; line-height:100%; margin:0.1em; padding:0.3em; vertical-align:baseline; &quot;&gt;y&lt;/span&gt; &lt;span style=&quot;background:#ce1126;color:#ffffff;font-family:&#39;Arial&#39;, Helvetica, sans-serif; font-size:xx-large; font-style:italic; line-height:75%; margin:0.1em; padding:0.1em; vertical-align:baseline; &quot;&gt;o&lt;/span&gt;&lt;span style=&quot;background:#717732;color:#ffffff;font-family:&#39;Verdana&#39;, Geneva, sans-serif; font-size:xx-large; font-weight:bold; box-shadow:-1px 1px 2px #333; text-transform:uppercase; line-height:100%; margin:0.1em; padding:0.2em; vertical-align:-0.1em; &quot;&gt;r&lt;/span&gt; &lt;span style=&quot;background:#ce1126;color:#ffffff;font-family:&#39;Courier&#39;, monospace; font-size:xx-large; box-shadow:-1px 1px 2px #333; line-height:125%; margin:0.1em; padding:0.2em; vertical-align:baseline; &quot;&gt;y&lt;/span&gt;&lt;span style=&quot;background:#717732;color:#ffffff;font-family:&#39;Tahoma&#39;, Geneva, sans-serif; font-size:x-large; font-weight:lighter; box-shadow:-1px 1px 2px #333; line-height:100%; margin:0.1em; padding:0.3em; vertical-align:0.1em; &quot;&gt;o&lt;/span&gt;&lt;span style=&quot;background:#717732;color:#ffffff;font-family:&#39;Impact&#39;, Charcoal, sans-serif; font-size:x-large; font-weight:bold; box-shadow:-1px 1px 2px #333; text-transform:lowercase; line-height:100%; margin:0.1em; padding:0.1em; vertical-align:-0.1em; &quot;&gt;u&lt;/span&gt;&lt;span style=&quot;background:#f15770;color:#000000;font-family:&#39;Impact&#39;, Charcoal, sans-serif; font-size:xx-large; box-shadow:1px 1px 2px #333; text-transform:lowercase; line-height:75%; margin:0.1em; padding:0.3em; vertical-align:baseline; &quot;&gt;r&lt;/span&gt; &lt;span style=&quot;background:#f8c83c;color:#000000;font-family:&#39;Times New Roman&#39;, Times, serif; font-size:xx-large; font-weight:bold; box-shadow:1px 1px 2px #333; text-transform:lowercase; line-height:100%; margin:0.1em; padding:0.3em; vertical-align:baseline; &quot;&gt;f&lt;/span&gt;&lt;span style=&quot;background:#ce1126;color:#ffffff;font-family:&#39;Trebuchet MS&#39;, Helvetica, sans-serif; font-size:x-large; font-style:italic; box-shadow:-1px 1px 2px #333; text-transform:lowercase; line-height:75%; margin:0.1em; padding:0.2em; vertical-align:0.1em; &quot;&gt;i&lt;/span&gt;&lt;span style=&quot;background:#f8c83c;color:#000000;font-family:&#39;Trebuchet MS&#39;, Helvetica, sans-serif; font-size:x-large; font-weight:bold; box-shadow:-1px -1px 2px #333; text-transform:lowercase; line-height:100%; margin:0.1em; padding:0.3em; vertical-align:0.1em; &quot;&gt;l&lt;/span&gt;&lt;span style=&quot;background:#f9aa51;color:#000000;font-family:&#39;Impact&#39;, Charcoal, sans-serif; font-size:xx-large; font-style:italic; text-transform:lowercase; line-height:100%; margin:0.1em; padding:0.3em; vertical-align:baseline; &quot;&gt;e&lt;/span&gt;&lt;span style=&quot;background:#ce1126;color:#ffffff;font-family:&#39;Trebuchet MS&#39;, Helvetica, sans-serif; font-size:x-large; text-transform:uppercase; line-height:75%; margin:0.1em; padding:0.2em; vertical-align:0.1em; &quot;&gt;s&lt;/span&gt; &lt;span style=&quot;background:#ce1126;color:#ffffff;font-family:&#39;Palatino Linotype&#39;, &#39;Book Antiqua&#39;, Palatino, serif; font-size:x-large; font-weight:bold; box-shadow:-1px -1px 2px #333; line-height:100%; margin:0.1em; padding:0em; vertical-align:0.1em; &quot;&gt;a&lt;/span&gt;&lt;span style=&quot;background:#f8c83c;color:#000000;font-family:&#39;Times New Roman&#39;, Times, serif; font-size:xx-large; font-weight:bold; box-shadow:1px 1px 2px #333; text-transform:uppercase; line-height:125%; text-decoration:underline; margin:0.1em; padding:0.3em; vertical-align:baseline; &quot;&gt;r&lt;/span&gt;&lt;span style=&quot;background:#f8c83c;color:#000000;font-family:&#39;Impact&#39;, Charcoal, sans-serif; font-size:xx-large; font-style:italic; box-shadow:-1px -1px 2px #333; text-transform:uppercase; line-height:125%; margin:0.1em; padding:0.1em; vertical-align:0.1em; &quot;&gt;e&lt;/span&gt; &lt;span style=&quot;background:#0c8489;color:#fbffff;font-family:&#39;Verdana&#39;, Geneva, sans-serif; font-size:x-large; box-shadow:-1px 1px 2px #333; line-height:125%; margin:0.1em; padding:0.3em; vertical-align:0.1em; &quot;&gt;g&lt;/span&gt;&lt;span style=&quot;background:#f8c83c;color:#000000;font-family:&#39;Comic Sans MS&#39;, cursive; font-size:xx-large; font-weight:bold; text-transform:uppercase; line-height:125%; margin:0.1em; padding:0.2em; vertical-align:0.1em; &quot;&gt;o&lt;/span&gt;&lt;span style=&quot;background:#f15770;color:#000000;font-family:&#39;Courier&#39;, monospace; font-size:xx-large; font-weight:bold; font-style:italic; box-shadow:-1px 1px 2px #333; text-transform:uppercase; line-height:100%; margin:0.1em; padding:0.2em; vertical-align:baseline; &quot;&gt;n&lt;/span&gt;&lt;span style=&quot;background:#f8c83c;color:#000000;font-family:&#39;Georgia&#39;, serif; font-size:xx-large; font-style:italic; line-height:100%; margin:0.1em; padding:0.2em; vertical-align:baseline; &quot;&gt;e&lt;/span&gt; &lt;span style=&quot;background:#f8c83c;color:#000000;font-family:&#39;Verdana&#39;, Geneva, sans-serif; font-size:xx-large; font-weight:bold; box-shadow:-1px 1px 2px #333; line-height:100%; margin:0.1em; padding:0.3em; vertical-align:-0.1em; &quot;&gt;f&lt;/span&gt;&lt;span style=&quot;background:#ce1126;color:#ffffff;font-family:&#39;Verdana&#39;, Geneva, sans-serif; font-size:x-large; font-weight:bold; font-style:italic; box-shadow:1px -1px 2px #333; line-height:100%; margin:0.1em; padding:0em; vertical-align:baseline; &quot;&gt;o&lt;/span&gt;&lt;span style=&quot;background:#0c8489;color:#fbffff;font-family:&#39;Times New Roman&#39;, Times, serif; font-size:xx-large; font-weight:bold; font-style:italic; box-shadow:-1px -1px 2px #333; line-height:75%; margin:0.1em; padding:0.2em; vertical-align:baseline; &quot;&gt;r&lt;/span&gt;&lt;span style=&quot;background:#0c8489;color:#fbffff;font-family:&#39;Comic Sans MS&#39;, cursive; font-size:xx-large; box-shadow:-1px -1px 2px #333; text-transform:uppercase; line-height:75%; margin:0.1em; padding:0.2em; vertical-align:baseline; &quot;&gt;e&lt;/span&gt;&lt;span style=&quot;background:#f8c83c;color:#000000;font-family:&#39;Times New Roman&#39;, Times, serif; font-size:xx-large; box-shadow:-1px -1px 2px #333; text-transform:lowercase; line-height:75%; margin:0.1em; padding:0.2em; vertical-align:0.1em; &quot;&gt;v&lt;/span&gt;&lt;span style=&quot;background:#f9aa51;color:#000000;font-family:&#39;Times New Roman&#39;, Times, serif; font-size:x-large; font-weight:bold; font-style:italic; box-shadow:1px 1px 2px #333; text-transform:lowercase; line-height:125%; margin:0.1em; padding:0.3em; vertical-align:0.1em; &quot;&gt;e&lt;/span&gt;&lt;span style=&quot;background:#f15770;color:#000000;font-family:&#39;Courier&#39;, monospace; font-size:x-large; font-weight:bold; box-shadow:1px -1px 2px #333; text-transform:lowercase; line-height:125%; margin:0.1em; padding:0.3em; vertical-align:baseline; &quot;&gt;r&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://machinebreaker.blogspot.com/feeds/8917037561377108480/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://machinebreaker.blogspot.com/2016/10/blog-post.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/8917037561377108480'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/8917037561377108480'/><link rel='alternate' type='text/html' href='http://machinebreaker.blogspot.com/2016/10/blog-post.html' title=''/><author><name>Machine Breaker</name><uri>http://www.blogger.com/profile/01198746302581389470</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidP3RUbZ_raZP83dwzFOMx7m4rBP5ziZhUmeupX0Iej6DpJ6oksyKEZYKZKY2HgjaRqrBoaaurh4I1P_BBsDS7ecHybVcmiEVZnQAZTXEDaKqjEEvHPjNwBYZtG9-nOA/s220/jbrias.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-733155551423588445.post-8287624187862913084</id><published>2016-05-19T04:43:00.002-07:00</published><updated>2016-09-27T07:18:03.336-07:00</updated><title type='text'>Our logo</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsmUrsiaJ5ZeRHta-3ZPChtxZBFrq7BoFmTkJ5QunAuocKJD043ToDHtQb2Kbqp7KJxpG0_zEJi8Nj8NozHkq6ijLWbYgoGLk7LRbgmCJDerqCJIv2GvzNlMy_Bm_sVKSNSo3DAUMWEYg/s1600/Secon+195x69.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsmUrsiaJ5ZeRHta-3ZPChtxZBFrq7BoFmTkJ5QunAuocKJD043ToDHtQb2Kbqp7KJxpG0_zEJi8Nj8NozHkq6ijLWbYgoGLk7LRbgmCJDerqCJIv2GvzNlMy_Bm_sVKSNSo3DAUMWEYg/s1600/Secon+195x69.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://machinebreaker.blogspot.com/feeds/8287624187862913084/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://machinebreaker.blogspot.com/2016/05/our-logo.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/8287624187862913084'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/8287624187862913084'/><link rel='alternate' type='text/html' href='http://machinebreaker.blogspot.com/2016/05/our-logo.html' title='Our logo'/><author><name>Machine Breaker</name><uri>http://www.blogger.com/profile/01198746302581389470</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidP3RUbZ_raZP83dwzFOMx7m4rBP5ziZhUmeupX0Iej6DpJ6oksyKEZYKZKY2HgjaRqrBoaaurh4I1P_BBsDS7ecHybVcmiEVZnQAZTXEDaKqjEEvHPjNwBYZtG9-nOA/s220/jbrias.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsmUrsiaJ5ZeRHta-3ZPChtxZBFrq7BoFmTkJ5QunAuocKJD043ToDHtQb2Kbqp7KJxpG0_zEJi8Nj8NozHkq6ijLWbYgoGLk7LRbgmCJDerqCJIv2GvzNlMy_Bm_sVKSNSo3DAUMWEYg/s72-c/Secon+195x69.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-733155551423588445.post-7687587924665650021</id><published>2016-05-13T10:50:00.000-07:00</published><updated>2016-05-13T10:50:16.131-07:00</updated><title type='text'>Now THAT’S embarrassing!</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;&lt;i&gt;&lt;span lang=&quot;EN-GB&quot; style=&quot;line-height: 107%;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;A &lt;a href=&quot;http://www.urbandictionary.com/define.php?term=goatse&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: blue; text-decoration: none;&quot;&gt;goatse&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;
hosting site is hacked leaving users with their asses vulnerable (pun intended)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;&lt;i&gt;&lt;span lang=&quot;EN-GB&quot; style=&quot;line-height: 107%;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN-GB&quot; style=&quot;line-height: 107%;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;Reality.
You can’t make this up. It’s so much better than any reality TV show.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN-GB&quot; style=&quot;line-height: 107%;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; line-height: 15.75pt; margin-top: 0cm;&quot;&gt;
&lt;span lang=&quot;EN-GB&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;A data
breach at a forum for &lt;b&gt;&quot;anal fisting&quot;&lt;/b&gt; has resulted in the&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;exposure&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;of 107,000 accounts.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; line-height: 15.75pt;&quot;&gt;More
than a third (37 per cent) of those affected by the &lt;b&gt;Rosebutt Board&lt;/b&gt; were already
included in the &lt;/span&gt;&lt;em style=&quot;font-family: arial, arial, sans-serif; line-height: 15.75pt;&quot;&gt;Have I
Been Pwned?&lt;/em&gt;&lt;span class=&quot;apple-converted-space&quot; style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; line-height: 15.75pt;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; line-height: 15.75pt;&quot;&gt;site,
according to security researcher &lt;b&gt;Troy Hunt&lt;/b&gt;. Victims will be able to use&lt;/span&gt;&lt;span class=&quot;apple-converted-space&quot; style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; line-height: 15.75pt;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;em style=&quot;font-family: arial, arial, sans-serif; line-height: 15.75pt;&quot;&gt;Have I Been Pwned?&lt;/em&gt;&lt;span class=&quot;apple-converted-space&quot; style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; line-height: 15.75pt;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; line-height: 15.75pt;&quot;&gt;to
check whether their data has been exposed once Hunt uploads the leaked data.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; line-height: 15.75pt; margin-top: 0cm;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; line-height: 15.75pt;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; line-height: 15.75pt;&quot;&gt;
&lt;span lang=&quot;EN-GB&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;Info
exposed includes usernames, email addresses, IP addresses, and weakly hashed
passwords, Vice&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;reports. Info
uploaded to&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;em&gt;Have I Been Pwned?&lt;/em&gt;&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;will be flagged as
&quot;sensitive&quot; and not publicly searchable.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; line-height: 15.75pt;&quot;&gt;
&lt;span lang=&quot;EN-GB&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; line-height: 15.75pt;&quot;&gt;
&lt;span lang=&quot;EN-GB&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;The
Rosebutt Board caters to enthusiasts of “extreme anal dilation and anal fisting,”
many of whom have been placed at risk of public humiliation or blackmail as a
result of their sexual proclivities. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; line-height: 15.75pt;&quot;&gt;
&lt;span lang=&quot;EN-GB&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; line-height: 15.75pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;Not
surprisingly, multiple .gov and .mil email addresses were exposed in the Rosebutt
breach, Hunt&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;a href=&quot;https://twitter.com/troyhunt/status/730036184651431937&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: blue; text-decoration: none;&quot;&gt;reports&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/span&gt;&lt;span lang=&quot;EN-GB&quot;&gt;. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; line-height: 15.75pt;&quot;&gt;
&lt;i&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;Note: You know what this means, don’t you? After years of the
government sticking it up our rear ends, it’s time for some serious payback!&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; line-height: 15.75pt;&quot;&gt;
&lt;b&gt;&lt;span lang=&quot;EN-GB&quot; style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;Here’s the cherry on top&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; line-height: 15.75pt;&quot;&gt;
&lt;span lang=&quot;EN-GB&quot; style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;How
often do you find this kind of synchronicity in life? &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;background: white; line-height: 15.75pt;&quot;&gt;
&lt;span lang=&quot;EN-GB&quot; style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;Right
after reading the above news article, I turned to the Guardian. And what do I
find? The &lt;/span&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;a href=&quot;http://www.theguardian.com/artanddesign/2016/may/12/turner-prize-shortlist-anthea-hamilton-michael-dean-helen-marten-josephine-pryde&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: blue; text-decoration: none;&quot;&gt;2016 Turner Prize&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/span&gt;&lt;span lang=&quot;EN-GB&quot; style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;
shortlist features the sculpture of a man’s ass! Here’s the picture.&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span lang=&quot;EN-GB&quot; style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyvOmw8-2OHEFhyCVihTV6qvM5Hfj3ItNNIkycntqlY3aTtRobqc8GKuQCiKXt0zYrEmOcACdGqgpHg2PVFI0hcrvMam8i2RZ4LQKjAyCVQd4kI1x6bPK4gDxgJXVa5LsnO8zVPveBS9Q/s1600/bum.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;192&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyvOmw8-2OHEFhyCVihTV6qvM5Hfj3ItNNIkycntqlY3aTtRobqc8GKuQCiKXt0zYrEmOcACdGqgpHg2PVFI0hcrvMam8i2RZ4LQKjAyCVQd4kI1x6bPK4gDxgJXVa5LsnO8zVPveBS9Q/s320/bum.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span lang=&quot;EN-GB&quot; style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://machinebreaker.blogspot.com/feeds/7687587924665650021/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://machinebreaker.blogspot.com/2016/05/now-thats-embarrassing.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/7687587924665650021'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/7687587924665650021'/><link rel='alternate' type='text/html' href='http://machinebreaker.blogspot.com/2016/05/now-thats-embarrassing.html' title='Now THAT’S embarrassing!'/><author><name>Machine Breaker</name><uri>http://www.blogger.com/profile/01198746302581389470</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidP3RUbZ_raZP83dwzFOMx7m4rBP5ziZhUmeupX0Iej6DpJ6oksyKEZYKZKY2HgjaRqrBoaaurh4I1P_BBsDS7ecHybVcmiEVZnQAZTXEDaKqjEEvHPjNwBYZtG9-nOA/s220/jbrias.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyvOmw8-2OHEFhyCVihTV6qvM5Hfj3ItNNIkycntqlY3aTtRobqc8GKuQCiKXt0zYrEmOcACdGqgpHg2PVFI0hcrvMam8i2RZ4LQKjAyCVQd4kI1x6bPK4gDxgJXVa5LsnO8zVPveBS9Q/s72-c/bum.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-733155551423588445.post-1661376068223865794</id><published>2016-05-11T07:49:00.001-07:00</published><updated>2016-05-11T07:49:58.516-07:00</updated><title type='text'>More than just another brick in the wall</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;font-family: Arial; font-weight: 700; line-height: 1.38; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;i&gt;Sats answers published online...the second time in 3 weeks! &lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial; font-style: italic; font-weight: 700; line-height: 1.38; white-space: pre-wrap;&quot;&gt;Testing to go ahead despite leak&lt;/span&gt;&lt;/div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/b&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://s-media-cache-ak0.pinimg.com/736x/bc/6d/aa/bc6daaf31bb651a3ed9a6381c8c6243c.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;137&quot; src=&quot;https://s-media-cache-ak0.pinimg.com/736x/bc/6d/aa/bc6daaf31bb651a3ed9a6381c8c6243c.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Pink Floyd&#39;s The Wall&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;News published by &lt;/span&gt;&lt;a href=&quot;http://www.theguardian.com/education/2016/may/10/fresh-humiliation-as-sats-answers-published-online-for-second-time?CMP=twt_gu&quot; style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;background-color: transparent; color: #1155cc; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;several media sources&lt;/span&gt;&lt;span style=&quot;background-color: transparent; color: #1155cc; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; &lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;yesterday revealed that the Department for Education suffered a second major embarrassment after the answers for its Spelling, punctuation and grammar tests for 10 and 11 yr olds across england were published online.&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: Arial; font-size: 14.6667px; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;i&gt;When we grew up and went to school there were certain teachers who would hurt the children any way they could...&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/b&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Despite the leak, &lt;/span&gt;&lt;a href=&quot;http://www.theguardian.com/education/2016/may/10/sats-tests-go-ahead-despite-leak-education-department&quot; style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;background-color: transparent; color: #1155cc; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;testing would go ahead&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;. &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;A DfE spokesperson said the key stage 2 test of spelling, punctuation and grammar (Spag), which is compulsory for pupils in the final year of state primary school in England, would take place as planned but said its investigation would continue.&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: Arial; font-size: 14.6667px; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;i&gt;By pouring their derision upon anything we did and exposing every weakness however carefully hidden by the kids.&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;A whistleblower revealed to the Guardian that Pearson, the multinational education publisher responsible for administering the Sats, posted the tests a day early on a password protected site for test markers. According to the &lt;/span&gt;&lt;a href=&quot;http://www.bbc.co.uk/news/uk-36253697&quot; style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;background-color: white; color: #1155cc; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;BBC website&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;background-color: white; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;, a company statement said that &quot;a small number of markers accessed the paper, although as contracted markers they are bound by confidentiality and have a duty not to share any papers. We do not have any evidence that the content of the paper has been compromised.&quot;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: Arial; font-size: 14.6667px; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;i&gt;But in the town it was well known when they got home at night their fat, psychopathic wives would thrash them within inches of their lives.&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; &lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 14pt;&quot;&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;John Fallon, Pearson CEO, said the company believed 102 markers had seen the paper in the four hours it was available. &quot;Unfortunately, in this case we have made a mistake which we are very sorry for,&quot; he said.&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 14pt;&quot;&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: Arial; font-size: 14.6667px; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;i&gt;We don&#39;t need no education.&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/b&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The DfE said while the paper had not been put into the public domain, it appeared a &quot;rogue marker&quot; had then leaked the paper to the Guardian newspaper.&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: Arial; font-size: 14.6667px; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;i&gt;We don&#39;t need no thought control.&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/b&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The new key stage 2 tests for 10- and 11-year-olds have also been widely criticised by teachers and parents who say &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;they are too difficult for the age group&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;. Last week parents across the country took their children out of school in protest at the tests.&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: Arial; font-size: 14.6667px; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;i&gt;No dark sarcasm in the classroom; teachers, leave them kids alone.&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;One experienced primary school headteacher said &lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;the new grammar tests would have stumped Jane Austen&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;. “I have a degree in English language and there are a number of questions that I couldn’t answer,” she said.&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: white; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;i style=&quot;font-family: Arial; font-size: 14.6667px; line-height: 20.24px; white-space: pre-wrap;&quot;&gt;Hey, teacher! Leave them kids alone! All in all you&#39;re just another brick in the wall.&lt;/i&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;i style=&quot;font-family: Arial; font-size: 14.6667px; line-height: 20.24px; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;font-family: Arial;&quot;&gt;&lt;span style=&quot;font-size: 14.6667px; line-height: 20.24px; white-space: pre-wrap;&quot;&gt;Special thanks to &lt;b&gt;Pink Floyd&lt;/b&gt; for a great album.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://machinebreaker.blogspot.com/feeds/1661376068223865794/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://machinebreaker.blogspot.com/2016/05/more-than-just-another-brick-in-wall.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/1661376068223865794'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/1661376068223865794'/><link rel='alternate' type='text/html' href='http://machinebreaker.blogspot.com/2016/05/more-than-just-another-brick-in-wall.html' title='More than just another brick in the wall'/><author><name>Machine Breaker</name><uri>http://www.blogger.com/profile/01198746302581389470</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidP3RUbZ_raZP83dwzFOMx7m4rBP5ziZhUmeupX0Iej6DpJ6oksyKEZYKZKY2HgjaRqrBoaaurh4I1P_BBsDS7ecHybVcmiEVZnQAZTXEDaKqjEEvHPjNwBYZtG9-nOA/s220/jbrias.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-733155551423588445.post-4897843137739295326</id><published>2016-05-11T05:56:00.001-07:00</published><updated>2016-05-13T10:44:29.214-07:00</updated><title type='text'>A new cybersecurity study reveals that…</title><content type='html'>&lt;b&gt;&lt;i&gt;Cybersecurity studies - how many does that make this year, 12...15?&lt;/i&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://s.yimg.com/ny/api/res/1.2/i5r5oGzHB0odiu.hRj76QA--/YXBwaWQ9aGlnaGxhbmRlcjtzbT0xO3c9ODAwO2lsPXBsYW5l/http://40.media.tumblr.com/676bd84d01bdf6e5cd11051b840d7428/tumblr_inline_nvkbvnm7em1rxwctk_540.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;216&quot; src=&quot;https://s.yimg.com/ny/api/res/1.2/i5r5oGzHB0odiu.hRj76QA--/YXBwaWQ9aGlnaGxhbmRlcjtzbT0xO3c9ODAwO2lsPXBsYW5l/http://40.media.tumblr.com/676bd84d01bdf6e5cd11051b840d7428/tumblr_inline_nvkbvnm7em1rxwctk_540.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;No one keeps a secret for long&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
Has anyone noticed? 
&lt;br /&gt;
&lt;br /&gt;
Almost daily we are being treated to the findings of yet another cybersecurity report designed (and not by accident, I might add) to scare the living bejesus out of us. 
&lt;br /&gt;
&lt;br /&gt;
For some reason, everytime I see a new cybersecurity report has been released, regardless of its content, I am instantly transported back to that popular 80s arcade game, Pac-Man ━  that canary yellow,  jaw-chomping, insatiable dot eater, whose 8-bit &lt;b&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=xbR_-kVEYQ0&quot; style=&quot;color: blue;&quot;&gt;wakka-wakka wav sound file&lt;/a&gt;&lt;/b&gt; was the inspiration for Shakira’s &lt;b&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=pRpeEdMmmQ0&quot; style=&quot;color: blue;&quot;&gt;2010 World Cup Waka-Waka theme song&lt;/a&gt;&lt;/b&gt;, I’m guessing. OK, that’s not even close.
&lt;br /&gt;
&lt;br /&gt;
This Pac-Man, however, has my face on it and I’m being chased around an ever increasingly, difficult-to-survive, digital maze by 4 hungry little chomping “ware” ghosts - &lt;b&gt;adware, malware, spyware and ransomware&lt;/b&gt;. Actually, any 80s arcade game is a great metaphor for today’s cyberattacks ━ Joust, Frogger, Space Invaders, Caterpillar, even Q*Bert ━ they’re all coming to get you, the hero, and you know that, sooner or later, you’re going to die. There’s no escape.
&lt;br /&gt;
&lt;br /&gt;
I may be wrong but it’s as if these reports are &lt;b&gt;being released almost simultaneously with the news of some cyberattack&lt;/b&gt;. And that makes me wonder if somehow security developers might be in cahoots with code hackers. 
&lt;br /&gt;
&lt;br /&gt;
I don’t want to belittle the gravity or consequences of these attacks ━ they are real. But it’s not surprising either that most of these cyberreports originate in the US, the masters of fear mongering. &lt;b&gt;Americans live off fear&lt;/b&gt;; just look at their news and adverts. It’s how they make their money. They spread fear and get you to buy stuff. Erectile dysfunction? We have a pill; Weird, suspicious looking neighbors? We have guns; Fear of illegal immigrants? We’ll build a wall; Running out of oil? We’ll start a war somewhere. All you have to do is pay.
&lt;br /&gt;
&lt;br /&gt;
In fact, this heightened state of collective paranoia has reached such a fever pitch that, just this past weekend, &lt;b&gt;&lt;a href=&quot;http://www.huffingtonpost.com/entry/professor-math-terrorist-flight-delay_us_572e41e6e4b016f3789617f7&quot; style=&quot;color: blue;&quot;&gt;a lady on a flight from Philadelphia to Syracuse&lt;/a&gt;&lt;/b&gt; reported to flight attendants that the person sitting next to her might be a terrorist because he was “writing strange things on a notepad.” It turns out the person next to her was professor Guido Menzio, an Italian economist working on some differential equations. I’m sure authorities at the Pentagon and NSA love this woman because she bought into the fear like a champion. To me, though, this woman just went off on a &lt;b&gt;(sinα / cos α)&lt;/b&gt;. In case you’re wondering, that equation translates to &lt;b&gt;tangent&lt;/b&gt;. Hey, maybe I’m a terrorist, too!
&lt;br /&gt;
&lt;br /&gt;
So the big question remains. How do we sift through all the fear tactics with the least amount of psychological and emotional damage? 
&lt;br /&gt;
&lt;br /&gt;
There are at least two ways. The first one is guaranteed to rid you of your fear forever. Live off the grid. Throw away everything electronic - TVs, phones, computers, cars, radios, watches, microwave ovens, trainers, etc. - basically anything with a chip in it, sell your house and belongings, buy a 60s or 70s vintage car, move out into the country far away from CCTV cameras, grow your own food and live free away from prying eyes, negative news reports, inane reality shows and doomsday-predicting politicians! Some people have done it and swear by it. 
&lt;br /&gt;
&lt;br /&gt;
It’s a great life, if you can find it. &lt;b&gt;&lt;a href=&quot;http://www.waff.com/story/29309958/city-says-huntsville-couple-cant-live-off-the-grid&quot; style=&quot;color: blue;&quot;&gt;Just ask this fellow from Alabama&lt;/a&gt;&lt;/b&gt;. Wait...what? That’s right, if you don’t buy any stuff, the government will come for you and evict you from your own land for being “unpatriotic.” So much for freedom, then. Clearly, you’re only allowed to be as free as the stuff ‘fear’ tells you to buy.
&lt;br /&gt;
&lt;br /&gt;
The other way is to use common sense, the ability to act in accordance to the consequences of cause-effect, a commodity of which we are in short supply. The demographics here are quite clear: millennials are, by far, the most tech savvy group. In other words, they’re the ones who spend the most time online, and, by extension, the demographic with the least awareness for common sense. Again, I don’t blame the ordinary millennials for their lack of cybersecurity awareness. They’re programmed to be online 24/7 with no regard for consequences. It’s a trend that’s been slowly developing and taking hold since the 80s.
&lt;br /&gt;
&lt;br /&gt;
Those of us who are older, and hopefully wiser, know the dangers of information, i.e., data, overload. We were brought up with phrases like, “Loose lips sink ships” and “Mum’s the word.” So we’re naturally wary of all these bits of personal data flying about in cyberspace. But millennials have no such compunction; they don’t know anything else.
&lt;br /&gt;
&lt;br /&gt;
So, use common sense because there’s no other alternative.
&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Install a good, reputable security program on all your devices. Make sure these offer VPNs and are cloud compatible.&lt;/li&gt;
&lt;li&gt;Install a good password manager.&lt;/li&gt;
&lt;li&gt;Make sure all your system devices are patched and updated.&lt;/li&gt;
&lt;li&gt;Don’t go putting stuff on the internet you wouldn’t want your mother to see.&lt;/li&gt;
&lt;li&gt;If you must do porn, go only to reputable porn sites. (yes, they exist!)&lt;/li&gt;
&lt;li&gt;Don’t share everything with everybody - your real life is more important than your virtual one.&lt;/li&gt;
&lt;li&gt;If you’re going to cheat on your spouse, do it the old fashioned way - go to a brothel and pay for it; don’t look for it online. Check out &lt;i&gt;The Girlfriend Experience&lt;/i&gt; on Showtime.&lt;/li&gt;
&lt;li&gt;READ! Preferably more than 140 characters at a time. There’s a lot of great advice out there; inform yourself. We have more knowledge available to us than at any point in history, and yet, we seem to be dumber than ever before.&lt;/li&gt;
&lt;li&gt;Employ a “best practices” strategy.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
But above all, just remember this - everything you do online is visible in some form or another. What would you like strangers to know about you...or not? </content><link rel='replies' type='application/atom+xml' href='http://machinebreaker.blogspot.com/feeds/4897843137739295326/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://machinebreaker.blogspot.com/2016/05/a-new-cybersecurity-study-reveals-that.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/4897843137739295326'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/4897843137739295326'/><link rel='alternate' type='text/html' href='http://machinebreaker.blogspot.com/2016/05/a-new-cybersecurity-study-reveals-that.html' title='A new cybersecurity study reveals that…'/><author><name>Machine Breaker</name><uri>http://www.blogger.com/profile/01198746302581389470</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidP3RUbZ_raZP83dwzFOMx7m4rBP5ziZhUmeupX0Iej6DpJ6oksyKEZYKZKY2HgjaRqrBoaaurh4I1P_BBsDS7ecHybVcmiEVZnQAZTXEDaKqjEEvHPjNwBYZtG9-nOA/s220/jbrias.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-733155551423588445.post-2958418759985813997</id><published>2013-02-17T03:07:00.002-08:00</published><updated>2013-02-17T08:02:58.886-08:00</updated><title type='text'>Secure.me your Facebook page (pt. 2)</title><content type='html'>OK, we&#39;ve discussed the first two sections of Secure.me. Before jumping into the third section, I thought I would post links to a couple of reviews I found online. The &lt;a href=&quot;https://www.secure.me/en/about/press/press-releases/secure-me-launches-app-advisor-to-shield-facebook-users/&quot; style=&quot;color: blue;&quot;&gt;&lt;b&gt;first one&lt;/b&gt;&lt;/a&gt; is from the Secure.me website and provides a primer on how Secure.me works. It also provides some interesting statistics on their analysis of 500,000 social media apps. The statistics alone should give you cause for concern. The &lt;a href=&quot;http://venturebeat.com/2011/11/30/secure-me-facebook/&quot; style=&quot;color: blue;&quot;&gt;&lt;b&gt;second one&lt;/b&gt;&lt;/a&gt; is a blog written by a mother who expresses her concerns about online stalkers and the need to protect her children. Needless to say, she uses Secure.me to monitor her children&#39;s facebook profiles.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;3. Threat summary&lt;/b&gt;&lt;br /&gt;
On the left hand column, Secure.me displays your threat summary. The number is orange next to &#39;Summary&#39; is the total number of threats over the time period you set (see &#39;&lt;b&gt;2. Scan now&lt;/b&gt;&#39; below) found by the scan process. The total is broken down into the 5 different areas I described previously. As you can see, in my particular&amp;nbsp;case, I have a total of 232 potential threats of which 201 are due to photos. And these are the threats found over the previous 7 days only. (I dread to think what Secure.me will find if I perform a scan back to 2007!)&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;ol&gt;
&lt;li&gt;&lt;u&gt;&lt;b&gt;Photos&lt;/b&gt;&lt;/u&gt;&lt;/li&gt;
Go ahead and click on the &#39;Photos&#39; tab located at the left hand column. Secure.me will open a new page providing a summary of all the photos scanned at the top part of the page. Directly below are the images you have uploaded, and directly below that are the pictures your friends have uploaded. See image below. Again, right click the image and select &#39;&lt;i&gt;Open image in new tab&lt;/i&gt;&#39; to view the full sized image in a new tab.&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimdh7GXwdRKjuDRFGWxS_6IO8CiSA3fQYh43xdZfgdvrETKgmt1d85nfl-gYCCLiaJYE0AJcuHkyGbd05c7NzWLKkzR7BCmpAl406pu-3m-g-U15CFBW180ZdMlA3N51UNFK6xbaE2FWA/s1600/FBsec3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimdh7GXwdRKjuDRFGWxS_6IO8CiSA3fQYh43xdZfgdvrETKgmt1d85nfl-gYCCLiaJYE0AJcuHkyGbd05c7NzWLKkzR7BCmpAl406pu-3m-g-U15CFBW180ZdMlA3N51UNFK6xbaE2FWA/s1600/FBsec3.jpg&quot; height=&quot;223&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Photo Analysis Section&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
At the bottom of the screen, turn the photo monitoring option (red box) to &#39;ON&#39; by clicking the button.&lt;br /&gt;
&lt;br /&gt;Read the page carefully. It says a total of 2693 images have been scanned. Of these, 1020 are the total number of photos I have uploaded, of which 34 photos (the red box on the right) were scanned over the past week and the remaining 1673 images were uploaded/posted by friends. The number 1673 represents the photos/images posted by ALL my friends over the previous week, and out of those 1673 photos, I have been tagged or mentioned in 134 of them.&lt;br /&gt;
&lt;br /&gt;Right about now you&#39;re probably wondering, so what? Again, there may be unflattering photos of you which you would rather delete, especially if you&#39;re looking for a job, or your children may be posting pictures of themselves which you would rather not let the world see.&lt;br /&gt;
&lt;br /&gt;At present, you will have to review the pictures one by one as Secure.me does not have a feature that allows the user to select multiple photos at a the same time. However, they are working on offering this feature.&lt;br /&gt;
&lt;br /&gt;To summarize, if there are no pictures of you throwing up or urinating at the curb after an evening of bacchanalian revelry, you probably have nothing to worry about. Nonetheless, it&#39;s a feature that&#39;s useful to have.&lt;br /&gt;
&lt;br /&gt;
&lt;li&gt;&lt;u&gt;&lt;b&gt;Activities&lt;/b&gt;&lt;/u&gt;&lt;/li&gt;
The Activities section is where you check, not only all your status updates, shares, likes and comments, but those of your friends as well over the given scan period. Again, it allows you to check which wall posts are objectionable. The right column displays the number of daily posts over the scan period. See image below (right click and open in a new tab).&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXLB4Oz3HNaoYF6TKJb7oSL28dYmWFUMFlzixbgfKUhUJeP-lqnXFmxmeOb5QScpuM6c-dWoUmOdPC6rO-IWxE_TaeB6hHtzImC2pwWFH_tfL2uVaVyLTFfykoDuITnWSr0PbxukRttrc/s1600/FBsec4.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXLB4Oz3HNaoYF6TKJb7oSL28dYmWFUMFlzixbgfKUhUJeP-lqnXFmxmeOb5QScpuM6c-dWoUmOdPC6rO-IWxE_TaeB6hHtzImC2pwWFH_tfL2uVaVyLTFfykoDuITnWSr0PbxukRttrc/s1600/FBsec4.jpg&quot; height=&quot;223&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Activities Analysis Section&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;li&gt;&lt;u&gt;&lt;b&gt;Privacy Analysis&lt;/b&gt;&lt;/u&gt;&lt;/li&gt;
Now we&#39;re getting to the good stuff because this is were your personal information can be at risk. Take a look at the image below (right click and open in a new tab).
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRkcX3XLKwEbdQlV-ruYzjlqAyzDdnzJ3asOV0c_PXCf6QOcunzanjtAWhKJJmTMZ35qXDp70eGSUn2H-xceI-aCI66GDd7dB60pOMMK-oR4VX44jEzNE3Q5JhZhQ1rjvKTaqT4ESBPts/s1600/FBsec5.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRkcX3XLKwEbdQlV-ruYzjlqAyzDdnzJ3asOV0c_PXCf6QOcunzanjtAWhKJJmTMZ35qXDp70eGSUn2H-xceI-aCI66GDd7dB60pOMMK-oR4VX44jEzNE3Q5JhZhQ1rjvKTaqT4ESBPts/s1600/FBsec5.jpg&quot; height=&quot;223&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Privacy Analysis Section&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
This is the information you (in this case me) have on your profile page, stuff like date of birth and email on the top part, and Education, Work, Family, Religious beliefs and Relationship status on the bottom. As you can see, I have 5 possible threats (only the first 3 are shown) and score only 4 out of a possible 10. In other words, I should review the information I&#39;m making public. Note the 3 red boxes on the left side and the 3 on the right side. On the left side, two of the boxes are POSSIBLE threats (text in yellow) and one is considered a HIGH threat (text in red). &lt;b&gt;Click the text in these boxes or the &quot;i&quot; on the right side boxes&lt;/b&gt; to get an explanation of WHAT it means, WHY this profile entry is considered a threat and HOW you can correct the security settings of the information displayed. Observe that even if you make the appropriate changes as recommended by Secure.me, this page will continue to show this information as possible threats.&lt;br /&gt;
&lt;br /&gt;The important thing to take into account is to review and apply the appropriate measures recommended by Secure.me. This is called &#39;locking down&#39; the security on your personal information. For some users, however, locking down their profiles isn&#39;t sufficient; they should be locked up...in a cell.&lt;br /&gt;
&lt;br /&gt;
&lt;li&gt;&lt;u&gt;&lt;b&gt;Profile Analysis&lt;/b&gt;&lt;/u&gt;&lt;/li&gt;
The profile analysis section pertains to the language recognition feature of Secure.me. As you can see, out of 679 posts appearing in my page in the past seven days, 20 have been found to have objectionable language (high-lighted in yellow), all of them from yours truly. In other words, I am, by nature, foul-mouthed and prone to use offensive to very offensive language. Despite the fact I tend to use foul language in excess, the mood of my posts is positive, thus the 10/10 profile analysis rank. Furthermore, the pie chart on the right column provides a breakdown of the source of the posts. In this case, I am the source of 99% of all the dirty language on my posts. But then again, I knew that already. See image below (right click and open in a new tab).
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbrUD-74xs0WoSZSz69y5Bm6NdM2DPJFiKy7FgKlG6ODw_vRXBXD8Yh33Jh_YiUQrzAucOX9I1Yawp-vf0QPzv0kB9NH9kONiaz4ABMGz27C1aO8jFK-RJ7nM-zLqBdknwVADx73-UY0E/s1600/FBsec6.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbrUD-74xs0WoSZSz69y5Bm6NdM2DPJFiKy7FgKlG6ODw_vRXBXD8Yh33Jh_YiUQrzAucOX9I1Yawp-vf0QPzv0kB9NH9kONiaz4ABMGz27C1aO8jFK-RJ7nM-zLqBdknwVADx73-UY0E/s1600/FBsec6.jpg&quot; height=&quot;223&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Profile Analysis Section&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;li&gt;&lt;u&gt;&lt;b&gt;Network Analysis&lt;/b&gt;&lt;/u&gt;&lt;/li&gt;
Finally, we have the network analysis section which analyzes the language of your friend&#39;s posts appearing on your page. Similarly, by clicking on the yellow cautionary text after each post, Secure.me explains why these posts are threatening and what you can do about it if you are so inclined. Well, personally I am not so inclined to censure any posts or comments so it&#39;s a feature I don&#39;t really use. However, if you have little ones on Facebook, you may want to monitor the language of their friends. &lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifdMCodYvWk7zKcoaJfnsh-_Gsn7_8USSru-P6LmDlW0bPBRz6GRtFPRCiNTFbwq8lXajgCf0LRhyphenhyphenLkXbuuyM0S3kpsF5Qz3L-IxRv1XzmBtrG79KJ038YE1NI9YdExZYuol7M4qupC4Q/s1600/FBsec7.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;b&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifdMCodYvWk7zKcoaJfnsh-_Gsn7_8USSru-P6LmDlW0bPBRz6GRtFPRCiNTFbwq8lXajgCf0LRhyphenhyphenLkXbuuyM0S3kpsF5Qz3L-IxRv1XzmBtrG79KJ038YE1NI9YdExZYuol7M4qupC4Q/s1600/FBsec7.jpg&quot; height=&quot;223&quot; width=&quot;400&quot; /&gt;&lt;/b&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;b&gt;Network Analysis Section&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/ol&gt;
&lt;b&gt;4. Privacy, Profile and Network Analysis&lt;/b&gt;&lt;br /&gt;
This topic has been covered at length in the previous section and needs no further explanation.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;5. Secure ranking&lt;/b&gt;&lt;br /&gt;
This topic has also been covered in the previous section and needs no further explanation&lt;br /&gt;
&lt;br /&gt;
And basically, that&#39;s it! Remember: Secure.me will not fix your Facebook security. It will point out potential weaknesses in your page and recommend fixes. If you still encounter problems, email me.&lt;br /&gt;
&lt;br /&gt;
One last thing, I apologize for the layout of the blog - it&#39;s horrible. I&#39;ll have to do something about that.&lt;br /&gt;
&lt;ol&gt;&amp;nbsp;&lt;ol&gt;&lt;br /&gt;&lt;/ol&gt;
&lt;/ol&gt;
</content><link rel='replies' type='application/atom+xml' href='http://machinebreaker.blogspot.com/feeds/2958418759985813997/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://machinebreaker.blogspot.com/2013/02/secureme-your-facebook-page-pt-2.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/2958418759985813997'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/2958418759985813997'/><link rel='alternate' type='text/html' href='http://machinebreaker.blogspot.com/2013/02/secureme-your-facebook-page-pt-2.html' title='Secure.me your Facebook page (pt. 2)'/><author><name>Machine Breaker</name><uri>http://www.blogger.com/profile/01198746302581389470</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidP3RUbZ_raZP83dwzFOMx7m4rBP5ziZhUmeupX0Iej6DpJ6oksyKEZYKZKY2HgjaRqrBoaaurh4I1P_BBsDS7ecHybVcmiEVZnQAZTXEDaKqjEEvHPjNwBYZtG9-nOA/s220/jbrias.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimdh7GXwdRKjuDRFGWxS_6IO8CiSA3fQYh43xdZfgdvrETKgmt1d85nfl-gYCCLiaJYE0AJcuHkyGbd05c7NzWLKkzR7BCmpAl406pu-3m-g-U15CFBW180ZdMlA3N51UNFK6xbaE2FWA/s72-c/FBsec3.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-733155551423588445.post-1738375767789869649</id><published>2013-02-15T09:25:00.002-08:00</published><updated>2013-02-17T04:31:41.675-08:00</updated><title type='text'>Secure.me your Facebook page (pt. 1)</title><content type='html'>&lt;b&gt;With Facebook&#39;s new Graph Search capabilities, your profile page pictures and wall posts are more exposed than ever before. The New York Times recently wrote an &lt;a href=&quot;http://www.nytimes.com/2013/02/07/technology/personaltech/protecting-your-privacy-on-the-new-facebook.html?_r=1&amp;amp;amp&quot; style=&quot;color: blue;&quot;&gt;&lt;b&gt;article&lt;/b&gt;&lt;/a&gt; on several privacy tools users may find useful. So far, I&#39;ve only tried Secure.me which I explain below.&lt;/b&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Recently, lots of Facebook users have been posting privacy notices and the need to get expressed written consent for the use of their pictures or content. Out of fear, other users see the post and share it by copy/pasting it on their own walls causing the whole thing to go viral. While the post may sound legal, beguiling the user to think (erroneously) he or she is actually protected, these messages have no legal bearing whatsoever.&lt;br /&gt;
&lt;br /&gt;
The worst part is, people don&#39;t even bother to check the veracity or authenticity of the message. They just simply assume that because it&#39;s being posted on Facebook, it must be true the same way chain emails are true. (&lt;i&gt;If you don&#39;t forward this blog to 10 friends, the DPRK will nuke the US.&lt;/i&gt;) However, a quick check on &lt;b&gt;&lt;a href=&quot;http://www.snopes.com/computer/facebook/privacy.asp&quot; style=&quot;color: blue;&quot;&gt;Snopes.com&lt;/a&gt;&lt;/b&gt; will tell you all you need to know about the message you&#39;re posting. But if you still don&#39;t get it, College Humor has a &lt;a href=&quot;http://www.collegehumor.com/video/6851490/facebook-law-for-idiots&quot; style=&quot;color: blue;&quot;&gt;&lt;b&gt;video&lt;/b&gt;&lt;/a&gt; that will make you feel like a downright idiot. If you&#39;re still in doubt, just Google it and see the &lt;a href=&quot;https://www.google.com/search?num=50&amp;amp;hl=en&amp;amp;tbo=d&amp;amp;rlz=1C2PQHS_enES489ES494&amp;amp;q=privacy+notice+facebook&amp;amp;oq=privacy+notice+facebook&amp;amp;gs_l=serp.1.0.0j0i7l2j0j0i7i30j0i30l2j0i7i30j0i30j0i7i30.21498.21498.0.23729.1.1.0.0.0.0.201.201.2-1.1.0.les%3B..0.0...1c.1.3.serp.1u9rUyumLsc&quot; style=&quot;color: blue;&quot;&gt;&lt;b&gt;results&lt;/b&gt;&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
So, &lt;b&gt;stop posting useless, none binding legal notices and stop asking your Facebook friends to perform security tasks for you&lt;/b&gt;. Take responsibility for your own security. &lt;b&gt;&lt;a href=&quot;http://secure.me/&quot; style=&quot;color: blue;&quot;&gt;Secure.me&lt;/a&gt;&lt;/b&gt; is just one of many available free apps that can help you in this regard.&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;
&lt;b&gt;Secure.me&lt;/b&gt;&lt;br /&gt;
Let me start by saying Secure.me is a &lt;b&gt;monitoring tool&lt;/b&gt;, it will &lt;b&gt;NOT&lt;/b&gt; configure your privacy settings on Facebook; you still have to do that yourself. What Secure.me does is scan all your &lt;i&gt;&lt;b&gt;photos&lt;/b&gt;&lt;/i&gt;, &lt;i&gt;&lt;b&gt;activities&lt;/b&gt;&lt;/i&gt; (latest user activities, status updates, comments, likes, places and friends), &lt;i&gt;&lt;b&gt;privacy analysis&lt;/b&gt;&lt;/i&gt; (personal information), &lt;i&gt;&lt;b&gt;profile analysis&lt;/b&gt;&lt;/i&gt; (questionable language on wall posts) and &lt;i&gt;&lt;b&gt;network analysis&lt;/b&gt;&lt;/i&gt; (questionable language on your friend&#39;s posts), and then proceeds to give you an account summary of its findings. You may or may not care for the language analysis feature of Secure.me, but it&#39;s there for a reason. Job recruiters and HR personnel normally do Facebook background checks of potential employees. By minimizing objectionable&amp;nbsp;language, candidates will have a more positive projection of themselves. &lt;br /&gt;
&lt;br /&gt;
After you install Secure.me (I am assuming you know how to install a free app), go ahead and login. You should see the following screen. Right click the image and select &#39;&lt;i&gt;Open image in new tab&lt;/i&gt;&#39; from the contextual menu. A full size image will open in the new tab. I&#39;ve boxed and labeled&amp;nbsp;the sections 1 to 5 which are explained below.&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdxZHCuOz896YrbXf6Dh8KhAcao_cZ6OnqlRtb4ILdrOCQTqNLTKix6P-wVbnPfAelJaUG79yKeqfqXoM78g-DVhlXHTTkeYuViSqEnqyhTlP-sWrpUxoEfKGlcu1hm17KjvlYOZG0x1g/s1600/FBsec1.jpg&quot; height=&quot;221&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Secure.me User Home Page&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;1. Automatic Monitoring&lt;/b&gt;&lt;br /&gt;
You can choose to have your Facebook page monitored 24/7 (ON) or you can manually scan your profile (OFF). If this is the first time you use Secure.me, change the setting to ON.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a name=&quot;scan&quot;&gt;2. Scan Now&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
The first time you use Secure.me, the Automatic Monitoring option is set to OFF by default. Click the Scan Now button. After the scanning process is complete, which can take several minutes depending on the time frame option (7 days, 30 days, 90 days), set the Automatic Monitoring option to ON.&lt;br /&gt;
&lt;br /&gt;
Below these two options is a graph of the results of the scan.&amp;nbsp;And right below the graph, it displays a summary of the analysis of privacy issues as well as the state of your profile and your network. Each of these three topics gets a rating up to 10 points, with 10 being the best.&lt;br /&gt;
&lt;br /&gt;
(cont&#39;d.&amp;nbsp;in pt. 2)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://machinebreaker.blogspot.com/feeds/1738375767789869649/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://machinebreaker.blogspot.com/2013/02/secure.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/1738375767789869649'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/1738375767789869649'/><link rel='alternate' type='text/html' href='http://machinebreaker.blogspot.com/2013/02/secure.html' title='Secure.me your Facebook page (pt. 1)'/><author><name>Machine Breaker</name><uri>http://www.blogger.com/profile/01198746302581389470</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidP3RUbZ_raZP83dwzFOMx7m4rBP5ziZhUmeupX0Iej6DpJ6oksyKEZYKZKY2HgjaRqrBoaaurh4I1P_BBsDS7ecHybVcmiEVZnQAZTXEDaKqjEEvHPjNwBYZtG9-nOA/s220/jbrias.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdxZHCuOz896YrbXf6Dh8KhAcao_cZ6OnqlRtb4ILdrOCQTqNLTKix6P-wVbnPfAelJaUG79yKeqfqXoM78g-DVhlXHTTkeYuViSqEnqyhTlP-sWrpUxoEfKGlcu1hm17KjvlYOZG0x1g/s72-c/FBsec1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-733155551423588445.post-3610680050261873351</id><published>2012-06-19T08:12:00.009-07:00</published><updated>2012-06-19T10:41:41.002-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="google"/><category scheme="http://www.blogger.com/atom/ns#" term="government censorship"/><category scheme="http://www.blogger.com/atom/ns#" term="online content"/><category scheme="http://www.blogger.com/atom/ns#" term="terrorism"/><category scheme="http://www.blogger.com/atom/ns#" term="transparency"/><category scheme="http://www.blogger.com/atom/ns#" term="transparency report"/><title type='text'>Google, online content and government censorship</title><content type='html'>&lt;b&gt;Today&#39;s headlines reveal that Google is alarmed over increasing government requests to censor online content. Do you have cause to worry?&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;The first thing I do in the morning is go online and read the news. Most days I read up on the latest sporting results and the headlines on the utter failure of the Spanish economy. However, when I wake up to this sort of news it&#39;s like shooting caffeine straight into my veins. &lt;br /&gt;&lt;br /&gt;In its latest &lt;a style:color=#0000ff href=&quot;http://www.google.com/transparencyreport/removals/government/&quot;&gt;Transparency Report&lt;/a&gt;, Google claims that governments, both foreign and domestic, have increased their request for the search engine giant to remove blog posts and videos. Aside from removing content, the requests also asked Google to hand over user information. Amazingly, the requests were made mostly at the behest of western democratic governments.&lt;br /&gt;&lt;br /&gt;This would all be well and fine if the content were solely related to terrorist activities and copyright infringement but this is not always the case. The Independent, a British newspaper, states that &lt;i&gt;&quot;Google says it increasingly fields requests from government agencies trying to use their power to suppress political opinions and other material they don&#39;t like. That comment may have been aimed at the US, where police prosecutors, courts and other government agencies submitted 187 requests to remove content from July through December last year, more than doubling from 92 requests from January through June.&quot;&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;The Voice of America further states that &lt;i&gt;&quot;the latest report goes on to detail a noticeable increase in the number of governments requesting material be taken down or blocked not for legal reasons per se, but more for image purposes.&quot;&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Here&#39;s a sampling of the Transparency Report:&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Germany&lt;/b&gt; - A court order resulted in the removal of 898 search results that linked to forums and blogs containing statements about a government agency and one of its employees that the court determined were not credible.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Canada&lt;/b&gt; - We received a request from the Passport Canada office to remove a YouTube video of a Canadian citizen urinating on his passport and flushing it down the toilet. We did not comply with this request.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Spain&lt;/b&gt; - We received 14 requests from the Spanish Data Protection Authority to remove 270 search results that linked to blogs and sites referencing individuals and public figures. The Spanish Data Protection Authority also ordered the removal of three blogs published on Blogger and three videos hosted on YouTube. We did not comply with these requests.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;United States&lt;/b&gt; - We received a request from a local law enforcement agency to remove a blog because of a post that allegedly defamed a law enforcement official in a personal capacity. We did not comply with this request, which we have categorized in this Report as a defamation request.&lt;br /&gt;&lt;br /&gt;We received a request from a local law enforcement agency to remove 1,400 YouTube videos for alleged harassment. We did not comply with this request. Separately, we received a request from a different local law enforcement agency to remove five user accounts that allegedly contained threatening and/or harassing content. We terminated four of the accounts, which resulted in the removal of approximately 300 videos, but did not remove the remaining account with 54 videos.&lt;br /&gt;&lt;br /&gt;We received a court order to remove 218 search results that linked to allegedly defamatory websites. We removed 25% of the results cited in the request.&lt;br /&gt;&lt;br /&gt;The number of content removal requests we received increased by 103% compared to the previous reporting period.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Freedom of expression&lt;/b&gt;&lt;br /&gt;The question then is, does free speech exist? For those of us living in western democracies, the answer would be an unequivocal &quot;yes,&quot; but if and only if you tow the government zeitgeist.&lt;br /&gt;&lt;br /&gt;I lived in the U.S. for over five years while going to school, and in all that time I never felt that I was living in the &quot;land of the free.&quot; To me, freedom in the U.S. was always an illusion. Instead, it felt like an Orwellian nightmare police state. The U.S. will have their citizens believe they are free only if they buy their brand of freedom, which is to say fear. By instilling fear, the government controls the people, how they think and what they think. Look for example what happened in Iraq. The government fed its people a bunch of lies, sprinkled it with Weapons of Mass Destruction (WMD) and impending terrorist attacks, and justified the subsequent invasion.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Time&#39;s Man of the Year&lt;/b&gt;&lt;br /&gt;For me, the clearest example of this &quot;controlled&quot; freedom of the press happened back in 2001. &lt;br /&gt;&lt;br /&gt;Every year Time magazine selects a Man of the Year or, as it is now known, Person of the Year. The only criteria set by the editors of Time to determine who or what receives the recognition is a person, group, idea or object that &lt;i&gt;&quot;for better or for worse, has done the most to influence the events of the year.&quot;&lt;/i&gt; As such, Time had previously selected Hitler, Stalin and Ayatollah Khomeini as Person of the Year.&lt;br /&gt;&lt;br /&gt;In 2001, the choice was clear: Osama bin Laden. However, prior to the release of the issue, Time conducted a survey among readers in the mid-west. The reaction was foreseeable: the choice of Osama bin Laden was seen as deplorable and would have antagonized its readers, possibly damaging the magazine&#39;s and the Group&#39;s revenues.&lt;br /&gt;&lt;br /&gt;Time&#39;s official statement was the following: &lt;i&gt;&quot;Though we spent hours contemplating the pros and cons of naming Osama bin Laden, it ultimately became easy to dismiss him,&quot; said managing editor Jim Kelly. &quot;He is not a larger-than-life figure with broad historical sweep...he is smaller than life, a garden variety terrorist whose evil plan succeeded beyond his highest hopes.&quot;&lt;/i&gt; &lt;br /&gt;&lt;br /&gt;In the end, time named Rudolph Giuliani as Person of the Year and in so doing compromised its journalistic integrity. Eleven years on, the world still lives under the shadow of Osama bin Laden and Al-Qaeda. Where has Rudolph Giuliani been all these years?&lt;br /&gt;&lt;br /&gt;Whatever justification Jim Kelly gave, Time sold out to crass commercialism and threw its principles out the window. And it is for this simple reason I have not bought a Time magazine since 2001. I cannot subscribe to a news company that claims to be impartial when in fact it is not. &lt;br /&gt;&lt;br /&gt;So, is there freedom of expression? Absolutely...just tow the government line and live an illusion.&lt;br /&gt;&lt;br /&gt;&lt;font size=2&gt;&lt;i&gt;My mind is my voice; my laptop its vocalizer&lt;/i&gt; - Javi Brias&lt;/font&gt;</content><link rel='replies' type='application/atom+xml' href='http://machinebreaker.blogspot.com/feeds/3610680050261873351/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://machinebreaker.blogspot.com/2012/06/google-online-content-and-government.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/3610680050261873351'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/3610680050261873351'/><link rel='alternate' type='text/html' href='http://machinebreaker.blogspot.com/2012/06/google-online-content-and-government.html' title='Google, online content and government censorship'/><author><name>Machine Breaker</name><uri>http://www.blogger.com/profile/01198746302581389470</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidP3RUbZ_raZP83dwzFOMx7m4rBP5ziZhUmeupX0Iej6DpJ6oksyKEZYKZKY2HgjaRqrBoaaurh4I1P_BBsDS7ecHybVcmiEVZnQAZTXEDaKqjEEvHPjNwBYZtG9-nOA/s220/jbrias.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-733155551423588445.post-7731034785820128626</id><published>2012-01-25T03:49:00.116-08:00</published><updated>2012-04-09T04:23:54.522-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="business model"/><category scheme="http://www.blogger.com/atom/ns#" term="copyright infringement"/><category scheme="http://www.blogger.com/atom/ns#" term="megaupload"/><category scheme="http://www.blogger.com/atom/ns#" term="piracy"/><title type='text'>Megaupload: piracy or business savvy?</title><content type='html'>&lt;b&gt;The Megaupload case has created worldwide interest due to its ramifications. The outcome of this case could determine the future of file sharing, not only on a wholesale basis but on a personal level as well.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
I&#39;ve been following the Megaupload case with great interest and was going to start this post yesterday but decided to wait for the outcome of Dotcom&#39;s bail hearing, which we now know has been denied.&lt;br /&gt;
&lt;br /&gt;
Beyond the criminal aspects of this case which have yet to be proven, there&#39;s something very unsettling about this whole media circus because its akin to a schoolyard bully marking his ground and demanding tribute.    &lt;br /&gt;
&lt;br /&gt;
This story is not about justice, it&#39;s about disrespect. It&#39;s about the street corner drug dealer not paying the Don his due. When Big Content says Megaupload is guilty of piracy, they&#39;re not really concerned that people are illegally downloading copyrighted content from the site. They&#39;re enraged that Dotcom is making money off their labor and he&#39;s not paying them a cent. And that&#39;s the whole point. It&#39;s a question of money and not justice.&lt;br /&gt;
&lt;br /&gt;
For decades the Hollywood bigwigs have languorously sat behind huge oak desks smoking illegally obtained Cuban Cohibas while their media output produced millions in earnings. In the process, the media moguls have become complacent believing their goose would lay golden eggs forever.  &lt;br /&gt;
&lt;br /&gt;
Enter the young upstart. Seeing the complacency of Mr. Hollywood&#39;s ways, he decides to rattle his goose&#39;s gilded cage. And that&#39;s got the media moguls fuming. Still, this isn&#39;t the first time this has happened.&lt;br /&gt;
&lt;br /&gt;
One of the earliest copyright infringement cases using new technologies is the &lt;a href=&quot;http://w2.eff.org/legal/cases/betamax/#documents&quot;&gt;Betamax Case&lt;/a&gt; (Sony vs. Universal) of 1984. Basically, the Supreme Court held that Sony, maker of VCRs, &quot;was not liable for creating a technology that some customers may use for copyright infringing purposes, so long as the technology is capable of substantial non-infringing uses. In other words, where a technology has many uses, the public cannot be denied the lawful uses just because some (or many or most) may use the product to infringe copyrights.&quot; Sound familiar? Clearly, based on the latter statement, we have a precedent for the legality of file sharing sites.&lt;br /&gt;
&lt;br /&gt;
But there&#39;s more. I mentioned the complacency of media moguls and their current business model. A recent global study by Social Science Research Center, and backed by Canada&#39;s International Development Research Center, seems to agree. Following several years of independent investigation in six emerging economies, the report, &lt;a href=&quot;http://www.ssrc.org/publications/view/C4A69B1C-8051-E011-9A1B-001CC477EC84/&quot;&gt;Media Piracy in Emerging Economies&lt;/a&gt;, concludes that piracy is chiefly a product of market failure, not a legal one.&lt;br /&gt;
&lt;br /&gt;
Simply stated, nature abhors a vacuum. Innovators saw a market opportunity which Hollywood has largely dismissed or is still trying to assimilate. I put my own case as an example. I like many of the American TV series and like to watch them as soon as they come out. However, living in Europe I often have to wait a year or two before the current season is aired. And that&#39;s assuming the show I&#39;m interested in is picked up by local networks. To top it off, by the time the show is aired, it&#39;s dubbed. So, I tried logging into Hulu.com and other similar sites to watch the shows online. However, these services are not allowed to operate over IP addresses outside the U.S. I&#39;ve even written them stating that I would be willing to pay a monthly fee to access their content but current contractual constraints prohibit them from providing their service overseas. There are many people like me all over the world and we are largely ignored. So what&#39;s a person to do?   &lt;br /&gt;
&lt;br /&gt;
I don&#39;t know who&#39;s right or who&#39;s wrong and, quite frankly, I don&#39;t care because I know innovation will win out in the long run. Innovation is an unstoppable force and Hollywood its unmovable object. This is a wake up call for Hollywood. Sooner or later they are going to have to accept market innovation and design new ways of delivering content to users. They may even have to make a deal with the devil himself.</content><link rel='replies' type='application/atom+xml' href='http://machinebreaker.blogspot.com/feeds/7731034785820128626/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://machinebreaker.blogspot.com/2012/01/megaupload-piracy-or-business-savvy.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/7731034785820128626'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/7731034785820128626'/><link rel='alternate' type='text/html' href='http://machinebreaker.blogspot.com/2012/01/megaupload-piracy-or-business-savvy.html' title='Megaupload: piracy or business savvy?'/><author><name>Machine Breaker</name><uri>http://www.blogger.com/profile/01198746302581389470</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidP3RUbZ_raZP83dwzFOMx7m4rBP5ziZhUmeupX0Iej6DpJ6oksyKEZYKZKY2HgjaRqrBoaaurh4I1P_BBsDS7ecHybVcmiEVZnQAZTXEDaKqjEEvHPjNwBYZtG9-nOA/s220/jbrias.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-733155551423588445.post-5469870238334993252</id><published>2010-04-11T12:44:00.000-07:00</published><updated>2016-05-25T02:20:27.939-07:00</updated><title type='text'>More suckers than I care to know...</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5JQX-RJpb5CK_f9mi1qo6dll1sY6KFxH8Yjs5Qphfbcqg3m6UkSjSNaWzsVSMhZRqIbt8f08YYSIHGW7_9QpZyn8pEDAV2pvIqT_HlIe0j58SCvgwIMgYrSBegPawzyik_2R9XLlZTu0/s1600/ipad-1up-us-20100127_512x512_167.jpg&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5459521571460120866&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5JQX-RJpb5CK_f9mi1qo6dll1sY6KFxH8Yjs5Qphfbcqg3m6UkSjSNaWzsVSMhZRqIbt8f08YYSIHGW7_9QpZyn8pEDAV2pvIqT_HlIe0j58SCvgwIMgYrSBegPawzyik_2R9XLlZTu0/s200/ipad-1up-us-20100127_512x512_167.jpg&quot; style=&quot;cursor: hand; cursor: pointer; float: left; height: 200px; margin: 0 10px 10px 0; width: 200px;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
Ok, I get it - the iPad looks cool.&lt;br /&gt;
&lt;br /&gt;
But seriously, do you really want to end up with something you can&#39;t really use for 500 bucks?&lt;br /&gt;
&lt;br /&gt;
Apple products have become the standard for status seeking yuppies. I can&#39;t argue with their marketing techniques; they do know how to sell a product. They even had a whole episode of Modern Family dedicated to the iPad. But creating a want and needing that want are two very different things. &lt;br /&gt;
&lt;br /&gt;
The iPad is beset with flaws, most notably the lack of Flash compatibility. Eighty percent of all websites use Flash to enhance the surfing experience with rich Internet applications (RIA). This means that most of the sites you visit, including most social networking websites, will not appear properly on your new iPad if you manage to see anything at all. Forget playing online games - they all use Flash.&lt;br /&gt;
&lt;br /&gt;
Maybe Apple&#39;s success has gone to their heads. If so, it sounds extremely arrogant and ultimately stupid.&lt;br /&gt;
&lt;br /&gt;
Here&#39;s a couple of other things you can&#39;t do with your new iPad.&lt;br /&gt;
&lt;br /&gt;
You can&#39;t plug in any peripherals because there are no USB ports. That means no photo downloads from your camera unless it&#39;s got bluetooth/Wi-Fi and no report printouts unless your printer&#39;s got bluetooth/Wi-Fi. In fact, you can&#39;t use any peripherals unless they have bluetooth/Wi-Fi and that includes an external hard disk, something that will be essential since the iPad only has a between 16GB and 64GB of memory. By today&#39;s standards, that&#39;s nothing. You can buy a USB pen drive with more memory.&lt;br /&gt;
&lt;br /&gt;
In the end, you&#39;re stuck with a nice looking product that does a few things well (screwing up your whole music library when you download iTunes) and which you will tire of rather quickly. And then, you&#39;ll come to the stark realization you could have had something different for much less with a lot better performance and capacity.&lt;br /&gt;
&lt;br /&gt;
I make no bones about it - I&#39;ve never been an Apple fan. I just can&#39;t trust a company that locks you out of your own product. It&#39;s like an open-source guru once told me, &quot;You wouldn&#39;t buy a car that denied access to the engine because the hood was welded shut, would you? That&#39;s what Apple does.&quot;&lt;br /&gt;
&lt;br /&gt;
The way I see it, Apples are for people who don&#39;t know about computers but want to look good doing it.</content><link rel='replies' type='application/atom+xml' href='http://machinebreaker.blogspot.com/feeds/5469870238334993252/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://machinebreaker.blogspot.com/2010/04/more-suckers-than-i-care-to-know.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/5469870238334993252'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/5469870238334993252'/><link rel='alternate' type='text/html' href='http://machinebreaker.blogspot.com/2010/04/more-suckers-than-i-care-to-know.html' title='More suckers than I care to know...'/><author><name>Machine Breaker</name><uri>http://www.blogger.com/profile/01198746302581389470</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidP3RUbZ_raZP83dwzFOMx7m4rBP5ziZhUmeupX0Iej6DpJ6oksyKEZYKZKY2HgjaRqrBoaaurh4I1P_BBsDS7ecHybVcmiEVZnQAZTXEDaKqjEEvHPjNwBYZtG9-nOA/s220/jbrias.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5JQX-RJpb5CK_f9mi1qo6dll1sY6KFxH8Yjs5Qphfbcqg3m6UkSjSNaWzsVSMhZRqIbt8f08YYSIHGW7_9QpZyn8pEDAV2pvIqT_HlIe0j58SCvgwIMgYrSBegPawzyik_2R9XLlZTu0/s72-c/ipad-1up-us-20100127_512x512_167.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-733155551423588445.post-2916041043873068718</id><published>2009-12-03T01:51:00.000-08:00</published><updated>2009-12-03T04:35:40.202-08:00</updated><title type='text'>Salesforce.com and the value of social networks</title><content type='html'>Anybody who is even mildly tech savvy probably has an account in one of the popular networking sites. The fact that you&#39;re reading this blog proves it as I&#39;ve only posted it on Facebook. Such is their popularity that these sites (Facebook, MySpace, Twitter) have become the ideal platform to share messages, photos, videos and comments with family and friends. Best of all, they are cloud operated platforms requiring no aplication downloads on your own PC.&lt;br /&gt;&lt;br /&gt;But for big business, what is the value of a social network?&lt;br /&gt;&lt;br /&gt;Social networks are the natural evolution of the first collaboration productivity tools. Initially, these consisted of email and instant messaging. Later on, wikis, user forums and developer communities appeared on the scene allowing a greater level of interaction. Subsequently, these different productivity tools made their way into social networking sites offering all-in-one functionality.&lt;br /&gt;&lt;br /&gt;One of the greatest benefits to end users of this evolution is the concept known as crowd sourcing - user forums or communities that share experiences on specific subjects. Nowadays, we no longer rely on sales hype to determine the cost-benefit of a product or service. We go online to see what type of experiences other users have had with the product and base our decisions on these personal assessments. It&#39;s the equivalent of customer testimonials on a massive scale. &lt;br /&gt;&lt;br /&gt;Until now big business has not really known how to profit from or take advantage of social networks as these sites are available to anyone free of charge. Site revenues come mostly from advertisers wanting to maximize demographic reach. Facebook, for example, has 350 million registered users.&lt;br /&gt;&lt;br /&gt;That is, until now.&lt;br /&gt;&lt;br /&gt;Salesforce.com, founded in 1999, is the world leader in cloud computing CRM (Customer Relationship Management) solutions. CRM is an automated system that traces the life-cycle of sales, from lead generation to post sales service and maintenance. Residing in the cloud as Software as a Service (SaaS), Salesforce.com&#39;s CRM solutions require no downloads on the client&#39;s PC and is OS agnostic. Because of the flexibility of its CRM solution (highly configurable and secure modules), Salesforce.com pricing model is just as flexible (subscription or per-user basis). Since its incorporation, Salesforce.com has steadily grown and refined its product and service portfolio. Today, they have more than 50,000 customers and over 100,000 contributing developers.&lt;br /&gt;&lt;br /&gt;In 2007, Salesforce.com launched Force.com, a new concept in cloud computing known as Platform as a Service extending the capabilities of CRM&#39;s SaaS model with the incorporation of collaboration tools in an integrated, flexible and secure suite of services. As with their CRM solutions, Force.com&#39;s mashable aplications offer a high level of user customization and configuration.&lt;br /&gt;&lt;br /&gt;Peter Coffee, Salesforce.com&#39;s Director of Platform Research, states that Force.com has experienced impressive growth in the emerging markets of India, Brazil and Australia where there is a large concentration of outsourcing companies and developer communities. Companies like Infosys and Tata, for example, have had such a great success with Force.com that they have actually been able to export their processes to the US. In other words, the high level of efficiency (read cost minimization) these companies have achieved through the use of the Force.com platform has permitted them to export the whole process (sales, service, help desk)to countries where costs are considered to be prohibitive.&lt;br /&gt;&lt;br /&gt;Force.com consists of four basic components: Sales Cloud, Service Cloud, Custom Cloud and Chatter. These components are available as independent modules as well. &lt;br /&gt;&lt;br /&gt;&lt;em&gt;&lt;strong&gt;Sales Cloud&lt;/strong&gt;&lt;/em&gt; - offers the main benefits of Salesforce.com CRM including mobile communications and real time updates including collaboration tools and analytics.&lt;br /&gt;&lt;br /&gt;&lt;em&gt;&lt;strong&gt;Service Cloud&lt;/strong&gt;&lt;/em&gt; - is centered on client&#39;s technical support. Aside from consisting of its own knowledge base for the Help Desk, Service Cloud also incorporates user&#39;s experiences (crowd sourcing). The advantages are clear. Different regions offer variations of the same product. For example, A Honda Accord in the US may have very little in common with a European Honda Accord. This means that the propietary knowledge base does not have to be exported to different data centers all over the world. Only the commonalities are exported as each region develops its own unique set of events. The result is a leaner, more agile base freeing up valuable compute resources.&lt;br /&gt;&lt;br /&gt;&lt;em&gt;&lt;strong&gt;Custom Coud&lt;/strong&gt;&lt;/em&gt; - is the application database created by the developer community. Custom Cloud not only offers all types of applications for use in client&#39;s systems, it serves as a direct link with developers to facilitate the modification or customization of Force.com applications.&lt;br /&gt;&lt;br /&gt;&lt;em&gt;&lt;strong&gt;Chatter&lt;/strong&gt;&lt;/em&gt; - is the latest component of Force.com and is slated for release in the Spring of 2010. On Chatter&#39;s release, it will allow the integration of social networking sites into the company&#39;s realm. According to Coffee, &quot;Chatter will provide real business value to the whole phenomenon of social networking. It will be the integration of partners, manufacturers, suppliers, customers, service and maintenance techs using existing social networks like Facebook and Twitter. Additionally, the networks will also provide professional tools such as forecasting and analytics. Everyone involved in the company&#39;s process will be connected at all times regardless of location providing instant feedback and results.&quot;&lt;br /&gt;&lt;br /&gt;If your Help Desk or outsourcing partner is turning out to be a black hole of ever increasing costs and poor customer satisfaction, perhaps it&#39;s time to look into more viable alternatives. Specifically, Force.com.&lt;br /&gt;&lt;br /&gt;For more information visit &lt;a href=&quot;http://www.salesforce.com&quot;&gt;www.salesforce.com&lt;/a&gt;.</content><link rel='replies' type='application/atom+xml' href='http://machinebreaker.blogspot.com/feeds/2916041043873068718/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://machinebreaker.blogspot.com/2009/12/salesforcecom-and-value-of-social.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/2916041043873068718'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/2916041043873068718'/><link rel='alternate' type='text/html' href='http://machinebreaker.blogspot.com/2009/12/salesforcecom-and-value-of-social.html' title='Salesforce.com and the value of social networks'/><author><name>Machine Breaker</name><uri>http://www.blogger.com/profile/01198746302581389470</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidP3RUbZ_raZP83dwzFOMx7m4rBP5ziZhUmeupX0Iej6DpJ6oksyKEZYKZKY2HgjaRqrBoaaurh4I1P_BBsDS7ecHybVcmiEVZnQAZTXEDaKqjEEvHPjNwBYZtG9-nOA/s220/jbrias.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-733155551423588445.post-1060980641017473943</id><published>2009-06-24T04:52:00.002-07:00</published><updated>2012-03-22T03:04:32.449-07:00</updated><title type='text'>Novatel&#39;s MiFi - a new kind of wireless</title><content type='html'>I&#39;m reprinting this article from the New York times verbatim because I&#39;ve been using this device for a couple of weeks now and I plan to do a little lab analysis in a few days. However, that analysis will be in Spanish and will be totally irrelevant to anyone not residing in Spain.  &lt;br /&gt;
&lt;br /&gt;
Still, this article sums up nicely what Novatel&#39;s MiFi is capable of, and thought you might find it interesting. &lt;br /&gt;
&lt;br /&gt;
The New York Times&lt;br /&gt;
May 7, 2009&lt;br /&gt;
State of the Art&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Online Wherever You Like, in a Private Wi-Fi Hot Spot&lt;/strong&gt;&lt;br /&gt;
By &lt;a href=&quot;http://www.nytimes.com/2009/05/07/technology/personaltech/07pogue.html?_r=2&amp;ref=personaltech&quot;&gt;DAVID POGUE&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Someday, we&#39;ll tell our grandchildren how we had to drive around town looking for a coffee shop when we needed to get online, and they&#39;ll laugh their heads off. Every building in America has running water, electricity and ventilation; what&#39;s the holdup on universal wireless Internet?&lt;br /&gt;
&lt;br /&gt;
Getting online isn&#39;t impossible, but today&#39;s options are deeply flawed. Most of them involve sitting rooted in one spot - in the coffee shop or library, for example. (Sadly, the days when cities were blanketed by free Wi-Fi signals leaking from people&#39;s apartments are over; they all require passwords these days.)&lt;br /&gt;
&lt;br /&gt;
If you want to get online while you&#39;re on the move, in fact, you&#39;ve had only one option: buy one of those $60-a-month cellular modems from Verizon, Sprint, T-Mobile or AT&amp;T. The speed isn&#39;t exactly cable-modem speed, but it&#39;s close enough. You can get a card-slot version, which has a nasty little antenna protuberance, or a &lt;br /&gt;
U.S.B.-stick version, which cries out to be snapped off by a passing flight attendant&#39;s beverage cart.&lt;br /&gt;
&lt;br /&gt;
A few laptops have this cellular modem built in, which is less awkward but still drains the battery with gusto.&lt;br /&gt;
&lt;br /&gt;
But imagine if you could get online anywhere you liked - in a taxi, on the beach, in a hotel with disgustingly overpriced Wi-Fi - without messing around with cellular modems. What if you had a personal Wi-Fi bubble, a private hot spot, that followed you everywhere?&lt;br /&gt;
&lt;br /&gt;
Incredibly, there is such a thing. It&#39;s the Novatel MiFi 2200, available from Verizon starting in mid-May ($100 with two-year contract, after rebate). It&#39;s a little wisp of a thing, like a triple-thick credit card. It has one power button, one status light and a swappable battery that looks like the one in a cellphone.&lt;br /&gt;
&lt;br /&gt;
When you turn on your MiFi and wait 30 seconds, it provides a personal, portable, powerful, password-protected wireless hot spot.&lt;br /&gt;
&lt;br /&gt;
The MiFi gets its Internet signal the same way those cellular modems do - in this case, from Verizon&#39;s excellent 3G (high-speed) cellular data network. If you just want to do e-mail and the Web, you pay $40 a month for the service (250 megabytes of data transfer, 10 cents a megabyte above that). If you watch videos and shuttle a lot of big files, opt for the $60 plan (5 gigabytes). And if you don&#39;t travel incessantly, the best deal may be the one-day pass: $15 for 24 hours, only when you need it. In that case, the MiFI itself costs $270.&lt;br /&gt;
&lt;br /&gt;
In essence, the MiFi converts that cellular Internet signal into an umbrella of Wi-Fi coverage that up to five people can share. (The speed suffers if all five are doing heavy downloads at once, but that&#39;s a rarity.)&lt;br /&gt;
&lt;br /&gt;
Cellular wireless routers, as they&#39;re called, have been available for years. The average person hasn&#39;t even heard of this product category, but these routers are popular on, for example, Hollywood movie shoots. On-location cast and crew can kill their downtime online, sharing the signal from a single cellular card that&#39;s broadcast via Wi-Fi.&lt;br /&gt;
&lt;br /&gt;
Those machines, however, get no cell signal on their own; you have to supply your own cellular modem. They&#39;re also big and metal and ugly. But the real deal-killer is that they have to be plugged into a power outlet. You can&#39;t use one at the beach or in the woods unless you have a really, really long extension cord.&lt;br /&gt;
&lt;br /&gt;
The MiFi is remarkable for its tiny size, its sleek good looks, its 30-foot range (it easily filled a large airport gate area with four-bar signal) - and the fact that it&#39;s cordless and rechargeable.&lt;br /&gt;
&lt;br /&gt;
How is this amazing? Let us count the ways.&lt;br /&gt;
&lt;br /&gt;
First, you&#39;re spared the plug-and-unplug ritual of cellular modems. You can leave the MiFi in your pocket, purse or laptop bag; whenever you fire up your laptop, netbook, Wi-Fi camera or game gadget, or wake up your iPhone or iPod Touch, you&#39;re online.&lt;br /&gt;
&lt;br /&gt;
Last week, I was stuck on a runway for two hours. As I merrily worked away online, complete with YouTube videos and file downloads, I became aware that my seatmate was sneaking glances. As I snuck counter-glances at him, I realized that he had no interest in what I was doing, but rather in the signal-strength icon on my laptop - on an airplane where there wasn&#39;t otherwise any Wi-Fi signal. &quot;I&#39;m sorry,&quot; he finally said, completely baffled, &quot;but how are you getting a wireless signal?&quot; He was floored when I pulled the MiFi from my pocket, its power light glowing evilly.&lt;br /&gt;
&lt;br /&gt;
If he&#39;d had a laptop, I would have happily shared my Wi-Fi cloud with him. The network password is printed right there on the bottom of the MiFi itself. That&#39;s a clever idea, actually. Since the MiFi is in your possession, it&#39;s impossible for anyone to get into your cloud unless you show it to them. Call it &quot;security through proximity.&quot;&lt;br /&gt;
&lt;br /&gt;
The second huge advantage of the MiFi is that, as with any wireless router, you can share its signal with other people; up to five road warriors can enjoy the same connection. Your youngsters with their iPod Touches in the back of the van could hop online, for example, or you and your colleagues could connect and collaborate on a corporate retreat. Verizon points out how useful the MiFi could be for college &lt;br /&gt;
students working off-campus, insurance adjusters at a disaster site and trade show booth teams. (Incredibly, Verizon even suggests that you could use the MiFi at home as your primary family Internet service. Sharing a cellular-modem account was something it strenuously discouraged only two years ago.)&lt;br /&gt;
&lt;br /&gt;
Some footnotes: First, the MiFi goes into sleep mode after 30 minutes of inactivity, to prolong its battery life. Yes, it means that a single charge can get you through a full day of on-and-off Internet noodling, even though the battery is supposed to &lt;br /&gt;
run for only four hours a charge. (it&#39;s rated at 40 hours of standby). But once the MiFi is asleep, your Wi-Fi bubble is gone until you tap the power button.&lt;br /&gt;
&lt;br /&gt;
It&#39;s probably the height of ingratitude to complain about having to press a single button to get yourself online. But if the MiFi is flopping around somewhere in the bottom of your bag, just finding it can be a minor hassle.&lt;br /&gt;
&lt;br /&gt;
Fortunately, you can turn off that sleep feature, or even change the inactivity interval before it kicks in. This gizmo is a full-blown wireless router with full-blown configuration controls. If you type 192.168.1.1 into your Web browser&#39;s address bar - a trick well known to network gurus - the MiFi&#39;s settings pages magically appear. Now you can do geeky, tweaky tasks like changing the password or the wireless network name, limiting access to specific computers, turning &lt;br /&gt;
on port forwarding (don&#39;t ask) .&lt;br /&gt;
&lt;br /&gt;
A final note: If your laptop has a traditional cellular modem, you can turn on a Mac OS X or Windows feature called Internet Sharing, which rebroadcasts the signal via Wi-Fi, just like the MiFi.&lt;br /&gt;
&lt;br /&gt;
But the MiFi is infinitely easier to use and start up, doesn&#39;t lock you into carrying around your laptop all the time, has better range and works even when your laptop battery is dead. (The MiFi recharges from a wall outlet; it still works as a hot spot while it&#39;s plugged in.)&lt;br /&gt;
&lt;br /&gt;
It&#39;s always exciting when someone invents a new product category, and this one is a jaw-dropper. All your gadgets can be online at once, wherever you go, without having to plug anything in - no coffee shop required. Heck, it might even be worth showing the grandchildren.</content><link rel='replies' type='application/atom+xml' href='http://machinebreaker.blogspot.com/feeds/1060980641017473943/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://machinebreaker.blogspot.com/2009/06/im-reprinting-this-article-from-new.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/1060980641017473943'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/1060980641017473943'/><link rel='alternate' type='text/html' href='http://machinebreaker.blogspot.com/2009/06/im-reprinting-this-article-from-new.html' title='Novatel&#39;s MiFi - a new kind of wireless'/><author><name>Machine Breaker</name><uri>http://www.blogger.com/profile/01198746302581389470</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidP3RUbZ_raZP83dwzFOMx7m4rBP5ziZhUmeupX0Iej6DpJ6oksyKEZYKZKY2HgjaRqrBoaaurh4I1P_BBsDS7ecHybVcmiEVZnQAZTXEDaKqjEEvHPjNwBYZtG9-nOA/s220/jbrias.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-733155551423588445.post-1469139415006422354</id><published>2009-05-26T14:15:00.000-07:00</published><updated>2009-05-27T06:42:49.381-07:00</updated><title type='text'>Random Access Memory (RAM)</title><content type='html'>&lt;span style=&quot;color:#333333;&quot;&gt;Before I get into other apps every system should have, I just wanted to add this piece of information as a result of a demo I witnessed the other day by the techies at &lt;strong&gt;Kingston Technology.&lt;/strong&gt;&lt;/span&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgak6zzzKoqw7ht86-OJfgO4j_t8tmTXGK55WN0B_pAY_0MUa-F-spSVk9Txs9IICgjmvHr0ihRCz9BVLtkYBUw240Bz1Iu-hiuVR5KR8N7Xt3NGoPvl-v5XcC35K3qfkvA2xPTVNdAmr4/s1600-h/hyperX.jpg&quot;&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;color:#333333;&quot;&gt;Kingston is the largest independent fabricator of &lt;strong&gt;system memory modules (RAM)&lt;/strong&gt;. You might be familiar with internal/external disc drives, USBs or memory cards (SD, SDHC, etc.) from other fabricators like SanDisk. They are not the same thing.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#333333;&quot;&gt;At the very beginning of this blog I said, &quot;You can never have enough RAM.&quot; The reason is simple: new applications requiere ever increasing amounts of RAM to function properly. Even if can&#39;t use all your RAM capacity now, sooner or later, you&#39;ll need it.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#333333;&quot;&gt;RAM is volatile memory. It&#39;s not meant to store anything; when you turn off your computer, everything you have in RAM is lost. It&#39;s a temporary workspace applications use to access frequently used data.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjagEv6NNY8tVHVel3YCLWrGM0qOvDbYViSrq74cOgmVNg4bzYdmsI5KWaYeEjHpny2tTxWtH92eXkCaPJCOLUKINHbv4zzOLStY_YHxc98MBSL5JPFkcNENDr2ONIAc6FjwpeXefmNnKQ/s1600-h/hyperX.jpg&quot;&gt;&lt;img style=&quot;MARGIN: 0px 10px 10px 0px; WIDTH: 242px; FLOAT: left; HEIGHT: 150px; CURSOR: hand&quot; id=&quot;BLOGGER_PHOTO_ID_5340440473752361186&quot; border=&quot;0&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjagEv6NNY8tVHVel3YCLWrGM0qOvDbYViSrq74cOgmVNg4bzYdmsI5KWaYeEjHpny2tTxWtH92eXkCaPJCOLUKINHbv4zzOLStY_YHxc98MBSL5JPFkcNENDr2ONIAc6FjwpeXefmNnKQ/s320/hyperX.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;color:#333333;&quot;&gt;Having said that, the other day the nice people of Kingston performed a demo of their latest RAM module: &lt;strong&gt;&lt;a href=&quot;http://www.kingston.com/hyperx/products/khx_ddr3.asp&quot;&gt;&lt;span style=&quot;color:#000066;&quot;&gt;Hy&lt;/span&gt;&lt;/a&gt;&lt;a href=&quot;http://www.kingston.com/hyperx/products/khx_ddr3.asp&quot;&gt;&lt;span style=&quot;color:#000066;&quot;&gt;perX DDR3&lt;/span&gt;&lt;/a&gt;&lt;/strong&gt;. RAM, like every other technology, has evolved. The very first computers (IBM PC, Apple IIe, Amiga) had 8-16KB RAM, a far cry from the 8GB systems of today. However, today&#39;s memory modules are not backward compatible with previous versions. In other words, &lt;strong&gt;DDR1 is not compatible with DDR2 which is &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPmKXr0bF55rn7JOO_orEZ3LfVZmVB2RjjFS87D9Pc8nNlPWYb8Cf0BN8sB4Hj8qTA0Xx02Baw6C0BUE1_oZ5mPmZUd7QF0yKnjmC2BBBcjtTm8u0e29R7f2X-ED4nmY6iOIvKT0BGygE/s1600-h/hyperX.jpg&quot;&gt;&lt;/a&gt;not compatible with DDR3&lt;/strong&gt;.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#333333;&quot;&gt;The first thing you notice about the new HyperX is its heat dissipator. It&#39;s huge! And that can only mean one thing: it generates a lot of heat. But that&#39;s not a bad thing because that also means it&#39;s fast. In fact, the whole demo centered around HyperX&#39;s capacity for overclocking. In plain English, the user&#39;s choice to configure data transfer between RAM and application faster and beyond its intended limits. Techies do this with resource-hungry video games to minimize or eliminate frame by frame latency and is configured from the system&#39;s BIOS. What this all boils down to is: if it&#39;s capable of seamlessly handling the most resource-hungry video games, &lt;strong&gt;it&#39;s capable of handling even your most demanding mission critical applications.&lt;/strong&gt;&lt;/span&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;br /&gt;&lt;span style=&quot;color:#333333;&quot;&gt;I can&#39;t give you all the technical details of how RAM works or the specs of HyperX, but &lt;a href=&quot;http://www.kingston.com/tools/umg/umg01a.asp&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#000066;&quot;&gt;Kingston&#39;s website&lt;/span&gt;&lt;/strong&gt; &lt;/a&gt;does a good job of explaining the development and evolution of RAM modules with this Ultimate Memory Guide. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#333333;&quot;&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://machinebreaker.blogspot.com/feeds/1469139415006422354/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://machinebreaker.blogspot.com/2009/05/random-access-memory-ram.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/1469139415006422354'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/1469139415006422354'/><link rel='alternate' type='text/html' href='http://machinebreaker.blogspot.com/2009/05/random-access-memory-ram.html' title='Random Access Memory (RAM)'/><author><name>Machine Breaker</name><uri>http://www.blogger.com/profile/01198746302581389470</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidP3RUbZ_raZP83dwzFOMx7m4rBP5ziZhUmeupX0Iej6DpJ6oksyKEZYKZKY2HgjaRqrBoaaurh4I1P_BBsDS7ecHybVcmiEVZnQAZTXEDaKqjEEvHPjNwBYZtG9-nOA/s220/jbrias.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjagEv6NNY8tVHVel3YCLWrGM0qOvDbYViSrq74cOgmVNg4bzYdmsI5KWaYeEjHpny2tTxWtH92eXkCaPJCOLUKINHbv4zzOLStY_YHxc98MBSL5JPFkcNENDr2ONIAc6FjwpeXefmNnKQ/s72-c/hyperX.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-733155551423588445.post-6428037829439540827</id><published>2009-05-19T04:59:00.000-07:00</published><updated>2009-05-19T05:54:11.971-07:00</updated><title type='text'></title><content type='html'>&lt;strong&gt;Try and Decide&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;OK. After a much deserved break, I&#39;m back. That trouble with the IRS, as it turns out, was just a hoax. I got all riled up over nothing. Still, work committments have kept me from updating my blog and I must apologize for that. So, let&#39;s get back to where we left off.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Try and Decide is a neat little function in Acronis True Image Home 2009 that allows you to test a potentially dangerous application (drivers, apps, updates, upgrades, etc.) before you actually install it on your system.&lt;br /&gt;&lt;br /&gt;Try and Decide creates a virtual workspace which isolates systems resources during the testing process. All the user has to do is click on the Try and Decide function from True Image Home&#39;s  main menu, click on the &#39;play&#39; button and the computer automatically enters into virtual mode.&lt;br /&gt;&lt;br /&gt;Not sure of your latest P2P client, mp3 download or website? Go ahead and try/install it within Try and Decide. If the client, file or program is infected with any sort of trojan or malware, it won&#39;t affect your system. Try and Decide allows you to check on program compatibility. When you click on the &#39;pause&#39; or &#39;stop&#39; button, your system reverts back to its normal state and you can then discard the infected application.&lt;br /&gt;&lt;br /&gt;Try and Decide works within Acronis Secure Zone (ASZ), that disk partition True Image advises you to create upon startup. However, I noticed that Try and Decide tends to use up a lot of the space reserved for ASZ, meaning that you may not have enough space left over for your backup chores. Because of this, I have since opted to save my backup chores on a separate disk partition, a purely arbitrary decision designed to minimize having to manage space requirements.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Next up: More apps you can&#39;t do without&lt;/strong&gt;</content><link rel='replies' type='application/atom+xml' href='http://machinebreaker.blogspot.com/feeds/6428037829439540827/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://machinebreaker.blogspot.com/2009/05/try-and-decide-ok.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/6428037829439540827'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/6428037829439540827'/><link rel='alternate' type='text/html' href='http://machinebreaker.blogspot.com/2009/05/try-and-decide-ok.html' title=''/><author><name>Machine Breaker</name><uri>http://www.blogger.com/profile/01198746302581389470</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidP3RUbZ_raZP83dwzFOMx7m4rBP5ziZhUmeupX0Iej6DpJ6oksyKEZYKZKY2HgjaRqrBoaaurh4I1P_BBsDS7ecHybVcmiEVZnQAZTXEDaKqjEEvHPjNwBYZtG9-nOA/s220/jbrias.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-733155551423588445.post-4483373197430843758</id><published>2009-05-08T07:57:00.000-07:00</published><updated>2009-05-08T08:11:14.493-07:00</updated><title type='text'>Time out</title><content type='html'>A thousand apologies...I know I&#39;ve been remiss in my blog duties but I have a damn good reason for it.&lt;br /&gt;&lt;br /&gt;It tax time once again and I just found out I have to pay a bunch of taxes this year because of capital gains. Plus, I have a Hacienda (IRS equivalent in Spain) audit this Monday. Now I don&#39;t know about you folks but I HATE having to pay taxes to any government, especially this one. My hard earned money is just gonna end up in the pockets of some crooked socialist politician. I&#39;m an anarchist at heart and I detest any kind of government intervention on private personal gains. I pay more than enough with social security and taxes withheld at source. Why can&#39;t they leave me the damn hell alone?&lt;br /&gt;&lt;br /&gt;So it was off to the shrink and anti-depressants for me. SIGH......&lt;br /&gt;&lt;br /&gt;I promise to be back after my audit next week. Thank you for your understanding.</content><link rel='replies' type='application/atom+xml' href='http://machinebreaker.blogspot.com/feeds/4483373197430843758/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://machinebreaker.blogspot.com/2009/05/time-out.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/4483373197430843758'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/4483373197430843758'/><link rel='alternate' type='text/html' href='http://machinebreaker.blogspot.com/2009/05/time-out.html' title='Time out'/><author><name>Machine Breaker</name><uri>http://www.blogger.com/profile/01198746302581389470</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidP3RUbZ_raZP83dwzFOMx7m4rBP5ziZhUmeupX0Iej6DpJ6oksyKEZYKZKY2HgjaRqrBoaaurh4I1P_BBsDS7ecHybVcmiEVZnQAZTXEDaKqjEEvHPjNwBYZtG9-nOA/s220/jbrias.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-733155551423588445.post-5674926721367694480</id><published>2009-04-15T12:43:00.000-07:00</published><updated>2009-04-16T15:53:45.014-07:00</updated><title type='text'>Back ups and recovering from disasters</title><content type='html'>&lt;strong&gt;&lt;span style=&quot;color:#000000;&quot;&gt;Backup and restore &#39;best practices&#39;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;I started taking about apps you can&#39;t do without and &#39;best practices&#39;. One of the things I forgot to mention, as part of best practices, is that everyone should get into the habit of &lt;strong&gt;creating restore points after any major event&lt;/strong&gt;, usually the installation of an application, driver, patch or update. I got into this habit with Windows XP and I&#39;ve extended it into Vista. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;Windows allows you to create &#39;restore points&#39; which are basically &#39;images&#39; or &#39;snapshots&#39; of your computer&#39;s configuration at certain points in time. Windows ordinarily creates these points automatically, although I usually do it manually.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;If a problem should occur in your system after the installation of an app, you can always go back to the point before the installation to restore your computer to the most recent working state. However, this is not a foolproof method since some security products like Kaspersky and Norton prevent the proper functioning of this tool. These products have a Self-Defense mode activated by default that interferes with the system restore tool. &lt;/span&gt;&lt;a href=&quot;http://bertk.mvps.org/html/srfail.html&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;Read it here.&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;Nonetheless, in Windows (XP and Vista), go to &lt;em&gt;Start Menu-All Programs-Accessories-System Tools-System Restore. &lt;/em&gt;You&#39;ll then be presented with an intuitive, self-explanatory dialog box that will allows you to restore your system or create and label your restore points. Now you can go back in time, as it were, to the last known working state. In theory, the Restore System function does not affect any stored files such as documents, music or videos. It only deals with applications, drivers, registries and libraries. However, just to be safe, store your personal files on a separate disk partition as mentioned previously in this blog. &lt;/span&gt;&lt;a href=&quot;http://www.microsoft.com/windowsxp/using/helpandsupport/getstarted/ballew_03may19.mspx&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;Read the full process as explained by a Windows expert.&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt; Pay careful attention to the sections that deal with Device Drivers and Compatibility Issues.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;This expert, Joli Ballew, also recommends using the Restore System function as a last resort. Usually, a malfunction can easily be fixed by a system reboot. If that doesn&#39;t work, the other option is to press the &lt;strong&gt;&#39;F8&#39; key &lt;/strong&gt;when you boot your system.&lt;strong&gt; &lt;/strong&gt;This brings up a DOS menu with several options. Use the arrow keys to highlight &lt;strong&gt;&#39;Last known good configuration&#39; &lt;/strong&gt;and press &lt;strong&gt;&#39;Enter&#39;&lt;/strong&gt;. This method usually works well most of the time.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;If you have any experience with Windows, then chances are you&#39;ve used some or all of these techniques in the past. On a difficulty scale of 1 to 10, I give this process a rating of 3-4 for anyone with average computer skills: more than a beginner but less than an expert and able to locate and use basic system tools such as changing the desktop themes, the disk defragmenter, or the most common word formatting funtions. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;The second to the worst case scenario is that the operating system may need to be &lt;strong&gt;repaired, NOT reinstalled.&lt;/strong&gt; This requires the original Windows OS installation disk. There are several forum sites that discuss the procedure which is too lengthy to describe here. However, &lt;/span&gt;&lt;a href=&quot;http://pcsupport.about.com/b/2006/11/08/repairing-windows-xp-the-easy-way.htm&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;this one&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt; is well illustrated and quite easy to follow and understand.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;The worst case scenario is a complete system reinstall, something we want to avoid at all cost because you lose everyting. The plus side is you start with a totally clean system. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;As mentioned earlier, the Restore System function may cause errors due to antivirus programs. Because of this, I have since decided to deploy a different solution. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#000000;&quot;&gt;Acronis True Image Home 2009&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;Because of my line of work, I&#39;m always installing and uninstalling software products to try out. This causes great havoc with the registry entries and library files. Often, I&#39;m left with orphaned entries that affect my computer&#39;s performance.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;So, instead of having to depend on Windows to get me out of a fix, I chose to go with Acronis True Image Home 2009 for my new laptop. Acronis is a company that specializes in disk management, backups and disaster recovery both at the consumer and enterprise level.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;ATIHome 2009, like Windows&#39; Restore Point function, creates an image of your entire system. But that&#39;s where the similarity ends. Acronis, as opposed to Windows, is a &lt;strong&gt;comprehensive solution&lt;/strong&gt; offering a wide array of options and a high degree of of granularity.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;The main dashboard layout presents the user with 4 four backup tasks and chores (Backup, Manage and Restore, Task Management and Try and Decide) and 6 disk management utilities (System Information, Protection Tools, One-Click Protection, Clean Utilities, Search and Help).&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;Below, I outline the procedure I followed.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#000000;&quot;&gt;1. System Information&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;The first step is to go to System Information and get a visual of your disk partitions and their current state. The top part of the interface lists the first 3 tasks that have to be carried out to get started: &lt;strong&gt;System Volume Backup, Acronis Bootable Media &lt;/strong&gt;and&lt;strong&gt; Acronis Startup Recovery Manager&lt;/strong&gt;. These three tasks will have a red &#39;Not Initiated&#39; tag right next to each one. To start the individual tasks, simply click on each one. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;The most important of the 3 tasks is the &lt;em&gt;System Volume Backup&lt;/em&gt; which creates a FULL backup of your system including application configuration and settings. You will be asked to save your backup file (.tib) in your choice of folder and partition.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;The &lt;em&gt;Acronis Bootable Media&lt;/em&gt; is not necessary if you&#39;ve already created the Windows Recovery Disks. Otherwise, create a bootable DVD/CD.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;The &lt;em&gt;Startup Recovery Manager&lt;/em&gt; allows you to boot and recover your computer in case of system failure.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;To be on the safe side, I executed all three.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;Below these three tasks, Acronis presents a visual of the status of your disk. Right below, the user can create &lt;em&gt;Aconis Secure Zone (ASZ). &lt;/em&gt;ASZ os a hidden, unaccessible partition that Acronis creates (if you so choose) to store your different backup files. When you create ASZ, the program will automatically determine the amount of disk space needed. In any case, you are allowed to manage (increase, decrease, remove) this disk partition via the &lt;em&gt;Protection Tools&lt;/em&gt; feature of the program found on the main screen.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#000000;&quot;&gt;2. Schedule backup tasks&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;Once the System Volume Backup has been created, you can now set up the frequency of your backups (manually, daily, weekly, monthly, etc.) via the &lt;strong&gt;Task Management &lt;/strong&gt;utility on the main screen.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;The nice thing about Acronis is that it is intuitive and easy to navigate&lt;em&gt;. Task Management &lt;/em&gt;presents you with a three month calendar and 3 tabs: Scheduled Tasks (planned backup schedules), Unscheduled Tasks (backups performed manually) and Log (a register of the backup actions taken). Clicking on any of these tabs changes the contextual menu on the title bar (top of screen).&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;Click on the Scheduled Tasks tab and select the &#39;Create Backup Task&#39; icon on the title bar. You will then be presented with several options: My Computer, My Data, System State, My Email, and My Application Settings. Below each is an explanation of the kind of backup that will be created. Ordinarily, choose My Computer which creates an image of the entire disk, and thus, is the most comprehensive of the options.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;The utility then takes you through a process to specify the destination disk of the backup file (this is where you can designate ASZ to store backups), the frequency (dates and times) of backups, and the type of backups (full, incremental or differential). &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;In my case, I configured Acronis to perform an incremental backup every Monday morning at 2:00 am,and to store the consolidated file in the ASZ partition. By default, Acronis chooses the &lt;strong&gt;Incremental Backup &lt;/strong&gt;method, provided you&#39;ve created the Full Backup mentioned above. Whether you choose Incremental or Differential, you will need the Full backup to proceed.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;So what&#39;s the difference betwen Incremental and Differential?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;Incremental backups record only the changes made to the system since the last incremental backup, which in turn is based on the first full backup. In other words, if we were to number the logical sequence of the backups, it would look something like this:&lt;/span&gt; &lt;p&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;color:#000000;&quot;&gt;1st full backup: filename.tib(1)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color:#000000;&quot;&gt;1st incremental backup: filename.tib(1)1&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color:#000000;&quot;&gt;2nd incremental backup: filename.tib(1)1.2&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color:#000000;&quot;&gt;3rd incremental backup: filename.tib(1)1.2.3 and so on...&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;span style=&quot;color:#000000;&quot;&gt;As you can see, each succeeding backup is based on the previous one. Incremental require less space since they only record the latest changes. However, to restore from an incremental backup file, it is absolutely necessary to have ALL previous incremental backups and the original full backup, since the backups are all interdependent. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;color:#000000;&quot;&gt;Differential backups, on the other hand, only record the changes made to the Full backup. It requires less space than a full backup but more space than an incremental backup. Differentail backups are almost as reliable as full backups since the backups are not dependent on each other but only the original full backup. The logical numbering sequence would look something like this:&lt;/span&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;color:#000000;&quot;&gt;1st full backup: filename.tib(1)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color:#000000;&quot;&gt;1st differntial backup: filename.tib(1)1&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color:#000000;&quot;&gt;2nd differential backup: filename.tib(1)2&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color:#000000;&quot;&gt;3rd differential backup: filename.tib(1)3 and so on...&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;span style=&quot;color:#000000;&quot;&gt;As you can see, each backup is based on the original full backup and not the preceeding differential backups. To restore from a differential backup, you only need the latest differential backup and the original full backup.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;strong&gt;&lt;span style=&quot;color:#000000;&quot;&gt;SUMMARY:&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;span style=&quot;color:#000000;&quot;&gt;Partition your hard disk to safeguard personal files.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color:#000000;&quot;&gt;Secure your system with a comprehensive security solution.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color:#000000;&quot;&gt;Create &#39;Restore Points&#39; after the installation of any application, driver, update, plug-in, patch or Internet download.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color:#000000;&quot;&gt;If you require a more comprehensive backup solution, choose an application that creates volume images rather than one that simply creates copies of files and folders.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color:#000000;&quot;&gt;Employ a &#39;best practices&#39; approach to your computing and surfing habits. &lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;strong&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;span style=&quot;color:#000000;&quot;&gt;Next: Acronis Try and Decide function&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://machinebreaker.blogspot.com/feeds/5674926721367694480/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://machinebreaker.blogspot.com/2009/04/back-ups-and-recovering-from-disasters.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/5674926721367694480'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/5674926721367694480'/><link rel='alternate' type='text/html' href='http://machinebreaker.blogspot.com/2009/04/back-ups-and-recovering-from-disasters.html' title='Back ups and recovering from disasters'/><author><name>Machine Breaker</name><uri>http://www.blogger.com/profile/01198746302581389470</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidP3RUbZ_raZP83dwzFOMx7m4rBP5ziZhUmeupX0Iej6DpJ6oksyKEZYKZKY2HgjaRqrBoaaurh4I1P_BBsDS7ecHybVcmiEVZnQAZTXEDaKqjEEvHPjNwBYZtG9-nOA/s220/jbrias.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-733155551423588445.post-5438862949655958877</id><published>2009-04-12T07:53:00.000-07:00</published><updated>2009-04-12T08:31:01.005-07:00</updated><title type='text'>General care of desktops and laptops</title><content type='html'>&lt;div&gt;&lt;div&gt;&lt;strong&gt;&lt;span style=&quot;font-family:georgia;&quot;&gt;Applications you can&#39;t do without...&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;Now that you&#39;ve got your wireless connection working, you&#39;re ready to surf the &#39;Net and fill your laptop with all kinds of downloads, right? Wrong! If you&#39;re anything like the millions of computer users around the world, you probably use your system to store everything from pictures to music to videos to emails to contacts. In other words, your life. On top of that, if you transact business online (banking and purchases) without adequate protection, you leave yourself open to the possibility of identity theft (bank acount, credit card and social security numbers). The loss of any or all of these can cause great anxiety and depression. &lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;So the first thing you need to do is &lt;strong&gt;SECURE &lt;/strong&gt;your system. It&#39;s easy to protect a system if you apply a strategy of &lt;strong&gt;&#39;best practices&#39;&lt;/strong&gt; which I outline below. Many users think that by activating Windows&#39; built-in Firewall and keeping systems updated, computers are protected. Nothing could be further from the truth. Microsoft is not a security provider (at least, not an experienced one), even though they have ventured into the field with their Windows Live One-Care product. &lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;Viruses and other infections, collectively known as malware, can only come from three sources: &lt;strong&gt;Websites&lt;/strong&gt; embedded with malicious code such as porn sites, fake bank Websites that solicit confidential info such as passwords or credit card numbers (phishing), P2P sites (spyware) and other free download sites that have occult harmful payloads that register keystrokes (keyloggers) or allow third parties to take control of your system (botnets); &lt;strong&gt;infected email attachments&lt;/strong&gt; with programs that install themselves when opened; and &lt;strong&gt;infected files&lt;/strong&gt; downloaded from external media such as USBs, DVDs and CD-ROMs. &lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;Incidentally, an authentic bank site would NEVER ask you to divulge confidential information, so if you get an email notice from your bank asking for account number confirmation, it&#39;s surely fake. If in doubt, call your bank. Better safe than sorry. Lately, there&#39;s also been a lot of concern over the security of social networks like Facebook. So be careful of the type of information you put out there and who you allow to see it. &lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;Indeed, the bad guys are always one step ahead because there&#39;s a lot of money to be made (&lt;a href=&quot;http://tinyurl.com/techweekpanda&quot;&gt;http://tinyurl.com/techweekpanda&lt;/a&gt;) from all kinds of scams. &lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;So let&#39;s go step-by-step. &lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;strong&gt;1. Partition your hard disk&lt;/strong&gt; &lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;The first thing you have to do is partition your hard disk. Normally, viruses and other malware will target your computer&#39;s C: drive boot sector because that&#39;s where the operating system, registry and applications reside. Most people don&#39;t bother to partition their disks so most data files and personal information also reside on the C: disk. Create a partition (a virtual disk) for your stored data and personal files. That way, even if your entire C: drive is infected requiring a complete system reinstall, your files will remain unaffected and safe. Windows Vista comes with a basic built-in disk partitioning tool that is fine for end users. However, if you manage several physical internal or external disks, I suggest you use a good partitioning application such as &lt;strong&gt;PowerQuest&#39;s Partition Magic&lt;/strong&gt;, a company specializing in disk management acquired by Symantec in 2003. &lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;In Windows Vista, simply right click the My Computer icon and go to &lt;em&gt;Administer/Manage&lt;/em&gt; (my OS is in Spanish so I&#39;m translating directly) - &lt;em&gt;Storage&lt;/em&gt; - &lt;em&gt;Disk Administrator/Manager&lt;/em&gt;. On the right pane, you will have a visual of how your disk is partitioned. Normally, your hard drive will have two partitions, C: (system) and D: (recovery) which are factory set. This is true for most systems sold in Europe. Right click on disk C: and select &quot;Reduce Volume&quot; and specify the size by which you want to reduce the C: drive (normally half the original size is good). What this does is reduce the size of your C: drive creating a new virtual drive with the amount of disk space which you can designate with any letter and name. Make sure this new virtual disk is an NTFS (&lt;strong&gt;NT&lt;/strong&gt; &lt;strong&gt;F&lt;/strong&gt;ile &lt;strong&gt;S&lt;/strong&gt;ystem) partition. Once created, you can store all your personal files (pictures, music, videos, contacts) in this new partition. &lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;strong&gt;2. Surf safely&lt;/strong&gt; &lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;Your laptop/computer probably came with an antivirus program when you purchased it. If not, you need to get and install a comprehensive solution before you surf the Web. Today&#39;s solutions have evolved and most include a combination of antivirus, antispam, antiphishing, antispyware, firewall and intrusion prevension system (IPS) features designed to provide a safe Internet experience. There are many diferent security providers including free antivirus applications. However, security is one THE one aspect of computers you cannot put a price on, just as you would not be able to put a price on the safety of your children. When it comes to security, don&#39;t scrimp, be conscientious. Remember the old adage: Better safe than sorry. &lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;Nowadays, most security providers offer variations of the same solutions, Internet Security. I&#39;ve tried several in the past and some were better than others. Over the past two years I&#39;ve been using &lt;strong&gt;Kaspersky&#39;s Internet Security&lt;/strong&gt; on my desktop not only because it does a good job and offers a lot of granularity (fine tuning), but because it is light on system resources - you hardly notice it working in the background. &lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;This new HP laptop I&#39;m using came with a 60 day license of &lt;strong&gt;Norton&#39;s Internet Security 2009&lt;/strong&gt;, and it is the first Norton product I&#39;ve used that is lightweight. My experience with previous editions of Norton security products was negative as they were all resource hungry. I remember being severely hampered by my Norton-protected, limited capacity workstation at work. However, I was truly surprised by this version of Internet Security. In addition to providing total web surfing protection (all the features mentioned above), NIS 2009 provides a neat little feature that stores your credit card information for online purchases. When you&#39;re ready to complete a purchase, you simply call up the &lt;strong&gt;Identity Safe&lt;/strong&gt; function and NIS 2009, together with its antiphishing feature, evaluate the validity of the page requesting your credit information. Once NIS 2009 assures you of the site&#39;s authentication, it supplies your credit card details to finalize the purchase upon your approval. &lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;Which brings me to another point. If you are fond of online shopping, rather than having to enter your credit card information everytime you make a purchase, I suggest signing up with a third party provider such as &lt;strong&gt;Pay Pal&lt;/strong&gt;. Signing up with Pay Pal is free and transactions cost you nothing. The service manages your credit information (encrypted) for you and charges the seller a commission. You enter your credit details only once and when you&#39;re ready to make a purchase, Pay Pal guarantees payment to the seller. This eliminates the need of entering your credit details in multiple sites reducing the risk of identity theft. &lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;strong&gt;Next up, backing up your data... &lt;/strong&gt;&lt;/div&gt;&lt;strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;Part deux...&lt;br /&gt;&lt;/strong&gt;&lt;br /&gt;According to the Quick Installtion Guide, after you’ve connected the laptop to the AP, type http://192.168.2.2 in Internet Explorer’s (IE) address bar to call up the security configuration interface. The SMCWEB-N, with four Ethernet LAN ports, requires no application or driver downloads, all software is preinstalled in the Access Point itself.&lt;br /&gt;&lt;br /&gt;I have to admit that I’m one of those guys that never reads a user manual because, like any big kid, I can’t wait to start playing with my new toys. If the instruction manual is longer than three pages, I don’t even bother reading the table of contents. I just dive right in. This attitude must be something innate in men and somewhat akin to never asking a woman for directions or stopping to read a map when you’re on a road trip. It’s hardwired into our genetic code to know machines. And I admit I should have read the CD manual because there was no way to get the AP interface up and running.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;Finally, after reading the manual (there’s a reason why manufacturers include instructions), I realized that the configured IP address (&lt;em&gt;Control Panel – Networks and Internet – Shared Resources and Networks Center – Manage Network Connections – Local Area Network Connection – Internet Protocol version 4 – Properties&lt;/em&gt; in Windows Vista) must be within a certain range of values to access the AP’s configuration interface. Normally, the IP address is obtained automatically or the ISP gives you a fixed value. Whichever the case may be, all that’s required is to select the box marked: “&lt;strong&gt;Use the following IP address&lt;/strong&gt;” and enter a value between &lt;strong&gt;192.168.2.3&lt;/strong&gt; and &lt;strong&gt;192.168.2.254&lt;/strong&gt;, and a “&lt;strong&gt;Subnet Mask&lt;/strong&gt;” of &lt;strong&gt;255.255.255.0&lt;/strong&gt;.&lt;br /&gt;&lt;br /&gt;And voilá! When you type http://192.168.2.2 in IE’s address bar, SMC’s configuration interface pops up. The interface is intuitive and easy to use. All the user has to do is enter “&lt;strong&gt;admin&lt;/strong&gt;” for the name and “&lt;strong&gt;smcadmin&lt;/strong&gt;” for the password to launch the security configuration wizard, Wireless Network Setup, with five tabs: Basic, Advanced, Tools, Status and Help.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Basic:&lt;/strong&gt; Click the Basic tab to setup the AP. If you currently do not have wireless access (and I’m guessing that’s why you bought the access point to begin with), setup the SMCWEB-N as a wireless Access Point using the Add Wireless Device wizard. This device comes with a switch that gives you the choice of using the unit as an access point or client. By default, it’s set to AP. All the user has to do is give the unit an SSID name that identifies the device in nearby wireless networks. In my case I used “SMCWEB-N”, but you can use any name you want.&lt;br /&gt;&lt;br /&gt;Next, the wizard will prompt you for the type of security you want to implement and suggests several options: WEP, WPA, WPA2, etc. What do these initials stand for? All I know is that they are encryption standards offering varying degrees of authentication security, the most recent and advanced being WPA2. That’s all I have to say about it since I’m not that technical anyway. At any rate, the device suggests WPA2 TKIP encryption and I figure that, in these matters, the machine knows more than I do. So after selecting this option, you are asked to enter a password to prevent third party clients (PDAs, laptops, cell phones, etc.) from accessing your network connection when they are within reach of your access point. Write down this password and keep it in a safe place in the event that you are asked to re-enter it, which could happen during a system failure or power outage. With respect to passwords, choose an adequate length alphanumeric string using a combination of numbers and upper and lower case letters. &lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;And with that, your SMCWEB-N Access Point should be ready to use, as mine was. I won’t go into the other Tab options because, frankly, when I saw that my AP was working fine and securely, I left it at that. No point in lookin’ to fix what ain’t broke!&lt;br /&gt;&lt;br /&gt;The only thing left to do is disconnect the Ethernet cable from your laptop, connect it to your broadband modem, and connect your desktop (previously connected to your modem) to the LAN2 port of your AP device.&lt;br /&gt;&lt;br /&gt;Lastly, don’t forget to reset your laptop’s IP address (3rd paragraph of ‘part deux’ above) to “Set IP address automatically” in the properties section of your TCP/IP version 4 Protocol.&lt;br /&gt;&lt;br /&gt;When you reboot your laptop, go to “Connect to” in the Start menu (Windows logo button). You should see a list of all the wireless networks in the vicinity, among them ‘SMCWEB-N’. Double click on this network and if you are prompted for a password, use the one you wrote down and (hopefully) kept. The AP will recognize it and connect you automatically.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;I have to say that I am very pleased with my SMCWEB-N device. On a scale of 1 to 5, with five being the most difficult, I give this device a mark of 2 with respect to the difficulty of its setup. It was rather simple to configure and its 802.11 draft N protocol gives my laptop better performance than my desktop. Of course, the fact that my laptop is a 64-bit system with 4GB of RAM, as opposed to my 2GB 32-bit desktop, also helps. Nonetheless, I’m very pleased with it and it has helped dispel my cynicism of wireless devices.&lt;br /&gt;&lt;br /&gt;NOTE: The AP is not a router meaning you won’t be able to access your home printer from your laptop unless your printer has an Ethernet port. But that’s a whole other configuration story.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Next up: Applications you can’t do without…&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;strong&gt;Then…&lt;br /&gt;&lt;/strong&gt;&lt;br /&gt;Ten years ago, my sister gave me an iBook (Apple), a laptop without Wi-Fi or Bluetooth capability and full of compatibility problems with Windows applications (Excel never worked liked it should have and the Apple store was charging me more than the price of a new one to get it fixed). After that, I never took the iBook seriously and parked it in some corner of the house to gather dust. Since then I’ve been strictly a desktop model user.&lt;br /&gt;&lt;br /&gt;Three years ago, I decided to check out the ‘triple-play’ (TV, phone calls, Internet) package of one of the biggest ISPs in Spain. The techs came to the house and changed my PC’s 1MB ADSL modem with a 3MB wireless router and a TV decoder. After that, everything went downhill fast! I experienced constant connectivity problems, and the times I could connect to the Internet, the speeds were waaay below those advertised. I was constantly calling tech support (which, incidentally, were not free calls at all as they had me believe) for some kind of explanation, but none was forthcoming. I tried everything short of signing up with a new service provider, something I regret not doing sooner. In the end, the techs gave up and washed their hands off the whole incident saying the problem lay with my PC since their dashboard gauges were all showing positive results. The problem, according to the tech, was my computer was too old; I needed to get myself a new one.&lt;br /&gt;&lt;br /&gt;Like an idiot, I believed them and marched straight out to buy myself a new desktop PC, a system I still use at home. After more than 700 euros and an additional six months of extremely bad or absolutely no service from the same provider (they never did figure out the cause of my poor connectivity), I decided to call it quits and angrily gave these guys the pink slip for having wasted my time. I changed my service provider and hooked up with a company that offered 20MB bandwidth and free local calls (no TV).&lt;br /&gt;&lt;br /&gt;Thanks to that wireless experience that had me wired to tech support at all times, I decided to forego venturing into wireless products other than my cell phone. That is, until now.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;…and now&lt;br /&gt;&lt;/strong&gt;&lt;br /&gt;A few weeks ago I was given the opportunity to buy a laptop at bargain basement prices. In addition, a manufacturer offered to let me try out a wireless Access Point (AP) which I could keep in exchange for a write up. As a technology journalist, these are the few perks of the trade we enjoy. So, I thought, why not? I’ll document the whole process in a blog.&lt;br /&gt;&lt;br /&gt;And this blog is it: what I did, how I did it, and why I did it.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;1. The laptop&lt;/strong&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;With so many different makes and models to choose from, the decisive question always reverts to ‘What use will I make of my laptop?’ And depending on the answer, you can narrow down your options. I wanted an all-in-one (professional, personal and entertainment) robust laptop with the latest wireless technologies at a price within my budget, between 600 and 900 euros. My other requirement was that it be small and light enough for road warrior duty. As a journalist, I get to travel around quite a bit and I wanted something light and easy to lug around. If on top of that I could find something that would be the envy of the office, then so much the better.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUKuKyF_x5pkgc71o-1ewMa3P8quU5GhX_9oVGCozDmXmC66f5PWYGBgzR1ariG6kzumx2-uXr7HtlPZ5xchbRNlpM1cHrOoRZg28GO_jjaKAN1Vvq5yw9mRTxojJEefCHPI17jyzVkhg/s1600-h/hp-pavilion-dv3500.jpg&quot;&gt;&lt;img style=&quot;MARGIN: 0px 10px 10px 0px; WIDTH: 207px; FLOAT: left; HEIGHT: 207px; CURSOR: hand&quot; id=&quot;BLOGGER_PHOTO_ID_5323825222466360994&quot; border=&quot;0&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUKuKyF_x5pkgc71o-1ewMa3P8quU5GhX_9oVGCozDmXmC66f5PWYGBgzR1ariG6kzumx2-uXr7HtlPZ5xchbRNlpM1cHrOoRZg28GO_jjaKAN1Vvq5yw9mRTxojJEefCHPI17jyzVkhg/s200/hp-pavilion-dv3500.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;I finally opted for an HP Pavilion dv3550es with the 64-bit version of Windows Vista Home Premium SP1 (very quick), 2.26GHz Intel Core 2 Duo dual-core processor (quicker even), 4GB of DDR2 RAM (you can never have enough RAM), 13.3” WXGA 1280x800 resolution Brite View wide screen monitor (very sharp), Nvidia GeForce 9300M GS graphics card (for gaming power), 320GB SATA HDD (I would have wished for 500GB, at least), Bluetooth and Wi-Fi, integrated webcam and mike, Altec Lansing speakers, remote control, biometric digital reader, 5-in-1 memory card reader, with HDMI output (easy connect to your HD flat screen TV) and other doo-dads. Total weight: 1.87 kilos or approximately 4 pounds.&lt;br /&gt;&lt;br /&gt;On the inside, the Pavilion includes a 60 day license of Norton Internet Security 2009, a 90 day license of Microsoft Office 2007 Home Edition, Microsoft Works (the cheap, unlimited-use version of Office), Windows Mail (the Works version of Outlook Express), Adobe Reader 5.0, and HP MediaSmart and HP ProtectSmart, a media center management application and hard disk protector, respectively.&lt;br /&gt;&lt;br /&gt;This laptop is cool both inside and out. It has a nice bronze-finish metal carcass (I don’t know that it’s titanium) and a very thin profile footprint.&lt;br /&gt;&lt;br /&gt;The only thing bad I have to say about it is the keyboard. The keys, like the frame are bronzed metallic with a smooth touch and solid feel unlike the cheap, jerky plastic keys on most of today’s laptops. However, the markings are in black which makes the keys hard to distinguish in dim light conditions. Were it not for this oversight on HP’s part, I would have given this Pavilion an A+ on everything from looks to size to performance to price. As it is, the best I can do is give it an A-.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;2. Access Point configuration procedure&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div&gt;After creating the user accounts and configuring the biometric reader, the first step in the life of any computer is configuring Internet access. For me, this was the moment of truth as my past experiences had made me rather cynical and apprehensive.&lt;br /&gt;&lt;br /&gt;SMC Networks manufactures a whole line of Internet access devices from routers to Access Points. They gave me a choice between a router and an Access Point, and after relating my previous experiences, they suggested I try their easy-to-configure SMCWEB-N wireless Access Point (AP) with the new ‘draft N’ standard of the 802.11 wireless communications protocol. The AP &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpNPrahpg-7H8PKZ1Pc1P5JGGDQc4jQcuz6sri7QBOx5VIYdCPd_xcU3zIvVi-Ze4I17K0iXqKrsQM5d48DLXwjzT6rpJu-cNBWSyu-EclxbLHS813f_CxORac6CsGMa7WrIYWJwoVdXA/s1600-h/SMCWEB_N.jpg&quot;&gt;&lt;img style=&quot;MARGIN: 0px 0px 10px 10px; WIDTH: 207px; FLOAT: right; HEIGHT: 124px; CURSOR: hand&quot; id=&quot;BLOGGER_PHOTO_ID_5323826070930205810&quot; border=&quot;0&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpNPrahpg-7H8PKZ1Pc1P5JGGDQc4jQcuz6sri7QBOx5VIYdCPd_xcU3zIvVi-Ze4I17K0iXqKrsQM5d48DLXwjzT6rpJu-cNBWSyu-EclxbLHS813f_CxORac6CsGMa7WrIYWJwoVdXA/s200/SMCWEB_N.jpg&quot; /&gt;&lt;/a&gt;also includes the ‘b’ and ‘g’ standards.&lt;br /&gt;&lt;br /&gt;According to the quick installation guide, the only thing the user has to do is connect the laptop (via Ethernet cable provided) to the LAN1 port on the rear of the AP, start Internet Explorer, and type http://192.168.2.2 on the address bar. I’m one of those guys who makes it a point to get by with the least amount of effort. In other words, I never read the instruction manual. Usually, I make do with the quick installation guide.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;strong&gt;Next: Part deux...&lt;/strong&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://machinebreaker.blogspot.com/feeds/5438862949655958877/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://machinebreaker.blogspot.com/2009/04/general-care-of-desktops-and-laptops.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/5438862949655958877'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/733155551423588445/posts/default/5438862949655958877'/><link rel='alternate' type='text/html' href='http://machinebreaker.blogspot.com/2009/04/general-care-of-desktops-and-laptops.html' title='General care of desktops and laptops'/><author><name>Machine Breaker</name><uri>http://www.blogger.com/profile/01198746302581389470</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='21' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidP3RUbZ_raZP83dwzFOMx7m4rBP5ziZhUmeupX0Iej6DpJ6oksyKEZYKZKY2HgjaRqrBoaaurh4I1P_BBsDS7ecHybVcmiEVZnQAZTXEDaKqjEEvHPjNwBYZtG9-nOA/s220/jbrias.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUKuKyF_x5pkgc71o-1ewMa3P8quU5GhX_9oVGCozDmXmC66f5PWYGBgzR1ariG6kzumx2-uXr7HtlPZ5xchbRNlpM1cHrOoRZg28GO_jjaKAN1Vvq5yw9mRTxojJEefCHPI17jyzVkhg/s72-c/hp-pavilion-dv3500.jpg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>