Two Tiny!

March 23, 2010

Vervain

We should all recognize this creature as the animal with the highest metabolism of any other creature on earth!

While sipping nectar from a flower the hummingbirds wings beat 50 times per second and are capable of beating up to 200 times a second to escape a predator.  They can fly in all directions: forward, backward, and sideways. They can also stop in mid-air; their wings beating and rotating like little helicopters.

Where does the fuel come from to keep this little guy going?

The nectar provides the fuel; every one of the 1000 flowers that this little guy visits in a day is a fuel stop.

What always amazes me is that no one ever wonders, where does the  protein come from to repair and grow his little body?

NO, sugar (nectar) is not a source of protein.

Ever notice that the flowers that this little guy sips the nectar from have no aphids? or caterpillars? or ants? or gnats? or mosquitoes?

Guess why.  He ate them!

20% of their daily diet is insects, but when it’s time for migration or nesting time comes along our little guy turns into quite the carnivore consuming almost half  his weight in insects. Nature helps by providing the ultimate “convenience store and fast food shop in one”  for the hummingbird; the local spider’s web!  It is there, caught in the web, insects too small for the spider to pay attention to, that our little guy can pick and choose until the owner of the web shows up.  To the hummingbird the spider is a big ball of food with eight legs!

Then also the solution to the humming-birds “home” problem is solved.

What is the problem?  How to get a nest to  stay stuck to a branch and hold together when it’s just a little bigger than a half dollar. The solution is the spider’s silk from the spider’s web!  It’s the spider’s web that provides the means to hold the little nest together and keep it held to the tree.

What happens if the Hummingbird gets caught in the web? Well, if the hummingbird didn’t eat the spider before being caught in the web the hummingbird will be eaten by the spider. If the spider has been eaten and the hummingbird gets caught in the web he will die from exhaustion or starvation.

Processor with a grain of rice !

We should all recognize at least two of the objects in this picture, right?

 

by R. Frank Tulak

Enhanced by Zemanta

The Killer Tomato, Potato and Botnet

December 15, 2009

Here are the last few seconds of this fly’s life before the lighting quick jaws of the venus flytrap leaf snaps shut and the plant begins to digest this fly, pulling the life giving nutrients from the fly to the plant. The venus fly trap (Dionaea muscipula) is labeled a carnivorous plant but not all carnivorous plants capture prey the same way. The standard definition would be “any of several unrelated plants modified to capture and digest animals, especially insects, which supply nitrogen that may otherwise be unavailable in their habitat.”

According to the standard definition; if a plant, because of it’s design, characteristics or attributes, captures and or kills an animal for the purpose of extracting nutrients to be used by the plant, it is carnivorous.

Carnivorous plants don’t digest all their victim only the nutrients it needs. Then when it opens only the structure and shell of the victim is left.

Other carnivorous plants  use nectar mixed with a sap and digestive chemicals to lure and capture the animal like the sundew (Drosera) .

While others are more passive like the  pitcher plant (Nepenthaceae and Sarraceniaceae) who lure insects into an opening that forces them to drown in a pool of water in the center of the plant. Thus extracting the nourishment over time as the animal dissolves in the water.

The problem is there are a whole group of plants that still fit the definition of carnivorous plant but because they do it differently they have never been recognized as been carnivorious.

Ladies and gentleman I introduce the covert carnivorous plants, our well-known tomato and potato plants! All this time we never recognized their carnivorous behavior. For those who grow tomatoes they have always recognised the dead insects on the plant or on the ground around the plant but have generally ignored it.  We never thought about it. I guess we all thought the insects just came to the plant to die. 🙂 The truth, recently accepted without controversy, is the tomato and potato plant lure the insects then the insects are trapped by the sticky hairs on the tomato or potato plant THEN (and here is where we missed it) as the sappy lure dries it finally releases the dead victim to dissolve on the soil to feed the roots of the plant just below the surface.

What does this have to do with Computers?

If you look at a computer program as a kind of life form then you see it needs the nutrients that are available from other computers to grow. So if there is a kind of program that can grow outside its own computer it must lure other computers, capture them then extract or assimilate those computers processor and memory to grow and capture other computers.

Is there such a carnivorous program? If so how big is it?

There are carnivorous programs and they are called  botnets!

How many botnets are there? There are hundreds but there are 16 which are the real monsters and have eaten the lions share of the world’s computers.

Are they dangerous to people? Well that depends on how much of your life is dependent on computers. For illustration purposes let’s use automobiles instead of computers. What if someone could take control away from the driver of a car and completely control it remotely? Could they do any damage? What if they could take control of 100 cars at any moment could they do any damage? Look at the size of  top 5 of these carnivorous programs!

  1. Conficker           35 ,000,000 +   computers controlled
  2. Kraken                     495,000       computers controlled
  3. Srizbi                        450,000      computers controlled
  4. Bobax                       185,000      computers controlled
  5. Rustock                    150,000      computers controlled

HOW DID CONFICKER GROW SO BIG!

After it has infected a target computer (by downloading a Trojan), it tries to prevent it’s removal by disabling anti-virus software and blocking access to security-related web sites, as well as stealing personal information by masquerading as an anti-virus product called Spyware Protect 2009. How ?   The worm informs the user that his computer is infected and takes the user to a fake security Web site, asks them to pay $50 for a spyware program that actually is the Conficker worm, then keeps their credit card information, to boot.

How can you tell if your computer is infected with the conficker worm?

There is a test to see if your computer is infected click here 

Where is the infection mostly located?

 

What should everyone do? Keep their antivirus and antispyware up to date and scan regularly.

Hey I’d rather eat a potato or tomato than be eaten by one! 🙂

 

 by R. Frank Tulak


Are the CIA FBI NSA the same thing?

July 1, 2009

bondslarge2

 

Of course not. They server different purposes and are limited in their authority and influence; but they are very vital in this day and time.

What they have in common is that they collect and act on information related to criminal activity or affects national security.
So they are filled with James Bond types right? No!
A James Bond type would never work well in either group. They may have attributes similar to the Mr. Bond of Ian Fleming’s stories but they must be team players, not lose cannons! Sorry if you are a James Bond fan. 🙂
What their focus is and their boundries are are pretty much given in theirs names.
The Federal Bureau of Investigation (FBI ) and Central Intelligence Agency (CIA) and National Security Agency (NSA).
The FBI is primarily a law enforcement agency, collecting intelligence related to domestic security and performing crime investigation.
The CIA is an international intelligence agency which is not responsible for domestic security
In other words the FBI investigates crimes, and the CIA gathers intelligence.

What does the National Security Agency handle? The NSA handles domestic intelligence in coordination with the FBI. In addition, the CIA often cooperates with international intelligence agencies to exchange information. The CIA may pass information regarding domestic security on to the FBI.

The FBI also handles domestic law enforcement issues. The FBI coordinates national efforts to track down missing persons, complex investigations which local law enforcement cannot handle, processing of criminal evidence, and support for victims of crime. FBI agents frequently assist in the collection of evidence in major criminal cases, especially those involving a substantial amount of money or multiple homicide cases.

The CIA does not handle law enforcement. Agents working within the United States are primarily stationed at CIA headquarters in Washington. Domestically based agents interpret information and create intelligence briefings for the President and White House staff. If directed, these agents may supervise overseas agents in carrying out covert actions on behalf of the United States. (more like Mission Impossible then like James Bond 🙂 )

What does this have to do with computers? EVERYTHING!

You see foriegn unfriendly nations and groups can and do gather information through the use of your computer by way of implanting spyware and malware. This method is almost totally impercievable and very destructive. Not only can they gather intelligence from your computer but use your computer to commit crimes with out you being aware that anyone else is using your computer.
Some recent examples are the Cyber attacks on the World Bank right before the economic world crash. The attack on the White House computers. But ones that can trigger the greatest damage are the botnets.
They are malware that allows someone else to take change of your computer from a distance. As a mild threat they are use to send spam email but as a greatter threat they can be combined to crash any and all networks! Which is about what everything runs on!
Picture if you will traffic any traffic, cars down a highway, water through a pipe, phone calls through a router or just your family coming and going through your house front door. Now instantly jump that incoming traffic to 10.5 million! What would happen to our communications network, our hospital’s network or our defence and police networks? This is the concern of our agancies that guard our nation! What botnet has 10.5 million computers under its control?
The confiker worm! Here is the distributions of control the botnet has.
conficker_world_map
Picture 10.5 million computers awaiting the command of their master!

In the world of your computer it needs protection! You and your computer are part of our nations security!
Your computer needs to have virus protection (like the FBI for our nation) and anti-spyware (like our nations CIA) and it needs to be more strengthed and upadated against attacks with the operating system updates (like our nations NSA).

YOUR MISSION IF YOU DESIDE TO ACCEPT IT IS TO KEEP YOUR COMPUTER’S
ANTIVIRUS UP TO DATE AND CHECK ITS OPERATION EVERY WEEK
UPDATE AND CHECK AND RUN YOUR ANTISPYWARE EVERY WEEK
CHECK AND RUN UP DATES FOR YOUR OPERATING SYSTEM EVERY WEEK.
THIS MESSAGE WILL NOT SELF-DESTRUCT.
GOOD LUCK 🙂


Cloud Computing Going Forward to the Past

June 16, 2009

image0When is the last time you were in the clouds?  No, I’m not talking being in love 🙂

You know, when you did the “take off the shoes” and “walk through the scanner” thing? No, I’m not talking about being arrested, I’m talking about when you got a flight at the airport. Remember just before that, when you got your tickets? Remember the person behind the counter? What was she typing on? A computer terminal. (bear with me I’m not being facetious 🙂 )

gettingtickets Well the program on the terminal screen isn’t in the terminal, the program is on a server which may not be in the same state!

I know what you thinking ” this technology is over 40 years old!”  You are right! Millions of terminals could connect to a few servers at the same time and it was called Master -Slave but since then for Political Correctness sake it was changed to Client-Server. Well what if you repackaged it and the terminal did some real cool stuff and could run multiple programs on several distant servers, what would you call it?

It already has a name; it’s called Cloud Computing!

The story of civilization is taking the individual from Independence to dependence from privacy to being fully exposed. An example would be water. Before, everyone had their own well for water, now it’s a utility, everyone shares and you have to use ONLY what they want you to have and how they want you to have it. So you pay for that utility of receiving water and still buy bottled water! It is the same with food! Now the last bastion of independence and privacy; what interests us, what we write and how we run our business; will be totally naked and accessible by anyone with perceived reasonable authority.

Why would anyone want to lose their Independence? The answer is one word COST!  The average person is after enjoyment, fun and communication. If they bought a computer it was for that purpose. If not, it was because it was too expensive and usually the cell phone, though limited, would suffice. But now that is about to change. Two years ago a computer notebook cost around $2500 with software. Now a net-book (the net part of the word for interNET) costs you $400, using the Intel Atom Processor (a midget Pentium 4 on steroids) and you can use applications such as wordprocessing, spreadsheets, databases and acounting from off a distant server (Really big computer). Next year Intel will cut the cost of the processor almost in half ! While Arm, who makes the processor for the cellphones, is coming out with their own prosessor called snapdragon for the NET book (slave side of Master-Slave, oops I mean Client-Server). The snapdragon configured computer (NETbook) is taunted to be $100 or free with signup, like with a cellphone. What about the really cool stuff part? Well since you are not running any programs on the unit itself but on a distant server, you can have full communication with someone right on the netbook. What I mean is full audio and VISUAL! IF you wanted to show him/her something on your netbook you could show your screen image to them, wherever they are. Or they could just see and hear you. Each one is scheduled to have a video camera with microphone focused on you when you open the lid. Where?  Right above the screen.

The battle for your privacy has already begun. Just like in chess. The board is set and the pieces are in motion. Who are the pieces? The king for the white is Intel Corp. for the black is ARM. The queen for the white is AT&T the queen for the black is Verizon. The bishops are Intel’s communication branch while on the black side Qualcom.The knights are the technologies of voice over the internet (voice over IP) or internet over voice lines which encompasses the router companies like Cisco and Juniper. The  rooks (castles) these are the applications that are to be run from servers. This is still in progress as to which side they are to take. Those who are positioning themselves are Amazon, Ebay, Microsoft, Google, Oracle and Apple, just to name a few.  

 Who are the naked and vulnerable pawns? Why,  those who use the netbook,  of course.  Except we are not naked and vulnerable we do have a little experiance in computers 🙂

Need help choosing and setting up your NETbook give us a call.

With our help you will be like the Cheshire cat,

talking and writing and crusing the NET
with the only thing seen in the cloud is your  smile!

 cheshirecatwithsmile

 We are here for you !


When a Stone is Not a Stone.

January 23, 2009

pacific_stone_fish

Safety is very important.

Fish hide in the rocks for safety.

In the next few moments of the this picture the little black damsel fish will be literally in the rock on the left and he will not be safe, he will be dead, eaten alive! (click on picture to watch the rock come alive!) Quicktime 7 required download and install here http://www.apple.com/quicktime/

In this world survival and propagation of one’s species is assured if one of two factors are incorporated in your existence, mimicry or crypsis. Mimicry is to mimic the characteristic or appearance of a deadly or dangerous creature even though it is not equipped to or capable of carrying out what it appears to be or have.  This is mostly used by prey.

Predators on the other hand use crypsis or camouflage to appear benign and harmless giving a false sense of protection or safety to their prey. 

In the world of computers more and more programs are resembling life forms.

If the program can not by its own abilities survive it will mimic the abilities of another! Our shelves and drawers are filled with programs that mimic the abilities of other powerful programs but were incapable of performing those abilities.

Then there are the predator programs who appear to be harmless or  benificial to guard and protect you but they are deceiving and will take a big bite out of your productivity, time and finances!

These predator programs trick you into believing a problem exists on your system. Then you are given no alternative but to purchase the bogus applications because your existing antivirus and antispyware cannot resolve the problems because your  antivirus and antispyware are damaged from the predator software, or there is no problem at all. Once they have your credit card info you download more predator software under the camouflaged appearance of protection for your computer. What do you think they will now do with your credit card info?

What if you catch them before you give them your credit card info?

 Even if you catch on that it is a predator it is extremely difficult to remove their fangs and claws out of your computer. Even experienced technicians will have to take 3 to 4 hour to remove it. For those who have paid and downloaded more predators, camouflaged as protection for your computer, it may take 3 to 4 days to remove!  One computer recently came in for repair with 630 predators in their computer!

 Here are the images of the 11 most painful predators in the computer world and 11 creatures whose bite or sting are the most painful  in the world!

 Stone Fish and WinFix

Pain = like boiling oil in ones veins and a sledgehammer to ones joints

Pain = like boiling oil in ones veins and a sledgehammer to ones joints

WinFixer

WinFixer

  

 

 

 

  Gila Monster and UltimateDefender

pain= slowly being burned alive from bite throughout body

pain= slowly being burned alive from bite throughout body

 ultimatedefender

 

.

Black Widow and Spy Sheriff

Unbearable pain just to breath !
Unbearable pain just to breath !

spysheriff

 
Turantula Hawk Wasp and Malwarewipe 
Lightning bolt of screaming agony
Lightning bolt of screaming agony

malwarewipe

Spiting Cobra and DriveCleaner

excruciating acompanied with 5 hours of blindess
excruciating acompanied with 5 hours of blindess

drivecleaner

 Bullet Ant and AVsystemCare

Repeatedly stabbed with red hot nail
Repeatedly stabbed with red hot nail

avsystemcare

Rattle Snake and 1st Anti Virus
being branded continously!
being branded continously!

1stantivirus-main_full

 
 Scorpion and VirusBurst
scorpion_500wvirusburst
 
 Box Jellyfish and SpywareQuake
wraped in burning embers
wrapped in burning embers

spyware-quake

 
Sting Ray and AntiSpyware Soldier
Stabed with a red hot 8 penny nail
Stabbed with a red hot 8 penny nail

ass

 
Brazilian Wandering Spider and System Live Protect
Unimaginable pain with every breath
Unimaginable pain with every breath

liveprotect

 

 

 

 

 

 

Safety  is  very  important.

Getting antivirus and antispyware is being safe!

Unless it gets you! 

Not sure what you are buying?

Call us 619-464-4249

Or email me atrftemail

 

If you are not already receiving it, ask to get our news letter !

We are here for you 🙂

 


…They know when your awake. They know if you’ve been bad or good, so ..

January 7, 2009
They see

They see

 

Privacy  has many  definitions, definitions which are dependant on who you are talking to.

 

Donald Kerr, Principal Deputy Director of National Intelligence  perceives the definition of privacy as anonymity. Therefore from his point of view he believes in this day and time that it  is impossible if there is to be security. In other words, privacy is what you and the government know about you and no others; this is for your safety! 

White Hats, Hackers, Phreeks (a portmanteau for phone and geek no I don’t know why there is an “r” in phreek) define privacy another way; that if you have given that information to anyone then they have a right to it as well. What is left is private.

Then there are those that believe privacy is like going to the beach; if you go to the beach your going to be exposed or why did you go to the beach? What is the beach? The internet. This group of marketers who manufacture the majority of spyware feel they are allot like Santa Claus; “who sees you when your sleeping and knows when your awake and knows when you’ve been bad or good..” and for a price will give any information on any and every type of person who uses the internet ( Ho Ho Ho). One of the oldest is http://www.doubleclick.com/: for a list of most of the American companies that write the spyware programs go to   http://www.spywareguide.com/creator_list_full.php?s=m.

The final group of spyware writers is the smallest but the most infamous they are the Black Hats. These have the skills of all those above but are bad guys “black hats“. They are after your computer to make it commit crimes for them; so that the FBI knocks on your door and arrests you and not them. They work to get your name, social security, birth date and credit card numbers. No, they are not thieves who use your credit cards to go to Europe and eat at fancy restaurants and stay at big hotels then throw your card away. These guys are very intelligent and astute. They collect information and credit card info on hundreds of thousands of people. Then they make a $0.14 to $0.24 transaction of each card at the end of each month.  How much is $0.14 X 100,000 ?  Have you ever complained about a $0.14 charge on your credit card? No one does. Where does the money go? The money trail ends in countries at the fringes of international law; to countries in Eastern Europe and private organizations in Pakistan. What do they do with the money? I don’t think its anything legal!

You are probably asking why I mentioned phreeks (phone geeks) in this article about privacy, right? Because many people say they don’t do credit card transactions over the Internet but only over their cell phones. Do I have a surprise for them. Your cell phone is a computer but what is worse it’s a wireless one.  All broadcasts over the airwaves are monitored and recorded by government agencies except the phone you have that has a wire attached; it is illegal for anyone to monitor that wired phone without a judges order and due cause, but not so for wireless. It is the job of the government to record and monitor wireless transmissions, does the letters FCC mean anything to you?  Well it’s only the government that is listening to my orders over the cell phone, right? Ladies and gentleman may I introduce to you the hottest selling item imported from Europe and Canada the Optoelectronics Scout frequency counter and a AOR-8200

The TOOL

The TOOL

Imagine the thrill of listening to every cell phone conversation within 40 miles !
There are tens of thousands of these  in the US.
Are they illegal to own? No!
Are they are illegal to use? YES! but they can not be detected if they are used.
Honestly it’s far safer to use the computer on the internet then a cell phone to transmit personal information.
With the Internet browser set to 128 bit encryption (and there is no spyware on your system) your computer is linked to the transactional computer and is virtually secure against anyone’s eyes while the information is in transit. How do you know its working?
There will be a little padlock either at the top next to the URL (internet address) or bottom right corner of your Internet browser.
Your transactions are secure!

Your transactions are secure!

 
 
.
Privacy to me is very simple.
If I get private with my wife behind closed doors where I can plainly see  the dimples on her cheeks then I guarantee she can see mine .
Privacy is not one way.
Bare truth from both parties is only right.
If they want my privacy then I have a right to theirs or no deal!
The same for the beach!
You want to check me out in a speedo on the beach then you have to be wearing just as little or no deal !
I don’t care how big your belly is !!!
santa_on_holiday_in_spainHO! HO! HO!  

Size Does Matter!

November 25, 2008
My Childhood Wonder!

My Childhood Wonder!

 

Ah the pride of every Boy Scout, the Swiss Army Knife!

 This is the little pocket treasure that would save the day and prove your resourcefulness. Yes I was a boy scout and yes I had a Swiss Army Knife (SAK) it was only 5 ounces and 4 ” long. It was a pocket knife that you could do everything with. 2.5″ Blade, 2.75″ Double-cut wood saw, Patented locking screwdriver, 2.4″ Springless scissors with serrated self-sharpening design, Cap lifter, Wire stripper, Can opener, Nail file and cleaner, Phillips® head screwdriver, Reamer, Awl, Toothpick, Tweezers, and a Key ring!

The most important part of all

IT WOULD FIT INTO YOUR POCKET!

That was what it was originally designed to do.

Giant Swiss Army Knife 2 pounds 11 ounces and 9 inches wide

Giant Swiss Army Knife 2 pounds 11 ounces and 9 inches wide

The new Giant Swiss Army Knife

weighing in at 2 pounds 11 ounces and around 9 inches wide with 85 tools and over 100 functions will

NOT fit into your pocket !

How could it be a Swiss Army Knife and not fit into your pocket?

Because the amount of tools became more important then its original purpose.
TO FIT INTO THE POCKET !!
 

 Does this have something to do with Computers? Yes!

I can see !

I can see !

The computer receives information from the Internet through port 80 or in other computers port 8080. These ports are for HTML. Information coming in from port 80 or 8080 requires a web browser to receive it.

Just like you need to have binoculars to receive information to your brain’s visual ports (eyes) from far away , your computer needs a browser to receive to its port 80 or 8080 from HTML information.

What would happen if you added more functions to the binoculars and in doing so made it so big you couldn’t carry it and worse you couldn’t see through it?

Let me introduce to you the Internet browser.

The Internet browser is your Swiss Army Knife or your Binoculars for the Internet.

REMEMBER THE BROWSER’S PRIMARY PURPOSE IS TO GET THROUGH PORT 80 or 8080 AND BRING BACK THE INFORMATION FOR YOU, EVERYTHING ELSE IS SECONDARY!

When you go onto the Internet with your browser is it excruciatingly slow but when you get your email it is fast? Use our old friend “tracert” (click on start, then run, then type cmd and hit enter, remember? 🙂  

Where did my email go?<- click here for a review)

 at the command prompt type “tracert yahoo.com” if you get rapid responses. then your brower is the problem.

bowser tools menu

bowser tools menu

 

At the tools menu click on ” manage add-ons”

 

Your next screen should look like this:

Menu of Add-ons

Menu of Add-ons

 

Notice I have 17 add-ons. But my computer is a dual core, if it was a single core (Pentium 4) I would only have 8.

If yours shows 63 add-ons its a wonder it even opened!

Highlight each one you do not use and click on “disable”. Try to get all so that you have only what you need or use.

When you are finished click on OK!

Close your browser. Then re-open it.

Notice the speed?

Notice the smile growing on your face?

What happened?

Your Giant Swiss Army Knife now fits into your 80 or 8080 pocket !

Do you see?

Enjoy 🙂

R. Frank Tulak

 

.