Let There Be Light!

August 8, 2010

Have you ever read the Bible?

Gen 1:3 “And God said, Let there be light: and there was light.”.

Did you notice as you continued to read that it wasn’t till the fourth day that the stars and sun and moon came into existence? So what light was God talking about in Gen 1:3?

Well according to John 1:1 and Heb 11:3 and 2 Peter 3:5 it is God’s Word.

God’s light is his thoughts and images.

 The great combination of thoughts and images transmitted by light  has been the Holy Grail that has been sought after since the first computers were connected. Obviously it was God’s idea first. 🙂

Why?  Because there is nothing faster than light!

Now that the new processors spend most of their time waiting for the data to proccess, the need to get the data to them faster is crucial. The year that light enters the computer as an interface is 2011!  It is this coming year that copper will begin to be replaced with a new fiber optic interface, designed by Intel Corp, which is called Light Peak!

I know what your thinking, fiber optic cable travels at 2 gigabyte so not a big deal, right? Well this design adaptation begins at 10 gigabytes and can easily go to 100 gigabytes.  

Imagine downloading a blueray movie in less than 30 seconds!   Imagine only one cable connecting your computer to your high definition monitor, then to your then TV, then it connects to your printer, then another computer, then….  There is no limit to the amount of connections and different data types, and the cable is 1/3 the size of  aquarium air tubing.

Instead of hundreds or thousands of wires for differnet signals and data there is only one!

With existing servers and the internet how much of the cabling is copper wiring?  What will this do to the internet and communications industry?

With aircraft how much of the weight is copper cabling ?  What will this do to the aircraft industry?

With robotics, how much of the robot is copper wire? What will this do to the robotics industry?

  
In the begining God brought forth his images, thoughts and words as light and created the world we have now.

Now man will  bring forth his thoughts, words and images as light and the world’s change will begin.

by R. Frank Tulak


Two Tiny!

March 23, 2010

Vervain

We should all recognize this creature as the animal with the highest metabolism of any other creature on earth!

While sipping nectar from a flower the hummingbirds wings beat 50 times per second and are capable of beating up to 200 times a second to escape a predator.  They can fly in all directions: forward, backward, and sideways. They can also stop in mid-air; their wings beating and rotating like little helicopters.

Where does the fuel come from to keep this little guy going?

The nectar provides the fuel; every one of the 1000 flowers that this little guy visits in a day is a fuel stop.

What always amazes me is that no one ever wonders, where does the  protein come from to repair and grow his little body?

NO, sugar (nectar) is not a source of protein.

Ever notice that the flowers that this little guy sips the nectar from have no aphids? or caterpillars? or ants? or gnats? or mosquitoes?

Guess why.  He ate them!

20% of their daily diet is insects, but when it’s time for migration or nesting time comes along our little guy turns into quite the carnivore consuming almost half  his weight in insects. Nature helps by providing the ultimate “convenience store and fast food shop in one”  for the hummingbird; the local spider’s web!  It is there, caught in the web, insects too small for the spider to pay attention to, that our little guy can pick and choose until the owner of the web shows up.  To the hummingbird the spider is a big ball of food with eight legs!

Then also the solution to the humming-birds “home” problem is solved.

What is the problem?  How to get a nest to  stay stuck to a branch and hold together when it’s just a little bigger than a half dollar. The solution is the spider’s silk from the spider’s web!  It’s the spider’s web that provides the means to hold the little nest together and keep it held to the tree.

What happens if the Hummingbird gets caught in the web? Well, if the hummingbird didn’t eat the spider before being caught in the web the hummingbird will be eaten by the spider. If the spider has been eaten and the hummingbird gets caught in the web he will die from exhaustion or starvation.

Processor with a grain of rice !

We should all recognize at least two of the objects in this picture, right?

 

by R. Frank Tulak

Enhanced by Zemanta

Are the CIA FBI NSA the same thing?

July 1, 2009

bondslarge2

 

Of course not. They server different purposes and are limited in their authority and influence; but they are very vital in this day and time.

What they have in common is that they collect and act on information related to criminal activity or affects national security.
So they are filled with James Bond types right? No!
A James Bond type would never work well in either group. They may have attributes similar to the Mr. Bond of Ian Fleming’s stories but they must be team players, not lose cannons! Sorry if you are a James Bond fan. 🙂
What their focus is and their boundries are are pretty much given in theirs names.
The Federal Bureau of Investigation (FBI ) and Central Intelligence Agency (CIA) and National Security Agency (NSA).
The FBI is primarily a law enforcement agency, collecting intelligence related to domestic security and performing crime investigation.
The CIA is an international intelligence agency which is not responsible for domestic security
In other words the FBI investigates crimes, and the CIA gathers intelligence.

What does the National Security Agency handle? The NSA handles domestic intelligence in coordination with the FBI. In addition, the CIA often cooperates with international intelligence agencies to exchange information. The CIA may pass information regarding domestic security on to the FBI.

The FBI also handles domestic law enforcement issues. The FBI coordinates national efforts to track down missing persons, complex investigations which local law enforcement cannot handle, processing of criminal evidence, and support for victims of crime. FBI agents frequently assist in the collection of evidence in major criminal cases, especially those involving a substantial amount of money or multiple homicide cases.

The CIA does not handle law enforcement. Agents working within the United States are primarily stationed at CIA headquarters in Washington. Domestically based agents interpret information and create intelligence briefings for the President and White House staff. If directed, these agents may supervise overseas agents in carrying out covert actions on behalf of the United States. (more like Mission Impossible then like James Bond 🙂 )

What does this have to do with computers? EVERYTHING!

You see foriegn unfriendly nations and groups can and do gather information through the use of your computer by way of implanting spyware and malware. This method is almost totally impercievable and very destructive. Not only can they gather intelligence from your computer but use your computer to commit crimes with out you being aware that anyone else is using your computer.
Some recent examples are the Cyber attacks on the World Bank right before the economic world crash. The attack on the White House computers. But ones that can trigger the greatest damage are the botnets.
They are malware that allows someone else to take change of your computer from a distance. As a mild threat they are use to send spam email but as a greatter threat they can be combined to crash any and all networks! Which is about what everything runs on!
Picture if you will traffic any traffic, cars down a highway, water through a pipe, phone calls through a router or just your family coming and going through your house front door. Now instantly jump that incoming traffic to 10.5 million! What would happen to our communications network, our hospital’s network or our defence and police networks? This is the concern of our agancies that guard our nation! What botnet has 10.5 million computers under its control?
The confiker worm! Here is the distributions of control the botnet has.
conficker_world_map
Picture 10.5 million computers awaiting the command of their master!

In the world of your computer it needs protection! You and your computer are part of our nations security!
Your computer needs to have virus protection (like the FBI for our nation) and anti-spyware (like our nations CIA) and it needs to be more strengthed and upadated against attacks with the operating system updates (like our nations NSA).

YOUR MISSION IF YOU DESIDE TO ACCEPT IT IS TO KEEP YOUR COMPUTER’S
ANTIVIRUS UP TO DATE AND CHECK ITS OPERATION EVERY WEEK
UPDATE AND CHECK AND RUN YOUR ANTISPYWARE EVERY WEEK
CHECK AND RUN UP DATES FOR YOUR OPERATING SYSTEM EVERY WEEK.
THIS MESSAGE WILL NOT SELF-DESTRUCT.
GOOD LUCK 🙂


Cloud Computing Going Forward to the Past

June 16, 2009

image0When is the last time you were in the clouds?  No, I’m not talking being in love 🙂

You know, when you did the “take off the shoes” and “walk through the scanner” thing? No, I’m not talking about being arrested, I’m talking about when you got a flight at the airport. Remember just before that, when you got your tickets? Remember the person behind the counter? What was she typing on? A computer terminal. (bear with me I’m not being facetious 🙂 )

gettingtickets Well the program on the terminal screen isn’t in the terminal, the program is on a server which may not be in the same state!

I know what you thinking ” this technology is over 40 years old!”  You are right! Millions of terminals could connect to a few servers at the same time and it was called Master -Slave but since then for Political Correctness sake it was changed to Client-Server. Well what if you repackaged it and the terminal did some real cool stuff and could run multiple programs on several distant servers, what would you call it?

It already has a name; it’s called Cloud Computing!

The story of civilization is taking the individual from Independence to dependence from privacy to being fully exposed. An example would be water. Before, everyone had their own well for water, now it’s a utility, everyone shares and you have to use ONLY what they want you to have and how they want you to have it. So you pay for that utility of receiving water and still buy bottled water! It is the same with food! Now the last bastion of independence and privacy; what interests us, what we write and how we run our business; will be totally naked and accessible by anyone with perceived reasonable authority.

Why would anyone want to lose their Independence? The answer is one word COST!  The average person is after enjoyment, fun and communication. If they bought a computer it was for that purpose. If not, it was because it was too expensive and usually the cell phone, though limited, would suffice. But now that is about to change. Two years ago a computer notebook cost around $2500 with software. Now a net-book (the net part of the word for interNET) costs you $400, using the Intel Atom Processor (a midget Pentium 4 on steroids) and you can use applications such as wordprocessing, spreadsheets, databases and acounting from off a distant server (Really big computer). Next year Intel will cut the cost of the processor almost in half ! While Arm, who makes the processor for the cellphones, is coming out with their own prosessor called snapdragon for the NET book (slave side of Master-Slave, oops I mean Client-Server). The snapdragon configured computer (NETbook) is taunted to be $100 or free with signup, like with a cellphone. What about the really cool stuff part? Well since you are not running any programs on the unit itself but on a distant server, you can have full communication with someone right on the netbook. What I mean is full audio and VISUAL! IF you wanted to show him/her something on your netbook you could show your screen image to them, wherever they are. Or they could just see and hear you. Each one is scheduled to have a video camera with microphone focused on you when you open the lid. Where?  Right above the screen.

The battle for your privacy has already begun. Just like in chess. The board is set and the pieces are in motion. Who are the pieces? The king for the white is Intel Corp. for the black is ARM. The queen for the white is AT&T the queen for the black is Verizon. The bishops are Intel’s communication branch while on the black side Qualcom.The knights are the technologies of voice over the internet (voice over IP) or internet over voice lines which encompasses the router companies like Cisco and Juniper. The  rooks (castles) these are the applications that are to be run from servers. This is still in progress as to which side they are to take. Those who are positioning themselves are Amazon, Ebay, Microsoft, Google, Oracle and Apple, just to name a few.  

 Who are the naked and vulnerable pawns? Why,  those who use the netbook,  of course.  Except we are not naked and vulnerable we do have a little experiance in computers 🙂

Need help choosing and setting up your NETbook give us a call.

With our help you will be like the Cheshire cat,

talking and writing and crusing the NET
with the only thing seen in the cloud is your  smile!

 cheshirecatwithsmile

 We are here for you !


Why Do We Need Passwords?

May 13, 2009

The same question could be phrased “why do we need locks on the doors of our house?” or “Why do we need locks on our cars?”
If some one fails to see the need for locks then have them remove the locks from their home and car.
Quickly the need will be self evident, all though costly.
In this computer age we need security and passwords are that lock to keep the outsiders out side!

Weak or substandard locks are worthless. Would you lock the front door of your house with a luggage lock?

luggagelock
The best they can do to a malicious person is be a nuisance. They will not hinder or stop him.

They are better than nothing right?

Low hanging fruit are always the first fruit taken from a tree. But once they are all gone then more effort is required to get the rest of the fruit. So it is with those with with no passwords at all and those with weak passwords. Those with weak passwords aren’t the first to be taken but they are definitely next!

Your computer has about 256 entry points called ports which are like doors  and it takes less than three seconds to knock on all the doors looking for a response from the computer of  “user name and password”.
Once there is a response then what is used is a dictionary attack where every word in the dictionary is used. This can be done in minutes. Next is the hackers list of most commonly used passwords. Comments on this list can be found at http://tech.yahoo.com/blogs/null/120554 
 

while the list itself can be found at

 

What is a strong password?
It should be at least 8 characters long with a mixture of numbers and letters with one or two special characters.
No, swordfish will not do. 🙂

So how do you remember a password that has number and letters with special characters?

For me special characters mean either at home or at work or at some other location. For instance the special character “$” would be for my computer at work. Then if I am opening a Windows OS then I just use the first four characters of Windows and it would be $Wind. Now interweave the last four digits of your personal phone number at work or your employee ID into it or any other familiar numeric string. Like this $W4i2n4d9. What if you were logging into your Quick books at work? What should the password be? $Q4u2i4c9k. When I am at home the stars are out. Guess what special symbol I use at home? Right, the “*” special character. So logging on to my home computer which has Windows it would be merged with a numeric string at home, perhaps the last four of the home phone *W9i7n5d5. 

This method makes for  stonewall passwords! What is even better they are easy to remember! (well almost 🙂 )

Remember it is not a person that is attacking your computer but a program that is written so that one program can be at thousands of places at one time, knocking on your or other’s computer’s or router’s doors.

Should you share your passwords with anyone? Maybe one; Groucho Marx! 🙂

We are here for you, if you need help give us a call at IBEX 619-464-4249


When a Stone is Not a Stone.

January 23, 2009

pacific_stone_fish

Safety is very important.

Fish hide in the rocks for safety.

In the next few moments of the this picture the little black damsel fish will be literally in the rock on the left and he will not be safe, he will be dead, eaten alive! (click on picture to watch the rock come alive!) Quicktime 7 required download and install here http://www.apple.com/quicktime/

In this world survival and propagation of one’s species is assured if one of two factors are incorporated in your existence, mimicry or crypsis. Mimicry is to mimic the characteristic or appearance of a deadly or dangerous creature even though it is not equipped to or capable of carrying out what it appears to be or have.  This is mostly used by prey.

Predators on the other hand use crypsis or camouflage to appear benign and harmless giving a false sense of protection or safety to their prey. 

In the world of computers more and more programs are resembling life forms.

If the program can not by its own abilities survive it will mimic the abilities of another! Our shelves and drawers are filled with programs that mimic the abilities of other powerful programs but were incapable of performing those abilities.

Then there are the predator programs who appear to be harmless or  benificial to guard and protect you but they are deceiving and will take a big bite out of your productivity, time and finances!

These predator programs trick you into believing a problem exists on your system. Then you are given no alternative but to purchase the bogus applications because your existing antivirus and antispyware cannot resolve the problems because your  antivirus and antispyware are damaged from the predator software, or there is no problem at all. Once they have your credit card info you download more predator software under the camouflaged appearance of protection for your computer. What do you think they will now do with your credit card info?

What if you catch them before you give them your credit card info?

 Even if you catch on that it is a predator it is extremely difficult to remove their fangs and claws out of your computer. Even experienced technicians will have to take 3 to 4 hour to remove it. For those who have paid and downloaded more predators, camouflaged as protection for your computer, it may take 3 to 4 days to remove!  One computer recently came in for repair with 630 predators in their computer!

 Here are the images of the 11 most painful predators in the computer world and 11 creatures whose bite or sting are the most painful  in the world!

 Stone Fish and WinFix

Pain = like boiling oil in ones veins and a sledgehammer to ones joints

Pain = like boiling oil in ones veins and a sledgehammer to ones joints

WinFixer

WinFixer

  

 

 

 

  Gila Monster and UltimateDefender

pain= slowly being burned alive from bite throughout body

pain= slowly being burned alive from bite throughout body

 ultimatedefender

 

.

Black Widow and Spy Sheriff

Unbearable pain just to breath !
Unbearable pain just to breath !

spysheriff

 
Turantula Hawk Wasp and Malwarewipe 
Lightning bolt of screaming agony
Lightning bolt of screaming agony

malwarewipe

Spiting Cobra and DriveCleaner

excruciating acompanied with 5 hours of blindess
excruciating acompanied with 5 hours of blindess

drivecleaner

 Bullet Ant and AVsystemCare

Repeatedly stabbed with red hot nail
Repeatedly stabbed with red hot nail

avsystemcare

Rattle Snake and 1st Anti Virus
being branded continously!
being branded continously!

1stantivirus-main_full

 
 Scorpion and VirusBurst
scorpion_500wvirusburst
 
 Box Jellyfish and SpywareQuake
wraped in burning embers
wrapped in burning embers

spyware-quake

 
Sting Ray and AntiSpyware Soldier
Stabed with a red hot 8 penny nail
Stabbed with a red hot 8 penny nail

ass

 
Brazilian Wandering Spider and System Live Protect
Unimaginable pain with every breath
Unimaginable pain with every breath

liveprotect

 

 

 

 

 

 

Safety  is  very  important.

Getting antivirus and antispyware is being safe!

Unless it gets you! 

Not sure what you are buying?

Call us 619-464-4249

Or email me atrftemail

 

If you are not already receiving it, ask to get our news letter !

We are here for you 🙂

 


…They know when your awake. They know if you’ve been bad or good, so ..

January 7, 2009
They see

They see

 

Privacy  has many  definitions, definitions which are dependant on who you are talking to.

 

Donald Kerr, Principal Deputy Director of National Intelligence  perceives the definition of privacy as anonymity. Therefore from his point of view he believes in this day and time that it  is impossible if there is to be security. In other words, privacy is what you and the government know about you and no others; this is for your safety! 

White Hats, Hackers, Phreeks (a portmanteau for phone and geek no I don’t know why there is an “r” in phreek) define privacy another way; that if you have given that information to anyone then they have a right to it as well. What is left is private.

Then there are those that believe privacy is like going to the beach; if you go to the beach your going to be exposed or why did you go to the beach? What is the beach? The internet. This group of marketers who manufacture the majority of spyware feel they are allot like Santa Claus; “who sees you when your sleeping and knows when your awake and knows when you’ve been bad or good..” and for a price will give any information on any and every type of person who uses the internet ( Ho Ho Ho). One of the oldest is http://www.doubleclick.com/: for a list of most of the American companies that write the spyware programs go to   http://www.spywareguide.com/creator_list_full.php?s=m.

The final group of spyware writers is the smallest but the most infamous they are the Black Hats. These have the skills of all those above but are bad guys “black hats“. They are after your computer to make it commit crimes for them; so that the FBI knocks on your door and arrests you and not them. They work to get your name, social security, birth date and credit card numbers. No, they are not thieves who use your credit cards to go to Europe and eat at fancy restaurants and stay at big hotels then throw your card away. These guys are very intelligent and astute. They collect information and credit card info on hundreds of thousands of people. Then they make a $0.14 to $0.24 transaction of each card at the end of each month.  How much is $0.14 X 100,000 ?  Have you ever complained about a $0.14 charge on your credit card? No one does. Where does the money go? The money trail ends in countries at the fringes of international law; to countries in Eastern Europe and private organizations in Pakistan. What do they do with the money? I don’t think its anything legal!

You are probably asking why I mentioned phreeks (phone geeks) in this article about privacy, right? Because many people say they don’t do credit card transactions over the Internet but only over their cell phones. Do I have a surprise for them. Your cell phone is a computer but what is worse it’s a wireless one.  All broadcasts over the airwaves are monitored and recorded by government agencies except the phone you have that has a wire attached; it is illegal for anyone to monitor that wired phone without a judges order and due cause, but not so for wireless. It is the job of the government to record and monitor wireless transmissions, does the letters FCC mean anything to you?  Well it’s only the government that is listening to my orders over the cell phone, right? Ladies and gentleman may I introduce to you the hottest selling item imported from Europe and Canada the Optoelectronics Scout frequency counter and a AOR-8200

The TOOL

The TOOL

Imagine the thrill of listening to every cell phone conversation within 40 miles !
There are tens of thousands of these  in the US.
Are they illegal to own? No!
Are they are illegal to use? YES! but they can not be detected if they are used.
Honestly it’s far safer to use the computer on the internet then a cell phone to transmit personal information.
With the Internet browser set to 128 bit encryption (and there is no spyware on your system) your computer is linked to the transactional computer and is virtually secure against anyone’s eyes while the information is in transit. How do you know its working?
There will be a little padlock either at the top next to the URL (internet address) or bottom right corner of your Internet browser.
Your transactions are secure!

Your transactions are secure!

 
 
.
Privacy to me is very simple.
If I get private with my wife behind closed doors where I can plainly see  the dimples on her cheeks then I guarantee she can see mine .
Privacy is not one way.
Bare truth from both parties is only right.
If they want my privacy then I have a right to theirs or no deal!
The same for the beach!
You want to check me out in a speedo on the beach then you have to be wearing just as little or no deal !
I don’t care how big your belly is !!!
santa_on_holiday_in_spainHO! HO! HO!