Wednesday, May 6, 2009
Rue Longue - Arch beneath an Arch
The Wadey/Snow Family
Photography as Transcendence
My friend was particularly impressed by how "utterly and completely absorbing" Eric's portraits are; but he was not - as he immediately explained - referrring only to the model's obvious beauty. My astute friend - who also happens to be a gifted artist - was using one of Eric's portraits to make a deeper point about what distinguishes the "best" photography from that which is merely "good." My friend opined that the best photograph - or, more generally, the best artwork of any kind - is the one that induces in the viewer the broadest possible inner experience. That is, that what the viewer experiences, transcends in some way - and in the very best art, transcends in multiple ways - the dimensions that the artist is physically constrained to using in order to express his artwork.Superficially, of course, this is always true, even of "not terribly good" photographs. All (conventional) photographs are by their nature two dimensional, yet evoke - with varying degrees of success - a "three dimensional" experience (mostly because we "expect" to see the "world as revealed by a photograph" as we see the world with our eyes). But what my friend was thinking about was a deeper level of experiential transcendence. When he looked at one of Eric's nude portraits - which is, as are all of Eric's photographs, beautifully lit, elegantly composed, and expertly printed with a wonderful palette of tones (see Eric's on-line gallery for samples of his work) - my friend's immediate reality was temporarily replaced by one in which only my friend and Eric's model existed, and in which the model was very real. From my friend's point of view, while he was looking at the portrait, the model was as palpably real to him as any physically real person can be.His experience of her far transcended the ink and paper on which her two dimensional form is physically expressed, and assumed multiple dimensions including touch, taste, smell, even (hints of imagined) emotion. To be sure, all of these "transcendent" dimensions are supplied by the viewer, and will be different from viewer to viewer. It is more correct to say that they are all induced in the viewer by the photograph. But that is the whole point. The photograph - as a physical cipher designed to convey a certain experience of reality - is so well executed, that the viewer experiences the full range of emotion while interacting with it. The shades of grey ink that depict a part of the model's neck, for example, are transformed in the viewer's mind into real skin, with its own unique aroma, its distinct tactile feel and texture, and so on. As tempting as it might be to think that this is true of all photographs, the truth is that it is not so. Indeed, had Eric's portrait been taken instead by a less seasoned photographer with no eye for light, let us say, but of the same model in exactly the same pose in exactly the same surroundings and background, the perceptive viewer would in all likelihood still "experience" a beautiful model in a beautiful pose, but nothing more. No extra, or transcendent, dimensions would reveal themselves; and certainly not as readily, and not all for indiscriminate viewers. Eric's fine-art "touch" reveals profoundly more. In a sense, Eric's portrait provides the raw "aesthetic" material that the interested viewer transforms into a transcendent, personally meaningful experiential reality.So the idea on the table, as proposed by my artist friend after viewing Eric's portrait is this: that art is at its finest when the artist somehow manages to induce in the viewer dimensions of inner experience that transcend those that define the artwork itself. Just as "fine-art" music (say, by Beethoven) may be distinguished from "musak" by the fact that listening to it makes you feel alive (whereas "musak" merely makes you think that you want your elevator ride to end soon); the finest photography makes you forget you are looking at a photograph and makes you experience it as if it were real; as if you were a part of it.Put another way, and assuming our traditional store of five senses (though we may have as many as eleven, and possibly more if we include "extra"-sensory ones), the finest art is a process whereby a single sensory dimension - and at most a few - is used to evoke in the viewer the experiential equivalent of all five. The very best art makes the viewer forget she is even looking at any art at all, the artwork having evoked an experience of transcendence itself (in which the viewer "sees" herself in the art, and cosmos in self). But that's another blog entry... ;-)
Hey Fella, Would you Mind...?
No, the class of people I am referring to are of a distinct "Hey Fella, Would you mind...?" bent of mind. The kind who - regardless of how busy they must surely see you are (it is hard to be "gesticulating wildly" without at least appearing to be busy doing something ;-) - nonetheless suddenly, brazenly, and anything-but-quietly approach you - often tapping you on the shoulder for good measure, presumably trying to increase their chances of getting your attention - to demand (yes demand!) that you stop what you are doing in order to take their picture. As preposterous as this may sound - come now, people don't really do that, do they? (yes they do!) - this has happened to me for so long, so consistently, in so many different places, that I never go on any of my photo-safaris without expecting (and bracing for) at least one such encounter.Here is a typical "Hey Fella, Would you mind...?" encounter I had recently on a trip my wife and I took to Grand Cayman island (to get away from it all during Spring break). My wife and I are on the beach in front of our hotel. The sun is setting (with precious few moments left before it disappears below the horizon). I have my tripod set up a few feet from shore, and am attempting to get a few Hiroshi Sugimoto-like (i.e., looooong exposure) shots. I have my trusty Singh-Ray vari-ND neutral density filter screwed on. And I am very much "in the moment"; ticking off the seconds of a shot and anticipating only a few compositional opportunities left before the light disappears for the night.Behind me, I faintly hear some whispers (though with an obvious urgency). "There are only a few moments left! Get someone!" A family. A man, a woman, and two teenage kids. I hear feet shuffling on the sand, ice sloshing in a glass (a rum punch?); voices getting closer. "He's busy." "So what, the lights going!" Two pairs of feet shuffling now; I also hear a few giggles from the kids. "I can't bother him now!" (A faint glimmer of hope that at least one member of this party has some decency!...but alas...) "He can take his pictures later...ask him, go ask him!" I hear: "Ah, fella, would you mind...?" (I'm not kidding you!) Keep in mind, I'm huddled over my camera, and in the middle of a minute-long exposure. I keep my posture, and say (without lifting my head) - loudly enough for him to hear, but with an even tone - "I'm in the middle of a shot right now; this is not a good time." "But I just heard the shutter; you've taken your shot already!" I can't believe this comment (I sigh, inwardly, but keep my eye at the camera - 45s, 46s, 47s, ... - and remain silent.I feel a light tap on my shoulder (I am not making this up!) "Hey fella, didn't you hear me? My wife and I would like you to take a picture of our family before the sun goes down." I still - somehow (!) - manage to keep my composure. I remain glued to my camera, but say, firmly this time, "Sir, I am busy right now. Perhaps you can find someone else to take your picture?" I should point out that the beach was filled with people, many of whom had their own cameras; and at least one other person had a tripod (which he was not even using, and was content simply enjoying the sunset view).The man persists: "Fella, there are only a few minutes left!" An assertion that finally grabs my full attention. I stand upright, look his way, and say - rather angrily I admit - "Yes, I know! I'd very much like to use this time to do my work, if you don't mind!" He doesn't let go: "Hey man, it's just one shot, come on..." Now, I know there must be some Emily Post etiquette behavior guide for situations such as this (there ought to be, if not). I grit my teeth - outwardly trying to smile - take his camera, move in front of the man, his wife, and two giggling teenagers, and tale a quick shot with their camera. "Thanks man," is all I get for my efforts (as I run back to my tripod)...almost. As I prepare to hit the shutter one last time (to capture the shot you see reproduced above), I feel another tap - I can;t make this stuff up! - "Hey fella, can you do one more, please, without the kids this time?" At least he said please!I have dozens of stories very similar to this one. An unforgettable "encounter" happened in Santorini, Greece last year, and involved a German couple who spoke not one word of English (nor I German). That made it both better and worse (and in hindsight - but only in hindsight - hilarious), but I'll leave the details to your imagination :-) There are no deep lessons or morals here, save for the obvious ones: (1) people will be people (on both sides of the camera); (2) always plan for one or two rude people (that way you won't be surprised); and (3) it pays to not lose your cool (had I lost mine, I would not have gotten the one "keeper" of the night, the shot at top).Postscript. For those kind readers who have, over time, picked up on my penchant for Borgesian/Godelian recursive mysteries, be assured that I did toy with the idea of weaving my tale around an infinite regress induced by my having thrown the "audacious, brash, brazen, daring, disrespectful, forward, impertinent, impudent, presumptuous, rash, rude, shameless,.." man's words right back at him: "Hey fella, would you mind...?" (Which would have made as much sense for me to use on him, as he clearly believed there was in using them on me.) In some unknown universe in the limitless multiverse we occupy an infinitesimally small point in, there is a world, much like our own, where an "encounter" between a photographer and a man wishing the photographer to take a picture of his family never ever ends: Hey fella, would you mind...?, Hey fella, would you mind...?, Hey fella, would you mind...?, ...
Hopeful cricket-related slogan
Cleaning up the blogroll
80th Birthday Cake
Tea Anyone?
First Birthday or was it?
Tuesday, May 5, 2009
NW (Nordic Walking) in NW (Northwestern) Colorado
Nordic Walking Classes in Two M-States
in Massachusetts
Minnesota
I think of Minnesota as a Nordic Walking hotbed. Two women -- Linda Lemke and Rhea Kontos -- each offer an impressive schedule of classes, and Nordic Walking is available in other contexts too.
Wednesdays, April 15, 22, 29 - Wayzata Community Education class #nordwk-400-00-001-09, 763-745-5200
Thursdays, April 16, 23 - Edina Community Education, Nordic Walking for Better Health 952-848-3950
Saturdays, May 2, 9, 16 - Nordic Walking Classes at Hoigaards, all 3 sessions for $25, Email Lemke for details
Wednesdays, May 13, 20, 27 - Minnetonka Community Ed, Nordic Walking for Better Health, 952-401-6800
Thursdays, May 7, 14, 21 and Saturdays, May 30, June 6, 13 - Plymouth Parks and Recreation Classes #30919 and 30920, 763-509-5200
Teelicht "Asphalt"
Magnetisches Schlüsselbrett
Friday, May 1, 2009
10 things you can do to protect your data
"Operating systems and applications can always be reinstalled, but your data is unique--making it the most important thing on your computer or network. Here's a look at 10 ways you can protect that data from loss and unauthorized access".
When you think about it, the most valuable thing on your computer or network is the data you create. After all, that data is the reason for having the computer and network in the first place and it's the bits and bytes that make up that data that are your first priority when putting protective strategies in place. Operating systems and applications can always be reinstalled, but user-created data is unique and if lost, may be irreplaceable.
Some data is also confidential; not only do you not want to lose it, you don't want others to even view it without authorization. Exposure of your social security number, credit card, and bank account information could subject you to identity theft. Company documents may contain trade secrets, personal information about employees or clients, or the organization's financial records.
Let's look at some ways to protect your all-important user data from loss and/or unauthorized access.
#1: Back up early and often
The single most important step in protecting your data from loss is to back it up regularly. How often should you back up? That depends--how much data can you afford to lose if your system crashes completely? A week's work? A day's work? An hour's work?
You can use the backup utility built into Windows (ntbackup.exe) to perform basic backups. You can use Wizard Mode to simplify the process of creating and restoring backups or you can configure the backup settings manually and you can schedule backup jobs to be performed automatically.
There are also numerous third-party backup programs that can offer more sophisticated options. Whatever program you use, it's important to store a copy of your backup offsite in case of fire, tornado, or other natural disaster that can destroy your backup tapes or discs along with the original data.
#2: Use file-level and share-level security
To keep others out of your data, the first step is to set permissions on the data files and folders. If you have data in network shares, you can set share permissions to control what user accounts can and cannot access the files across the network. With Windows 2000/XP, this is done by clicking the Permissions button on the Sharing tab of the file's or folder's properties sheet.
However, these share-level permissions won't apply to someone who is using the local computer on which the data is stored. If you share the computer with someone else, you'll have to use file-level permissions (also called NTFS permissions, because they're available only for files/folders stored on NTFS-formatted partitions). File-level permissions are set using the Security tab on the properties sheet and are much more granular than share-level permissions.
In both cases, you can set permissions for either user accounts or groups, and you can allow or deny various levels of access from read-only to full control.
#3: Password-protect documents
Many productivity applications, such as Microsoft Office applications and Adobe Acrobat, will allow you to set passwords on individual documents. To open the document, you must enter the password. To password-protect a document in Microsoft Word 2003, go to Tools Options and click the Security tab. You can require a password to open the file and/or to make changes to it. You can also set the type of encryption to be used.
Unfortunately, Microsoft's password protection is relatively easy to crack. There are programs on the market designed to recover Office passwords, such as Elcomsoft's Advanced Office Password Recovery (AOPR). This type of password protection, like a standard (non-deadbolt) lock on a door, will deter casual would-be intruders but can be fairly easily circumvented by a determined intruder with the right tools.
You can also use zipping software such as WinZip or PKZip to compress and encrypt documents.
#4: Use EFS encryption
Windows 2000, XP Pro, and Server 2003 support the Encrypting File System (EFS). You can use this built-in certificate-based encryption method to protect individual files and folders stored on NTFS-formatted partitions. Encrypting a file or folder is as easy as selecting a check box; just click the Advanced button on the General tab of its properties sheet. Note that you can't use EFS encryption and NTFS compression at the same time.
EFS uses a combination of asymmetric and symmetric encryption, for both security and performance. To encrypt files with EFS, a user must have an EFS certificate, which can be issued by a Windows certification authority or self-signed if there is no CA on the network. EFS files can be opened by the user whose account encrypted them or by a designated recovery agent. With Windows XP/2003, but not Windows 2000, you can also designate other user accounts that are authorized to access your EFS-encrypted files.
Note that EFS is for protecting data on the disk. If you send an EFS file across the network and someone uses a sniffer to capture the data packets, they'll be able to read the data in the files.
#5: Use disk encryption
There are many third-party products available that will allow you to encrypt an entire disk. Whole disk encryption locks down the entire contents of a disk drive/partition and is transparent to the user. Data is automatically encrypted when it's written to the hard disk and automatically decrypted before being loaded into memory. Some of these programs can create invisible containers inside a partition that act like a hidden disk within a disk. Other users see only the data in the "outer" disk.
Disk encryption products can be used to encrypt removable USB drives, flash drives, etc. Some allow creation of a master password along with secondary passwords with lower rights you can give to other users. Examples include PGP Whole Disk Encryption and DriveCrypt, among many others.
#6: Make use of a public key infrastructure
A public key infrastructure (PKI) is a system for managing public/private key pairs and digital certificates. Because keys and certificates are issued by a trusted third party (a certification authority, either an internal one installed on a certificate server on your network or a public one, such as Verisign), certificate-based security is stronger.
You can protect data you want to share with someone else by encrypting it with the public key of its intended recipient, which is available to anyone. The only person who will be able to decrypt it is the holder of the private key that corresponds to that public key.
#7: Hide data with steganography
You can use a steganography program to hide data inside other data. For example, you could hide a text message within a .JPG graphics file or an MP3 music file, or even inside another text file (although the latter is difficult because text files don't contain much redundant data that can be replaced with the hidden message). Steganography does not encrypt the message, so it's often used in conjunction with encryption software. The data is encrypted first and then hidden inside another file with the steganography software.
Some steganographic techniques require the exchange of a secret key and others use public/private key cryptography. A popular example of steganography software is StegoMagic, a freeware download that will encrypt messages and hide them in .TXT, .WAV, or .BMP files.
#8: Protect data in transit with IP security
Your data can be captured while it's traveling over the network by a hacker with sniffer software (also called network monitoring or protocol analysis software). To protect your data when it's in transit, you can use Internet Protocol Security (IPsec)--but both the sending and receiving systems have to support it. Windows 2000 and later Microsoft operating systems have built-in support for IPsec. Applications don't have to be aware of IPsec because it operates at a lower level of the networking model.
Encapsulating Security Payload (ESP) is the protocol IPsec uses to encrypt data for confidentiality. It can operate in tunnel mode, for gateway-to-gateway protection, or in transport mode, for end-to-end protection. To use IPsec in Windows, you have to create an IPsec policy and choose the authentication method and IP filters it will use. IPsec settings are configured through the properties sheet for the TCP/IP protocol, on the Options tab of Advanced TCP/IP Settings.
#9: Secure wireless transmissions
Data that you send over a wireless network is even more subject to interception than that sent over an Ethernet network. Hackers don't need physical access to the network or its devices; anyone with a wireless-enabled portable computer and a high gain antenna can capture data and/or get into the network and access data stored there if the wireless access point isn't configured securely.
You should send or store data only on wireless networks that use encryption, preferably Wi-Fi Protected Access (WPA), which is stronger than Wired Equivalent Protocol (WEP).
#10: Use rights management to retain control
If you need to send data to others but are worried about protecting it once it leaves your own system, you can use Windows Rights Management Services (RMS) to control what the recipients are able to do with it. For instance, you can set rights so that the recipient can read the Word document you sent but can't change, copy, or save it. You can prevent recipients from forwarding e-mail messages you send them and you can even set documents or messages to expire on a certain date/time so that the recipient can no longer access them after that time.
To use RMS, you need a Windows Server 2003 server configured as an RMS server. Users need client software or an Internet Explorer add-in to access the RMS-protected documents. Users who are assigned rights also need to download a certificate from the RMS server.
10 dumb things users do that can mess up their computers
Here’s one that actually can physically destroy your computer equipment, as well as the data it holds. You may think your systems are in danger only during an electrical storm, but anything that interrupts the electrical circuit and then starts the current back again can fry your components. Something as simple as someone turning on an appliance that’s plugged into the same circuit (especially a high voltage one such as a hair dryer, electric heater, or air conditioner) can cause a surge, or a surge may be caused by a tree limb touching a power line. If you have a power outage, you may experience a surge when the electricity comes back on.
You can protect your systems against damage from power surges by always using a surge protector, but it’s important to be aware that most cheap surge protectors will survive only a single surge and need to be replaced afterward. An Uninterruptible Power Supply (UPS) is better than a surge protector; it has a battery that keeps power flowing smoothly even when there’s an outage, to give you time to gracefully shut down.
DUMB 2 > Surf the Internet without a firewall
Many home users plug their computers right into their spiffy new cable or DSL modems and hop onto the Internet without realizing that they’re putting themselves at risk from viruses and attackers. Every Internet-connected computer should be protected by a firewall; this can be a firewall built into the broadband modem or router, a separate firewall appliance that sits between the modem/router and the computer, a server at the network’s edge running firewall software, or personal firewall software installed on the computer (such as ICF/Windows Firewall built into Windows XP or a third-party firewall program like Kerio or ZoneAlarm).
One advantage of personal firewalls on laptop computers is that they’re still with you when you take the computer on the road and plug into a hotel’s DSL or cable port or connect to a wireless hotspot. Just having a firewall isn’t enough, though. You must also be sure it’s turned on and configured properly to protect you.
DUMB 3 > Neglect to run or update antivirus and anti-spyware programs
Let’s face it: Antivirus programs can be a royal pain. They’re always blocking some application you want to use, you often have to disable them to install new software, and they have to be updated on a regular basis to do any good. Seems like the subscription is always expiring and prompting you to renew it--for a fee, in many cases. But in today’s environment, you can’t afford to go without virus protection. The malicious programs that AV software detects--viruses, Trojans, worms, etc.--can not only wreak havoc on your system but can spread via your computer to the rest of the network. In extreme cases, they can bring down the whole network.
Spyware is another growing threat; these are programs that install themselves on your computer (usually without your knowledge) and collect information from your system that is then sent back to the spyware program’s author or vendor. Antivirus programs often don’t address spyware so it’s important to run a dedicated spyware detection and removal program.
DUMB 4 >Install and uninstall lots of programs, especially betas
You like to be on the cutting edge, so you often install and try out new software. Beta programs are usually free and give you a chance to sample neat new features before most people. There are also many freeware and shareware programs made available as Internet downloads by their authors. We know you’d never do it, but some users even install pirated software or “warez.”
The more programs you install, the more likely you are to run across ones that either include malicious code or that are poorly written and cause your system to behave improperly or crash. The risk is greater with pirated programs.
Even if you install only licensed, final-release commercial software, too many installations and uninstallations can gunk up the registry. Not all uninstall routines completely remove program remnants and at the least, this practice can cause your system to slow down over time.
You should install only the programs that you really need, stick with legitimate software, and try to minimize the number you install and uninstall.
DUMB 5 > Keep disks full and fragmented
One of the results of installing and uninstalling lots of programs (or adding and deleting data of any kind) is that it fragments your disk. Disk fragmentation occurs because of the way information is stored on the disk: On a new, clean disk, when you save a file it’s stored in contiguous sections called clusters. If you delete a file that takes up, for example, five clusters, and then save a new file that takes eight clusters, the first five clusters’ worth of data will be saved in the empty space left by the deletion and the remaining three will be saved in the next empty spaces. That makes the file fragmented, or divided. To access that file, then, the disk’s read heads won’t find all the parts of the file together but must go to different locations on the disk to retrieve it all. That makes it slower to access. If the file is part of a program, the program will run more slowly. A badly fragmented disk will slow down to a crawl.
You can use the disk defragmenter built into Windows (Programs Accessories System Tools) or a third-party defrag program to rearrange these pieces of files so that they’re placed contiguously on the disk.
Another common cause of performance problems and application misbehavior is a disk that’s too full. Many programs create temporary files and need extra free space on the disk to operate. You can use Windows XP’s Disk Cleanup Tool or a third-party program to find and delete rarely used files, or you can manually delete files to clear space on your disk.
DUMB 6 >Open all attachments
Some folks just can’t help themselves: Getting an e-mail message with an attachment is like getting an unexpected gift. You just have to peek inside to see what it is. But just as that package left on your doorstep could contain a bomb, that file attached to your mail message could contain code that will delete your documents or system folder or send viruses to everyone in your address book.
The most blatantly dangerous attachments are executable files--those that run code--with extensions like .exe, .cmd, and many others (see http://antivirus.about.com/od/securitytips/a/fileextview.htm for a list of file extensions for different types of executables). Files that aren’t themselves executables, such as Word .doc files and Excel .xls files, can contain embedded macros. Scripts (Visual Basic, JavaScript, Flash, etc.) aren’t directly executed by the computer but are run by other programs.
It used to be that you could assume plain text (.txt) or graphics (.gif, .jpg, .bmp) files were safe, but not anymore. File extensions can be “spoofed”; attackers take advantage of the Windows default setting that doesn’t display common file extensions to name executables something like greatfile.jpg.exe. With the real extension hidden, it shows up as greatfile.jpg. So the recipient thinks it’s a graphic, but it’s actually a malicious program.
You should open attachments only when they’re from trusted sources and only when you’re expecting them. Even if the mail with the attachment appears to come from someone you trust, it’s possible that someone spoofed their address or that their computer is infected with a virus that sent the attachment to you without their knowledge.
DUMB 7 > Click on everything
Opening attachments isn’t the only type of mouse click that can get you in trouble. Clicking on hyperlinks in e-mail messages or on Web pages can take you to Web sites that have embedded ActiveX controls or scripts that can perform all sorts of malicious activities, from wiping your hard disk to installing a backdoor program on your computer that a hacker can use to get in and take control of it.
Clicking the wrong link can also take you to inappropriate Web sites that feature pornography, pirated music or software, or other content that can get you in trouble if you’re using a computer on the job or even get you in trouble with the law.
Don’t give in to “click mania.” Think before you click a link. Links can also be disguised in “phishing” messages or on Web sites to appear to take you to a different site from the ones they really point to. For example, the link might say www.safesite.com, but it actually takes you to www.gotcha.com. You can often find out the real URL by hovering over the link without clicking it.
DUMB 8 >Share and share alike
Your mother taught you that it’s nice to share, but when you’re on a network, sharing can expose you to dangers. If you have file and printer sharing enabled, others can remotely connect to your computer and access your data. Even if you haven’t created any shared folders, by default Windows systems have hidden “administrative” shares for the root of each drive. A savvy hacker may be able to use these shares to get in. One way to prevent that is to turn off file and printer sharing--if you don’t need to make any of the files on your computer accessible across the network. This is especially a good idea if you’re connecting your laptop to a public wireless hotspot. You can find instructions on how to do so at http://www.pcmag.com/article2/0,1895,1277222,00.asp.
If you do need to make shared folders accessible, it’s important that they be protected by both share-level permissions and file-level (NTFS) permissions. Also ensure that your account and the local administrative account have strong passwords.
DUMB 9 > Pick the wrong passwords:
That brings us to another common mistake that can expose you to attacks: picking the wrong password. Even if you don’t belong to a network where the administrator forces you to select strong passwords and change them regularly, you should do so. Don’t pick passwords that are easy to guess, such as your birthdate, loved one’s name, social security number, etc. Longer passwords are harder to crack, so make your password at least eight characters long; 14 is even better. Popular password-cracking methods use "dictionary" attacks so don’t use words that are in the dictionary. Passwords should contain a combination of alpha, numeric, and symbol characters for best security.
A long string of nonsense characters may create a password that’s tough to crack, but if you can’t remember it, you’ll defeat the purpose by writing it down (where an intruder may be able to find it). Instead, create a phrase you can remember easily and use the first letters of each word, along with logical numbers and symbols. For example: “My cat ate a mouse on the 5th day of June” becomes “Mc8amot5doJ.”
DUMB 10 > Ignore the need for a backup and recovery plan:
Even if you follow all these suggestions, an attacker may crash your system or your data may be corrupted or get wiped out by a hardware problem. That’s why it’s essential that you always back up your important information and have a plan for recovering from a system failure.
Most computer users know they should back up, but many never get around to it. Or they make an initial backup but don’t update it regularly. Use the built-in Windows backup program (Ntbackup.exe in Windows NT, 2000, and XP) or a third-party backup program and schedule backups to occur automatically. Store backed up data on a network server or removable drive in a location away from the computer itself, in case of a natural disaster like flood, fire, or tornado.
Remember that the data is the most important thing on your computer। The operating system can be reinstalled and so can applications, but it may be difficult or impossible to recreate your original data. (See "10 ways to protect your data" for additional suggestions.)
10 dumb things users do that can mess up their computers
Here’s one that actually can physically destroy your computer equipment, as well as the data it holds. You may think your systems are in danger only during an electrical storm, but anything that interrupts the electrical circuit and then starts the current back again can fry your components. Something as simple as someone turning on an appliance that’s plugged into the same circuit (especially a high voltage one such as a hair dryer, electric heater, or air conditioner) can cause a surge, or a surge may be caused by a tree limb touching a power line. If you have a power outage, you may experience a surge when the electricity comes back on.
You can protect your systems against damage from power surges by always using a surge protector, but it’s important to be aware that most cheap surge protectors will survive only a single surge and need to be replaced afterward. An Uninterruptible Power Supply (UPS) is better than a surge protector; it has a battery that keeps power flowing smoothly even when there’s an outage, to give you time to gracefully shut down.
DUMB 2 > Surf the Internet without a firewall
Many home users plug their computers right into their spiffy new cable or DSL modems and hop onto the Internet without realizing that they’re putting themselves at risk from viruses and attackers. Every Internet-connected computer should be protected by a firewall; this can be a firewall built into the broadband modem or router, a separate firewall appliance that sits between the modem/router and the computer, a server at the network’s edge running firewall software, or personal firewall software installed on the computer (such as ICF/Windows Firewall built into Windows XP or a third-party firewall program like Kerio or ZoneAlarm).
One advantage of personal firewalls on laptop computers is that they’re still with you when you take the computer on the road and plug into a hotel’s DSL or cable port or connect to a wireless hotspot. Just having a firewall isn’t enough, though. You must also be sure it’s turned on and configured properly to protect you.
DUMB 3 > Neglect to run or update antivirus and anti-spyware programs
Let’s face it: Antivirus programs can be a royal pain. They’re always blocking some application you want to use, you often have to disable them to install new software, and they have to be updated on a regular basis to do any good. Seems like the subscription is always expiring and prompting you to renew it--for a fee, in many cases. But in today’s environment, you can’t afford to go without virus protection. The malicious programs that AV software detects--viruses, Trojans, worms, etc.--can not only wreak havoc on your system but can spread via your computer to the rest of the network. In extreme cases, they can bring down the whole network.
Spyware is another growing threat; these are programs that install themselves on your computer (usually without your knowledge) and collect information from your system that is then sent back to the spyware program’s author or vendor. Antivirus programs often don’t address spyware so it’s important to run a dedicated spyware detection and removal program.
DUMB 4 >Install and uninstall lots of programs, especially betas
You like to be on the cutting edge, so you often install and try out new software. Beta programs are usually free and give you a chance to sample neat new features before most people. There are also many freeware and shareware programs made available as Internet downloads by their authors. We know you’d never do it, but some users even install pirated software or “warez.”
The more programs you install, the more likely you are to run across ones that either include malicious code or that are poorly written and cause your system to behave improperly or crash. The risk is greater with pirated programs.
Even if you install only licensed, final-release commercial software, too many installations and uninstallations can gunk up the registry. Not all uninstall routines completely remove program remnants and at the least, this practice can cause your system to slow down over time.
You should install only the programs that you really need, stick with legitimate software, and try to minimize the number you install and uninstall.
DUMB 5 > Keep disks full and fragmented
One of the results of installing and uninstalling lots of programs (or adding and deleting data of any kind) is that it fragments your disk. Disk fragmentation occurs because of the way information is stored on the disk: On a new, clean disk, when you save a file it’s stored in contiguous sections called clusters. If you delete a file that takes up, for example, five clusters, and then save a new file that takes eight clusters, the first five clusters’ worth of data will be saved in the empty space left by the deletion and the remaining three will be saved in the next empty spaces. That makes the file fragmented, or divided. To access that file, then, the disk’s read heads won’t find all the parts of the file together but must go to different locations on the disk to retrieve it all. That makes it slower to access. If the file is part of a program, the program will run more slowly. A badly fragmented disk will slow down to a crawl.
You can use the disk defragmenter built into Windows (Programs Accessories System Tools) or a third-party defrag program to rearrange these pieces of files so that they’re placed contiguously on the disk.
Another common cause of performance problems and application misbehavior is a disk that’s too full. Many programs create temporary files and need extra free space on the disk to operate. You can use Windows XP’s Disk Cleanup Tool or a third-party program to find and delete rarely used files, or you can manually delete files to clear space on your disk.
DUMB 6 >Open all attachments
Some folks just can’t help themselves: Getting an e-mail message with an attachment is like getting an unexpected gift. You just have to peek inside to see what it is. But just as that package left on your doorstep could contain a bomb, that file attached to your mail message could contain code that will delete your documents or system folder or send viruses to everyone in your address book.
The most blatantly dangerous attachments are executable files--those that run code--with extensions like .exe, .cmd, and many others (see http://antivirus.about.com/od/securitytips/a/fileextview.htm for a list of file extensions for different types of executables). Files that aren’t themselves executables, such as Word .doc files and Excel .xls files, can contain embedded macros. Scripts (Visual Basic, JavaScript, Flash, etc.) aren’t directly executed by the computer but are run by other programs.
It used to be that you could assume plain text (.txt) or graphics (.gif, .jpg, .bmp) files were safe, but not anymore. File extensions can be “spoofed”; attackers take advantage of the Windows default setting that doesn’t display common file extensions to name executables something like greatfile.jpg.exe. With the real extension hidden, it shows up as greatfile.jpg. So the recipient thinks it’s a graphic, but it’s actually a malicious program.
You should open attachments only when they’re from trusted sources and only when you’re expecting them. Even if the mail with the attachment appears to come from someone you trust, it’s possible that someone spoofed their address or that their computer is infected with a virus that sent the attachment to you without their knowledge.
DUMB 7 > Click on everything
Opening attachments isn’t the only type of mouse click that can get you in trouble. Clicking on hyperlinks in e-mail messages or on Web pages can take you to Web sites that have embedded ActiveX controls or scripts that can perform all sorts of malicious activities, from wiping your hard disk to installing a backdoor program on your computer that a hacker can use to get in and take control of it.
Clicking the wrong link can also take you to inappropriate Web sites that feature pornography, pirated music or software, or other content that can get you in trouble if you’re using a computer on the job or even get you in trouble with the law.
Don’t give in to “click mania.” Think before you click a link. Links can also be disguised in “phishing” messages or on Web sites to appear to take you to a different site from the ones they really point to. For example, the link might say www.safesite.com, but it actually takes you to www.gotcha.com. You can often find out the real URL by hovering over the link without clicking it.
DUMB 8 >Share and share alike
Your mother taught you that it’s nice to share, but when you’re on a network, sharing can expose you to dangers. If you have file and printer sharing enabled, others can remotely connect to your computer and access your data. Even if you haven’t created any shared folders, by default Windows systems have hidden “administrative” shares for the root of each drive. A savvy hacker may be able to use these shares to get in. One way to prevent that is to turn off file and printer sharing--if you don’t need to make any of the files on your computer accessible across the network. This is especially a good idea if you’re connecting your laptop to a public wireless hotspot. You can find instructions on how to do so at http://www.pcmag.com/article2/0,1895,1277222,00.asp.
If you do need to make shared folders accessible, it’s important that they be protected by both share-level permissions and file-level (NTFS) permissions. Also ensure that your account and the local administrative account have strong passwords.
DUMB 9 > Pick the wrong passwords:
That brings us to another common mistake that can expose you to attacks: picking the wrong password. Even if you don’t belong to a network where the administrator forces you to select strong passwords and change them regularly, you should do so. Don’t pick passwords that are easy to guess, such as your birthdate, loved one’s name, social security number, etc. Longer passwords are harder to crack, so make your password at least eight characters long; 14 is even better. Popular password-cracking methods use "dictionary" attacks so don’t use words that are in the dictionary. Passwords should contain a combination of alpha, numeric, and symbol characters for best security.
A long string of nonsense characters may create a password that’s tough to crack, but if you can’t remember it, you’ll defeat the purpose by writing it down (where an intruder may be able to find it). Instead, create a phrase you can remember easily and use the first letters of each word, along with logical numbers and symbols. For example: “My cat ate a mouse on the 5th day of June” becomes “Mc8amot5doJ.”
DUMB 10 > Ignore the need for a backup and recovery plan:
Even if you follow all these suggestions, an attacker may crash your system or your data may be corrupted or get wiped out by a hardware problem. That’s why it’s essential that you always back up your important information and have a plan for recovering from a system failure.
Most computer users know they should back up, but many never get around to it. Or they make an initial backup but don’t update it regularly. Use the built-in Windows backup program (Ntbackup.exe in Windows NT, 2000, and XP) or a third-party backup program and schedule backups to occur automatically. Store backed up data on a network server or removable drive in a location away from the computer itself, in case of a natural disaster like flood, fire, or tornado.
Remember that the data is the most important thing on your computer। The operating system can be reinstalled and so can applications, but it may be difficult or impossible to recreate your original data. (See "10 ways to protect your data" for additional suggestions.)
Thursday, April 30, 2009
Bad Religion - New Maps Of Hell
Punk Rock. Ist natürlich total aus der Mode, und das nicht erst seit gestern. Einige Bands versuchen, sich in ein hippes Nachbargenre zu retten und verzapfen seitdem weinerlichen Emo wie AFI. Andere wollen auf Gedeih und Verderb der Politik in den Hintern treten, scheitern aber an ihrer Engstirnigkeit, wie beispielsweise Anti-Flag, oder verrennen sich in den eigenen Zwangsvorstellungen, siehe NOFX. Und von vielen weiteren hat man seit Ewigkeiten nichts mehr gehört. In letztere Kategorie fallen irgendwie auch Bad Religion. Schließlich sollte dieses Album ursprünglich schon letztes Jahr erscheinen.
Nun haben wir Mitte 2007 und New Maps Of Hell rotiert endlich im CD-Player. Und obwohl man bei diesem Gerät keine Möglichkeit hat, die Geschwindigkeit einzustellen, fragt man sich zu Beginn, wann man denn aus Versehen den Knopf „schneller" gedrückt hat. Denn Bad Religion legen vor wie Rancid auf ihrem 2000er Album. Die ersten drei Songs brauchen keine vier Minuten. Der Hörer ist sofort drin, der Opener 52 Seconds nach kurzer Zeit nur noch ein Schemen. Melodien schwirren aus den Lautsprechern, werden einem um die Ohren gehauen. Erst der siebte Song, die Single Honest Goodbye, nimmt die Geschwindigkeit ein wenig heraus. Die Platte klingt schon fast nach einem Befreiungsschlag, und das, obwohl Bad Religion eigentlich zuletzt zwei recht gute Alben nach der Rückkehr zu Epitaph veröffentlicht haben. Die Band legt zweifellos noch einmal eine Schippe drauf. Kompromisse werden hier keine gemacht. Akustik-Gitarren und Elektronik-Effekte wird man vergeblich suchen, einzig die zaghaften Klaviertöne von Fields Of Mars verkünden das nahe Ende dieses etwa 38minütigen Höllenritts.
Und natürlich sind die Texte politisch. Aber sie sind gleichzeitig differenziert und fordern kein plakatives New America, wie noch vor einigen Jahren oder bei einigen musikalischen Kollegen Bad Religion sind musikalisch in der Vergangenheit geblieben und haben alte Tugenden perfektioniert. Künstlerisch sind die jedoch weiter als die meisten. 8/10
Titan - A Raining Sun
Monday, April 27, 2009
William "The Refrigerator" Perry hospitalized in serious condition due to complications of Guillan-Barré syndrome
Perry remains in serious condition at Aiken Regional Medical Center, located in his boyhood home of Aiken, South Carolina. Perry's nephew, Purnell Perry, said Tuesday that his uncle was admitted more than a week ago but was expected to recover. According to thebrainmatters.org, a website of the American Academy of Neurology Foundation, GBS "can be a devastating disorder because of its sudden and unexpected onset. Most people reach the stage of greatest weakness within the first 2 weeks after symptoms appear, and by the third week of the illness 90 percent of all patients are at their weakest. The recovery period may be as little as a few weeks or as long as a few years. About 30 percent of those with Guillain-Barré still have a residual weakness after 3 years. About 3 percent may suffer a relapse of muscle weakness and tingling sensations many years after the initial attack."According to Perry's agent, Adam Plotkin of NOPAC Talent Agency, Perry's GBS had developed into a chronic form known as chronic inflammatory demyelinating polyradiculoneuropathy (CIDP). Depicted below is an electron photomicrograph of a transerve section of peripheral nerve involved with CIDP. Note the the thinly myelinated axons at the 3, 5, and 10 o'clock positions. Surrounding these axons are "onion-bulb" formations wherein multiple Schwann cells are concentrically arranged around inadequately myelinated axons.
Thanks to Mark B. Weiss of Earthwise Productions for alerting me to Perry's condition.
Thursday, April 9, 2009
Pete Yorn - To Open Coldplay [News]
"Back and Fourth" marks a new musical chapter for the acclaimed singer and songwriter. Yorn wrote all the songs and recorded the album in Omaha, NE, with producer Mike Mogis (Bright Eyes, Rilo Kiley). Columbia's Co-Chairman Rick Rubin helped guide the project from its earliest demo stages to final mastering.
Cruzan Amphitheatre
5/17
Atlanta, GA
Lakewood Amphitheatre
5/18
Birmingham, AL
Verizon Wireless Amphitheatre Birmingham
5/20
Virginia Beach, VA
Verizon Wireless Virginia Beach Amphitheatre
5/21
Washington, DC
Nissan Pavilion
5/23
Hartford, CT
Meadows Music Theater
5/24
Hershey, PA
Hershey Stadium
5/26
Philadelphia, PA
Susquehanna Center
5/27
Saratoga Springs, NY
SPAC
5/30
Pittsburgh, PA
Post Gazette Pavilion
6/01
Buffalo, NY
Darien Lakes
6/02
Detroit, MI
DTE Energy Music Theatre
6/04
Cincinnati, OH
Riverbend Music Center
The Killers - Tap Wild Light As Main Support For Upcoming North American Tour [New]
The Killers Tap Wild Light as Main Support for Upcoming North American
Tour,
Kicking off April 17th 2009 at the Highly Anticipated Re-Opening of
Las Vegas’ Premier Rock Club, The Joint
Debut Album Adult Nights Out Now on Startime International
New York, NY – The Killers have tapped New Hampshire quartet Wild Light to be the main support on their upcoming North American tour, which kicks off April 17, 2009 at the highly anticipated re-opening of Las Vegas’ premier rock club, The Joint. During this 10 city trek Wild Light will play to packed crowds at arenas including the San Jose Events Center in San Jose and the WAMU Theater in Seattle, before closing the tour with a final show at the Capitol Federal Park in Bonner Springs, KS on May 2nd.
This highly coveted main supporting slot comes on the heels of what has already been a wildly successful 2009 for Wild Light. The band kicked off the year with a bang when they hit the road with Tapes N Tapes for their first ever National tour, in support of the March 3rd release of their debut album Adult Nights (Startime International). Recorded in LA with famed producer Rob Schnapf (Beck, Elliott Smith) the album has received raves from prestigious publications including SPIN, Rolling Stone, The LA Times, Paste Magazine and Billboard among others. Following their run with Tapes N Tapes, the band descended upon Austin, TX at the annual SXSW Music Festival where they played a slew of successful performances to fans and industry heads alike from across the world.
Wild Light Tour Dates:
April 8th Great Scott (headlining show) Boston, MA
17th The Joint Las Vegas, NV
19th San Jose Events Center Arena San Jose, CA
22nd WAMU Theatre Seattle, WA
Ashley Tisdale - Dishes On Guilty Pleasure [News]
Ashley Tisdale - Dishes On Guilty Pleasure [News]
POP SINGER AND ACTRESS TAKES CONTROL ON FIRST ALBUM SINCE COMPLETING HER RUN IN BLOCKBUSTER HIGH SCHOOL MUSICAL FRANCHISE
Ashley Tisdale, the singer and actress known to millions as the star of the blockbuster High School Musical series, will release her second album for Warner Bros. Records, entitled Guilty Pleasure, June 16, 2009.
With an edgy, guitar-driven pop-rock sound, Guilty Pleasure is a creative and mature leap forward for this appealing young singer and songwriter, who launched a career as a solo artist with her gold-certified Top 5 rhythmic-pop debut Headstrong in 2007. "Headstrong was a big learning experience, as it was my first album," Tisdale says. "This time I went in knowing exactly what I wanted to do and the message I wanted to put out there, which is that I’m 23 and I’m not just the cute, bubbly blonde girl you know from Disney. I have a tougher side and I love rock music, which are things people probably don’t know about me. On each album you get to share with the world who you are as a person, and I wanted my fans to see another side to me. This album really reflects who I am at this point in my life."
Guilty Pleasure is indeed an authentic reflection of a girl growing up and speaking her mind on songs like the first single "It’s Alright, It’s OK" — a spunky break-up anthem about being single and in control of your life for the first time. "I love break-up songs," Tisdale admits. "On this album, I put to rest a lot of baggage from a previous relationship by venting about the frustration. Everyone can relate to those moments. That song is about how you need to stand up for yourself and not let someone walk all over you; it’s a message I wanted to get across to other girls."
Working with a host of top-flight producers and songwriters, such as Kara DioGuardi (Kelly Clarkson, Carrie Underwood), Toby Gad (Beyoncé, Fergie), Billy Steinberg (Madonna), Emanuel Kiriakou (David Archuleta, Nick Lachey), and Swedish production team Twin (who co-wrote the Headstrong singles "Not Like That" and "Be Good To Me"), Tisdale co-wrote several tracks on Guilty Pleasure, including the feisty "Acting Out," whose lyrics could serve as the album’s mission statement: "Let me out of this cage / I'm not gonna hold back / I'm gonna break these chains / I'm taking control now / Gonna give you something to talk about / It's another side of me I'm acting out." She also co-wrote the propulsive "Overrated," about not changing your personality for a guy, and two ballads "What If" and "Me Without You." Another album highlight is the slinky, confident "Masquerade," perhaps the most sophisticated song Tisdale has recorded to date.
"I’m growing up and this is music I would listen to," Tisdale says. "On this record, I’m not catering to anyone other than to who I am as a person. I think all of these songs have a message and a story that anyone can relate to. I couldn’t sing them if I didn’t connect with them myself."
Guilty Pleasure’s first single, "It’s Alright, It’s OK" ships to Top 40 radio on April 14th — the same day it will be available for purchase via digital retailers. For more on Ashley Tisdale, please visit her official website www.ashleytisdale.com.
Also, be sure to check out Ashley’s new interview with MySpace Celebrity where she dishes about the upcoming release, fashion, musical influences and more.
Monday, March 30, 2009
Lisette Vares - What A Night
Interview with Bhawaiya artist Shafiul Alam Raza
Take the case of ‘Bhawaiya,’ a genre indigenous to north Bengal, mostly popularised by the folk maestro Abbasuddin. This genre is certainly not getting its rightful due today.
This is exactly the point where artiste Shafiul Alam Raza steps in. A regular artiste of Bangladesh Betar (radio) and Bangladesh Television, Raza is fast becoming a familiar name to ‘Bhawaiya’ enthusiasts in the country. Recently he had his second solo performance at Bangladesh Shilpakala Academy (BSA).
In his words, “Most people are under the impression that songs like “Oki gariyal bhai,” “Baukumtha batash jemon” and a few others define the repertoire of the ‘Bhawaiya’ genre. However, in the rural areas of north Bengal, so many songs that the local artistes and Bauls sing are yet to receive exposure. Personally, I feel an inclination to bring these numbers before city audiences.”
And Raza practices what he preaches. Along with popular music, he always tries to present new, lesser-known ‘Bhawaiya’ songs. At the major cultural events in the city, such as ‘Pahela Baishakh,’ ‘Bashonto Utshab,’ ‘Ekushey February’ and ‘Bijoy Dibosh,’ Raja performs ‘Bhawaiya’ songs exclusively written for the occasion.
Born in Chilmari of Kurigram district, known as the hub of the genre, Raza was understandably fascinated by these songs. Since childhood, he was an avid listener of Rangpur Betar; he sought to learn his favourite songs and as it happened most of these were ‘Bhawaiya.’
“I don’t clearly know the reason for my interest. Maybe having grown up in that area, I was irresistibly drawn to ‘Bhawaiya’ songs,” said the artiste.
Though he didn’t receive formal education in music, this didn’t prevent him from receiving several prizes at competitions in his school. As it happened, at an Upazilla competition where he bagged the first prize, he met his music guru, Nurul Islam Zahid. A singer, composer and music teacher, Zahid has written over 3,000 ‘Bhawaiya’ songs. Zahid was a major source of inspiration for the young Raza, though the latter could not receive practical training from Zahid at that time. Years later, Raza managed to contact the artiste once more; since then, he has been among Zahid’s talented disciples.