Wednesday, May 6, 2009

Rue Longue - Arch beneath an Arch




Throughout the Old Town you find signs giving historical information on where you are. Very helpful it is too.On the left you see part of one of these signs, showing an old arched doorway under an archway that stretches across the street to the other side. In the main photograph, you see the same viewpoint. Not much in the way of a change here..thank goodness.The sign, by the way, was dirty from all the rain we had last month - next I'll walk around with a bucket.Notice the beautiful old cobbles in the drawing and compare to the new road surface which really doesn't enhance the beauty of this ancient street.

The Wadey/Snow Family


First of all I wanted to say Thank you to Nancy for sending me these beautiful flowers for Mothers Day. I love getting flowers and tulips are my favorite!Secondly Zeland had his appointment with the Ear, nose and throat Doc on Tuesday and it went really well. We didn't have to wait long and they had a little play area so Zeland was able to play while we waited to be taken back. Dr. Simms was very nice and answered all my questions. We agreed that the best thing for Zeland is to have tubes put in. As it stands right now he is not hearing as well as he should be. Dr Simms said it was like walking around all day and plugging your ears. Not really a good thing when your learning how to talk. He said that the procedure takes like ten minuets and the kids are fine after. The tubes will last anywhere from 8-12 months. We are confidant that this will help our baby boy not have anymore ear infections and he will be able to hear clearly. I will hear from the surgery scheduler this week or early next week and get everything set up and see what our insurance will pay. I am so ready to get this done and over with. I pretty nervous but I know things will be fine and if this is the worst we are very blessed. Just keep my little munchkin in your thoughts and prayers.

Photography as Transcendence


A philosophically minded friend of mine dropped by the Lorton Photography Workhouse while I was performing my "gallery sitting" chores this Saturday. After exchanging some pleasantries, and mutual musings - as is our custom - on the nature of life, art, and meaning, his attention soon focused on a series of masterful nude portraits by a fellow member of the coop I belong to (E. E. McCollum).
My friend was particularly impressed by how "utterly and completely absorbing" Eric's portraits are; but he was not - as he immediately explained - referrring only to the model's obvious beauty. My astute friend - who also happens to be a gifted artist - was using one of Eric's portraits to make a deeper point about what distinguishes the "best" photography from that which is merely "good." My friend opined that the best photograph - or, more generally, the best artwork of any kind - is the one that induces in the viewer the broadest possible inner experience. That is, that what the viewer experiences, transcends in some way - and in the very best art, transcends in multiple ways - the dimensions that the artist is physically constrained to using in order to express his artwork.Superficially, of course, this is always true, even of "not terribly good" photographs. All (conventional) photographs are by their nature two dimensional, yet evoke - with varying degrees of success - a "three dimensional" experience (mostly because we "expect" to see the "world as revealed by a photograph" as we see the world with our eyes). But what my friend was thinking about was a deeper level of experiential transcendence. When he looked at one of Eric's nude portraits - which is, as are all of Eric's photographs, beautifully lit, elegantly composed, and expertly printed with a wonderful palette of tones (see Eric's on-line gallery for samples of his work) - my friend's immediate reality was temporarily replaced by one in which only my friend and Eric's model existed, and in which the model was very real. From my friend's point of view, while he was looking at the portrait, the model was as palpably real to him as any physically real person can be.His experience of her far transcended the ink and paper on which her two dimensional form is physically expressed, and assumed multiple dimensions including touch, taste, smell, even (hints of imagined) emotion. To be sure, all of these "transcendent" dimensions are supplied by the viewer, and will be different from viewer to viewer. It is more correct to say that they are all induced in the viewer by the photograph. But that is the whole point. The photograph - as a physical cipher designed to convey a certain experience of reality - is so well executed, that the viewer experiences the full range of emotion while interacting with it. The shades of grey ink that depict a part of the model's neck, for example, are transformed in the viewer's mind into real skin, with its own unique aroma, its distinct tactile feel and texture, and so on. As tempting as it might be to think that this is true of all photographs, the truth is that it is not so. Indeed, had Eric's portrait been taken instead by a less seasoned photographer with no eye for light, let us say, but of the same model in exactly the same pose in exactly the same surroundings and background, the perceptive viewer would in all likelihood still "experience" a beautiful model in a beautiful pose, but nothing more. No extra, or transcendent, dimensions would reveal themselves; and certainly not as readily, and not all for indiscriminate viewers. Eric's fine-art "touch" reveals profoundly more. In a sense, Eric's portrait provides the raw "aesthetic" material that the interested viewer transforms into a transcendent, personally meaningful experiential reality.So the idea on the table, as proposed by my artist friend after viewing Eric's portrait is this: that art is at its finest when the artist somehow manages to induce in the viewer dimensions of inner experience that transcend those that define the artwork itself. Just as "fine-art" music (say, by Beethoven) may be distinguished from "musak" by the fact that listening to it makes you feel alive (whereas "musak" merely makes you think that you want your elevator ride to end soon); the finest photography makes you forget you are looking at a photograph and makes you experience it as if it were real; as if you were a part of it.Put another way, and assuming our traditional store of five senses (though we may have as many as eleven, and possibly more if we include "extra"-sensory ones), the finest art is a process whereby a single sensory dimension - and at most a few - is used to evoke in the viewer the experiential equivalent of all five. The very best art makes the viewer forget she is even looking at any art at all, the artwork having evoked an experience of transcendence itself (in which the viewer "sees" herself in the art, and cosmos in self). But that's another blog entry... ;-)

Hey Fella, Would you Mind...?


Audacious, brash, brazen, daring, disrespectful, forward, impertinent, impudent, presumptuous, rash, rude, shameless, ...One of my pet peeves, in and out of photography, is what I call the "in your face" approach some people take to get my attention (I am sure I am not alone is despising this phenomenon to the "beyond measurable category" level). I am emphatically not referring to people who are quiet and polite; (which most are, of course); and certainly not those who patiently wait for me to finish whatever it is I am doing - usually hovering over my tripod, bending up and down and sideways, while gesticulating wildly with my elbows trying to find a reasonable composition (my wife refers to my picture-taking process as akin to the wild thrashings of a stark raving mad broken-pretzel) - before introducing themselves.
No, the class of people I am referring to are of a distinct "Hey Fella, Would you mind...?" bent of mind. The kind who - regardless of how busy they must surely see you are (it is hard to be "gesticulating wildly" without at least appearing to be busy doing something ;-) - nonetheless suddenly, brazenly, and anything-but-quietly approach you - often tapping you on the shoulder for good measure, presumably trying to increase their chances of getting your attention - to demand (yes demand!) that you stop what you are doing in order to take their picture. As preposterous as this may sound - come now, people don't really do that, do they? (yes they do!) - this has happened to me for so long, so consistently, in so many different places, that I never go on any of my photo-safaris without expecting (and bracing for) at least one such encounter.Here is a typical "Hey Fella, Would you mind...?" encounter I had recently on a trip my wife and I took to Grand Cayman island (to get away from it all during Spring break). My wife and I are on the beach in front of our hotel. The sun is setting (with precious few moments left before it disappears below the horizon). I have my tripod set up a few feet from shore, and am attempting to get a few Hiroshi Sugimoto-like (i.e., looooong exposure) shots. I have my trusty Singh-Ray vari-ND neutral density filter screwed on. And I am very much "in the moment"; ticking off the seconds of a shot and anticipating only a few compositional opportunities left before the light disappears for the night.Behind me, I faintly hear some whispers (though with an obvious urgency). "There are only a few moments left! Get someone!" A family. A man, a woman, and two teenage kids. I hear feet shuffling on the sand, ice sloshing in a glass (a rum punch?); voices getting closer. "He's busy." "So what, the lights going!" Two pairs of feet shuffling now; I also hear a few giggles from the kids. "I can't bother him now!" (A faint glimmer of hope that at least one member of this party has some decency!...but alas...) "He can take his pictures later...ask him, go ask him!" I hear: "Ah, fella, would you mind...?" (I'm not kidding you!) Keep in mind, I'm huddled over my camera, and in the middle of a minute-long exposure. I keep my posture, and say (without lifting my head) - loudly enough for him to hear, but with an even tone - "I'm in the middle of a shot right now; this is not a good time." "But I just heard the shutter; you've taken your shot already!" I can't believe this comment (I sigh, inwardly, but keep my eye at the camera - 45s, 46s, 47s, ... - and remain silent.I feel a light tap on my shoulder (I am not making this up!) "Hey fella, didn't you hear me? My wife and I would like you to take a picture of our family before the sun goes down." I still - somehow (!) - manage to keep my composure. I remain glued to my camera, but say, firmly this time, "Sir, I am busy right now. Perhaps you can find someone else to take your picture?" I should point out that the beach was filled with people, many of whom had their own cameras; and at least one other person had a tripod (which he was not even using, and was content simply enjoying the sunset view).The man persists: "Fella, there are only a few minutes left!" An assertion that finally grabs my full attention. I stand upright, look his way, and say - rather angrily I admit - "Yes, I know! I'd very much like to use this time to do my work, if you don't mind!" He doesn't let go: "Hey man, it's just one shot, come on..." Now, I know there must be some Emily Post etiquette behavior guide for situations such as this (there ought to be, if not). I grit my teeth - outwardly trying to smile - take his camera, move in front of the man, his wife, and two giggling teenagers, and tale a quick shot with their camera. "Thanks man," is all I get for my efforts (as I run back to my tripod)...almost. As I prepare to hit the shutter one last time (to capture the shot you see reproduced above), I feel another tap - I can;t make this stuff up! - "Hey fella, can you do one more, please, without the kids this time?" At least he said please!I have dozens of stories very similar to this one. An unforgettable "encounter" happened in Santorini, Greece last year, and involved a German couple who spoke not one word of English (nor I German). That made it both better and worse (and in hindsight - but only in hindsight - hilarious), but I'll leave the details to your imagination :-) There are no deep lessons or morals here, save for the obvious ones: (1) people will be people (on both sides of the camera); (2) always plan for one or two rude people (that way you won't be surprised); and (3) it pays to not lose your cool (had I lost mine, I would not have gotten the one "keeper" of the night, the shot at top).Postscript. For those kind readers who have, over time, picked up on my penchant for Borgesian/Godelian recursive mysteries, be assured that I did toy with the idea of weaving my tale around an infinite regress induced by my having thrown the "audacious, brash, brazen, daring, disrespectful, forward, impertinent, impudent, presumptuous, rash, rude, shameless,.." man's words right back at him: "Hey fella, would you mind...?" (Which would have made as much sense for me to use on him, as he clearly believed there was in using them on me.) In some unknown universe in the limitless multiverse we occupy an infinitesimally small point in, there is a world, much like our own, where an "encounter" between a photographer and a man wishing the photographer to take a picture of his family never ever ends: Hey fella, would you mind...?, Hey fella, would you mind...?, Hey fella, would you mind...?, ...

Hopeful cricket-related slogan


Back in January I posted some cricket-related photos from my last trip to India. Here is one I'd forgotten about. No cricket action, but a reasonably sensible (albeit slightly cheesy) slogan to think about in these days of the IPL. This was taken at a coffee shop in Candolim, Goa. I've forgotten the name of the chain. The coffee (a double-shot latte) was very good.

Cleaning up the blogroll

Subash pointed out that my blogroll linked to a few dead blogs. I've known about that for a while, but hadn't done anything about it. Today I have. Eight blogs are gone. My criteria for deletion was simple: if you hadn't blogged in 2009, I removed you. If you want to come back, please start blogging!

80th Birthday Cake

One of my favourite things about being a cake designer is being able to personalize that cake for a special person. I was asked to design an 80th birthday cake for a man who golfed, used to be a photographer for the London Free Press and also sailed a Lark.We discussed some cake ideas like a golf bag, a boat and even the Rolleiflex camera he used to use - but then it came to me - what about what his desk would look like.


So, here's the final design with all handmade items - A desktop with The London Free Press Newspaper with an article about the Rolleiflex camera as the top news story, his current Canon Powershot A430 Camera, a golf ball and tees, a pen with his name on it and also a photo in a frame of his Lark. I loved doing this cake - its such a thoughtful, unique and special centerpiece for their event.I just got an email from my client "The cake was a big hit! He was so funny – from a distance he thought we had bought him a camera and had it displayed – he couldn’t figure out why we would do that when he had a camera just like the one displayed – It was only when he got closer that he realized it was a cake with all kinds of stuff on it"btw - The cake was Sour Cream Chocolate Cake with Swiss Meringue Buttercream. The camera was also cake and the rest of the items were handmade of sugarpaste and the details were painted on with edible color.

Tea Anyone?


Well, there actually isn't any tea.... this is a Teapot Cake with a sugarpaste teacup and saucer. It is a 3-layer lemon butter cake with swiss meringue buttercream. Isn't it sweet?When I got the call for this order, I was so excited! The teapot cake was to celebrate an 80th birthday - I think that is such a thoughtful gift.


I knew that this was going to be challenging, but I'm always up for a new cake design. Then I was very lucky because one of my favourite cake blogs had just posted a tutorial on this a few weeks ago. So, that really helped. So, who wants tea?
First Birthday or was it?




This past weekend, I made this wonderfully cute birthday cake for a little boy. The mother sent me a photo of her son so I could make a sugarpaste model of him for the top. This cake was chocolate velvet on the bottom tier and vanilla butter cake on the top tier. I was so happy with this cake, loved how the little boy turned out, the colours, the train and the clothesline. I can't take credit for the clothesline design - the client had found this on another website, I just added in my own flair with the rest of the cake.

Tuesday, May 5, 2009

NW (Nordic Walking) in NW (Northwestern) Colorado


Routt County program to introduce Nordic Walking to the state's northwestern region

I cheer (hooray!) whenever I learn of new Nordic Walking classes, and I cheer more loudly (HOORAY!!) whenever I learn of another here in Colorado. My cheers for a Routt County healthy-aging and wellness program's enthusiasm for walking in general might have loud enough to be heard in northwestern Colorado. The county's Aging Well program is planning to offer beginning and advanced-level walking classes in Steamboat Springs, and possibly Hayden and South Routt County, including Nordic Walking.


Marti Irish, a physical therapist, avid cross-country skier and Nordic Walker, is expected to facilitate a Nordic Walking class as part of Steamboat Springs' Aging Well program. The class will include warm ups, stretches and other exercises, and will be aimed at physically fit individuals. Irish plans to utilize trails in the Sanctuary and lower Howelsen Hill Ski Area. Details about classes in Routt County still are being finalized. For more information about or helping as a volunteer, call 970-871-7606.

Nordic Walking Classes in Two M-States

A slew of intros in the Land of Lakes -- and at least one class series
in Massachusetts

Minnesota
I think of Minnesota as a Nordic Walking hotbed. Two women -- Linda Lemke and Rhea Kontos -- each offer an impressive schedule of classes, and Nordic Walking is available in other contexts too.

Linda Lemke, who calls herself the "Nordic Walking Queen," has scheduled the following classes (click on the links or call the numbers she provided to check on times and costs):

Wednesdays, April 15, 22, 29 - Wayzata Community Education class #nordwk-400-00-001-09, 763-745-5200
Thursdays, April 16, 23 - Edina Community Education, Nordic Walking for Better Health 952-848-3950
Saturdays, May 2, 9, 16 - Nordic Walking Classes at Hoigaards, all 3 sessions for $25, Email Lemke for details
Wednesdays, May 13, 20, 27 - Minnetonka Community Ed, Nordic Walking for Better Health, 952-401-6800
Thursdays, May 7, 14, 21 and Saturdays, May 30, June 6, 13 - Plymouth Parks and Recreation Classes #30919 and 30920, 763-509-5200
Rhea Kontos of Nordic Walk This Way has not, as far as I know, given herself a title, but here's her schedule of upcoming one-session intro classes at $19 each, including use of demo poles. For times or to register, call the phone numbers that Kontos provided or register online when the community is shown below in blue -- and for the sharp-eyed among you, I have been trying to bullet and single-space Kontos's classes too, but this occasionally frustrating program
won't let me:
Thursday, April 16 or Tuesday, May 19 - at Jefferson High School, Bloomington, 952-681-6132
Tuesday, April 21; Thursday; May 14, Tuesday, June 2 - at Grainwood Middle School, Prior Lake, 952-226-0800
Thursday, April 30, or Tuesday, June 16, at Nicollet Junior High, Burnsville, 952-707-4110
Tuesday, April 28 - at North High School Lakeville, 952-232-2150; register online with Park & Rec or call 952-985-4600
Tuesday, May 5 or Thursday, June 4 - at Falcon Ridge Middle School Eagan/A.V., 651-423-7920
Wednesday, May 6; Thursday, June 11, or Tuesday, August 18 - Shakopee, Community Center, (if registering online, at "Activity Type" drop-down box, select "Programs-Adult"), 952-233-9500
Thursday, May 7 - at Bridgewater Elementary, Northfield, 507-664-3648
Tuesday, May 12 - at Jonathan Elementary, Chaska, 952-556-6200
Wednesday, May 13 - River Bend Nature Center, Faribault, 507-384-0516 (or get mail-in form)
a wellness center in Minnetonka is offering a low-cost Nordic walking class on this Saturday, April 18, from 11:30 a.m. to 1:00 p.m., including use or poles. Call 952-935-2202. Midwest Mountaineering has classes May 4 and 16. And Midwest Mountaineering's next Nordic Walking demo is on Monday, May 4, at 6:30 p.m. The store is at 309 Cedar Avenue, Minneapolis; 612-339-3433.

Teelicht "Asphalt"




Ein kleines Stück Stadtromantik für dein zu Hause!Die neuen Teelichthalter aus der Serie "Asphalt" bestechen durch ihre schlichte Form und machen jeden Platz zu einem feierlichen Anlass!


Hier trifft weicher Designerfilz auf fliederfarbenen Asphalt.


Diese harten Kontraste in Materialmix und Farbe geben dem Teelicht seine besondere Optik und Ausstrahlung.Erhältlich im roterpanda Wohnaccessoires Shop und bei vier gezeiten.

Schlüsselbrett mit Vögelchen




Schlüsselbrett mit sitzendem Vögelchen.




Ein schönes Zuhause für deine Schlüssel!Zusätzliche bietet die Tafel genügend Platz für deine Nachrichten und Geistesblitze!Das mokkafarbene Schlüsselbrett wurde mit Tafellack

Magnetisches Schlüsselbrett




Dieses Schlüsselbrett ist mit oliv-farbenem Designerfilz bezogen und zusätzlich mit starken Magneten ausgestattet.Der Kork-Streifen bietet auf diese Weise unsichtbaren Halt für deine Schlüssel, Scheren, Heftklammern, Buttons, etc...eben für all deine magentischen Dinge!Die Materialkombination verleiht dem Schlüsselbrett eine schöne und klare Optik und findet in jeder Umgebung einen gegeigneten Platz.

Friday, May 1, 2009

10 things you can do to protect your data

Takeaway:

"Operating systems and applications can always be reinstalled, but your data is unique--making it the most important thing on your computer or network. Here's a look at 10 ways you can protect that data from loss and unauthorized access".


When you think about it, the most valuable thing on your computer or network is the data you create. After all, that data is the reason for having the computer and network in the first place and it's the bits and bytes that make up that data that are your first priority when putting protective strategies in place. Operating systems and applications can always be reinstalled, but user-created data is unique and if lost, may be irreplaceable.
Some data is also confidential; not only do you not want to lose it, you don't want others to even view it without authorization. Exposure of your social security number, credit card, and bank account information could subject you to identity theft. Company documents may contain trade secrets, personal information about employees or clients, or the organization's financial records.
Let's look at some ways to protect your all-important user data from loss and/or unauthorized access.



#1: Back up early and often

The single most important step in protecting your data from loss is to back it up regularly. How often should you back up? That depends--how much data can you afford to lose if your system crashes completely? A week's work? A day's work? An hour's work?
You can use the backup utility built into Windows (ntbackup.exe) to perform basic backups. You can use Wizard Mode to simplify the process of creating and restoring backups or you can configure the backup settings manually and you can schedule backup jobs to be performed automatically.
There are also numerous third-party backup programs that can offer more sophisticated options. Whatever program you use, it's important to store a copy of your backup offsite in case of fire, tornado, or other natural disaster that can destroy your backup tapes or discs along with the original data.

#2: Use file-level and share-level security

To keep others out of your data, the first step is to set permissions on the data files and folders. If you have data in network shares, you can set share permissions to control what user accounts can and cannot access the files across the network. With Windows 2000/XP, this is done by clicking the Permissions button on the Sharing tab of the file's or folder's properties sheet.
However, these share-level permissions won't apply to someone who is using the local computer on which the data is stored. If you share the computer with someone else, you'll have to use file-level permissions (also called NTFS permissions, because they're available only for files/folders stored on NTFS-formatted partitions). File-level permissions are set using the Security tab on the properties sheet and are much more granular than share-level permissions.
In both cases, you can set permissions for either user accounts or groups, and you can allow or deny various levels of access from read-only to full control.

#3: Password-protect documents

Many productivity applications, such as Microsoft Office applications and Adobe Acrobat, will allow you to set passwords on individual documents. To open the document, you must enter the password. To password-protect a document in Microsoft Word 2003, go to Tools Options and click the Security tab. You can require a password to open the file and/or to make changes to it. You can also set the type of encryption to be used.
Unfortunately, Microsoft's password protection is relatively easy to crack. There are programs on the market designed to recover Office passwords, such as Elcomsoft's Advanced Office Password Recovery (AOPR). This type of password protection, like a standard (non-deadbolt) lock on a door, will deter casual would-be intruders but can be fairly easily circumvented by a determined intruder with the right tools.
You can also use zipping software such as WinZip or PKZip to compress and encrypt documents.

#4: Use EFS encryption

Windows 2000, XP Pro, and Server 2003 support the Encrypting File System (EFS). You can use this built-in certificate-based encryption method to protect individual files and folders stored on NTFS-formatted partitions. Encrypting a file or folder is as easy as selecting a check box; just click the Advanced button on the General tab of its properties sheet. Note that you can't use EFS encryption and NTFS compression at the same time.
EFS uses a combination of asymmetric and symmetric encryption, for both security and performance. To encrypt files with EFS, a user must have an EFS certificate, which can be issued by a Windows certification authority or self-signed if there is no CA on the network. EFS files can be opened by the user whose account encrypted them or by a designated recovery agent. With Windows XP/2003, but not Windows 2000, you can also designate other user accounts that are authorized to access your EFS-encrypted files.
Note that EFS is for protecting data on the disk. If you send an EFS file across the network and someone uses a sniffer to capture the data packets, they'll be able to read the data in the files.

#5: Use disk encryption

There are many third-party products available that will allow you to encrypt an entire disk. Whole disk encryption locks down the entire contents of a disk drive/partition and is transparent to the user. Data is automatically encrypted when it's written to the hard disk and automatically decrypted before being loaded into memory. Some of these programs can create invisible containers inside a partition that act like a hidden disk within a disk. Other users see only the data in the "outer" disk.
Disk encryption products can be used to encrypt removable USB drives, flash drives, etc. Some allow creation of a master password along with secondary passwords with lower rights you can give to other users. Examples include PGP Whole Disk Encryption and DriveCrypt, among many others.

#6: Make use of a public key infrastructure

A public key infrastructure (PKI) is a system for managing public/private key pairs and digital certificates. Because keys and certificates are issued by a trusted third party (a certification authority, either an internal one installed on a certificate server on your network or a public one, such as Verisign), certificate-based security is stronger.
You can protect data you want to share with someone else by encrypting it with the public key of its intended recipient, which is available to anyone. The only person who will be able to decrypt it is the holder of the private key that corresponds to that public key.

#7: Hide data with steganography

You can use a steganography program to hide data inside other data. For example, you could hide a text message within a .JPG graphics file or an MP3 music file, or even inside another text file (although the latter is difficult because text files don't contain much redundant data that can be replaced with the hidden message). Steganography does not encrypt the message, so it's often used in conjunction with encryption software. The data is encrypted first and then hidden inside another file with the steganography software.
Some steganographic techniques require the exchange of a secret key and others use public/private key cryptography. A popular example of steganography software is StegoMagic, a freeware download that will encrypt messages and hide them in .TXT, .WAV, or .BMP files.

#8: Protect data in transit with IP security

Your data can be captured while it's traveling over the network by a hacker with sniffer software (also called network monitoring or protocol analysis software). To protect your data when it's in transit, you can use Internet Protocol Security (IPsec)--but both the sending and receiving systems have to support it. Windows 2000 and later Microsoft operating systems have built-in support for IPsec. Applications don't have to be aware of IPsec because it operates at a lower level of the networking model.
Encapsulating Security Payload (ESP) is the protocol IPsec uses to encrypt data for confidentiality. It can operate in tunnel mode, for gateway-to-gateway protection, or in transport mode, for end-to-end protection. To use IPsec in Windows, you have to create an IPsec policy and choose the authentication method and IP filters it will use. IPsec settings are configured through the properties sheet for the TCP/IP protocol, on the Options tab of Advanced TCP/IP Settings.

#9: Secure wireless transmissions

Data that you send over a wireless network is even more subject to interception than that sent over an Ethernet network. Hackers don't need physical access to the network or its devices; anyone with a wireless-enabled portable computer and a high gain antenna can capture data and/or get into the network and access data stored there if the wireless access point isn't configured securely.
You should send or store data only on wireless networks that use encryption, preferably Wi-Fi Protected Access (WPA), which is stronger than Wired Equivalent Protocol (WEP).

#10: Use rights management to retain control

If you need to send data to others but are worried about protecting it once it leaves your own system, you can use Windows Rights Management Services (RMS) to control what the recipients are able to do with it. For instance, you can set rights so that the recipient can read the Word document you sent but can't change, copy, or save it. You can prevent recipients from forwarding e-mail messages you send them and you can even set documents or messages to expire on a certain date/time so that the recipient can no longer access them after that time.
To use RMS, you need a Windows Server 2003 server configured as an RMS server. Users need client software or an Internet Explorer add-in to access the RMS-protected documents. Users who are assigned rights also need to download a certificate from the RMS server.

10 dumb things users do that can mess up their computers

DUMB 1 >Plug into the wall without surge protection

Here’s one that actually can physically destroy your computer equipment, as well as the data it holds. You may think your systems are in danger only during an electrical storm, but anything that interrupts the electrical circuit and then starts the current back again can fry your components. Something as simple as someone turning on an appliance that’s plugged into the same circuit (especially a high voltage one such as a hair dryer, electric heater, or air conditioner) can cause a surge, or a surge may be caused by a tree limb touching a power line. If you have a power outage, you may experience a surge when the electricity comes back on.
You can protect your systems against damage from power surges by always using a surge protector, but it’s important to be aware that most cheap surge protectors will survive only a single surge and need to be replaced afterward. An Uninterruptible Power Supply (UPS) is better than a surge protector; it has a battery that keeps power flowing smoothly even when there’s an outage, to give you time to gracefully shut down.

DUMB 2 > Surf the Internet without a firewall


Many home users plug their computers right into their spiffy new cable or DSL modems and hop onto the Internet without realizing that they’re putting themselves at risk from viruses and attackers. Every Internet-connected computer should be protected by a firewall; this can be a firewall built into the broadband modem or router, a separate firewall appliance that sits between the modem/router and the computer, a server at the network’s edge running firewall software, or personal firewall software installed on the computer (such as ICF/Windows Firewall built into Windows XP or a third-party firewall program like Kerio or ZoneAlarm).
One advantage of personal firewalls on laptop computers is that they’re still with you when you take the computer on the road and plug into a hotel’s DSL or cable port or connect to a wireless hotspot. Just having a firewall isn’t enough, though. You must also be sure it’s turned on and configured properly to protect you.

DUMB 3 > Neglect to run or update antivirus and anti-spyware programs

Let’s face it: Antivirus programs can be a royal pain. They’re always blocking some application you want to use, you often have to disable them to install new software, and they have to be updated on a regular basis to do any good. Seems like the subscription is always expiring and prompting you to renew it--for a fee, in many cases. But in today’s environment, you can’t afford to go without virus protection. The malicious programs that AV software detects--viruses, Trojans, worms, etc.--can not only wreak havoc on your system but can spread via your computer to the rest of the network. In extreme cases, they can bring down the whole network.
Spyware is another growing threat; these are programs that install themselves on your computer (usually without your knowledge) and collect information from your system that is then sent back to the spyware program’s author or vendor. Antivirus programs often don’t address spyware so it’s important to run a dedicated spyware detection and removal program.

DUMB 4 >Install and uninstall lots of programs, especially betas

You like to be on the cutting edge, so you often install and try out new software. Beta programs are usually free and give you a chance to sample neat new features before most people. There are also many freeware and shareware programs made available as Internet downloads by their authors. We know you’d never do it, but some users even install pirated software or “warez.”
The more programs you install, the more likely you are to run across ones that either include malicious code or that are poorly written and cause your system to behave improperly or crash. The risk is greater with pirated programs.
Even if you install only licensed, final-release commercial software, too many installations and uninstallations can gunk up the registry. Not all uninstall routines completely remove program remnants and at the least, this practice can cause your system to slow down over time.
You should install only the programs that you really need, stick with legitimate software, and try to minimize the number you install and uninstall.

DUMB 5 > Keep disks full and fragmented

One of the results of installing and uninstalling lots of programs (or adding and deleting data of any kind) is that it fragments your disk. Disk fragmentation occurs because of the way information is stored on the disk: On a new, clean disk, when you save a file it’s stored in contiguous sections called clusters. If you delete a file that takes up, for example, five clusters, and then save a new file that takes eight clusters, the first five clusters’ worth of data will be saved in the empty space left by the deletion and the remaining three will be saved in the next empty spaces. That makes the file fragmented, or divided. To access that file, then, the disk’s read heads won’t find all the parts of the file together but must go to different locations on the disk to retrieve it all. That makes it slower to access. If the file is part of a program, the program will run more slowly. A badly fragmented disk will slow down to a crawl.
You can use the disk defragmenter built into Windows (Programs Accessories System Tools) or a third-party defrag program to rearrange these pieces of files so that they’re placed contiguously on the disk.
Another common cause of performance problems and application misbehavior is a disk that’s too full. Many programs create temporary files and need extra free space on the disk to operate. You can use Windows XP’s Disk Cleanup Tool or a third-party program to find and delete rarely used files, or you can manually delete files to clear space on your disk.

DUMB 6 >Open all attachments

Some folks just can’t help themselves: Getting an e-mail message with an attachment is like getting an unexpected gift. You just have to peek inside to see what it is. But just as that package left on your doorstep could contain a bomb, that file attached to your mail message could contain code that will delete your documents or system folder or send viruses to everyone in your address book.
The most blatantly dangerous attachments are executable files--those that run code--with extensions like .exe, .cmd, and many others (see http://antivirus.about.com/od/securitytips/a/fileextview.htm for a list of file extensions for different types of executables). Files that aren’t themselves executables, such as Word .doc files and Excel .xls files, can contain embedded macros. Scripts (Visual Basic, JavaScript, Flash, etc.) aren’t directly executed by the computer but are run by other programs.
It used to be that you could assume plain text (.txt) or graphics (.gif, .jpg, .bmp) files were safe, but not anymore. File extensions can be “spoofed”; attackers take advantage of the Windows default setting that doesn’t display common file extensions to name executables something like greatfile.jpg.exe. With the real extension hidden, it shows up as greatfile.jpg. So the recipient thinks it’s a graphic, but it’s actually a malicious program.

You should open attachments only when they’re from trusted sources and only when you’re expecting them. Even if the mail with the attachment appears to come from someone you trust, it’s possible that someone spoofed their address or that their computer is infected with a virus that sent the attachment to you without their knowledge.

DUMB 7 > Click on everything

Opening attachments isn’t the only type of mouse click that can get you in trouble. Clicking on hyperlinks in e-mail messages or on Web pages can take you to Web sites that have embedded ActiveX controls or scripts that can perform all sorts of malicious activities, from wiping your hard disk to installing a backdoor program on your computer that a hacker can use to get in and take control of it.
Clicking the wrong link can also take you to inappropriate Web sites that feature pornography, pirated music or software, or other content that can get you in trouble if you’re using a computer on the job or even get you in trouble with the law.
Don’t give in to “click mania.” Think before you click a link. Links can also be disguised in “phishing” messages or on Web sites to appear to take you to a different site from the ones they really point to. For example, the link might say www.safesite.com, but it actually takes you to www.gotcha.com. You can often find out the real URL by hovering over the link without clicking it.

DUMB 8 >Share and share alike

Your mother taught you that it’s nice to share, but when you’re on a network, sharing can expose you to dangers. If you have file and printer sharing enabled, others can remotely connect to your computer and access your data. Even if you haven’t created any shared folders, by default Windows systems have hidden “administrative” shares for the root of each drive. A savvy hacker may be able to use these shares to get in. One way to prevent that is to turn off file and printer sharing--if you don’t need to make any of the files on your computer accessible across the network. This is especially a good idea if you’re connecting your laptop to a public wireless hotspot. You can find instructions on how to do so at http://www.pcmag.com/article2/0,1895,1277222,00.asp.
If you do need to make shared folders accessible, it’s important that they be protected by both share-level permissions and file-level (NTFS) permissions. Also ensure that your account and the local administrative account have strong passwords.

DUMB 9 > Pick the wrong passwords:


That brings us to another common mistake that can expose you to attacks: picking the wrong password. Even if you don’t belong to a network where the administrator forces you to select strong passwords and change them regularly, you should do so. Don’t pick passwords that are easy to guess, such as your birthdate, loved one’s name, social security number, etc. Longer passwords are harder to crack, so make your password at least eight characters long; 14 is even better. Popular password-cracking methods use "dictionary" attacks so don’t use words that are in the dictionary. Passwords should contain a combination of alpha, numeric, and symbol characters for best security.
A long string of nonsense characters may create a password that’s tough to crack, but if you can’t remember it, you’ll defeat the purpose by writing it down (where an intruder may be able to find it). Instead, create a phrase you can remember easily and use the first letters of each word, along with logical numbers and symbols. For example: “My cat ate a mouse on the 5th day of June” becomes “Mc8amot5doJ.”

DUMB 10 > Ignore the need for a backup and recovery plan:


Even if you follow all these suggestions, an attacker may crash your system or your data may be corrupted or get wiped out by a hardware problem. That’s why it’s essential that you always back up your important information and have a plan for recovering from a system failure.
Most computer users know they should back up, but many never get around to it. Or they make an initial backup but don’t update it regularly. Use the built-in Windows backup program (Ntbackup.exe in Windows NT, 2000, and XP) or a third-party backup program and schedule backups to occur automatically. Store backed up data on a network server or removable drive in a location away from the computer itself, in case of a natural disaster like flood, fire, or tornado.
Remember that the data is the most important thing on your computer। The operating system can be reinstalled and so can applications, but it may be difficult or impossible to recreate your original data. (See "10 ways to protect your data" for additional suggestions.)

10 dumb things users do that can mess up their computers

DUMB 1 >Plug into the wall without surge protection

Here’s one that actually can physically destroy your computer equipment, as well as the data it holds. You may think your systems are in danger only during an electrical storm, but anything that interrupts the electrical circuit and then starts the current back again can fry your components. Something as simple as someone turning on an appliance that’s plugged into the same circuit (especially a high voltage one such as a hair dryer, electric heater, or air conditioner) can cause a surge, or a surge may be caused by a tree limb touching a power line. If you have a power outage, you may experience a surge when the electricity comes back on.
You can protect your systems against damage from power surges by always using a surge protector, but it’s important to be aware that most cheap surge protectors will survive only a single surge and need to be replaced afterward. An Uninterruptible Power Supply (UPS) is better than a surge protector; it has a battery that keeps power flowing smoothly even when there’s an outage, to give you time to gracefully shut down.

DUMB 2 > Surf the Internet without a firewall


Many home users plug their computers right into their spiffy new cable or DSL modems and hop onto the Internet without realizing that they’re putting themselves at risk from viruses and attackers. Every Internet-connected computer should be protected by a firewall; this can be a firewall built into the broadband modem or router, a separate firewall appliance that sits between the modem/router and the computer, a server at the network’s edge running firewall software, or personal firewall software installed on the computer (such as ICF/Windows Firewall built into Windows XP or a third-party firewall program like Kerio or ZoneAlarm).
One advantage of personal firewalls on laptop computers is that they’re still with you when you take the computer on the road and plug into a hotel’s DSL or cable port or connect to a wireless hotspot. Just having a firewall isn’t enough, though. You must also be sure it’s turned on and configured properly to protect you.

DUMB 3 > Neglect to run or update antivirus and anti-spyware programs

Let’s face it: Antivirus programs can be a royal pain. They’re always blocking some application you want to use, you often have to disable them to install new software, and they have to be updated on a regular basis to do any good. Seems like the subscription is always expiring and prompting you to renew it--for a fee, in many cases. But in today’s environment, you can’t afford to go without virus protection. The malicious programs that AV software detects--viruses, Trojans, worms, etc.--can not only wreak havoc on your system but can spread via your computer to the rest of the network. In extreme cases, they can bring down the whole network.
Spyware is another growing threat; these are programs that install themselves on your computer (usually without your knowledge) and collect information from your system that is then sent back to the spyware program’s author or vendor. Antivirus programs often don’t address spyware so it’s important to run a dedicated spyware detection and removal program.

DUMB 4 >Install and uninstall lots of programs, especially betas

You like to be on the cutting edge, so you often install and try out new software. Beta programs are usually free and give you a chance to sample neat new features before most people. There are also many freeware and shareware programs made available as Internet downloads by their authors. We know you’d never do it, but some users even install pirated software or “warez.”
The more programs you install, the more likely you are to run across ones that either include malicious code or that are poorly written and cause your system to behave improperly or crash. The risk is greater with pirated programs.
Even if you install only licensed, final-release commercial software, too many installations and uninstallations can gunk up the registry. Not all uninstall routines completely remove program remnants and at the least, this practice can cause your system to slow down over time.
You should install only the programs that you really need, stick with legitimate software, and try to minimize the number you install and uninstall.

DUMB 5 > Keep disks full and fragmented

One of the results of installing and uninstalling lots of programs (or adding and deleting data of any kind) is that it fragments your disk. Disk fragmentation occurs because of the way information is stored on the disk: On a new, clean disk, when you save a file it’s stored in contiguous sections called clusters. If you delete a file that takes up, for example, five clusters, and then save a new file that takes eight clusters, the first five clusters’ worth of data will be saved in the empty space left by the deletion and the remaining three will be saved in the next empty spaces. That makes the file fragmented, or divided. To access that file, then, the disk’s read heads won’t find all the parts of the file together but must go to different locations on the disk to retrieve it all. That makes it slower to access. If the file is part of a program, the program will run more slowly. A badly fragmented disk will slow down to a crawl.
You can use the disk defragmenter built into Windows (Programs Accessories System Tools) or a third-party defrag program to rearrange these pieces of files so that they’re placed contiguously on the disk.
Another common cause of performance problems and application misbehavior is a disk that’s too full. Many programs create temporary files and need extra free space on the disk to operate. You can use Windows XP’s Disk Cleanup Tool or a third-party program to find and delete rarely used files, or you can manually delete files to clear space on your disk.

DUMB 6 >Open all attachments

Some folks just can’t help themselves: Getting an e-mail message with an attachment is like getting an unexpected gift. You just have to peek inside to see what it is. But just as that package left on your doorstep could contain a bomb, that file attached to your mail message could contain code that will delete your documents or system folder or send viruses to everyone in your address book.
The most blatantly dangerous attachments are executable files--those that run code--with extensions like .exe, .cmd, and many others (see http://antivirus.about.com/od/securitytips/a/fileextview.htm for a list of file extensions for different types of executables). Files that aren’t themselves executables, such as Word .doc files and Excel .xls files, can contain embedded macros. Scripts (Visual Basic, JavaScript, Flash, etc.) aren’t directly executed by the computer but are run by other programs.
It used to be that you could assume plain text (.txt) or graphics (.gif, .jpg, .bmp) files were safe, but not anymore. File extensions can be “spoofed”; attackers take advantage of the Windows default setting that doesn’t display common file extensions to name executables something like greatfile.jpg.exe. With the real extension hidden, it shows up as greatfile.jpg. So the recipient thinks it’s a graphic, but it’s actually a malicious program.

You should open attachments only when they’re from trusted sources and only when you’re expecting them. Even if the mail with the attachment appears to come from someone you trust, it’s possible that someone spoofed their address or that their computer is infected with a virus that sent the attachment to you without their knowledge.

DUMB 7 > Click on everything

Opening attachments isn’t the only type of mouse click that can get you in trouble. Clicking on hyperlinks in e-mail messages or on Web pages can take you to Web sites that have embedded ActiveX controls or scripts that can perform all sorts of malicious activities, from wiping your hard disk to installing a backdoor program on your computer that a hacker can use to get in and take control of it.
Clicking the wrong link can also take you to inappropriate Web sites that feature pornography, pirated music or software, or other content that can get you in trouble if you’re using a computer on the job or even get you in trouble with the law.
Don’t give in to “click mania.” Think before you click a link. Links can also be disguised in “phishing” messages or on Web sites to appear to take you to a different site from the ones they really point to. For example, the link might say www.safesite.com, but it actually takes you to www.gotcha.com. You can often find out the real URL by hovering over the link without clicking it.

DUMB 8 >Share and share alike

Your mother taught you that it’s nice to share, but when you’re on a network, sharing can expose you to dangers. If you have file and printer sharing enabled, others can remotely connect to your computer and access your data. Even if you haven’t created any shared folders, by default Windows systems have hidden “administrative” shares for the root of each drive. A savvy hacker may be able to use these shares to get in. One way to prevent that is to turn off file and printer sharing--if you don’t need to make any of the files on your computer accessible across the network. This is especially a good idea if you’re connecting your laptop to a public wireless hotspot. You can find instructions on how to do so at http://www.pcmag.com/article2/0,1895,1277222,00.asp.
If you do need to make shared folders accessible, it’s important that they be protected by both share-level permissions and file-level (NTFS) permissions. Also ensure that your account and the local administrative account have strong passwords.

DUMB 9 > Pick the wrong passwords:


That brings us to another common mistake that can expose you to attacks: picking the wrong password. Even if you don’t belong to a network where the administrator forces you to select strong passwords and change them regularly, you should do so. Don’t pick passwords that are easy to guess, such as your birthdate, loved one’s name, social security number, etc. Longer passwords are harder to crack, so make your password at least eight characters long; 14 is even better. Popular password-cracking methods use "dictionary" attacks so don’t use words that are in the dictionary. Passwords should contain a combination of alpha, numeric, and symbol characters for best security.
A long string of nonsense characters may create a password that’s tough to crack, but if you can’t remember it, you’ll defeat the purpose by writing it down (where an intruder may be able to find it). Instead, create a phrase you can remember easily and use the first letters of each word, along with logical numbers and symbols. For example: “My cat ate a mouse on the 5th day of June” becomes “Mc8amot5doJ.”

DUMB 10 > Ignore the need for a backup and recovery plan:


Even if you follow all these suggestions, an attacker may crash your system or your data may be corrupted or get wiped out by a hardware problem. That’s why it’s essential that you always back up your important information and have a plan for recovering from a system failure.
Most computer users know they should back up, but many never get around to it. Or they make an initial backup but don’t update it regularly. Use the built-in Windows backup program (Ntbackup.exe in Windows NT, 2000, and XP) or a third-party backup program and schedule backups to occur automatically. Store backed up data on a network server or removable drive in a location away from the computer itself, in case of a natural disaster like flood, fire, or tornado.
Remember that the data is the most important thing on your computer। The operating system can be reinstalled and so can applications, but it may be difficult or impossible to recreate your original data. (See "10 ways to protect your data" for additional suggestions.)

Thursday, April 30, 2009

Bad Religion - New Maps Of Hell


Punk Rock. Ist natürlich total aus der Mode, und das nicht erst seit gestern. Einige Bands versuchen, sich in ein hippes Nachbargenre zu retten und verzapfen seitdem weinerlichen Emo wie AFI. Andere wollen auf Gedeih und Verderb der Politik in den Hintern treten, scheitern aber an ihrer Engstirnigkeit, wie beispielsweise Anti-Flag, oder verrennen sich in den eigenen Zwangsvorstellungen, siehe NOFX. Und von vielen weiteren hat man seit Ewigkeiten nichts mehr gehört. In letztere Kategorie fallen irgendwie auch Bad Religion. Schließlich sollte dieses Album ursprünglich schon letztes Jahr erscheinen.
Nun haben wir Mitte 2007 und New Maps Of Hell rotiert endlich im CD-Player. Und obwohl man bei diesem Gerät keine Möglichkeit hat, die Geschwindigkeit einzustellen, fragt man sich zu Beginn, wann man denn aus Versehen den Knopf „schneller" gedrückt hat. Denn Bad Religion legen vor wie Rancid auf ihrem 2000er Album. Die ersten drei Songs brauchen keine vier Minuten. Der Hörer ist sofort drin, der Opener 52 Seconds nach kurzer Zeit nur noch ein Schemen. Melodien schwirren aus den Lautsprechern, werden einem um die Ohren gehauen. Erst der siebte Song, die Single Honest Goodbye, nimmt die Geschwindigkeit ein wenig heraus. Die Platte klingt schon fast nach einem Befreiungsschlag, und das, obwohl Bad Religion eigentlich zuletzt zwei recht gute Alben nach der Rückkehr zu Epitaph veröffentlicht haben. Die Band legt zweifellos noch einmal eine Schippe drauf. Kompromisse werden hier keine gemacht. Akustik-Gitarren und Elektronik-Effekte wird man vergeblich suchen, einzig die zaghaften Klaviertöne von Fields Of Mars verkünden das nahe Ende dieses etwa 38minütigen Höllenritts.
Und natürlich sind die Texte politisch. Aber sie sind gleichzeitig differenziert und fordern kein plakatives New America, wie noch vor einigen Jahren oder bei einigen musikalischen Kollegen Bad Religion sind musikalisch in der Vergangenheit geblieben und haben alte Tugenden perfektioniert. Künstlerisch sind die jedoch weiter als die meisten. 8/10

Titan - A Raining Sun

Stoner Rock ist innovativ! Eine auf den ersten Blick paradoxe Aussage bekommt immer mehr Wahrheitsgehalt. Noch vor ein bis zwei Jahren konnte man den Verwesungsprozess schon mit bloßen Ohren hören. Der Wüstensound hatte irgendwie keinen Sand mehr im Getriebe. Die meisten Bands, die in Übersee oder Skandinavien unterwegs sind, kennt hierzulande nicht zu Unrecht niemand. Wer die letzten Platten von The Glasspack, Dozer, Truckfighters, The Awesome Machine, Spiritual Beggars etc. nicht gehört hat, hat auch nichts verpasst. Die hundertste Emoband war zweifellos spannender.

Monday, April 27, 2009

William "The Refrigerator" Perry hospitalized in serious condition due to complications of Guillan-Barré syndrome

According to an associated press report, the gargantuan defensive tackle William "The Refrigerator" Perry (pictured below), who helped lead the Chicago Bears to a 1985 Super Bowl victory, has been hospitalized after complications related to Guillan-Barré syndrome (GBS).

Perry remains in serious condition at Aiken Regional Medical Center, located in his boyhood home of Aiken, South Carolina. Perry's nephew, Purnell Perry, said Tuesday that his uncle was admitted more than a week ago but was expected to recover. According to thebrainmatters.org, a website of the American Academy of Neurology Foundation, GBS "can be a devastating disorder because of its sudden and unexpected onset. Most people reach the stage of greatest weakness within the first 2 weeks after symptoms appear, and by the third week of the illness 90 percent of all patients are at their weakest. The recovery period may be as little as a few weeks or as long as a few years. About 30 percent of those with Guillain-Barré still have a residual weakness after 3 years. About 3 percent may suffer a relapse of muscle weakness and tingling sensations many years after the initial attack."According to Perry's agent, Adam Plotkin of NOPAC Talent Agency, Perry's GBS had developed into a chronic form known as chronic inflammatory demyelinating polyradiculoneuropathy (CIDP). Depicted below is an electron photomicrograph of a transerve section of peripheral nerve involved with CIDP. Note the the thinly myelinated axons at the 3, 5, and 10 o'clock positions. Surrounding these axons are "onion-bulb" formations wherein multiple Schwann cells are concentrically arranged around inadequately myelinated axons.


Thanks to Mark B. Weiss of Earthwise Productions for alerting me to Perry's condition.

Thursday, April 9, 2009

Pete Yorn - To Open Coldplay [News]


Pete Yorn has been picked by Coldplay to open over a dozen tour dates this spring. Yorn will highlight songs from his expansive new album ‘Back and Fourth’ (June 23, Columbia).
"Back and Fourth" marks a new musical chapter for the acclaimed singer and songwriter. Yorn wrote all the songs and recorded the album in Omaha, NE, with producer Mike Mogis (Bright Eyes, Rilo Kiley). Columbia's Co-Chairman Rick Rubin helped guide the project from its earliest demo stages to final mastering.

PETE YORN TOUR DATES:
5/15
West Palm Beach, FL
Cruzan Amphitheatre
5/17
Atlanta, GA
Lakewood Amphitheatre
5/18
Birmingham, AL
Verizon Wireless Amphitheatre Birmingham
5/20
Virginia Beach, VA
Verizon Wireless Virginia Beach Amphitheatre
5/21
Washington, DC
Nissan Pavilion
5/23
Hartford, CT
Meadows Music Theater
5/24
Hershey, PA
Hershey Stadium
5/26
Philadelphia, PA
Susquehanna Center
5/27
Saratoga Springs, NY
SPAC
5/30
Pittsburgh, PA
Post Gazette Pavilion
6/01
Buffalo, NY
Darien Lakes
6/02
Detroit, MI
DTE Energy Music Theatre
6/04
Cincinnati, OH
Riverbend Music Center

The Killers - Tap Wild Light As Main Support For Upcoming North American Tour [New]



The Killers Tap Wild Light as Main Support for Upcoming North American
Tour,

Kicking off April 17th 2009 at the Highly Anticipated Re-Opening of

Las Vegas’ Premier Rock Club, The Joint

Debut Album Adult Nights Out Now on Startime International

New York, NY – The Killers have tapped New Hampshire quartet Wild Light to be the main support on their upcoming North American tour, which kicks off April 17, 2009 at the highly anticipated re-opening of Las Vegas’ premier rock club, The Joint. During this 10 city trek Wild Light will play to packed crowds at arenas including the San Jose Events Center in San Jose and the WAMU Theater in Seattle, before closing the tour with a final show at the Capitol Federal Park in Bonner Springs, KS on May 2nd.

This highly coveted main supporting slot comes on the heels of what has already been a wildly successful 2009 for Wild Light. The band kicked off the year with a bang when they hit the road with Tapes N Tapes for their first ever National tour, in support of the March 3rd release of their debut album Adult Nights (Startime International). Recorded in LA with famed producer Rob Schnapf (Beck, Elliott Smith) the album has received raves from prestigious publications including SPIN, Rolling Stone, The LA Times, Paste Magazine and Billboard among others. Following their run with Tapes N Tapes, the band descended upon Austin, TX at the annual SXSW Music Festival where they played a slew of successful performances to fans and industry heads alike from across the world.

Wild Light Tour Dates:

April 8th Great Scott (headlining show) Boston, MA

17th The Joint Las Vegas, NV

19th San Jose Events Center Arena San Jose, CA

22nd WAMU Theatre Seattle, WA
23rd Save on Foods Centre Victoria, BC
24th UBC Thunderbird Arena Vancouver, BC
26th Pengrowth Saddledome Calgary, AB
27th Rexall Place Edmonton, AB
30th The Eagles Club Milwaukee, WI
May 1st Murat Centre Indianapolis, IN
2
nd Capitol Federal Park at Sandstone Bonner Springs, KS
8th The Bog (headlining show) Scranton, PA
10th Bank of America City Center (w/ Third Eye Blind) Providence, RI

Ashley Tisdale - Dishes On Guilty Pleasure [News]


ASHLEY TISDALE TO RELEASE BRAND-NEW ALBUM — GUILTY PLEASURE — JUNE 16, 2009 ON WARNER BROS. RECORDSPOP SINGER AND ACTRESS TAKES CONTROL ON FIRST ALBUM SINCE COMPLETING HER RUN IN BLOCKBUSTER HIGH SCHOOL MUSICAL FRANCHISEAshley Tisdale, the singer and actress known to millions as the star of the blockbuster High School Musical series, will release her second album for Warner Bros. Records, entitled Guilty Pleasure, June 16, 2009.With an edgy, guitar-driven pop-rock sound, Guilty Pleasure is a creative and mature leap forward for this appealing young singer and songwriter, who launched a career as a solo artist with her gold-certified Top 5 rhythmic-pop debut Headstrong in 2007. "Headstrong was a big learning experience, as it was my first album," Tisdale says. "This time I went in knowing exactly what I wanted to do and the message I wanted to put out there, which is that I’m 23 and I’m not just the cute, bubbly blonde girl you know from Disney. I have a tougher side and I love rock music, which are things people probably don’t know about me. On each album you get to share with the world who you are as a person, and I wanted my fans to see another side to me. This album really reflects who I am at this point in my life."Guilty Pleasure is indeed an authentic reflection of a girl growing up and speaking her mind on songs like the first single "It’s Alright, It’s OK" — a spunky break-up anthem about being single and in control of your life for the first time. "I love break-up songs," Tisdale admits. "On this album, I put to rest a lot of baggage from a previous relationship by venting about the frustration. Everyone can relate to those moments. That song is about how you need to stand up for yourself and not let someone walk all over you; it’s a message I wanted to get across to other girls."Working with a host of top-flight producers and songwriters, such as Kara DioGuardi (Kelly Clarkson, Carrie Underwood), Toby Gad (Beyoncé, Fergie), Billy Steinberg (Madonna), Emanuel Kiriakou (David Archuleta, Nick Lachey), and Swedish production team Twin (who co-wrote the Headstrong singles "Not Like That" and "Be Good To Me"), Tisdale co-wrote several tracks on Guilty Pleasure, including the feisty "Acting Out," whose lyrics could serve as the album’s mission statement: "Let me out of this cage / I'm not gonna hold back / I'm gonna break these chains / I'm taking control now / Gonna give you something to talk about / It's another side of me I'm acting out." She also co-wrote the propulsive "Overrated," about not changing your personality for a guy, and two ballads "What If" and "Me Without You." Another album highlight is the slinky, confident "Masquerade," perhaps the most sophisticated song Tisdale has recorded to date."I’m growing up and this is music I would listen to," Tisdale says. "On this record, I’m not catering to anyone other than to who I am as a person. I think all of these songs have a message and a story that anyone can relate to. I couldn’t sing them if I didn’t connect with them myself."Guilty Pleasure’s first single, "It’s Alright, It’s OK" ships to Top 40 radio on April 14th — the same day it will be available for purchase via digital retailers. For more on Ashley Tisdale, please visit her official website www.ashleytisdale.com.Also, be sure to check out Ashley’s new interview with MySpace Celebrity where she dishes about the upcoming release, fashion, musical influences and more.

Ashley Tisdale - Dishes On Guilty Pleasure [News]

ASHLEY TISDALE TO RELEASE BRAND-NEW ALBUM — GUILTY PLEASURE — JUNE 16, 2009 ON WARNER BROS. RECORDS
POP SINGER AND ACTRESS TAKES CONTROL ON FIRST ALBUM SINCE COMPLETING HER RUN IN BLOCKBUSTER HIGH SCHOOL MUSICAL FRANCHISE
Ashley Tisdale, the singer and actress known to millions as the star of the blockbuster High School Musical series, will release her second album for Warner Bros. Records, entitled Guilty Pleasure, June 16, 2009.
With an edgy, guitar-driven pop-rock sound, Guilty Pleasure is a creative and mature leap forward for this appealing young singer and songwriter, who launched a career as a solo artist with her gold-certified Top 5 rhythmic-pop debut Headstrong in 2007. "Headstrong was a big learning experience, as it was my first album," Tisdale says. "This time I went in knowing exactly what I wanted to do and the message I wanted to put out there, which is that I’m 23 and I’m not just the cute, bubbly blonde girl you know from Disney. I have a tougher side and I love rock music, which are things people probably don’t know about me. On each album you get to share with the world who you are as a person, and I wanted my fans to see another side to me. This album really reflects who I am at this point in my life."
Guilty Pleasure is indeed an authentic reflection of a girl growing up and speaking her mind on songs like the first single "It’s Alright, It’s OK" — a spunky break-up anthem about being single and in control of your life for the first time. "I love break-up songs," Tisdale admits. "On this album, I put to rest a lot of baggage from a previous relationship by venting about the frustration. Everyone can relate to those moments. That song is about how you need to stand up for yourself and not let someone walk all over you; it’s a message I wanted to get across to other girls."
Working with a host of top-flight producers and songwriters, such as Kara DioGuardi (Kelly Clarkson, Carrie Underwood), Toby Gad (Beyoncé, Fergie), Billy Steinberg (Madonna), Emanuel Kiriakou (David Archuleta, Nick Lachey), and Swedish production team Twin (who co-wrote the Headstrong singles "Not Like That" and "Be Good To Me"), Tisdale co-wrote several tracks on Guilty Pleasure, including the feisty "Acting Out," whose lyrics could serve as the album’s mission statement: "Let me out of this cage / I'm not gonna hold back / I'm gonna break these chains / I'm taking control now / Gonna give you something to talk about / It's another side of me I'm acting out." She also co-wrote the propulsive "Overrated," about not changing your personality for a guy, and two ballads "What If" and "Me Without You." Another album highlight is the slinky, confident "Masquerade," perhaps the most sophisticated song Tisdale has recorded to date.
"I’m growing up and this is music I would listen to," Tisdale says. "On this record, I’m not catering to anyone other than to who I am as a person. I think all of these songs have a message and a story that anyone can relate to. I couldn’t sing them if I didn’t connect with them myself."
Guilty Pleasure’s first single, "It’s Alright, It’s OK" ships to Top 40 radio on April 14th — the same day it will be available for purchase via digital retailers. For more on Ashley Tisdale, please visit her official website www.ashleytisdale.com.
Also, be sure to check out Ashley’s new interview with MySpace Celebrity where she dishes about the upcoming release, fashion, musical influences and more.

Monday, March 30, 2009

Lisette Vares - What A Night


New single from the lovely Lisette Vares. You can check out this song on her MySpace page, along with a few others from her forthcoming album: http://www.myspace.com/lizzvega.

Nadia Ali - Love Story



Nadia Ali, the former iiO vocalist, is releasing a new song called "Love Story". The single will include remixes from the Starkillers, Sultan/Ned Shepard, and Andy Moor. Check out Nadia's MySpace for more info.

Lasgo - Gone




After the recent success of their previous single "Out Of My Mind", Belgian eurotrance act Lasgo is looking to score yet another hit. Their new single "Gone", a catchy breakup song, was released on March 2nd. Check out Lasgo's website at www.lasgo.be for more info.

Interview with Bhawaiya artist Shafiul Alam Raza


Regional folk songs have a pride of place in Bangladesh. However, though the genre is widely appreciated, such songs do not share the magnitude of popularity as other genres.
Take the case of ‘Bhawaiya,’ a genre indigenous to north Bengal, mostly popularised by the folk maestro Abbasuddin. This genre is certainly not getting its rightful due today.
This is exactly the point where artiste Shafiul Alam Raza steps in. A regular artiste of Bangladesh Betar (radio) and Bangladesh Television, Raza is fast becoming a familiar name to ‘Bhawaiya’ enthusiasts in the country. Recently he had his second solo performance at Bangladesh Shilpakala Academy (BSA).
In his words, “Most people are under the impression that songs like “Oki gariyal bhai,” “Baukumtha batash jemon” and a few others define the repertoire of the ‘Bhawaiya’ genre. However, in the rural areas of north Bengal, so many songs that the local artistes and Bauls sing are yet to receive exposure. Personally, I feel an inclination to bring these numbers before city audiences.”
And Raza practices what he preaches. Along with popular music, he always tries to present new, lesser-known ‘Bhawaiya’ songs. At the major cultural events in the city, such as ‘Pahela Baishakh,’ ‘Bashonto Utshab,’ ‘Ekushey February’ and ‘Bijoy Dibosh,’ Raja performs ‘Bhawaiya’ songs exclusively written for the occasion.
Born in Chilmari of Kurigram district, known as the hub of the genre, Raza was understandably fascinated by these songs. Since childhood, he was an avid listener of Rangpur Betar; he sought to learn his favourite songs and as it happened most of these were ‘Bhawaiya.’
“I don’t clearly know the reason for my interest. Maybe having grown up in that area, I was irresistibly drawn to ‘Bhawaiya’ songs,” said the artiste.
Though he didn’t receive formal education in music, this didn’t prevent him from receiving several prizes at competitions in his school. As it happened, at an Upazilla competition where he bagged the first prize, he met his music guru, Nurul Islam Zahid. A singer, composer and music teacher, Zahid has written over 3,000 ‘Bhawaiya’ songs. Zahid was a major source of inspiration for the young Raza, though the latter could not receive practical training from Zahid at that time. Years later, Raza managed to contact the artiste once more; since then, he has been among Zahid’s talented disciples.

Wednesday, March 25, 2009

Interview with Balam

The music sensation Balam,
who continues to create new tunes and medley for music lovers, speaks of his passion, his work that began a decade ago and plans for creating more music in an interview with Faizul Khan Tanim.

His signature style of combining eastern and western fusion incorporated with humming tunes has indeed won hearts and opened a new dimension to upcoming artists across the country. On the spring afternoon that I met this versatile and talented artist, Balam, in his studio, he was busy working on a new composition— playing with organ, piano and string tones.

Needless to say, like always, the sound that he was creating before my eyes was fresh, elusive and mystic. With passage of time, we can safely say that Balam is one of those artists who has brought unique musical perspective to the electro pop genre and captured attention of critics and fans.

Although his sudden shift from rock to pop may have disappointed his core fans, it has nonetheless made him reach a larger audience. It actually increased his fans and his recordings sound better and have sold more than most people would imagine. His role in the musical industry has been nothing less than significant. The producer and the singer has appeared in countless concerts and CDs and gained immense popularity. But his popularity has in no way diminished his versatility and rare talent.

Back in the old days..
It is hard to forget the immortal Warfaze song Mone pore jai amar koishor- this brilliant composition was actually done by Balam, who was then a class eight student. At that age, Balam had learnt the rare art of experimenting through strings and composing new sounds and Mone Pore was just the beginning for him.

‘Babna bhai is my cousin and that is how I got myself introduced to Warfaze and amongst a lot of my tunes, the band picked up Koishor’s composition and added it as a song in their album. And I must say, that was a huge morale boost for a kid like me,’ says Balam, with a hint of nostalgia.

Interestingly, a lot of Balam’s music enthusiasts don’t know that Balam was in a band where he worked with now musical icon Habib, who was the keyboardist of the group in the mid 90’s.

‘My first band was Renegades which was formed after my SSC examination in 1995. We used to compose pop/rock mellow songs and the band actually formed just from random musical jamming. All the members used to live in the same area and those of us who shared a common taste, actually went on for musical addas. It wasn’t all that serious even,’ he remembers fondly.

‘However, like many others, we also got our first break when we became the second band in the first Cocacola Band Music Awards in 1997. That was the beginning of our inspiration and especially, mine personally. We made an album in the end of 1995 called Phiriye Dao, which was released from a record label called Enteck. And very sadly, that album was recently re-released as it is, just the cover picture changed by the record label who bought Enteck, says Balam, while answering to a question about a re-made version of the album by Balam and Habib. ‘We did not make any re-make or remixed any songs. If there is such a rumour in the market, it is hundred percent false and we are thinking of taking legal actions,’ added Balam.

By the end of 1998, Balam joined the celebrated band, Warfaze. ‘That was like a whole new life again and I enjoyed being a part of that crew,’ he says laughing.

And today….
‘The moment I decided to quit bands and go solo, my feelings and work became more synonymous with the terms ‘freedom’ and ‘satisfaction’. Honestly, after my debut album Premshikari, which was a mixed compilation, my latest work – the self-titled album- became huge and that was so unexpected. I did not expect any results before six months but the appreciation I received, which was in less than three months, is amazing! My worst fear is that, a standard is now set and both music enthusiasts and critics will be eagerly waiting to review my next album strongly,’ adds Balam.
His first solo album was not very appreciated by his rock fans, however he believes that, the second compilation got a universal character. ‘It is my personal belief that a musician should not stay rooted to a single genre and should constantly experiment to a level which is acceptable,’ said Balam.

He composed jingles for countless television commercials and became very successful. ‘I did the Banglalink Din Bodol series, Navana Real Estate – which was my first work. Now I have plenty of offers, but the first experience of creating music for a very short duration was more challenging than fulfilling. But now it seems I’m doing well and best of all…enjoying,’ adds Balam with a smirk.
Tomorrow

Balam is coming out with his new album, the third one which will feature his sister Julie, who already is a popular artist collaborating with Habib in Moyna Go. The album will be out in Pahela Baishakh – on the occasion of the first day of the Bangla calendar.

‘My latest songs will have some structural change, musically different which will suit Julie’s style of singing. And I will definitely give preference to creating ‘soothing music’…music which will give my fans audible pleasure and for a long time.’

While wrapping up the interview, this creative musician speaks of his belief- living in the moment. ‘I will definitely continue doing music and will compose tracks — what ever comes to my mind in an impulsive manner. That would capture the very essence of the raw appeal I like. The album is coming out from Sangeeta record label and I hope everyone will enjoy listening to it.’
Send this to my Friends: