Sunday, January 13, 2013

Cool House Design Tools images

Flickr Tool: BlackMagic
house design tools
Image by nosha
9 March 2010: Read on further below to see how to add any
color background you would like to a blackmagic view... a new
feature. .


B l a c k M a g i c, a new Flickr tool is available.

Blackmagic is very easy to use. Paste:

<a href="http://flickrhivemind.net/blackmagic">better view</a>



into your photo description underneath any of the photos in your
photostream.


Adding it in a photo comment on your or other's photos is also just
fine.

You can replace the " better view " with any text you would like shown
for the link.

Those of you that use more advanced uploading tools can add this to
the text template of each of your photos.


What you get:

From any of your photo pages, an "On Black" style photo view -
view your pictures in medium or large size on black, grey, or white
backgrounds.

From your Flickr home page, you get a Flickr Hive
Mind
view of your photo stream. From there, clicking on any photo
gets you the BlackMagic view.

Strengths of BlackMagic

BlackMagic uses something called "referer" information to figure out
the picture you were looking at, so you don't have to craft a new
link for each picture
.

If you want to create custom links you can do so - there's a
custom link as well as example link text available on every BlackMagic
page (follow the "more" link).


Blackmagic is often faster than other tools that do this type
of display, as it makes only a single, simple call to the Flickr API
to do its work.

Weaknesses of BlackMagic

If you click on a BlackMagic link on a person's home page, BlackMagic
can't figure out which of the the photos you were
looking at. However there's a solution: BlackMagic sends you to a
custom view of all pictures on the user's home page (via Flickr Hive
Mind ), and then clicking on any of those pictures gives you a
BlackMagic view (as mentioned above).



Super-paranoid web browser settings shut off "referer" information -
BlackMagic can't figure out which picture you are looking at. You
can still use custom links, which will work on all browsers (as
opposed to 99% of them).


BlackMagic links generally do not work from emails or RSS
feeds. Again, if you are concerned about this working then
creating a custom link works in all cases.





Updates:

New March 2010 feature you can now specify the background color
you want for any or all of your photos. Follow the example link
formats below:


flickrhivemind.net/blackmagic.cgi?bg=blue

flickrhivemind.net/blackmagic.cgi?bg=white


flickrhivemind.net/blackmagic.cgi?bg=333333

(this is web color #333333, a dark gray)

flickrhivemind.net/blackmagic.cgi?bg=ff0000


(this is web color #ff0000, bright red!)

a pasteable example:


<a href="http://flickrhivemind.net/blackmagic.cgi?bg=333333>view on dark grey</a>


To see how these colors are specified, see:


en.wikipedia.org/wiki/Web_colors

the 'Hex Triplet' colors (without the leading #)

and the 'HTML color names'

should all work...

Michael Brush has sent me another invaluable link for colors. Thanks, Michael!

www.w3schools.com/html/html_colornames.asp

www.w3schools.com/tags/ref_colorpicker.asp












23 May: A bug that led to your default small/big black/grey settings
not being used has been fixed. Let me know if I've broken anything!

23 May: the display has been made even more minimal! Click on "More"
to see other options and links from Blackmagic pages.

22 May: Fiveprime.org was switched to new DNS Servers for what I hope
to be added stability during the day. It seemed the old DNS servers
were flaking out sporadically and were not sufficiently redundant.



6 May 2009: New server for added speed and (eventually) stability.
Added html to paste into your flickr page at the bottom of every Black
Magic page. (only necessary if you want a specific, customized
view)



16 March:


Victoria House - 59 Willes Road, Leamington Spa - Patrol Guard car
house design tools
Image by ell brown
More Georgian buildings in Leamington Spa.

This is Victoria House at 59 Willes Road in Leamington Spa

Grade II listed. At the time of listing it was a Masonic Hall.

Victoria House (masonic Hall), Royal Leamington Spa - British Listed Buildings

ROYAL LEAMINGTON SPA

SP3266SW LANSDOWNE CRESCENT
1208-1/4/213 (East side)
19/11/53 Victoria House (Masonic Hall)
(Formerly Listed as:
WILLES ROAD
(East side)
Masonic Hall)

GV II

Villa, now masonic hall. Laid out in 1832, building began in
1835, with later additions and alterations including
extensions to left return and to rear. Architect, William
Thomas for the Barber family, but completed for Edward Pinder.
Pinkish-brown brick with painted stucco facades, Welsh slate
roofs and cast-iron balconies. Late Classical style.
PLAN: central hallway plan.
EXTERIOR: 3 storeys with basement, 3 bays with 5 first-floor
windows arranged 1:3:1. Central projection. Plinth. Giant
Corinthian columns to ends through ground and first floors,
surmounted by continuous frieze.
First floor: outer bays have tall 6/9 sashes, central bay has
6/6 sashes, all in plain reveals and with tooled, eared
architraves, frieze and cornice.
Second floor: 3/6 sashes throughout in plain reveals and with
sills. Frieze, cornice, blocking course surmounted by
segmental acroteria.
Ground floor, centre bay: flight of wide steps to off-centre
entrance a 6-fielded-panel door with overlight with
glazing-bars, in plain reveals and with tooled, splayed
architrave and cornice with bay-leaf motif; to right a 6/6
sash in similar surround with round-arched niche between. All
under tetrastyle Ionic portico with 2 engaged pilasters,
frieze and pediment. Outer bays have tall 6/6 sashes in
similar surrounds to doorway.
Basement: casement windows to outer bays. Tall end and rear
stacks with cornices. First floor, windows to outer bays have
individual balconies with circle-and-anthemion motif
balustrades.
Right return (garden facade): central bay is recessed. Plinth
surmounted by 4 similar giant Corinthian pilasters through
ground and first floors.
First floor: two 6/9 sashes in plain reveals and tooled, eared
architraves with frieze and cornice. To centre and arcade of 3
blind arches. Frieze.
Second floor: three 3/6 sashes in plain reveals and with

sills; frieze, cornice, low parapet.
Ground floor: steps to central tripartite entrance with French
windows and divided overlight between 2/3 sashes, within
recess with 2 Ionic columns, frieze, cornice. To either side
are tripartite windows with 6/9 between 2/3 sashes with frieze
and cornice on consoles. Similar window to single-storey rear
extension. First-floor, outer windows have individual
balconies with circle-and-anthemion motif balustrades.
Left return: three 6/6 sashes, staircase window a 9/15 sash
with radial glazing to head and margin-lights; second floor
has two 3/6 sashes and a 4/4 sash.
INTERIOR: main openwell staircase has boarded-in balustrade,
but to rear an openwell staircase with turned balusters.
Ground floor, front and rear halls have cornices with acanthus
modillions; elaborate cornice with anthemion motif and ceiling
rose to rear drawing room; both front rooms have deep,
cavetto-moulded cornices. First floor, stair hall has cornice
with anthemion motif, otherwise moulded cornices. Room to
right has tall panelling. Fireplaces: ground floor, rear
drawing room has marble fireplace with corbels; further marble
fireplaces to rear room and to front, left room; to first
floor are simple Regency fireplaces. Mainly 6-panel doors;
shutters to most windows; deep skirting boards.
HISTORICAL NOTE: William Thomas was a 'builder, speculator and
chapman for Mr Barber', the house was sold before completion
to Edward Pinder, a director of the Leamington Bank
(information taken from deeds). The Masons purchased the house
in 1889, previously it had been Copps Hotel and a Ladies'
Academy. A map of 1834 shows Lansdowne Crescent and Circus
laid out for 'intended building'.
Victoria House forms an architectural group with Nos 19-57
(odd) Lansdowne Crescent and Nos 1-17 (consecutive) Lansdowne
Circus (qqv), all by William Thomas.

Victoria House - history

Situated on the corner of Upper Holly Walk and Willes Road near the center of Royal Leamington Spa, this elegant Georgian building was constructed in 1835.

Designed by Architect William Thomas and built by Edward Pinder, the building was originally named Landsdowne House until 1841 when it took on it's present name.

Victoria House has served many purposes over the years from a private house rented out for 'the season' (May to October), a family hotel, and a residential academy for young ladies. Purchased by the Freemasons of Guy's Lodge in 1889 it became the home of the fraternity in the area.

During the Second World War it became a billet for expatriated Czech soldiers, seven of whom were successful in the assassination of Rheinhard Heidrich in 1941- These gallant few lost their lives in eliminating the man who may have succeeded Adolf Hitler. A memorial to those brave men stands in the nearby Jephson Gardens.

Today Victoria House is still a building buzzing with activity. The owners continually strive to maintain the beauty of this late Georgian property that makes it an Perfect venue for almost every occasion be it Business or Pleasure.


Outside was this Patrol Guard car. Not really a Police car though. Looks like one, but isn't.


Houston, Texas (1956) ... Tools published that exploit router flaw (December 30, 2011) ...item 4.. Hackers continue to exploit outdated browser plug-ins (Posted on 07. Mar, 2012) ...
house design tools
Image by marsmet481
Typically, it would take a hacker about 100 million tries to crack an eight digit code. But because the router indicates whether or not some digits are correct, that number drops to around 11,000 attempts before access can be gained, according to Viehbock's research paper.

Once an hacker figures out the PIN, it's much easier to figure out the router's password and gain access to the network.
.

........***** All images are copyrighted by their respective authors ........
.

... marsmet501 photostream

www.flickr.com/photos/63583766@N04/
.

...............................................................................................................................................................................................
.
.....item 1).... CNET ... news.cnet.com ... Tools published that exploit router flaw ...

by Marguerite Reardon ... December 30, 2011 8:32 AM PST ....

Researchers have released two tools that can be used to exploit a vulnerability in a protocol that makes it easier to set up secure home Wi-Fi networks.

news.cnet.com/8301-1009_3-57350220-83/tools-published-tha...

Stefan Viehbock, who first reported the vulnerability to the U.S. Computer Emergency Readiness Team, released a tool that can crack a home Wi-Fi network in two hours. And Craig Heffner of Tactical Network Solutions, who had been working independently on figuring out the same vulnerability that Viebock reported to US-CERT, has also developed a tool that will allow hackers to gain access to some secure Wi-Fi networks in four to 10 hours. His tool called Reaver is hosted on Google Code.

The vulnerability itself is inherent in the Wi-Fi Protected Set-up protocol. This protocol, which is often bundled into Wi-Fi routers, is designed to allow unskilled home users to set up secure networks using WPA encryption without much hassle. Users are then able to type in a shortened PIN instead of a long pass-phrase when adding a new device to the secure network.

The problem is that when security PINs are entered for access to the network, the router actually lets the user know if has gotten the first or last numbers of the 8-digit code correct. The code that Viehbock and Heffner have written use a brute-force approach, which means different combinations of PINs are tried over and over until one is found that allows the hacker access. This can be done since most routers don't limit the number of attempts on the passwords used to access the router.

Typically, it would take a hacker about 100 million tries to crack an eight digit code. But because the router indicates whether or not some digits are correct, that number drops to around 11,000 attempts before access can be gained, according to Viehbock's research paper. Once an hacker figures out the PIN, it's much easier to figure out the router's password and gain access to the network.

The security flaw could affect millions of people with Wi-Fi routers in their homes and businesses, since the protocol is integrated into most new wireless routers sold today. The US-CERT warning named all the major wireless router brands: Buffalo, D-Link, Cisco Linksys, Netgear, Technicolor, TP-Link, and ZyXEL.

So far none of these companies have responded to the US-CERT warning with a fix, nor have they provided comment to the press on this situation. CNET reached out to each of these companies. Buffalo and Cisco representatives said they were looking into the issue, but they have still not officially responded.

Viehbock and Heffner say this is why they have published their tools, so that they could draw attention to the issue.

The fix right now is that users can disable the WPS set-up on their routers.
Originally posted at Signal Strength


Marguerite Reardon

Marguerite Reardon has been a CNET News reporter since 2004, covering cell phone services, broadband, citywide Wi-Fi, the Net neutrality debate, as well as the ongoing consolidation of the phone companies.
.
.
..............................................................................................................................................................................................
.
.....item 2).... Yahoo! Finance ... finance.yahoo.com/news ... If You're Using 'Password1,' Change It. Now.

By Stacy Cowley | CNNMoney.com – 6 hours ago ..... Thursday March 01, 2012 ...

finance.yahoo.com/news/if-you-re-using--password1---chang...

The number one way hackers get into protected systems isn't through a fancy technical exploit. It's by guessing the password.

That's not too hard when the most common password used on business systems is "Password1."

There's a technical reason for Password1's popularity: It's got an upper-case letter, a number and nine characters. That satisfies the complexity rules for many systems, including the default settings for Microsoft's widely used Active Directory identity management software.

Security services firm Trustwave spotlighted the "Password1" problem in its recently released "2012 Global Security Report," which summarizes the firm's findings from nearly 2 million network vulnerability scans and 300 recent security breach investigations.

Around 5% of passwords involve a variation of the word "password," the company's researchers found. The runner-up, "welcome," turns up in more than 1%.

Easily guessable or entirely blank passwords were the most common vulnerability Trustwave's SpiderLabs unit found in its penetration tests last year on clients' systems. The firm set an assortment of widely available password-cracking tools loose on 2.5 million passwords, and successfully broke more than 200,000 of them.

Verizon came up with similar results in its 2012 Data Breach Investigations Report, one of the security industry's most comprehensive annual studies. The full report will be released in several months, but Verizon previewed some of its findings at this week's RSA conference in San Francisco.

Exploiting weak or guessable passwords was the top method attackers used to gain access last year. It played a role in 29% of the security breaches Verizon's response team investigated.

[Related: Smartphone Features You Don't Really Need]

Verizon's scariest finding was that attackers are often inside victims' networks for months or years before they're discovered. Less than 20% of the intrusions Verizon studied were discovered within days, let alone hours.

Even scarier: Few companies discovered the breach on their own. More than two-thirds learned they'd been attacked only after an external party, such as a law-enforcement agency, notified them. Trustwave's findings were almost identical: Only 16% of the cases it investigated last year were internally detected.

So if your password is something guessable, what's the best way to make it more secure? Make it longer.

Adding complexity to your password -- swapping "password" for "p@S$ w0rd" -- protects against so-called "dictionary" attacks, which automatically check against a list of standard words.

But attackers are increasingly using brute-force tools that simply cycle through all possible character combinations. Length is the only effective guard against those. A seven-character password has 70 trillion possible combinations; an eight-character password takes that to more than 6 quadrillion.

Even a few quadrillion options isn't a big deal for modern machines, though. Using a ,500 computer built with off-the-shelf parts, it took Trustwave just 10 hours to harvest its 200,000 broken passwords.

"We've got to get ourselves using stuff larger than human memory capacity," independent security researcher Dan Kaminsky said during an RSA presentation on why passwords don't work.

He acknowledged that it's an uphill fight. Biometric authentication, smartcards, one-time key generators and other solutions can increase security, but at the cost of adding complexity.

"The fundamental win of the password over every other authentication technology is its utter simplicity on every device," Kaminsky said. "This is, of course, also their fundamental failing." To top of page
.
.
............................................................................................................................................................................................
.
.....item 3).... Phantom Report ... www.phantomreport.com ... Resistance Against the Enemies of Freedom ...

China testing cyber-attack capabilities
March 8, 2012 Posted by Phantom Report

www.phantomreport.com/china-testing-cyber-attack-capabili...

For a decade or more, Chinese military officials have talked about conducting warfare in cyberspace, but in recent years they have progressed to testing attack capabilities during exercises, according to a congressional report to be released Thursday.

The People’s Liberation Army (PLA) probably would target transportation and logistics networks before an actual conflict to try to delay or disrupt the United States’ ability to fight, according to the report prepared by Northrop Grumman for the U.S.-China Economic and Security Review Commission.

The Chinese military conducted an exercise in October involving “joint information offensive and defensive operations” and another in 2010 featuring attacks on communications command-and-control systems, according to the commission, which was set up by Congress.

Such exercises, combined with evidence that China is streamlining its forces to integrate cyber and electronic warfare and is financing research in the two areas, show that “Chinese capabilities in computer network operations have advanced sufficiently to pose genuine risk to U.S. military operations in the event of a conflict,” the report asserted.

Although the report provides no evidence that China can launch destructive attacks on U.S. targets, it serves as yet another warning to policymakers and the public that the United States has adversaries intent on catching up to, or surpassing, it in cyber capabilities. The report comes as Congress considers major cybersecurity legislation.

Read More: Washington Post
.
........................................

In our age there is no such thing as 'keeping out of politics.' All issues are political issues, and politics itself is a mass of lies, evasions, folly, hatred and schizophrenia.

-George Orwell

........................................
.
.
..............................................................................................................................................................................................
.
.....item 4).... CYBER WAR ZONE ... www.cyberwarzone.com ... Hackers continue to exploit outdated browser plug-ins

Posted on 07. Mar, 2012 by siavash

Tag: Adobe Shockwave, Android devices, attack vector, blackberry, hackers, iPhone, Malicious URLs Pick a random article for me

www.cyberwarzone.com/cyberwarfare/hackers-continue-exploi...
.
.
.......................................

img code photo ... cybersecurity

www.cyberwarzone.com/sites/default/files/images/cybersecu...

.......................................
.

Outdated browser plug-ins continue to be a leading attack vector, according to a recent Zscaler ThreatLabZ report.

Zscaler ThreatLabZ, the research arm of cloud security firm Zscaler, observed that Adobe Shockwave was the most outdated browser plug-in during the third quarter of 2011, with 94% of those installed being outdated.

According to its most recent '2011 State of the Web' report, there was a dramatic shift in the fourth quarter. Shockwave is down to 52% outdated of all installed, and Adobe Reader now tops the list at 61%. Hackers are aware that large amounts of users continue to run outdated plug-ins and use these as an easy attack vector, the report warned.

Botnets comprised the majority of threats seen in December, at 80% of Zscaler blocks. Malicious URLs followed far behind at 14%, while a mere 3% of threats blocked were identified by anti-virus/signature detection.

The report found that enterprises are moving to the more secure Internet Explorer 8. The use of IE 8 has more than doubled in the enterprise over 2011, from 26% of overall IE traffic in January to 55% in December. The report noted that while enterprises are moving to newer and more secure web browsers, IE 9 adoption remains very low.

Overall, IE use in the enterprise followed a slow decline, down to 53% in the fourth quarter from 58% in the third quarter. Meanwhile, Chrome usage saw a big jump from 0.17% of all web browser use in the third quarter to 5% in the fourth quarter, while Safari saw a decline from 7% in third quarter to 4% in the fourth quarter. Firefox usage remained constant at 10%.

In addition, Zscaler ThreatLabZ observed an 85% increase in mobile traffic during the fourth quarter. iPhone and Android devices dominated mobile traffic, accounting for about 87% of such, while Blackberry use fell sharply from 27% to 13% over the quarter.

Info
Article Author:
infosecurity

Source: www.infosecurity-magazine.com/view/24383/hackers-continue...
.
.
..............................................................................................................................................................................................
.
.....item 5).... The SCADA & Smart Grid Cyber Security Summit 2012 ... April 26th & 27th, London ..

.....MARCH 08, 2012....

scadacybersecuritysummit.com/index.html

Assess the nature of the latest threats being faced by energy companies and the impact of these upon your organisation.

Discover why Utility Cyber Security has been reaching a state of near chaos and the latest strategies from utilities to gain the upper-hand against hackers.

Understand the importance of industrial control system (ICS) security and assess the latest solutions on offer.

Discuss the most promising cyber security technologies in the marketplace.

Assess the trends to watch in utility cyber security.

Discover the best practice from across Europe in protecting SCADA and the Smart Grid from cyber-attack.

Benefit from case study presentations from a wide range of international utilities and energy companies.

Network with your industry peers in the comfort of a 5 star venue.

---Featuring a two-day Conference & Exhibition, with over 25 top level speakers.

---Discover the latest technologies and solutions for cyber security in the Technology Exhibition

---By popular demand from Utilities this year's event will include a selection of 3 not to be missed training workshops on SCADA and Smart Grid Cyber Security.

---Network with your industry peers and make vital new contacts.
.
.
...............................................


High level event taking place in Miami 21st & 22nd May - REGISTRATIONS are now open to attend & sponsor the...: t.co/5FTZjgy4
@ Thu Mar 08 19:45:15

White House simulates cyberattack for senators in push for more regulation - t.co/NWshFv6O
@ Thu Mar 08 17:27:28

Apple takes wraps off iPad 3 - t.co/yeytOrf2
@ Thu Mar 08 17:27:01


join the conversation

...............................................
.
.
..............................................................................................................................................................................................
.
.


Tool Bucket
house design tools
Image by Suite 112
Brandon and I got so sick of looking in every room for our tools-- so he bought this tool bucket thing. It's my new favorite thing in our house.


Website Interactive Design
house design tools
Image by VFS Digital Design
Created by Vancouver Film School students Paul Belen, Luis Francisco, Felipe Dos Santos, and Tamish Aswani through the VFS Digital Design program. These students created this video as part of a public awareness campaign on cyber-bulling. The also created a simple website to house the video that integrates social networking tools such as Twitter and Facebook. This project received national news coverage as part of anti-bullying week.

Learn more about VFS's one-year Digital Design program at www.vfs.com/digitaldesign.

No comments:

Post a Comment