<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-1583082957916736357</id><updated>2024-10-25T05:54:30.177-05:00</updated><category term="Microsoft"/><category term="IE"/><category term="Windows"/><category term="Amazon"/><category term="ClamAV"/><category term="Desktop VR"/><category term="Exchange"/><category term="Head Tracking"/><category term="Internet Explorer"/><category term="Linux"/><category term="Linux vs Windows"/><category term="NASA"/><category term="OpenDNS"/><category term="Perseid Meteor Shower"/><category term="Remote access"/><category term="Robot"/><category term="S3"/><category term="SMTP"/><category term="Security"/><category term="Stupid User Tricks"/><category term="Tech Support"/><category term="Tether"/><category term="Ticketing"/><category term="USB"/><category term="VMware"/><category term="Vista"/><category term="Vulnerability"/><category term="Wii"/><category term="XV6700"/><category term="backups"/><category term="duplicity"/><category term="meteor shower"/><category term="ssh"/><title type='text'>Bob&#39;s Tech</title><subtitle type='html'>&quot;It is a capital mistake to theorize before one has data.  Insensibly one begins to twist facts to suit theories, instead of theories to suit facts.&quot; - Sir Arthur Conan Doyle</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://tech.justbob.us/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://tech.justbob.us/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>JustBob</name><uri>http://www.blogger.com/profile/08132115541530970900</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>20</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-1583082957916736357.post-4778515524501600926</id><published>2010-11-05T09:48:00.000-06:00</published><updated>2010-11-05T09:48:55.557-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="IE"/><category scheme="http://www.blogger.com/atom/ns#" term="Microsoft"/><title type='text'>Internet Explorer CSS Tag Parsing Code Execution Vulnerability</title><content type='html'>Yet another IE Code Execution Vulnerability:&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Description:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Internet Explorer, Microsoft&#39;s flagship browser, is susceptible  to a memory corruption vulnerability. The code responsible for parsing  cascading stylesheet (CSS) tags can be made to overwrite a pointer to a  virtual function, potentially resulting in code execution.&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;blockquote&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;The beta version of Internet Explorer 9 is not susceptible, but other  versions are. An attacker must entice a target to view a malicious site in  order to exploit this vulnerability, which can be used to execute arbitrary  code on the target&#39;s machine. No updates are currently available for this  vulnerability, which is being actively exploited in the wild.&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;br /&gt;
Status: vendor confirmed, updates not available&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;SecurityFocus Bugtraq ID&amp;nbsp;&lt;a href=&quot;http://www.securityfocus.com/bid/44536&quot;&gt;http://www.securityfocus.com/bid/44536&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;Again, why are you still using IE? &amp;nbsp;Really, why?&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;-Bob&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://tech.justbob.us/feeds/4778515524501600926/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1583082957916736357/4778515524501600926' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/4778515524501600926'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/4778515524501600926'/><link rel='alternate' type='text/html' href='http://tech.justbob.us/2010/11/internet-explorer-css-tag-parsing-code.html' title='Internet Explorer CSS Tag Parsing Code Execution Vulnerability'/><author><name>JustBob</name><uri>http://www.blogger.com/profile/08132115541530970900</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1583082957916736357.post-4608557321257042762</id><published>2010-07-29T18:18:00.000-05:00</published><updated>2010-07-29T18:18:26.514-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Amazon"/><category scheme="http://www.blogger.com/atom/ns#" term="backups"/><category scheme="http://www.blogger.com/atom/ns#" term="duplicity"/><category scheme="http://www.blogger.com/atom/ns#" term="S3"/><title type='text'>Amazon S3 IP Blocks</title><content type='html'>Today I need to help a customer that uses &lt;a href=&quot;http://j.mp/dv0yO1&quot;&gt;Amazon S3&lt;/a&gt; for offsite backups (using &lt;a href=&quot;http://j.mp/9oHA42&quot;&gt;duplicity&lt;/a&gt;).  Up until now they had been accessing S3 through a &lt;a href=&quot;http://j.mp/du5ivD&quot;&gt;squid proxy&lt;/a&gt; to get the data to and from S3.  This enables them to limit the outgoing HTTP connections from their hosts.&lt;br /&gt;
&lt;br /&gt;
Recently, they discovered that the performance of backups has been highly variable and restores are extremely slow.  In testing today we found that performance through the proxy (with just duplicity) was much slower than it was going direct to S3.  Of course, this now caused some problems with firewall configuration.  In order to try to limit access, we need to find the IP addresses that are used by S3.  Unfortunately, this does appear to be an easy task.  &lt;a href=&quot;http://j.mp/azDV1S&quot;&gt;Google&lt;/a&gt; was not immediately helpful.&lt;br /&gt;
&lt;br /&gt;
I then started looking at DNS.  It appears that *.s3.amazonaws.com goes through a number of CNAME records before arriving at an IP address.  The last step alone the way appears to be one of three host names:&lt;br /&gt;
&lt;br /&gt;
&lt;ol&gt;&lt;li&gt;s3-1-w.amazonaws.com.&lt;/li&gt;
&lt;li&gt;s3-2-w.amazonaws.com.&lt;/li&gt;
&lt;li&gt;s3-3-w.amazonaws.com.&lt;/li&gt;
&lt;/ol&gt;&lt;div&gt;It appears that each of these host names resolve to IP addresses in different blocks. &amp;nbsp;By running whois queries against an IP address in each block I was able to discover the following blocks:&lt;/div&gt;&lt;div&gt;&lt;ol&gt;&lt;li&gt;72.21.192.0/19&lt;/li&gt;
&lt;li&gt;87.238.80.0/21&lt;/li&gt;
&lt;li&gt;207.171.160.0/19&lt;/li&gt;
&lt;/ol&gt;&lt;/div&gt;&lt;div&gt;For now, this is good enough...&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;-Bob&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://tech.justbob.us/feeds/4608557321257042762/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1583082957916736357/4608557321257042762' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/4608557321257042762'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/4608557321257042762'/><link rel='alternate' type='text/html' href='http://tech.justbob.us/2010/07/amazon-s3-ip-blocks.html' title='Amazon S3 IP Blocks'/><author><name>JustBob</name><uri>http://www.blogger.com/profile/08132115541530970900</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1583082957916736357.post-7219399258896809648</id><published>2009-08-11T16:38:00.003-05:00</published><updated>2009-08-11T16:45:18.572-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="meteor shower"/><category scheme="http://www.blogger.com/atom/ns#" term="NASA"/><category scheme="http://www.blogger.com/atom/ns#" term="Perseid Meteor Shower"/><title type='text'>The Perseids are Coming</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://en.wikipedia.org/wiki/File:IMG_8505n3.JPG&quot;&gt;&lt;img style=&quot;cursor:pointer; cursor:hand;width: 120px; height: 100px;&quot; src=&quot;http://upload.wikimedia.org/wikipedia/commons/thumb/c/c5/Labeled-perseids.jpg/120px-Labeled-perseids.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;From: &lt;a href=&quot;http://science.nasa.gov/headlines/y2009/31jul_perseids2009.htm&quot;&gt;http://science.nasa.gov/headlines/y2009/31jul_perseids2009.htm&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;For sky watchers in North America, the watch begins after nightfall on August 11th and continues until sunrise on the 12th. Veteran observers suggest the following strategy: Unfold a blanket on a flat patch of ground. (Note: The middle of your street is not a good choice.) Lie down and look up. Perseids can appear in any part of the sky, their tails all pointing back to the shower&#39;s radiant in the constellation Perseus. Get away from city lights if you can.&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;-Bob</content><link rel='replies' type='application/atom+xml' href='http://tech.justbob.us/feeds/7219399258896809648/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1583082957916736357/7219399258896809648' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/7219399258896809648'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/7219399258896809648'/><link rel='alternate' type='text/html' href='http://tech.justbob.us/2009/08/perseids-are-coming.html' title='The Perseids are Coming'/><author><name>JustBob</name><uri>http://www.blogger.com/profile/08132115541530970900</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1583082957916736357.post-9089512107358303882</id><published>2008-12-11T20:38:00.002-06:00</published><updated>2008-12-11T20:39:48.739-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="IE"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet Explorer"/><category scheme="http://www.blogger.com/atom/ns#" term="Microsoft"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerability"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>A couple of Microsoft Zero Day Vulnerabilities</title><content type='html'>For those still using Internet Explorer for regular web browsing, you need to read this:&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;&lt;span style=&quot;font-family:Courier New;&quot;&gt;&lt;span style=&quot;font-family:Consolas;&quot;&gt;&lt;span style=&quot;font-family:&#39;Courier New&#39;;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;From the &quot;@RISK: The Consensus Security Vulnerability Alert - Week 50 2008&quot;&lt;br /&gt;  &lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;&lt;br /&gt;(1) CRITICAL: Microsoft Internet Explorer Remote Code Execution Vulnerability (0day)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;Affected:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;Microsoft Internet Explorer 7 and possibly prior&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;Description: Microsoft Internet Explorer contains a remote code execution vulnerability in its handling of certain XML structures. A specially crafted web page can result in remote code execution with the privileges of the current user. This vulnerability is currently being exploited in the wild, and is reportedly not mitigated by the most recent Microsoft patches. No further technical details are publicly available for this vulnerability.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;Status: Vendor confirmed, no updates available.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;References:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;Microsoft Security Advisory&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;&lt;a href=&quot;http://www.microsoft.com/technet/security/advisory/961051.mspx&quot;&gt;http://www.microsoft.com/technet/security/advisory/961051.mspx&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;SecurityFocus BID&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;&lt;a href=&quot;http://www.securityfocus.com/bid/32721&quot;&gt;http://www.securityfocus.com/bid/32721&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;US-CERT Vulnerability Note&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;&lt;a href=&quot;http://www.kb.cert.org/vuls/id/493881&quot;&gt;http://www.kb.cert.org/vuls/id/493881&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;Network&lt;span style=&quot;&quot;&gt;  &lt;/span&gt;World Article&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;&lt;a href=&quot;http://www.networkworld.com/news/2008/120908-new-web-attack-exploits-unpatched.html?fsrc=rss-security&quot;&gt;http://www.networkworld.com/news/2008/120908-new-web-attack-exploits-unpatched.html?fsrc=rss-security&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;SecurityFocus BID&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;&lt;a href=&quot;http://www.securityfocus.com/bid/32721&quot;&gt;http://www.securityfocus.com/bid/32721&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;***********************************************&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;(2) CRITICAL: Microsoft WordPad Text Converter Remote Code Execution (0day)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;Affected:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;Microsoft Windows XP prior to Service Pack 3.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;Description: Microsoft WordPad is a Rich Text Format (RTF) editor included by default in Microsoft Windows. It is the default viewer for RTF files. It contains a flaw in its Text Converter component. A specially crafted RTF document could trigger this vulnerability, allowing an attacker to execute arbitrary code with the privileges of the current user. This vulnerability is being actively exploited in the wild and is reportedly not mitigated by the most recent set of Microsoft patches.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;Status: Vendor confirmed, no updates available.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;References:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;Microsoft Security Advisory&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;&lt;a href=&quot;http://www.microsoft.com/technet/security/advisory/960906.mspx&quot;&gt;http://www.microsoft.com/technet/security/advisory/960906.mspx&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;US-CERT Vulnerability Note&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;&lt;a href=&quot;http://www.kb.cert.org/vuls/id/926676&quot;&gt;http://www.kb.cert.org/vuls/id/926676&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;SecurityFocus BID&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;&lt;a href=&quot;http://www.securityfocus.com/bid/32718&quot;&gt;http://www.securityfocus.com/bid/32718&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt; &lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;&lt;span style=&quot;font-family:Courier New;&quot;&gt;&lt;span style=&quot;font-family:Consolas;&quot;&gt;&lt;span style=&quot;font-family:&#39;Courier New&#39;;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;So why aren&#39;t you using something else?  If you didn&#39;t know, there&#39;s &lt;a href=&quot;http://www.google.com/chrome/index.html&quot;&gt;Chrome&lt;/a&gt;, &lt;a href=&quot;http://www.mozilla.com/en-US/firefox/&quot;&gt;Firefox&lt;/a&gt;, &lt;a href=&quot;http://www.opera.com/&quot;&gt;Opera&lt;/a&gt;, and &lt;a href=&quot;http://www.apple.com/safari/&quot;&gt;Safari&lt;/a&gt; available for Windows users, among others.  The excuse that &quot;I need IE for site X&quot; may be valid for site X, but, why are you using it for everything else?&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;-Bob&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;&lt;span style=&quot;font-family:Courier New;&quot;&gt;&lt;span style=&quot;font-family:Consolas;&quot;&gt;&lt;span style=&quot;font-family:&#39;Courier New&#39;;&quot;&gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;&lt;span style=&quot;;font-family:&#39;Courier New&#39;;font-size:10;&quot;  &gt;&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://tech.justbob.us/feeds/9089512107358303882/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1583082957916736357/9089512107358303882' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/9089512107358303882'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/9089512107358303882'/><link rel='alternate' type='text/html' href='http://tech.justbob.us/2008/12/couple-of-microsoft-zero-day.html' title='A couple of Microsoft Zero Day Vulnerabilities'/><author><name>JustBob</name><uri>http://www.blogger.com/profile/08132115541530970900</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1583082957916736357.post-6568206533338087132</id><published>2008-10-10T14:25:00.003-05:00</published><updated>2008-10-10T14:28:07.095-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Exchange"/><category scheme="http://www.blogger.com/atom/ns#" term="Microsoft"/><category scheme="http://www.blogger.com/atom/ns#" term="SMTP"/><title type='text'>How to set size limits for messages in Exchange Server</title><content type='html'>I was asked by a customer today how to configure the SMTP message size limit in Exchange.  Here is what I found: &lt;a href=&quot;http://support.microsoft.com/kb/322679&quot;&gt;http://support.microsoft.com/kb/322679&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;-Bob</content><link rel='replies' type='application/atom+xml' href='http://tech.justbob.us/feeds/6568206533338087132/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1583082957916736357/6568206533338087132' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/6568206533338087132'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/6568206533338087132'/><link rel='alternate' type='text/html' href='http://tech.justbob.us/2008/10/how-to-set-size-limits-for-messages-in.html' title='How to set size limits for messages in Exchange Server'/><author><name>JustBob</name><uri>http://www.blogger.com/profile/08132115541530970900</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1583082957916736357.post-2676822636816485592</id><published>2008-06-28T00:43:00.004-05:00</published><updated>2008-06-28T09:41:24.714-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Microsoft"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>BlueScreen Saver...</title><content type='html'>This has got to be one of the funniest screen savers there ever was, BlueScreen.  Of all places, this one comes from Microsoft (&lt;a href=&quot;http://technet.microsoft.com/en-us/sysinternals/bb897558.aspx&quot;&gt;http://technet.microsoft.com/en-us/sysinternals/bb897558.aspx&lt;/a&gt;).&lt;br /&gt;&lt;br /&gt;One of the &lt;a href=&quot;http://www.lifehacker.com.au/tips/2008/04/01/top_10_harmless_geek_pranks-2.html&quot;&gt;&quot;Top 10 Harmless Geek Pranks&quot;&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;-Bob</content><link rel='replies' type='application/atom+xml' href='http://tech.justbob.us/feeds/2676822636816485592/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1583082957916736357/2676822636816485592' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/2676822636816485592'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/2676822636816485592'/><link rel='alternate' type='text/html' href='http://tech.justbob.us/2008/06/bluescreen-saver.html' title='BlueScreen Saver...'/><author><name>JustBob</name><uri>http://www.blogger.com/profile/08132115541530970900</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1583082957916736357.post-1572751021566065563</id><published>2008-06-14T22:45:00.007-05:00</published><updated>2008-12-12T01:27:04.111-06:00</updated><title type='text'>Footpeg springs for the Oset</title><content type='html'>I had enough of watching how frustrated my son got with the foot pegs on his &lt;a href=&quot;http://www.osetbikes.com/&quot;&gt;Oset&lt;/a&gt;.  Frequently, as he picked up his feet, the would brush by the foot pegs and the one (or both) of the foot pegs would stick in the folded position.  Often this would occur just as he was about to enter a section. This would cause to stop and reset the pegs before continuing.  Here&#39;s how the foot pegs look on a stock bike (click on the images for larger versions):&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqbzHwwhk022XBYBdKBP61XTTlc-iRRD2HLWko9XQRRMLMYOgBr2eMpYJTktPTnE-djT57Y8zTUm5hyphenhyphenP5ntMzcLbSl7Ecz1naGNe_E5Xy4AWLwGLpVUGlSsiLb8OIghcHia6IGsBHOau8/s1600-h/0510081645.jpg&quot;&gt;&lt;img style=&quot;float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqbzHwwhk022XBYBdKBP61XTTlc-iRRD2HLWko9XQRRMLMYOgBr2eMpYJTktPTnE-djT57Y8zTUm5hyphenhyphenP5ntMzcLbSl7Ecz1naGNe_E5Xy4AWLwGLpVUGlSsiLb8OIghcHia6IGsBHOau8/s320/0510081645.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5211951111446065378&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;p style=&quot;clear: both;&quot;&gt;Obviously, something had to be done...&lt;br /&gt;&lt;br /&gt;A trip to the hardware store was in order to find some suitable springs.  After a bit of searching, I found these:&lt;/p&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOaujVOhoRJqDGhF_bFs3kealqLFEyLrdeYU7KezyF0Uns222uLvPYDxLrk8bzT-dpHdoLyDS8QVAkTdCKp92FHSSsUv6RI0xaA7E0u4AwaLKbuSlmFs4Z55moGrq_GlBZ0HNHYNhwZbg/s1600-h/0510081647.jpg&quot;&gt;&lt;img style=&quot;float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOaujVOhoRJqDGhF_bFs3kealqLFEyLrdeYU7KezyF0Uns222uLvPYDxLrk8bzT-dpHdoLyDS8QVAkTdCKp92FHSSsUv6RI0xaA7E0u4AwaLKbuSlmFs4Z55moGrq_GlBZ0HNHYNhwZbg/s320/0510081647.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5211951506776871634&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;p style=&quot;clear: both;&quot;&gt;Back at home, it was time to figure out how to put these in place.  I started by drilling a hole in the leading edge of each foot peg (see red arrow).  The hole was just slightly large then wire diameter of the springs.  The hole positioned so that the straight part of the spring would reach to the inner end of the plate portion of the foot peg (see the yellow arrow):&lt;/p&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5RqquqbKFtJgVcLF575sFMUO_N16dzHSVGpVpFfLUYYpETFxhqJhr4A8QXhCA3_R1IgvqVfPhSxsI73DgWY9N4x9-jBZJ5A7WxzmHbEhvkXQGrfeh2YRV23XbgsFwUznhhyLDR4mrw7c/s1600-h/0510081726-1.JPG&quot;&gt;&lt;img style=&quot;float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5RqquqbKFtJgVcLF575sFMUO_N16dzHSVGpVpFfLUYYpETFxhqJhr4A8QXhCA3_R1IgvqVfPhSxsI73DgWY9N4x9-jBZJ5A7WxzmHbEhvkXQGrfeh2YRV23XbgsFwUznhhyLDR4mrw7c/s320/0510081726-1.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5211953456664033410&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;p style=&quot;clear: both;&quot;&gt;For the other end of the spring, I drilled a hole in the frame just below the foot peg mount.  To test this idea I used Ring Terminal electrical connector:&lt;/p&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLCerurxpFk5sKeDE9qoV1Zj16d9VYa8nj_4IAKeb4YHU8ehrgXnj13lPwzmHEk-rFK4S9sGyxHX3unjss837QQN0RHjdZFLbedFoBQ8f89uTBkjckx56VWPD4WduDEP5mxAxDjvve4pQ/s1600-h/u600067.jpg&quot;&gt;&lt;img style=&quot;float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLCerurxpFk5sKeDE9qoV1Zj16d9VYa8nj_4IAKeb4YHU8ehrgXnj13lPwzmHEk-rFK4S9sGyxHX3unjss837QQN0RHjdZFLbedFoBQ8f89uTBkjckx56VWPD4WduDEP5mxAxDjvve4pQ/s320/u600067.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5211955170114719106&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;p style=&quot;clear: both;&quot;&gt;I removed the insulation and threaded the other end of the spring (the end with the loop like a key ring) on to the ring terminal.  The ring portion of the ring terminal  was &quot;bolted&quot; to the frame using the hole I had drilled just below the foot peg mount.  Here are the results:&lt;/p&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7PFOwl0zOpFnY57vmDTQdRd72CUwtC4r-U3HStIUHI_5PCpHTyukmKrWAPbQgt4UQiNZ70dRmVNGCqERku5FIg-sriyTAX8DbeKefV4Jiex7hhXPwjP1kH5vgnMQ1SkWoiOaT7AuITzM/s1600-h/0510081954.jpg&quot;&gt;&lt;img style=&quot;float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7PFOwl0zOpFnY57vmDTQdRd72CUwtC4r-U3HStIUHI_5PCpHTyukmKrWAPbQgt4UQiNZ70dRmVNGCqERku5FIg-sriyTAX8DbeKefV4Jiex7hhXPwjP1kH5vgnMQ1SkWoiOaT7AuITzM/s320/0510081954.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5211955843046429634&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;p style=&quot;clear: both;&quot;&gt;This done with just a drill and common hand tools.  If had a welder, I would have welded a small loop to the frame just below the foot peg mount.  This would be much more solid than the current configuration.&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;So far, this has held up through two events.  I&#39;ve lost count on the number of time the bike has fallen over.  Only once did I have to crimp one of the ring terminals back together.&lt;br /&gt;&lt;br /&gt;Total cost: about $4.&lt;br /&gt;&lt;br /&gt;If you have any suggestions for improvements, please let me know!&lt;br /&gt;&lt;br /&gt;-Bob</content><link rel='replies' type='application/atom+xml' href='http://tech.justbob.us/feeds/1572751021566065563/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1583082957916736357/1572751021566065563' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/1572751021566065563'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/1572751021566065563'/><link rel='alternate' type='text/html' href='http://tech.justbob.us/2008/06/footpeg-springs-for-oset.html' title='Footpeg springs for the Oset'/><author><name>JustBob</name><uri>http://www.blogger.com/profile/08132115541530970900</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqbzHwwhk022XBYBdKBP61XTTlc-iRRD2HLWko9XQRRMLMYOgBr2eMpYJTktPTnE-djT57Y8zTUm5hyphenhyphenP5ntMzcLbSl7Ecz1naGNe_E5Xy4AWLwGLpVUGlSsiLb8OIghcHia6IGsBHOau8/s72-c/0510081645.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1583082957916736357.post-2376011106775122715</id><published>2008-03-26T16:26:00.003-06:00</published><updated>2008-03-26T16:32:16.443-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Robot"/><title type='text'>The BristleBot</title><content type='html'>Check this out:&lt;br /&gt;&lt;object height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/Zcgsv75TSzY&quot;&gt;&lt;param name=&quot;wmode&quot; value=&quot;transparent&quot;&gt;&lt;embed src=&quot;http://www.youtube.com/v/Zcgsv75TSzY&quot; type=&quot;application/x-shockwave-flash&quot; wmode=&quot;transparent&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;p&gt;At least a few minutes of fun...&lt;/p&gt;&lt;br /&gt;Now, where can I get a pager motor?&lt;br /&gt;&lt;br /&gt;&lt;p&gt;-Bob&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://tech.justbob.us/feeds/2376011106775122715/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1583082957916736357/2376011106775122715' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/2376011106775122715'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/2376011106775122715'/><link rel='alternate' type='text/html' href='http://tech.justbob.us/2008/03/bristlebot.html' title='The BristleBot'/><author><name>JustBob</name><uri>http://www.blogger.com/profile/08132115541530970900</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1583082957916736357.post-1661684337139378874</id><published>2008-02-29T15:46:00.001-06:00</published><updated>2008-02-29T15:48:05.524-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Stupid User Tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Tech Support"/><title type='text'>Computer Stupidities</title><content type='html'>Do you want to waste a lot of time ROTFL?  Try: &lt;a href=&quot;http://rinkworks.com/stupid/&quot;&gt;http://rinkworks.com/stupid/&lt;/a&gt;  It&#39;s a great collection of all of those IT support stories that you&#39;ve been looking for.&lt;br /&gt;&lt;br /&gt;Thanks Ron!&lt;br /&gt;&lt;br /&gt;-Bob</content><link rel='replies' type='application/atom+xml' href='http://tech.justbob.us/feeds/1661684337139378874/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1583082957916736357/1661684337139378874' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/1661684337139378874'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/1661684337139378874'/><link rel='alternate' type='text/html' href='http://tech.justbob.us/2008/02/computer-stupidities.html' title='Computer Stupidities'/><author><name>JustBob</name><uri>http://www.blogger.com/profile/08132115541530970900</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1583082957916736357.post-5025259351918629533</id><published>2008-02-29T15:42:00.002-06:00</published><updated>2008-02-29T15:44:32.151-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux vs Windows"/><title type='text'>Vomit or Linux: your choice</title><content type='html'>&lt;span class=&quot;intro&quot;&gt;&lt;blockquote&gt;&quot;Imagine standing on the road. An oncoming car is heading rapidly towards you. You have a choice to move, or to stay. Now consider that in business you need to choose a server platform wisely but often Windows shops become entrenched because it is the status quo. A couple of user experiences show why you ought to think about it more.&quot;&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;For the rest: &lt;a href=&quot;http://www.itwire.com/content/view/16891/1141/&quot;&gt;http://www.itwire.com/content/view/16891/1141/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;-Bob&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://tech.justbob.us/feeds/5025259351918629533/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1583082957916736357/5025259351918629533' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/5025259351918629533'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/5025259351918629533'/><link rel='alternate' type='text/html' href='http://tech.justbob.us/2008/02/vomit-or-linux-your-choice.html' title='Vomit or Linux: your choice'/><author><name>JustBob</name><uri>http://www.blogger.com/profile/08132115541530970900</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1583082957916736357.post-3309111180576257935</id><published>2008-02-14T23:20:00.003-06:00</published><updated>2008-02-14T23:22:29.070-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Desktop VR"/><category scheme="http://www.blogger.com/atom/ns#" term="Head Tracking"/><category scheme="http://www.blogger.com/atom/ns#" term="Wii"/><title type='text'>Head Tracking for Desktop VR Displays using the WiiRemote</title><content type='html'>Is this cool or what?&lt;br /&gt;&lt;br /&gt;-Bob&lt;br /&gt;&lt;div xmlns=&quot;http://www.w3.org/1999/xhtml&quot;&gt;&lt;p&gt;&lt;object height=&quot;350&quot; width=&quot;425&quot;&gt;&lt;param value=&quot;http://youtube.com/v/Jd3-eiid-Uw&quot; name=&quot;movie&quot;&gt;&lt;embed type=&quot;application/x-shockwave-flash&quot; src=&quot;http://youtube.com/v/Jd3-eiid-Uw&quot; height=&quot;350&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;/p&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://tech.justbob.us/feeds/3309111180576257935/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1583082957916736357/3309111180576257935' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/3309111180576257935'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/3309111180576257935'/><link rel='alternate' type='text/html' href='http://tech.justbob.us/2008/02/head-tracking-for-desktop-vr-displays.html' title='Head Tracking for Desktop VR Displays using the WiiRemote'/><author><name>JustBob</name><uri>http://www.blogger.com/profile/08132115541530970900</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1583082957916736357.post-6205081631490043611</id><published>2007-12-24T02:57:00.000-06:00</published><updated>2007-12-24T03:04:07.405-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ClamAV"/><title type='text'>backup-clamav.sh - backup ClamAV data files prior to upgrade</title><content type='html'>#!/bin/sh&lt;br /&gt;#&lt;br /&gt;# backup-clamav.sh - backup ClamAV data files&lt;br /&gt;#&lt;br /&gt;# History:&lt;br /&gt;#    2007/12/23 rwsiv1@gmail.com&lt;br /&gt;#        Created this file based on the ClamAV documentation (http://wiki.clamav.net/Main/UpgradeInstructions).&lt;br /&gt;#&lt;br /&gt;# Notes:&lt;br /&gt;#    This file can also be downloaded from: &lt;a title=&quot;backup-clamav.sh&quot; target=&quot;_blank&quot; href=&quot;http://docs.google.com/Doc?id=dgwx5z52_90ftmz92gg&quot; id=&quot;ffvt&quot;&gt;http://docs.google.com/Doc?id=dgwx5z52_90ftmz92gg&lt;/a&gt;&lt;br /&gt;#&lt;br /&gt;&lt;br /&gt;BACKUPDIR=&quot;/tmp/clamav&quot;&lt;br /&gt;TIMESTAMP=`date &#39;+%Y%m%d-%H%M%S&#39;`&lt;br /&gt;ETCDIR=&quot;/usr/local/etc/&quot;&lt;br /&gt;BACKUPETCFILE=&quot;${BACKUPDIR}/backup-etc-${TIMESTAMP}.tgz&quot;&lt;br /&gt;SIGDIR=&quot;/usr/local/share/clamav/&quot;&lt;br /&gt;BACKUPSIGFILE=&quot;${BACKUPDIR}/backup-sig-${TIMESTAMP}.tgz&quot;&lt;br /&gt;&lt;br /&gt;#&lt;br /&gt;# Functions&lt;br /&gt;#&lt;br /&gt;#       failed() - print an error message and exit.&lt;br /&gt;#               args: message [errno]&lt;br /&gt;#&lt;br /&gt;failed () {&lt;br /&gt;      EXITCODE=&quot;1&quot;&lt;br /&gt;&lt;br /&gt;      if [ -n &quot;$1&quot; ]; then&lt;br /&gt;              echo &quot;$0 - $1&quot;&lt;br /&gt;              if [ &quot;$2&quot; -gt 0 ]; then&lt;br /&gt;                      EXITCODE=&quot;$2&quot;&lt;br /&gt;              fi&lt;br /&gt;      fi&lt;br /&gt;      exit ${EXITCODE}&lt;br /&gt;}&lt;br /&gt;&lt;br /&gt;#&lt;br /&gt;# Make sure that the backup directory exists&lt;br /&gt;#&lt;br /&gt;[ -d ${BACKUPDIR} ] || mkdir ${BACKUPDIR} || failed &quot;unable to access or create ${BACKUPDIR}&quot;&lt;br /&gt;&lt;br /&gt;#&lt;br /&gt;# Backup the directories&lt;br /&gt;#&lt;br /&gt;#       etc files&lt;br /&gt;#&lt;br /&gt;cd ${ETCDIR} || failed &quot;unable to cd to ${ETCDIR}&quot;&lt;br /&gt;tar czvpf ${BACKUPETCFILE} /usr/local/etc/clam*.conf /usr/local/etc/freshclam.conf&lt;br /&gt;#&lt;br /&gt;#       signature files&lt;br /&gt;#&lt;br /&gt;cd ${SIGDIR} || failed &quot;unable to cd to ${SIGDIR}&quot;&lt;br /&gt;tar czvpf ${BACKUPSIGFILE} /usr/local/share/clamav/</content><link rel='replies' type='application/atom+xml' href='http://tech.justbob.us/feeds/6205081631490043611/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1583082957916736357/6205081631490043611' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/6205081631490043611'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/6205081631490043611'/><link rel='alternate' type='text/html' href='http://tech.justbob.us/2007/12/backup-clamavsh-backup-clamav-data.html' title='backup-clamav.sh - backup ClamAV data files prior to upgrade'/><author><name>JustBob</name><uri>http://www.blogger.com/profile/08132115541530970900</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1583082957916736357.post-7361287595993366120</id><published>2007-09-27T14:54:00.001-05:00</published><updated>2007-09-27T14:57:04.127-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="OpenDNS"/><title type='text'>Block adult sites with OpenDNS (for free!)</title><content type='html'>Do you want to block access to adult sites from your network?&amp;nbsp; Want to do it for free?&lt;br&gt; &lt;br&gt; If so, just use &lt;a href=&quot;http://www.opendns.com/&quot;&gt;OpenDNS&lt;/a&gt;.&amp;nbsp; Create yourself an account and configured your account to &quot;Block Adult Sites&quot;.&amp;nbsp; What could be easier?&lt;br&gt; &lt;br&gt; In additional to being able to block adult site, you can also block or whitelist any domain that you choose.&amp;nbsp; &lt;a  href=&quot;http://www.opendns.com/&quot;&gt;OpenDNS&lt;/a&gt; put the power in your hands.&lt;br&gt; &lt;br&gt; Can you tell I like it?&amp;nbsp; I expect that you will too!&lt;br&gt; &lt;br&gt; -Bob&lt;br&gt; &lt;br&gt; </content><link rel='replies' type='application/atom+xml' href='http://tech.justbob.us/feeds/7361287595993366120/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1583082957916736357/7361287595993366120' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/7361287595993366120'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/7361287595993366120'/><link rel='alternate' type='text/html' href='http://tech.justbob.us/2007/09/block-adult-sites-with-opendns-for-free.html' title='Block adult sites with OpenDNS (for free!)'/><author><name>JustBob</name><uri>http://www.blogger.com/profile/08132115541530970900</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1583082957916736357.post-7349082233011696229</id><published>2007-08-30T09:08:00.000-05:00</published><updated>2007-08-30T09:10:13.859-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="VMware"/><title type='text'>VMware VMX-file parameters</title><content type='html'>Today I found this site: &lt;span class=&quot;pagename&quot;&gt;&lt;a  href=&quot;http://sanbarrow.com/vmx.html&quot;&gt;VMX-file parameters&lt;/a&gt; that documents most, if not virtually all, of the VMware .vmx file parameters.&lt;br&gt; &lt;br&gt; -Bob&lt;br&gt; &lt;/span&gt;&lt;br&gt; </content><link rel='replies' type='application/atom+xml' href='http://tech.justbob.us/feeds/7349082233011696229/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1583082957916736357/7349082233011696229' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/7349082233011696229'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/7349082233011696229'/><link rel='alternate' type='text/html' href='http://tech.justbob.us/2007/08/vmware-vmx-file-parameters.html' title='VMware VMX-file parameters'/><author><name>JustBob</name><uri>http://www.blogger.com/profile/08132115541530970900</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1583082957916736357.post-8971596726762059893</id><published>2007-08-16T02:27:00.001-05:00</published><updated>2007-08-16T02:37:09.319-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tether"/><category scheme="http://www.blogger.com/atom/ns#" term="USB"/><category scheme="http://www.blogger.com/atom/ns#" term="Vista"/><category scheme="http://www.blogger.com/atom/ns#" term="XV6700"/><title type='text'>Using my XV6700 as a USB wireless modem</title><content type='html'>Tonight I was challenged with finding a way to get an Internet connection from my laptop when the DSL connection I am using (at my Dad&#39;s house) at the moment is down.&lt;br /&gt;&lt;br /&gt;At the moment I am accessing the Internet from my laptop (Vista) using my XV6700 as a wireless modem (USB connection).  It was a bit of a challenge, but, I was able to getting it working.  It much easier to establish a bluetooth connection, but, the USB connection offers much better speed.  If I were in 1X land BT would have been fine.  But, given that I have a strong EVDO signal here in KC, MO, I wanted to see how well it could run.&lt;br /&gt;&lt;br /&gt;After a bit a swapping back and forth from the BT to the USB configuration on the phone, I was able to download a couple web pages that offered up the information I needed.  &lt;a href=&quot;http://forum.brighthand.com/archive/index.php?t-222120.html&quot;&gt;http://forum.brighthand.com/archive/index.php?t-222120.html&lt;/a&gt; got me the phone configuration information that I needed .  I was able to download the USB driver I needed from &lt;a href=&quot;http://www.myehud.com/xv6600/usbmodem.html&quot;&gt;http://www.myehud.com/xv6600/usbmodem.html&lt;/a&gt;.  (I don&#39;t have the Verizon CD with me).  I was able to get the driver installed by following the instructions at &lt;a href=&quot;http://www.howardforums.com/showthread.php?threadid=1137398&quot;&gt;http://www.howardforums.com/showthread.php?threadid=1137398&lt;/a&gt;.   From there I was able to use the standard Windows Vista &quot;Connect to a Network&quot; wizard using &quot;Dial-up networking&quot; via the &quot;CMDA1X USB Modem&quot; that was created in the earlier steps.&lt;br /&gt;&lt;br /&gt;Here is the fruit of my labor: &lt;img src=&quot;http://www.speedtest.net/result/171415167.png&quot; /&gt;&lt;br /&gt;&lt;br /&gt;That image shows a very reasonable 1702 x 119 Kbps connection.  Overall, it&#39;s not nearly as responsive as the DSL connection (higher latency), but, it appears to work well enough!&lt;br /&gt;&lt;br /&gt;-Bob</content><link rel='replies' type='application/atom+xml' href='http://tech.justbob.us/feeds/8971596726762059893/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1583082957916736357/8971596726762059893' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/8971596726762059893'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/8971596726762059893'/><link rel='alternate' type='text/html' href='http://tech.justbob.us/2007/08/using-my-xv6700-as-usb-wireless-modem.html' title='Using my XV6700 as a USB wireless modem'/><author><name>JustBob</name><uri>http://www.blogger.com/profile/08132115541530970900</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1583082957916736357.post-5405662063648977410</id><published>2007-06-20T16:56:00.001-05:00</published><updated>2007-06-20T16:59:18.741-05:00</updated><title type='text'>Apache and Subversion authentication with Microsoft Active Directory</title><content type='html'>Here is a good article on how to integrate Active Directory authentication with Apache:&lt;br /&gt;&lt;a href=&quot;http://www.jejik.com/articles/2007/06/apache_and_subversion_authentication_with_microsoft_active_directory/&quot;&gt;http://www.jejik.com/articles/2007/06/apache_and_subversion_authentication_with_microsoft_active_directory/&lt;/a&gt;&lt;p&gt;Of course, the first thing that must be done is getting past the pain of dealing with Active Directory.  It pays off in the end when you have a well integrated system that &quot;just works&quot;.&lt;/p&gt;&lt;p&gt;-Bob&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://tech.justbob.us/feeds/5405662063648977410/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1583082957916736357/5405662063648977410' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/5405662063648977410'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/5405662063648977410'/><link rel='alternate' type='text/html' href='http://tech.justbob.us/2007/06/apache-and-subversion-authentication.html' title='Apache and Subversion authentication with Microsoft Active Directory'/><author><name>JustBob</name><uri>http://www.blogger.com/profile/08132115541530970900</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1583082957916736357.post-3091132344215305674</id><published>2007-05-25T08:11:00.000-05:00</published><updated>2007-05-25T08:14:54.774-05:00</updated><title type='text'>Please explain why the Jeopardy Style of e-mail composition is a &quot;good thing&quot;</title><content type='html'>I don&#39;t understand this, please help me out.&amp;nbsp; To me, the Jeopardy Style of e-mail composition, made popular by Microsoft, is a mess.&amp;nbsp; Imagine trying to tell a new user how to read an e-mail.&amp;nbsp; I envision it would go something like this:&lt;br&gt; &lt;br&gt; &lt;ol&gt;   &lt;li&gt;Go to the bottom of the e-mail.&lt;/li&gt;   &lt;li&gt;Find the beginning of the first e-mail.&lt;/li&gt;   &lt;li&gt;Read the first e-mail.&lt;/li&gt;   &lt;li&gt;Working your way back up, find the beginning of the first reply.&lt;/li&gt;   &lt;li&gt;Read the reply.&lt;/li&gt;   &lt;li&gt;Continue the process of moving up and down throughout the e-mail and it&#39;s replies until you have read everything in the order that it was originally written.&lt;/li&gt; &lt;/ol&gt; &lt;br&gt; Replying to an e-mail would go something like this:&lt;br&gt; &lt;ol&gt;   &lt;li&gt;Try to remember everything you had read before (see previous steps).&lt;/li&gt;   &lt;li&gt;Try to compose your reply in such a fashion that it might be understood without the context added by all of the previous content.&lt;/li&gt;   &lt;li&gt;Of course, all of the previous content, including signatures and disclaimers from previous senders, is included below your message, in reverse chronological order.&lt;/li&gt; &lt;/ol&gt; &lt;br&gt; Please, please help me understand why this is a &quot;good thing&quot;?&amp;nbsp; Or, is virtually everyone just a Lemming that is following the other Lemmings, not knowing why?&lt;br&gt; &lt;br&gt; -Bob&lt;br&gt; &lt;br&gt;</content><link rel='replies' type='application/atom+xml' href='http://tech.justbob.us/feeds/3091132344215305674/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1583082957916736357/3091132344215305674' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/3091132344215305674'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/3091132344215305674'/><link rel='alternate' type='text/html' href='http://tech.justbob.us/2007/05/please-explain-why-jeopardy-style-of-e.html' title='Please explain why the Jeopardy Style of e-mail composition is a &quot;good thing&quot;'/><author><name>JustBob</name><uri>http://www.blogger.com/profile/08132115541530970900</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1583082957916736357.post-1848135228176696472</id><published>2007-05-25T02:44:00.001-05:00</published><updated>2007-05-25T02:45:49.280-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ssh"/><title type='text'>MORE THAN I EVER WANTED TO KNOW ABOUT CHROOT JAILS</title><content type='html'>&amp;quot;The idea is that the customers need to upload content to our content &lt;br&gt;server, but we want to do it in a secure and private way.  Customer One &lt;br&gt;should not be able to see Customer Two, for example. And neither &lt;br&gt;customer should be able to do anything that might damage the server in &lt;br&gt;any way.&amp;quot;&lt;p&gt;COMPLETE STORY:&lt;p&gt;&lt;a href=&quot;http://nl.internet.com/ct.html?rtr=on&amp;amp;s=1,37f1,1,4j30,gy0r,ct5s,55dr&quot;&gt;http://nl.internet.com/ct.html?rtr=on&amp;amp;s=1,37f1,1,4j30,gy0r,ct5s,55dr&lt;/a&gt;&lt;p&gt;-Bob</content><link rel='replies' type='application/atom+xml' href='http://tech.justbob.us/feeds/1848135228176696472/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1583082957916736357/1848135228176696472' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/1848135228176696472'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/1848135228176696472'/><link rel='alternate' type='text/html' href='http://tech.justbob.us/2007/05/more-than-i-ever-wanted-to-know-about.html' title='MORE THAN I EVER WANTED TO KNOW ABOUT CHROOT JAILS'/><author><name>JustBob</name><uri>http://www.blogger.com/profile/08132115541530970900</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1583082957916736357.post-7403715163250858435</id><published>2007-05-25T02:31:00.001-05:00</published><updated>2007-05-25T02:32:54.743-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Ticketing"/><title type='text'>RT SCRATCHES A TROUBLE-TICKETING ITCH</title><content type='html'>&amp;quot;Much available help desk software is quite bland, with two exceptions: &lt;br&gt;open source RT and the more corporate Remedy Help Desk. The two have &lt;br&gt;quite different goals, but they both do one common thing: track trouble &lt;br&gt;tickets. The question is, which one will meet your needs?&amp;quot;&lt;p&gt;COMPLETE STORY:&lt;p&gt;&lt;a href=&quot;http://nl.internet.com/ct.html?rtr=on&amp;amp;s=1,37f1,1,6dr4,1ox6,ct5s,55dr&quot;&gt;http://nl.internet.com/ct.html?rtr=on&amp;amp;s=1,37f1,1,6dr4,1ox6,ct5s,55dr&lt;/a&gt;&lt;p&gt;-Bob</content><link rel='replies' type='application/atom+xml' href='http://tech.justbob.us/feeds/7403715163250858435/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1583082957916736357/7403715163250858435' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/7403715163250858435'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/7403715163250858435'/><link rel='alternate' type='text/html' href='http://tech.justbob.us/2007/05/rt-scratches-trouble-ticketing-itch.html' title='RT SCRATCHES A TROUBLE-TICKETING ITCH'/><author><name>JustBob</name><uri>http://www.blogger.com/profile/08132115541530970900</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1583082957916736357.post-2519849477827284442</id><published>2007-05-25T02:28:00.001-05:00</published><updated>2007-05-25T02:33:04.155-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Remote access"/><title type='text'>HOW TO SECURE VNC REMOTE ACCESS WITH TWO-FACTOR AUTHENTICATION</title><content type='html'>&amp;quot;VNC is the most popular remote access solution today. However, it was &lt;br&gt;developed to provide remote access, not to provide secure remote access.&amp;quot;&lt;p&gt;COMPLETE STORY:&lt;p&gt;&lt;a href=&quot;http://nl.internet.com/ct.html?rtr=on&amp;amp;s=1,37f1,1,4nw,34ga,ct5s,55dr&quot;&gt;http://nl.internet.com/ct.html?rtr=on&amp;amp;s=1,37f1,1,4nw,34ga,ct5s,55dr&lt;/a&gt;&lt;p&gt;-Bob</content><link rel='replies' type='application/atom+xml' href='http://tech.justbob.us/feeds/2519849477827284442/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1583082957916736357/2519849477827284442' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/2519849477827284442'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1583082957916736357/posts/default/2519849477827284442'/><link rel='alternate' type='text/html' href='http://tech.justbob.us/2007/05/how-to-secure-vnc-remote-access-with.html' title='HOW TO SECURE VNC REMOTE ACCESS WITH TWO-FACTOR AUTHENTICATION'/><author><name>JustBob</name><uri>http://www.blogger.com/profile/08132115541530970900</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>