Jump to content

Tux of Borg

Community Member
  • Posts

    3,598
  • Joined

  • Last visited

Everything posted by Tux of Borg

  1. How many championships has he won without shaq?
  2. Here = Where Hear = Ear Now go eat a Vick
  3. All we need now is some paraplegic cheerleaders.
  4. Why not share... everybody should have a set of blueprints for missiles, stealth bombers and satellite systems.
  5. http://i-newswire.com/pr54269.html (I-Newswire) - City of Shaker Heights, OHIO - ( Jan 17, 2006 ) Following a health trend that appears to be brewing up all over the nation, Mayor Judith Rawson has signed a proclamation for the City of Shaker Heights that addresses the issues regarding caffeine intoxication and dependency. In the proclamation the Mayor is "calling upon all Shaker Heights citizens, public and private institutions, business and schools to increase awareness and understanding of the consequences of caffeine consumption." The proclamation also spells out many dangers of caffeine abuse such as heart disease, pancreas and bladder cancer, hypoglycemia, and central nervous system disorders. By getting the word out about the serious dangers of caffeine, Mayor Rawson hopes to prevent a substance that can "pose a significant hazard to health and longevity." City of Shaker Heights is one of several cities across the country recognizing this annual event. This will be the third year for this event which is sponsored by the Caffeine Awareness Alliance, a non-profit organization. Marina Kushner, founder, states, "Each year more and more people are waking up to the real truth about the dangers of this ubiquitous drug. We are delighted that the mayor has recognized that this is not a laughing matter." Prior years have seen ways of celebrating this event ranging from educational events in school to even picketing outside coffee houses, "During this month, we hope to reach out to educate business and consumers about the risk associated with caffeine dependency and to raise awareness about the impact it has on our society" says Kushner. Kushner is an authority on the subject. She delves into both the physical and psychological dangers that caffeine can cause in her new book called "The Truth About Caffeine". In addition to the book, she has developed a line of caffeine-free coffee replacements called Soyfee, made from 100% organic soybeans. Soy has been shown to help lower cholesterol, fight heart disease and promote strong bones. For further information on the popular product please visit www.soycoffee.com. For more information about National Caffeine Awareness Month, please visit the website www.CaffeineAwareness.org or contact Marina Kushner at ( 815 ) 572-8007.
  6. link Smash and grab, the hi-tech way Last year, parliament nearly fell victim to a sophisticated hacking fraud. Experts are convinced that such attacks have the support of Chinese authorities Peter Warren Thursday January 19, 2006 The Guardian As they packed their briefcases for the Christmas break, MPs in Westminster were unaware they had been the targets of one of the most audacious hacking attempts ever mounted. The Guardian has learned that the oldest modern democracy came under a sustained attack aimed at stealing sensitive information. It was launched by cyber criminals almost certainly operating in the world's next superpower, China. The hi-tech industrial espionage involved a series of innocuous-looking emails targeted at secretaries, researchers, parliamentary staff and even MPs themselves. Each one was specifically tailored to the individual who would receive it. Once opened, these emails tried to download sophisticated spyware that hunts through the recipient's computer and network for potentially valuable documents, which would be automatically sent back to the hackers without the user's knowledge. Fortunately, the attack, which took place earlier in 2005, was thwarted by parliament's sophisticated internet security system; no sensitive data is thought to have been lost. Instead, the Commons' IT security staff immediately alerted the UK's National Infrastructure Security Co-ordination Centre (NISCC), a powerful organisation linked to MI5 that is responsible for protecting the UK's critical information systems. Security experts set up an exercise to monitor the attacks, and immediately realised the hackers were well resourced. "These were not normal hackers," said a source close to the NISCC. "The degree of sophistication was extremely high. They were very clever programmers." A spokesman for the Home Office would only say: "We do not comment on security matters, but have had discussions with many governments and computer emergency response teams from around the world on this problem." According to research by US investigators, the hackers are thought to have been based in the Guangdong province in southern China. British and US security experts believe the hackers are working with the tacit approval - or possibly even direct support - of authorities in the People's Republic of China and are attempting to acquire western technology in a massive hit and run raid on the world's intellectual property to aid their booming economic growth. A spokesman for the Chinese government said: "If there are such allegations then it is subject to further investigation." A wakeup call Commodore Patrick Tyrrell, the UK's first director of information warfare, warned about the likelihood of such an attack nearly 10 years ago. He believes the attack is a wakeup call to the government. "This could certainly be seen as a provocative act. Up until now, governments have not set much store by information," says Commodore Tyrrell, now managing director of the computer company Vale Atlantic. "The government has to take seriously the way [this kind of attack] is developing." The attack on the Commons may be the most eye-catching attack from Chinese-based hackers, but is certainly not unique. According to a spokesman for MessageLabs, the company responsible for filtering malicious email from government networks, similar spy emails - called "targeted Trojans' - were noticed about 18 months ago. "There were not very many, maybe one every two months, but now they are coming in at the rate of one to two a week," said Maksym Schipka, MessageLab's senior anti-virus researcher. Last June, the government sent out a warning in which Roger Cummings, the head of NISCC, spoke about the threat of attacks from far eastern gangs on the UK critical national infrastructure (CNI) - the key network of transport, energy, financial, telecommunication and government organisations. At the end of November, Cummings warned that targeted Trojans from foreign powers were a significant threat. In mid-December, the Cabinet Office - which has overall responsibility for ministries - joined in the chorus at a conference at Glamorgan University. Senior civil servant Harvey Mattison, the head of accreditation for the Cabinet Office's Central Sponsor of Information Assurance, the unit responsible for protecting communications between government departments, gave a keynote address on the threat from the far east. "We were given the impression it was coming from one ISP in Guangdong," said a delegate. Mattison declined to comment except to say that his address was based on details from the NISCC alert. Britain is not the only country targeted. Key parts of the US have been targeted by far eastern hackers for up to five years. Some of the attacks - codenamed Titan Rain - have been traced to just 20 workstations and three routers in Guangdong. Alan Paller, head of the Sans Institute, the US's top computer crime fighting organisation, has stated categorically that the attacks emanate from the People's Republic. He points to attacks in November 2004, during which hackers grabbed thousands of sensitive documents. The hackers stashed the stolen files in zombie servers in South Korea, before sending them back to Guangdong. In one, a researcher found a stockpile of aerospace documents with hundreds of detailed schematics about propulsion systems, solar paneling and fuel tanks for the Mars Reconnaissance Orbiter, the Nasa probe launched in August. On one night alone they copied a huge collection of files that had been stolen from the Redstone Arsenal, home to the US army's Aviation and Missile Command in Alabama. The attackers had grabbed specifications for the aviation mission-planning system for army helicopters, as well as Falconview 3.2, the flight-planning software used by the army and air force. For six hours the gang skipped through the computers of Redstone, the army's Information Systems Engineering Command in Arizona, the Defense Information Systems Agency, Naval Ocean System Center in San Diego and the Space and Missile Defense Acquisition Center in Alabama. "Of course it's the [Chinese] government [that receives this information]. Governments will pay anything for control of other governments' computers," said Paller. Other clues - such as the focus on economic espionage - suggest the attacks are not the work of run-of-the-mill hackers. Computer criminals usually seek a quick turnaround of funds and an easy escape route. But economic secrets do not always have a ready cash market. Sources involved in tracking down the gang say the Chinese group is just one of a number of organised groups around the world that are involved in a hi-tech crime wave, some working for governments, others highly organised criminal gangs. "We have seen three attacks a day from this group in the past week and there are a lot of other groups out there," said the source. "You could say that the iceberg is now in view." Privately, UK civil servants familiar with NISCC's investigation agree that the attacks on the UK and US are coming from China. This almost certainly means some state sanction or involvement - perhaps even a "shopping list" of requirements. Some of the attacks have been aimed at parts of the UK government dealing with human rights issues - "a very odd target", according to one UK security source. There is another, more compelling reason. "Hacking in China carries the death penalty," says Professor Neil Barrett, of the Royal Military College at Shrivenham. "You also have to sign on with the police if you want to use the internet. And then there is the Great Firewall of China, which lets very little through - and lets [the Chinese government] know exactly what is happening." The internet traffic to the UK, and its origin, would all be visible to the Chinese government. Finding the culprits would, in theory, be a simple process. Sophisticated attacks While the Chinese embassy confirmed that hacking carries the death penalty, a spokesman denied that registration with the police was necessary: "The same permission as for a telephone relates to the internet. You simply have to apply to a service provider." Another clue is the sophistication and cost of organising the attacks. MessageLab's Schipka thinks such a scale required the resources of a very large company. "Either that, or a lot of small organisations are cooperating to help someone but the way these are done is spotless." "Whoever is doing this is well-funded," said Dr Andrew Blyth, head of computer forensics at Glamorgan University. "They are not only able to develop sophisticated software but have also been able to develop websites that people are directed to by emails. These sites then corrupt their web browsers - it is very sophisticated stuff and it costs money to be able to mount an operation of this complexity." In the attacks, each individual receiving the emails and the organisation's IT structure are meticulously researched. The Trojan emails are designed to appeal uniquely to victims. "One email was targeted at one company in aviation. It was a Word document that had a Math/cad component. If you did not have math/cad on your computer it would not open," says Schipka. "The point was to find documents that had been written in that particular program and then send them back." Meanwhile, the Sans Institute has raised the idea that the Titan Rain attacks might even have a military origin. In the two-and-a-half years of investigation, the hackers never made a mistake. "It was like being against a master chess player except he was running around between different terminals in different locations," said Alan Paller, of Sans. "There was a level of care and consistency behind this that has to indicate a military operation." Intriguingly, the Pentagon in its annual report of the military power of the People's Republic of China, published on July 28 last year, noted the development of computer attack systems by China's military, adding that the People's Liberation army (PLA) regards computer network operations as being "critical to seize the initiative" in establishing "electromagnetic dominance" at the start of a battle. The report added: "Although initial training efforts [by the PLA] focused on increasing the PLA's proficiency in defensive measures, recent exercises have incorporated offensive operations, primarily as first strikes against enemy networks." Industrial espionage via computers is not new. In 1989, for example, German hackers from the Chaos Computer Club stole secrets from western defence companies and sold them to the KGB. However, the sheer scale of the recent attacks have set alarm bells ringing in security circles around the western world; at the very least they ought to give MPs something to think about when they switch on their computers each morning.
  7. Hey, hey, hey... lay off the car! I've seen Grease, having a cool car back then is just as important as it is today. Damn a 19 year old daughter... no wonder you're bald. My brother's oldest is 8 and he has quite the receding hairline. Unlike his older brother who still has all his hair EDIT: Check out this new pic! http://eviscero.net/images/beer1.jpg
  8. You're working on your masters and you can't figure this out for yourself. Go to !@#$in Walmart and get a 2nd set of keys made.
  9. Someone made a photoshop videos of those guys. NSFW http://video.google.com/videoplay?docid=-1...8846000620770&q
  10. Atlanta wants to interview him for their OC job.
  11. I noticed that they both use the same naughty words after they miss a kick.
  12. Pete: Was it over when the Germans bombed Pearl Harbor? Hell no! Otter: [whispering] Germans? Boon: Forget it, he's rolling.
  13. I thought you were going to retire at 15,000.
  14. "The lack of girls in this pic is not surprising." I made it to page 4 before I had to stop to get fresh air.
  15. There are unconfirmed reports that bin Laden died last month in Iran. Not that it matters, al Qaeda is going to be around for a long time.
  16. I doubt if he would want to come to Buffalo.
  17. I wished they played each other every year.
  18. Dec. 23, 1944 - "Battle of the Bulge" - An entire U.S. armored division was retreating from the Germans in the Ardennes forest when a sergeant in a tank destroyer spotted an American digging a foxhole. The GI, PFC Martin, 325th Glider Infantry Regiment, looked up and asked, "Are you looking for a safe place?" "Yeah" answered the tanker. "Well, buddy," he drawled, "just pull your vehicle behind me... I'm the 82nd Airborne, and this is as far as the bastards are going."
  19. This article/video is a couple of months old but is still worth posting. Video: mms://wm.gannett.speedera.net/wm.gannett/atpco/071505sniper.wmv
  20. http://msn.foxsports.com/nfl/story/5215140 Brees: Chargers want to pursue long-term deal / Associated Press Posted: 5 hours ago SAN DIEGO (AP) - Drew Brees let the secret slip - the San Diego Chargers would like to sign him to a long-term deal. Brees was discussing his shoulder surgery and rehab during a conference call with San Diego reporters on Wednesday when he was asked if the team had told him anything about his future. "They want to pursue me long-term," Brees said from Birmingham, Ala. "I know that's something that for the next few months everybody's going to be working on. As far as what's going on up to this point, it's not much, just the very beginning stages. I know they want me long-term and I want to be here long-term." General manager A.J. Smith, who's always tightlipped about player transactions, at first refused to confirm that he or anyone else from the front office told Brees that. "We don't have any comment on our business until we're complete with our business," Smith told The Associated Press. Brees' agent, Tom Condon, said he hadn't heard from the Chargers. "I know that Drew told me that, but I've had no conversations with the Chargers," Condon said. A few hours later, Smith called reporters back to confirm what Brees said. "We are going to try to long-term him," Smith said. "We originally wanted to do this in early February, but I guess Drew was just answering the question honestly." Smith said he called Brees last Wednesday, a day before the quarterback had his torn right labrum repaired by Dr. James Andrews in Birmingham. "I just felt it was the perfect time to rest his mind that we were going to try to get a long-term deal done, and for him not to worry about it," Smith said. "I told him to just rehab, get better and lead us to a championship. And he said, 'Fine.' " Brees played last season under a one-year, $8 million contract as the team's "franchise" player. Smith stressed that the two sides still must negotiate a deal. If the Chargers and Condon haven't agreed to a contract by Feb. 23 - well before the quarterback is throwing again - the Chargers can retain Brees' rights by using the franchise tag again, or make him the transition player. As the franchise player, Brees would get a one-year deal that would pay him the average of the five highest-paid quarterbacks, or just less than $10 million. If he's the transition player, he'd be paid the average of the 10 highest-paid quarterbacks. The Chargers and Brees could continue to negotiate a long-term deal even if the team makes him the franchise or transition player. "I would assume it would be pretty soon, obviously, because they probably want to get it done as soon as possible," Brees said. "With free agency coming up in March, the franchise-tag deadline in late February, I'm sure that that's something that's probably a big priority." Condon also represents star running back LaDainian Tomlinson and coach Marty Schottenheimer, increasing the chances a deal would get done before the Feb. 23 deadline. If not, though, Brees could also negotiate with other teams. However, the Chargers could match any offers he received. The Chargers gave Tomlinson a deal worth approximately $60 million in August 2004, making him the NFL's highest-paid running back. Backup quarterback Philip Rivers has pocketed more than $14.25 million while playing sparingly the last two seasons. He still has four years left on his contract, which is potentially worth $40.5 million. The Chargers have said that they will have enough room under the salary cap to carry Brees and Rivers again next year. Brees was hurt in a home loss to the Denver Broncos on Dec. 31 when he tried to recover his fumble and Broncos tackle Gerard Warren landed on him. He tore the labrum in his throwing shoulder, which was dislocated. Brees will remain in Birmingham for the next few weeks. He originally anticipated a four-month rehab, which would have had him ready for minicamp. Now he hopes to be ready by the start of training camp in late July. "Even when you come back throwing, it's a long process just to get your arm to where you have the endurance, and you gradually work from throwing 5 yards to 10 yards," Brees said. "Even once I start throwing, it's still probably two more months or so before I start throwing routes, deep passes and all that stuff, but it's a process. "I'd love to be throwing in May, and we'll see how this whole thing goes. But really, the most important thing for me is to be ready by training camp." The Chargers (9-7) missed the playoffs for the ninth time in 10 seasons.
  21. I read this rumor on the Texans message board about a week ago. Has it been confirmed by anyone yet?
  22. Changes I would make. 1 - No fair catch (but allow the 5 yards) 2 - The muffed punt rule, the team recovering should be able to advance it 3 - If the QB is going to run, he is going to get hit (no slide rule) 4 - Get rid of the Tuck Rule 5 - No down by contact rule 6 - The booth can initiate a challenge any time in the game so a team does not have to waste there's on obvious mistakes. 7 - Both teams get a shot in OT 8 - Use hot chicks in bikinis (where it's warm) to judge the field goals.
  23. USC and NE don't get any respect.
×
×
  • Create New...