tag:blogger.com,1999:blog-50132992837670986302024-03-05T20:59:49.721-08:00West chester public affairsAnonymoushttp://www.blogger.com/profile/08811822556440072470noreply@blogger.comBlogger2323125tag:blogger.com,1999:blog-5013299283767098630.post-54891288918116986872013-07-11T05:09:00.000-07:002013-07-11T12:16:29.980-07:00Reviewing Your PC SecurityIt seems dozens of times a year a friend or co-worker asks me to "fix" their PC. This is because generally users of personal computers do not care about how secure their home computers (and laptops) actually are. I believe that this is because the majority of home computer users are unaware of how vulnerable they are to hackers, or how their personal information can be misused. It is, widely and mistakenly, believed that if a mere antivirus is installed, computers are secure. People assume their Antivirus can protect them against all forms of malware, be it a virus, worm, or a Trojan horse. This, however, is far from the reality. Antivirus programs <strong>cannot</strong> be relied on <em>solely</em> to protect your data and information from hackers. <br /><br /><strong>Here is the Basic Question. Why is it so important to keep your PC secure?</strong><br /><br />An ordinary person may have no reason to believe why his computer and data may be hacked into, and no knowledge whatsoever of how his personal information might be misused. An unsecured computer over the internet is immensely risky. Your personal information can be altered and abused if your PC security is compromised. Your personal details, such as your Social Security number, credit card numbers, bank and utility account numbers can all be used to access your savings or to open new bank accounts under your name which, consequently may be used for serious crimes such as money laundering or fraud, or simply for stealing your money. <br /><br /><strong>There are some very basic & long standing things you can do. <em>What are they?</em></strong><br /><br />There are a number of ways to make sure your PC, and as a result your personal information, is protected properly. First and foremost, reliable anti-virus software must be installed and regularly updated. These are compared to “flu shots,” because they only protect you to a certain extent. Then, you must refrain from opening emails or attachments from people or sources you do not know personally. Take care while opening attachments even from people you know if it is unexpected.<br /><br /><strong>If you want to take same extra steps to protect your PC, <em>Try This</em>.</strong><br /><br />You must use firewalls to ensure that the ports you are not using are closed off and cannot be used unless you need them. The security updates and ‘patches’ on your operating system and all other software must be kept up to date. All your passwords should be strong, at least eight characters long, and preferably an amalgam of upper and lower case letters and numbers. Keep your PC disconnected from the internet when you are not using it, and keep from sharing access to your computer with people you do not know- sharing files on online servers is very risky. To be even safer, make regular backups of all your data on disks or CDs.Anonymoushttp://www.blogger.com/profile/08811822556440072470noreply@blogger.com0tag:blogger.com,1999:blog-5013299283767098630.post-61926308408588101612013-07-10T09:33:00.000-07:002013-07-11T12:16:30.060-07:00Windows Under The DomeOk maybe it's not just me who has high hopes for Microsoft's Windows Phone. I suggest this because of the new mini-series, <strong>“Under the Dome”. </strong>This new series from CBS follows a group of people suddenly cut off from the rest of the world after an indestructible invisible dome suddenly surrounds their town began airing this summer.<br /><br />The show is classified as sci-fi/horror and watching part 3 this week I had to do a double take several times as Windows phones and Windows tablets were on display and being used by many of the characters.<br /><br /><table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVbdf9OVQHN6gCPtHFCVZty2LUttxlmvtGCyeKVvGG7Ms8Sayka6j-oswQ8RLznt4CUj0WoKuV-1iIJLtG4lsUnSA_qMfKcFrSMeyz1fgvaeKZkmuilnCCdhU7TwIVqXxjXIBfUpiamNt3/s1600/Under_Dome_Lumia_920_Screen.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="220" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVbdf9OVQHN6gCPtHFCVZty2LUttxlmvtGCyeKVvGG7Ms8Sayka6j-oswQ8RLznt4CUj0WoKuV-1iIJLtG4lsUnSA_qMfKcFrSMeyz1fgvaeKZkmuilnCCdhU7TwIVqXxjXIBfUpiamNt3/s320/Under_Dome_Lumia_920_Screen.jpg" width="320" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">Hey, that's a Windows Nokia Lumia 920 being charged!</td></tr></tbody></table><br />In this week's episode (part 3), Microsoft clearly got under the dome as a few products suddenly showed up in the town, mostly in the youth’s hands. We saw two Nokia Lumia 920s (one white, one red) and even a few Microsoft Surfaces being used by the teens in the scene where they all use a generator to re-charge their devices. The best is probably seeing the Surface being swiped back and forth on the Start screen, which is just kind of fun.<br /><br /><table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYRqjJQVBRcKoHbTq7KWQZfWnLthQc5yN9JSyR1yCZqUozRnW882wwsOiw18U0kA2ILdEQptlgX470t_62SpnQ2vW7Wje7oZrF9O6hNraYzw5AOpU7bhCf5lbKilovhA9VJH1crmenBelH/s1600/Under_Dome_Lumia_Surface.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="195" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYRqjJQVBRcKoHbTq7KWQZfWnLthQc5yN9JSyR1yCZqUozRnW882wwsOiw18U0kA2ILdEQptlgX470t_62SpnQ2vW7Wje7oZrF9O6hNraYzw5AOpU7bhCf5lbKilovhA9VJH1crmenBelH/s320/Under_Dome_Lumia_Surface.jpg" width="320" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">A Microsoft Surface Table appears Under the Dome.</td></tr></tbody></table><br />Does this kind of hidden placement really help? Well it can't hurt that's for sure. Microsoft has been working very hard this past year in an attempt to gather some buzz and the "cool" factor. I believe there is a good chance that this sort of product placement will indeed help increase Microsoft's product share, which has been improving regularly, if not slowly recently. <br /><br />I am not sure how I actually feel about this new series after 3 episodes but at least the residents are using something other than Android & Apple.Anonymoushttp://www.blogger.com/profile/08811822556440072470noreply@blogger.com3tag:blogger.com,1999:blog-5013299283767098630.post-17612926135912002422013-07-09T18:17:00.000-07:002013-07-11T12:16:30.084-07:00Android Users Beware<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmfvXwuXe9HGYvXaZotpt4CSDkBMO2C1dSroD3IN-E6vM4ZQ-kuI-3HUd5ubXUn4mj4Tpv1po3PhJKhraaN481XVfVLXl0ZQLK1B1K5MXm-6_51s0f_uko9CmeRLWiqJ9cSZ8pRAhaR8T_/s1600/android-malware.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmfvXwuXe9HGYvXaZotpt4CSDkBMO2C1dSroD3IN-E6vM4ZQ-kuI-3HUd5ubXUn4mj4Tpv1po3PhJKhraaN481XVfVLXl0ZQLK1B1K5MXm-6_51s0f_uko9CmeRLWiqJ9cSZ8pRAhaR8T_/s200/android-malware.jpg" width="194" /></a><br />It is stories like this that make me glad I am a Windows Phone user. <br /><br />It was recently discovered that Android has had a <strong>major security hole</strong> since version 1.6, which allowed hackers to modify almost any Play Store app and turn it malicious without tripping the built-in security measures. The good news for Android users is that the that hole has already been plugged and the fix has been sent out to OEMs (Google was made aware of the issue in February, so it has had time to fix it).<br /><br />Google claims that it has not seen any app from the Play Store (or other app stores for that matter) that have been affected by this vulnerability. <br /><span id="more-51533"></span><br />The Play Store itself scans the apps it offers and the Verify App feature (new in 4.2) scans all apps (even if you installed them from elsewhere).<br /><br />Samsung and some other OEMs are reportedly already shipping devices that contain the fix. Current devices will have to wait for an update, which has an uncertain timeframe as it depends on OEMs and then carriers to push it out.<br /><br />As with anything else, be cautious of what you download, not only on your PC, but on your mobile devices as well. Anonymoushttp://www.blogger.com/profile/08811822556440072470noreply@blogger.com0tag:blogger.com,1999:blog-5013299283767098630.post-72682490234985383392013-07-09T12:21:00.000-07:002013-07-11T12:16:30.109-07:00Alert (TA13-190A)<strong>United States Computer Emergency Readiness Team</strong><br /><br />US-CERT’s mission is to improve the nation's cybersecurity posture, coordinate cyber information sharing, and proactively manage cyber risks to the nation while protecting the constitutional rights of Americans. US-CERT's vision is to be a trusted global leader in cybersecurity — collaborative, agile, and responsive in a complex environment.<br /><br />As a public service the West Chester Technology Blog will forward alerts issued by US-CERT.<br /><br /><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFE4Z79n4aNxEXRoAIu9TvbCEy90M4pWvObTc7B-DQSx-1-2L7JfcLX3GoFcIdnhvRHb7uvXgC0L6XbEAYNjHDAVijUa4qbpy2BrUKJIBkvjDIvJT2jJeREOh6XvGIxujJ0ShJ0n-asgA7/s1600/compatibletitlebar.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="44" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFE4Z79n4aNxEXRoAIu9TvbCEy90M4pWvObTc7B-DQSx-1-2L7JfcLX3GoFcIdnhvRHb7uvXgC0L6XbEAYNjHDAVijUa4qbpy2BrUKJIBkvjDIvJT2jJeREOh6XvGIxujJ0ShJ0n-asgA7/s320/compatibletitlebar.jpg" width="320" /></a></div><h3>Microsoft Updates for Multiple Vulnerabilities</h3><h3> </h3><h3>Systems Affected</h3><div class="field field-name-field-alert-systems-affected field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><ul><li><span face="">Microsoft Windows</span></li><li><span face="">Microsoft .NET Framework</span></li><li><span face="">Microsoft Silverlight</span></li><li><span face="">Microsoft Office</span></li><li><span face="">Microsoft Visual Studio</span></li><li><span face="">Microsoft Lync</span></li><li><span face="">Internet Explorer</span></li><li><span face="">Windows Defender </span></li></ul></div></div></div><a href="http://www.blogger.com/null" id="overview"></a> <br /><h3>Overview</h3><div class="field field-name-field-alert-overview field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even">Select Microsoft software products contain multiple vulnerabilities. Microsoft has released updates to address these vulnerabilities.</div></div></div><a href="http://www.blogger.com/null" id="description"></a> <br /><h3>Description</h3><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even">The <a href="https://www.us-cert.gov/redirect?url=http%3A%2F%2Ftechnet.microsoft.com%2Fen-us%2Fsecurity%2Fbulletin%2Fms13-jul" target="_blank">Microsoft Security Bulletin Summary for July 2013</a> describes multiple vulnerabilities in Microsoft software. Microsoft has released updates to address these vulnerabilities.</div></div></div> <br /><h3>Impact</h3><div class="field field-name-field-alert-impact field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even">These vulnerabilities could allow remote code execution or elevation of privilege.</div></div></div><a href="http://www.blogger.com/null" id="solution"></a> <br /><h3>Solution</h3><div class="field field-name-field-alert-solution field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><strong>Apply Updates</strong><br />Microsoft has provided updates for these vulnerabilities in the <a href="https://www.us-cert.gov/redirect?url=http%3A%2F%2Ftechnet.microsoft.com%2Fen-us%2Fsecurity%2Fbulletin%2Fms13-jul" target="_blank">Microsoft Security Bulletin Summary for July 2013</a>, which describes any known issues related to the updates. Administrators are encouraged to note these issues and test for any potentially adverse effects. In addition, administrators should consider using an automated update distribution system such as <a href="http://www.us-cert.gov/redirect?url=http%3A%2F%2Ftechnet.microsoft.com%2Fen-us%2Fwsus%2Fdefault.aspx" target="_blank">Windows Server Update Services</a> (WSUS). Home users are encouraged to enable <a href="http://www.us-cert.gov/redirect?url=http%3A%2F%2Fwindows.microsoft.com%2Fen-us%2Fwindows-vista%2FTurn-automatic-updating-on-or-off" target="_blank">automatic updates</a>.</div></div></div>Anonymoushttp://www.blogger.com/profile/08811822556440072470noreply@blogger.com0tag:blogger.com,1999:blog-5013299283767098630.post-17710215118573002952013-07-09T09:49:00.000-07:002013-07-11T12:16:30.132-07:00Staying Tech Safe On Vacation<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCW3Pcsn_uMZMURmZjlSMocbZJ8A_4sg8cKx6BdVBXLOGf3sihxrHUbSexuZ57dFH4-u2Rvx2U0GTRbXJsZV_Im9UQOzjYsJ8tepRgAiJJZxKEkLneB17HNBNPS-1-4uoTSFQ3e1XBA4ec/s1600/2619476-3664753570.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="191" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCW3Pcsn_uMZMURmZjlSMocbZJ8A_4sg8cKx6BdVBXLOGf3sihxrHUbSexuZ57dFH4-u2Rvx2U0GTRbXJsZV_Im9UQOzjYsJ8tepRgAiJJZxKEkLneB17HNBNPS-1-4uoTSFQ3e1XBA4ec/s200/2619476-3664753570.png" width="200" /></a></div><strong>Summertime 2013 tech Tip #4</strong><br /><br />My summer series of tech tips continues with help on staying safe, digitally (at least) while on vacation.<br /><br />The reality is many 21st century families want or need to <em>text</em>, <em>check email</em> and <em>update social media accounts</em>, even when the goal of taking a vacation is to take a break from our everyday lives. I struggle with this as well. Every summer vacation at the shore I try to disconnect - but I usually fail to do so. However, would should all be aware that our online activity while on the road can put us at a higher risk of having our identity stolen.<br /><br />Identity theft is a serious crime that can have a lasting negative impact. Just one important piece of information, like a Social Security card, a driver’s license or a bank account statement, can provide a criminal what he needs to steal someone’s identity. What’s worse is victims may not realize their identities have been stolen for weeks, months or years after the fact, allowing the crime to perpetuate and destroy their credit. The good news is there are actions you can take to help protect your identity while on vacation — and anywhere else you may be mobile and online. <br /><br /><strong>Mobile Routers or Cellular Hotspots</strong><br />Consider a portable router to create your own Wi-Fi hotspot for your own or your family’s devices. You’ll need a local SIM data card, which is available at most electronic stores or even airport kiosks. This will help you avoid using public Wi-Fi spots. All cellular companies sell mobile hotspot devices.<br /><br /><strong>Avoid Contact with Hackers</strong><br />If you use public Wi-Fi, be very cautious of using unsecured networks. Make sure you are logging into a secured or private network when you use Wi-Fi. If you aren’t sure, don’t visit sites that contain sensitive information, like bank accounts.<br /><br /><strong>Be Careful Being Social</strong><br />Using social media while you travel can be a great way to share your family’s trip but remember — checking in or posting pictures can alert someone that your home is vacant! Make sure to set your home alarm, hire a house-sitter or maybe the best option is to delay posts until you are back home. If you do really want to share these photos while you are on vacation, make sure to set your privacy settings to “friends” only. This will help limit the number of people who actually see these pictures.<br /><br /><strong>Make Sure It's Legit</strong><br />Before logging onto a website from your mobile device, make sure the URL is legit. There are plenty of URL spoof sites out there, created in order to steal your information. Unfortunately many mobile browsers do not show the URL, so it is best to bookmark your favorite sites after you type in the address.<br /><br /><strong>Lock Down Your Social Networks</strong><br />If you have a blog or social accounts — such as Facebook and Twitter — use the highest security settings possible to ensure your information, posts and photos aren’t being leaked onto the internet.<br /><br /><strong>Strong Passwords</strong><br />Use a mix of upper and lowercase letters, numbers, symbols and punctuation marks to make your passwords harder to crack.<br /><br /><strong>Secure Your Mobile Devices</strong><br />Losing your mobile phone, tablet or laptop can be just as bad as losing your wallet. Be sure to protect your mobile devices with strong passwords and encryption. Consider installing wiping software on your mobile device so that you can remove your information remotely if your phone is lost.<br />Anonymoushttp://www.blogger.com/profile/08811822556440072470noreply@blogger.com0tag:blogger.com,1999:blog-5013299283767098630.post-81719403873788681042013-07-09T05:43:00.000-07:002013-07-11T12:16:30.156-07:00Facebook's New Graph SearchThe feature allows users to make in depth searches of your friends based on similar interests, details and so on. It has been in limited beta since earlier this year.<br /><br />This new feature went live yesterday, July 8. It is currently only available for users with their language set to US English.<br /><br />The tool is designed to help people find friends and other users with similar interests. It is also possible to dive much deeper into the information given on people’s profiles.<br /><br /><table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjT1nBdFGIOHFtv4l327stNLpNwpl08H3b2mEKDYLbXFdYwf3mfDLBZxGRLw2Jnm0Yspatgt2b7sCb1mDnMxGGL9z5-ranB0AFqSiM2tA9SBCx_MaN8q65QSxc20TRaqIXFHNo0tTVfL_0N/s1600/graphsearch.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="253" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjT1nBdFGIOHFtv4l327stNLpNwpl08H3b2mEKDYLbXFdYwf3mfDLBZxGRLw2Jnm0Yspatgt2b7sCb1mDnMxGGL9z5-ranB0AFqSiM2tA9SBCx_MaN8q65QSxc20TRaqIXFHNo0tTVfL_0N/s320/graphsearch.png" width="320" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">From Here You Can Complete Searches in Facebook Like Never Before</td></tr></tbody></table><br />For example, it is possible to find people who have worked at two companies and list them.<br /><br />It has also been referred to as Facebook’s first incursion into online dating. It is possible to type in “Single friends in West Chester”. Doing so will bring up all of your friends in West Chester who are single.<br /><br />It is also possible to use the search menu to find local restaurants and what your friends are saying about them, and so on.<br /><br />According to reports, a mobile version of the function will be released later this year for iOS and Android devices.<br /><br />You can learn more about Facebook's new graph search <a href="https://www.facebook.com/about/graphsearch" target="_blank">here</a>.<br /><br />I, personally am a fan of services like <a href="https://foursquare.com/" target="_blank">Foursquare</a> and <a href="https://untappd.com/" target="_blank">Untappd </a>for features like this, but if you are entrenched in Facebook's world check their new grap search out. Anonymoushttp://www.blogger.com/profile/08811822556440072470noreply@blogger.com0tag:blogger.com,1999:blog-5013299283767098630.post-52964837829575717352013-07-08T21:58:00.000-07:002013-07-11T11:40:51.722-07:00Steve Lipsky's Water is On Fire from Recent Fracking ~ RRC Says, "No, It's Not!" <div style="text-align: center;"><br /><span style="color: #20124d;"><b><span style="font-family: Georgia,"Times New Roman",serif;">Featured in the Debut of <span style="color: #660000;"><span style="font-size: large;">Josh Fox's "Gasland 2"</span></span> on HBO Earlier Tonight. <i><span style="color: #660000;">It will run at various times all week.</span></i> </span></b></span><br /><br /><span style="color: #20124d;"><b><span style="font-family: Georgia,"Times New Roman",serif;">Watch carefully, as Steve Lipsky's water <span style="color: #660000;">catches on fire</span>. </span></b></span></div><br /><div style="text-align: center;"><br /><span style="color: #20124d;"><b><span style="font-family: Georgia,"Times New Roman",serif;">Thank you to WFAA's Award-Winning Journalist </span></b></span></div><br /><div style="text-align: center;"><br /><span style="font-size: large;"><span style="color: #274e13;"><b><span style="font-family: Georgia,"Times New Roman",serif;">Brett Shipp </span></b></span></span></div><br /><div style="text-align: center;"><br /><span style="color: #20124d;"><b><span style="font-family: Georgia,"Times New Roman",serif;">for this <i>important report</i> earlier this year.<br /></span></b></span></div><br /><br /><br /><script src="http://www.wfaa.com/templates/belo_embedWrapper.js?storyid=191125411&pos=top&swfw=315"></script><object data="http://swfs.bimvid.com/player-3.2.15.swf?x-bim-callletters=WFAA" height="315" id="_fp_0.02229435835033655" name="player" type="application/x-shockwave-flash" width="515"> <param value="true" name="allowfullscreen"/> <param value="always" name="allowscriptaccess"/> <param value="transparent" name="wmode"/> <param value="high" name="quality"/> <param name="movie" value="http://swfs.bimvid.com/player-3.2.15.swf?x-bim-callletters=WFAA" /> <param value="config=http://www.wfaa.com/?j=embed_191125411&ref=http://www.wfaa.com/news/local/News-8-Exclusive-Parker-Co-water-well-in-on-fire---191125411.html" name="flashvars"/></object><script src="http://www.wfaa.com/templates/belo_embedWrapper.js?storyid=191125411&pos=bottom&ref=http://www.wfaa.com/news/local/News-8-Exclusive-Parker-Co-water-well-in-on-fire---191125411.html"></script><br /><br /><span style="color: #660000;"><b><span style="font-family: Georgia,"Times New Roman",serif;">Click <span style="color: #660000;"><span style="font-size: large;"><a href="http://www.epa.gov/region6/region-6/tx/tx005.html">Here</a></span></span> to read all about the <span style="color: #660000; font-size: large;">Imminent and Substantial Endangerment Order</span><span style="font-size: large;"> </span>issued by the EPA for this methane contaminated water well in the backyard of the Lipsky's. (December 7, 2010.)<br /></span></b></span>Anonymoushttp://www.blogger.com/profile/08811822556440072470noreply@blogger.com0tag:blogger.com,1999:blog-5013299283767098630.post-33594519086040296712013-07-06T10:53:00.000-07:002013-07-11T11:40:51.738-07:00WOW! Solar Impulse ~ The First Trip Across America 2013<div style="text-align: center;"><br /><span style="color: #20124d;"><span style="color: #274e13;"><span style="font-size: large;"><b>Happening Now. Zero Fossil Fuels Used. </b></span></span></span></div><br /><center><br /><iframe allowfullscreen="" frameborder="0" height="315" src="//www.youtube-nocookie.com/embed/rl2cBYUNqc0?rel=0" width="515"></iframe></center><br /><div style="text-align: center;"><br /><span style="color: #20124d;"><b><span style="color: #660000;"><span style="font-family: Georgia,"Times New Roman",serif;">Livestreaming NOW. July 6, 2013</span></span> </b></span></div><br /><blockquote class="tr_bq"><br /><span style="color: #20124d;"><b><span style="font-family: Georgia,"Times New Roman",serif;">"</span></b><span style="font-family: Georgia,"Times New Roman",serif;"><b>[...]</b></span>Zero-fuel airplane's <b>epic flight to New York live!</b> </span></blockquote><br /><blockquote class="tr_bq"><br /><span style="color: #20124d;"></span></blockquote><br /><blockquote class="tr_bq"><br /><span style="color: #20124d;">Check out the triumphant conclusion of the <span style="font-size: large;"><b>historic crossing of the United States with the world's first airplane able to fly day and night without fuel!</b></span> </span><br /><br /><br /><br /><span style="color: #20124d;"><span style="font-size: large;"><b>Solar Impulse,</b></span> a project born in Switzerland, is ending its Across America mission that started exactly two months ago at NASA's Moffett Airfield at the heart of Silicon Valley. </span><br /><br /><br /><br /><span style="color: #20124d;">This epic in stages that led the solar plane to Phoenix (AZ), Dallas (TX), St. Louis (MO) and Washington D.C. is now coming to an end with the <b>scheduled landing at New York's John F. Kennedy International Airport sometime after 2AM EDT (UTC-4) on Sunday July 7th 2013.<br /><br />Watch the entire flight live starting one hour before take-off -- around 3:30AM EDT (UTC-4).</b> The live streaming includes interviews with pilots and project Co-founders André Borschberg from the cockpit and Bertrand Piccard from the ground, reruns of the mission flights and interviews with Solar Impulse team members.<b>"[...]</b> <span style="color: #660000;"><i><b><a href="http://www.youtube.com/watch?v=rl2cBYUNqc0">(~ From the Solar Impulse LiveStream)</a></b></i></span><br /></span></blockquote><br /><br /><br /><div style="text-align: center;"><br /><span style="font-family: Georgia,"Times New Roman",serif;"><span style="color: #20124d;">Click <span style="font-size: large;"><span style="color: #660000;"><b><a href="http://www.youtube.com/user/SolarImpulseChannel">here</a></b></span></span> to visit the <span style="font-size: large;"><span style="color: #274e13;"><b>Solar Impulse YouTube Channel </b></span></span>for <b>incredible videos</b> of this <span style="color: #660000;"><i><b>first solar flight across America</b></i></span>!! </span></span><br /><br /></div><br /><center><br /><iframe allowfullscreen="" frameborder="0" height="315" src="//www.youtube-nocookie.com/embed/1gXY9c2rToI" width="515"></iframe></center><br />Anonymoushttp://www.blogger.com/profile/08811822556440072470noreply@blogger.com0tag:blogger.com,1999:blog-5013299283767098630.post-4643955010777126542013-07-03T07:51:00.000-07:002013-07-11T12:16:30.182-07:00West Chester Connect Launches July 8, 2013<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7Bwu2z6D4iKcUc5S2M-BDNi6z6muz2yhqDErzLtom2ZKRp8lOq6XFgun04Gnl_DMG2xXgl27mXg9vwsl-fPS04nXLxmm6fwWQwyVAgrvNzMXE24EVqD63B2hl_fPWk8cyLejhxBfnN-_7/s1136/connect3.PNG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7Bwu2z6D4iKcUc5S2M-BDNi6z6muz2yhqDErzLtom2ZKRp8lOq6XFgun04Gnl_DMG2xXgl27mXg9vwsl-fPS04nXLxmm6fwWQwyVAgrvNzMXE24EVqD63B2hl_fPWk8cyLejhxBfnN-_7/s200/connect3.PNG" width="112" /></a></div><span style="font-family: Calibri;">The Borough of West Chester is proud to announce that we are providing a new service which is intended to enhance civic engagement within our community. <o:p></o:p></span><br /><span style="font-family: Calibri;"><br /></span><br /><div class="MsoNormal" style="margin: 0in 0in 8pt;"><span style="font-family: Calibri;"><b>“West Chester Connect”</b> is the name of our new service. You can download the free app in your smartphone’s app store by searching for <b>“West Chester Connect”</b>. The app is free of charge. Once downloaded you can easily report “environmental”, “public safety” & “quality of life” issues. You can then follow the process of your work orders through <i>push notifications</i> on your smart phone. <o:p></o:p></span></div><span style="font-family: Calibri;"><b>“West Chester Connect”</b> officially launches on <u>July 8, 2013</u>. <o:p></o:p></span><br /><br /><div class="MsoNormal" style="margin: 0in 0in 8pt;"><span style="font-family: Calibri;">You can learn more about <b>“West Chester Connect”</b> by visiting our website at </span><a href="http://www.west-chester.com/"><span style="color: #0563c1; font-family: Calibri;">www.west-chester.com</span></a><span style="font-family: Calibri;">. <o:p></o:p></span></div><span style="font-family: Calibri;">This service is not intended for emergencies. As always continue to call 911 for emergency situations.<o:p></o:p></span><br /><span style="font-family: Calibri;"><br /></span><span style="font-family: Calibri;"><b>What is West Chester Connect? </b></span><br /><span style="font-family: Calibri;"><br /></span><span style="font-family: Calibri;">West Chester Connect is simply a way of fostering engagement between citizens and their government. Through the free "West Chester Connect" smartphone app citizens can easily and quickly provide information regarding <b>environmental</b>, <b>public safety</b> and <b>quality of life</b> issues. </span><br /><span style="font-family: Calibri;"><br /></span><span style="font-family: Calibri;">Citizens can then remain engaged with their government as the work orders are processed and completed through <b>push notifications</b> on their smartphones.</span><br /><span style="font-family: Calibri;"><br /></span><span style="font-family: Calibri;"><b>What is West Chester Connect <u>NOT</u> For?</b></span><br /><span style="font-family: Calibri;"><br /></span><span style="font-family: Calibri;"><b>First and foremost.</b> West Chester Connect is <b>not for reporting emergency situations</b>. The reports made through this service are handled as non-emergency situations. </span><br /><span style="font-family: Calibri;"><br /></span><span style="font-family: Calibri;">West Chester Connect is not a place for social commentary. </span><br /><span style="font-family: Calibri;"><br /></span><span style="font-family: Calibri;">You can read the official press release <a href="https://dl.dropboxusercontent.com/u/97281974/West%20Chester%20Connect/West%20Chester%20Connect%20Press%20Release.pdf" target="_blank">here</a>.</span><br /><span style="font-family: Calibri;"><br /></span><span style="font-family: Calibri;">You can learn more by reading our <a href="https://dl.dropboxusercontent.com/u/97281974/West%20Chester%20Connect/West%20Chester%20Connect%20Citizen%20Guide.pdf" target="_blank">"Citizen Guide"</a>. </span><br /><span style="font-family: Calibri;"><br /></span>Anonymoushttp://www.blogger.com/profile/08811822556440072470noreply@blogger.com0tag:blogger.com,1999:blog-5013299283767098630.post-18086704967432551632013-07-01T12:42:00.000-07:002013-07-11T12:16:30.271-07:00Fun in the Sun With Your Smartphone<strong>Summertime 2013 Tech Tip #3</strong><br /><br /><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwx8Zc_EtIzZAIEmcr7vE5v50y7T2Nf_gy8Mxq4fTiBsQtSss0pUr2FFKL-dysYLLMoEJvmuKlFvRlERihyphenhyphenaS7ONyxtsr0rIwZdrRAeDmNFQk8SnlqM8JOxoKVu-jYEFG85BPTlcxDnxf5/s468/summer-1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="212" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwx8Zc_EtIzZAIEmcr7vE5v50y7T2Nf_gy8Mxq4fTiBsQtSss0pUr2FFKL-dysYLLMoEJvmuKlFvRlERihyphenhyphenaS7ONyxtsr0rIwZdrRAeDmNFQk8SnlqM8JOxoKVu-jYEFG85BPTlcxDnxf5/s320/summer-1.jpg" width="320" /></a></div><br />A trip to the shore for some sunshine and water may sound like the perfect getaway and in many ways it can be. However your smartphone probably will not agree. There is little doubt that many of us are addicted to our smartphones so here are some tips for keeping them safe this summer. <br /><br /><strong>Seek some shade.</strong> Direct sunlight can cause overheating, so be sure to stash your devices somewhere shady. If you do trigger an “overheated” alert, be sure to turn off the device and move it to a cooler location. Do not place it inside a freezer!<br /><br /><strong>Invest in a quality case.</strong> In the summertime, the living is easy – but not for your gadgets. Sticky fingers from ice cream, blowing sand and condensation are just a few of the perils the season brings for your devices. There are a ton of options on the market, including rugged cases to help protect from drops and waterproof options to help keep things safe poolside – or tabletop during meals. <br /><br /><strong>Limit the glare.</strong> Sunlight can make your screen hard to read. <em>You can tackle this in a few ways:</em><br /><br /><strong>Adjust your brightness settings.</strong> Navigate to your device’s “Settings” menu, then select the “Display Settings.” You can modify both “Brightness” and “Backlight” options on most devices: the higher the brightness settings, the easier it is to read your screen in sunlight. Some devices also offer an “Auto Brightness” option that automatically adjusts your screen for optimal viewing.<br /><br />Purchase an <strong>anti-glare cover</strong> which will help make your screen more legible in bright light.<br /><br /><strong>Find some shade</strong>. Relax under an umbrella or a tree for some temporary relief.<br /><br /><strong>Low-Fi Stereo Fun!</strong> Summer means impromptu gatherings, which just beg for a great music. But if you do not have portable speakers handy, you can try this simple trick to pump up the volume. Place your music player in a bowl or glass to amplify your device’s speakers. It really works!<br /><br /><em>Stay tuned for more fun-in-the sun technology tips.</em>Anonymoushttp://www.blogger.com/profile/08811822556440072470noreply@blogger.com0tag:blogger.com,1999:blog-5013299283767098630.post-34583718251939098922013-07-01T05:39:00.000-07:002013-07-11T12:16:30.358-07:00West Chester Connect Launches July 8, 2013<em>West Chester Connect</em> officially launches next Monday, July 8. You can read the press release <a href="http://www.west-chester.com/pdfs/West-Chester-Connect-Press-Release.pdf" target="_blank">here</a>.<br /><br />You can also check out our "<strong>West Chester Connect - Citizen Guide</strong>" <a href="http://www.west-chester.com/pdfs/West-Chester-Connect-Citizen-Guide.pdf" target="_blank">here</a>.<br /><br /><table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigazajlmKTvFXy6PMbnINMP0m-K3AFTNK6azWhnRQDCARbAcGrOeIJbASrikStTdaRDUGFZSPoi8BxCB2ksUfMprDo5ZI3A98kblZkp1QffgHF93G_-RICyv-JeRB4jk3Oa518CksFWHHc/s636/PressRelease.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigazajlmKTvFXy6PMbnINMP0m-K3AFTNK6azWhnRQDCARbAcGrOeIJbASrikStTdaRDUGFZSPoi8BxCB2ksUfMprDo5ZI3A98kblZkp1QffgHF93G_-RICyv-JeRB4jk3Oa518CksFWHHc/s640/PressRelease.png" width="500" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">West Chester Connect - Press Release</td></tr></tbody></table><div class="separator" style="clear: both; text-align: center;"> </div><div class="separator" style="clear: both; text-align: center;"> </div><div align="center"></div>Anonymoushttp://www.blogger.com/profile/08811822556440072470noreply@blogger.com0tag:blogger.com,1999:blog-5013299283767098630.post-88666625433503633852013-07-01T05:26:00.000-07:002013-07-11T12:16:30.485-07:00How To Tell If Your PC Has a Virus<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjh47VZZig5v07xCBUFADSo9SQ90J3V0vt6G94hEV8lfMWsOWCQ5ytIfu7SQC42U7KD0zrNSRKsqHUcKdCR6GnZHreEfemlOyANJ3awiuD2L1szSBjlaqY907z7oJ0aVjXp3E2GeyUKszzV/s353/Spyware-Doctor.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="199" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjh47VZZig5v07xCBUFADSo9SQ90J3V0vt6G94hEV8lfMWsOWCQ5ytIfu7SQC42U7KD0zrNSRKsqHUcKdCR6GnZHreEfemlOyANJ3awiuD2L1szSBjlaqY907z7oJ0aVjXp3E2GeyUKszzV/s200/Spyware-Doctor.jpg" width="200" /></a></div><strong>Summertime 2013 Tech Tip #1</strong><br /><br />One of the questions I am asked very often is "how do I know if my computer has a virus"? <br /><br /><span class="leadInPhrase_other"><em>Is your computer running very slowly?</em></span> A common symptom of a virus is much slower than normal computer performance. However, there can be other reasons for slow performance, including a hard disk that needs defragmenting, a computer that needs more memory (RAM), or the existence of spyware or adware. For more information about spyware, see <span style="color: black;"><a href="http://wctech.blogspot.com/2013/07/what-is-spyware.html" target="_blank">How to tell if your computer is infected with spyware</a></span>.<br /><br /><div class="para"><span class="leadInPhrase_other">Are you getting unexpected messages, or are programs starting automatically?</span> Some viruses can cause damage to <span class="notLocalizable">Windows</span> or some of your programs. The results of this damage might include messages appearing unexpectedly, programs starting or closing automatically, or <span class="notLocalizable">Windows</span> shutting down suddenly.</div><div class="para"> </div><div class="para"><span class="leadInPhrase_other">Is your modem or hard disk working overtime?</span> An e‑mail virus works by sending many copies of itself by e‑mail. One indicator of this is that the activity light on your broadband or external modem is constantly lit; another is the sound of your computer's hard disk continually working. These are not always symptoms of a computer virus, but when combined with other problems, can indicate a virus infection.</div><div class="para"> </div><div class="para lastElement">To check for viruses, scan your computer with an antivirus program. New viruses appear every day, so keeping your antivirus program updated is important. </div>Anonymoushttp://www.blogger.com/profile/08811822556440072470noreply@blogger.com1tag:blogger.com,1999:blog-5013299283767098630.post-20163512212968931282013-07-01T05:25:00.000-07:002013-07-11T12:16:30.508-07:00What is Spyware?<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgx2hA2ffXHGA1EtuTOj-q1GgdA9cu1mGe4ZIPItYKz4tLRVrb2C9af9m2xpRvtjvtJRpQ65WFlnwDuvs1O38ybr55X6OiADaZU7bzylxPK9YC9Amk4zCdy0jVVSHw1fBfhwdOs-meo_b-/s353/Spyware-Doctor.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="199" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgx2hA2ffXHGA1EtuTOj-q1GgdA9cu1mGe4ZIPItYKz4tLRVrb2C9af9m2xpRvtjvtJRpQ65WFlnwDuvs1O38ybr55X6OiADaZU7bzylxPK9YC9Amk4zCdy0jVVSHw1fBfhwdOs-meo_b-/s200/Spyware-Doctor.jpg" width="200" /></a></div><div class="para"><strong>Summertime 2013 Tech Tip #2</strong><br /><br />One of the most common problems computer users deal with is Spyware. The threat of Spyware infecting your PC is becoming more real everyday. It is easier then ever for your PC to become a victim of Spyware. What is Spyware anyway?</div><div class="para"> </div><div class="para">Spyware is a type of software that is installed on your computer to watch and record your activity. Some types of spyware record your keystrokes and information that you type into websites or other programs and then use that information for targeted advertising or identity theft. These programs can be installed on your computer in many ways, but often they are hidden inside of software such as free games, screen savers, or animated cursors.</div><div class="para"> </div><div class="para">Here are some signs that your computer might be infected with spyware: </div><ul class="unordered"><li class="listItem"><div class="para">You notice new toolbars, links, or favorites that you didn't intentionally add to your web browser.</div></li><li class="listItem"><div class="para">Your home page, mouse pointer, or search program changes unexpectedly.</div></li><li class="listItem"><div class="para">You type the address of a specific website into your web browser, but you're taken to a completely unrelated website.</div></li><li class="listItem"><div class="para">You see pop-up ads, even if your computer isn't connected to the Internet.</div></li><li class="listItem"><div class="para">Your computer suddenly starts running slowly. Not all computer performance problems are caused by spyware, but spyware can cause a noticeable change.</div></li></ul><div class="para">Sometimes, your computer will show no symptoms, even if a spyware program is running. To help protect your privacy and your computer, I recommend that you run <span class="notLocalizable">Windows</span> Defender or another antispyware program at all times. </div><div class="para"> </div><div class="para lastElement"><strong>What if Spyware is on your PC?</strong></div><div class="para lastElement"> </div><div class="para lastElement">If you have spyware or other potentially unwanted software on your computer, you should use an antispyware scanner and removal tool to try to remove it. You can also try to remove spyware manually. You might need to use both of these methods more than once to completely remove the spyware or other potentially unwanted software.</div><div class="para lastElement"> </div><div class="para">Spyware can sometimes be hard to remove. If an antispyware program notifies you that it can't remove spyware, follow the instructions provided by the antispyware program. If that doesn't work, try these options:</div><ul class="unordered"><li class="listItem"><div class="para">Try installing an antivirus or another antispyware program. Many antivirus programs also come with antispyware protection.</div></li></ul><div class="para">Sadly sometimes even the most trained and well informed computer experts cannot remove a well entrenched and hidden piece of spyware. Some spyware can hide itself so well that it can't be removed. If you still see evidence of spyware after trying to remove it with an antispyware program or after trying to uninstall it using Control Panel, you might need to reinstall <span class="notLocalizable">Windows</span> and your programs.</div>Anonymoushttp://www.blogger.com/profile/08811822556440072470noreply@blogger.com0tag:blogger.com,1999:blog-5013299283767098630.post-1550951794370602122013-06-25T09:15:00.000-07:002013-07-11T12:16:30.531-07:00Summertime Tech AdviceSummertime has finally arrived and that usually means many of us are headed to the shore for some rest and relaxation. Unfortunately our mobile devices usually tag along. If this is true in your case be sure to take care with your mobile devices as they are even more susceptible to the summer's unique weather conditions then you are. <br /><br /><strong>Avoid "Heat-Related Death"</strong><br /><br />Extremely warm (and hot) temperatures have noticeable effects on your phone's battery, display and the parts inside your phone. There's even a possibility of the ominously named "heat-related death," which is exactly as horrible as it sounds. The best way to protect your tech is to keep it in the shade. If you do find that your phone has overheated in the sun, don't panic and let it cool gradually. Do not put it in the refrigerator or freezer. Let it cool down on it's own, and out of the sun.<br /><br />Use a cooling pad when you're working on a laptop outdoors, even if you don’t use one at home. Increased temperatures mean even new laptops could easily overheat in the summer sun. Also take the time to clean your laptop fan before heading into the sun. This will help to ensure that it is running properly and keeping your laptop cooler. Of course the best protection is to keep it in the shade.<br /><br /><strong>Use "Protection"</strong><br /><br />Another concern is water damage. While your smartphone case protects against damage from dropping your phone, it will do little to protect your phone from damage caused by liquid, dust or sand. If you want to tote your cell to the shore, you’ll need a little something extra like a waterproof case. You can find these online easily. I found dozens of these cases at <a href="http://amazon.com/">Amazon.com</a>.Anonymoushttp://www.blogger.com/profile/08811822556440072470noreply@blogger.com0tag:blogger.com,1999:blog-5013299283767098630.post-64301143081584460362013-06-25T05:42:00.000-07:002013-07-11T12:16:30.555-07:00US-CERT (Risks of Default Passwords on the Internet)<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivPZakVFfMDGCz_EMR6z4BIaXX0HsXVokaSoshwjlolVgtp5nXMkGzMpU2TrRy_q6OYTX2dHmJxuf6XMh3k6ge16FmQUc1Ip8VszTCLz7_f8M6l1tvbuoSQZf_K4CSxqrywvgcM_f8owXF/s1600/us-cert-logo.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivPZakVFfMDGCz_EMR6z4BIaXX0HsXVokaSoshwjlolVgtp5nXMkGzMpU2TrRy_q6OYTX2dHmJxuf6XMh3k6ge16FmQUc1Ip8VszTCLz7_f8M6l1tvbuoSQZf_K4CSxqrywvgcM_f8owXF/s200/us-cert-logo.jpg" width="200" /></a>I will start posting cyber alerts that are published by the <em>United States Computer Emergency Readiness Team</em> (<strong>US-CERT</strong>).<br /><br /><br />US-CERT’s mission is to improve the nation's cybersecurity posture, coordinate cyber information sharing, and proactively manage cyber risks to the nation while protecting the constitutional rights of Americans. US-CERT's vision is to be a trusted global leader in cybersecurity — collaborative, agile, and responsive in a complex environment.<br /><br /><div class="MsoNormal" style="margin: 0in 0in 0pt;"><b><span style="font-size: 14.5pt; mso-fareast-font-family: "Times New Roman";"></span></b><b><span style="font-size: 14.5pt; mso-fareast-font-family: "Times New Roman";"></span></b> </div><div class="MsoNormal" style="margin: 0in 0in 0pt;"><b><span style="font-size: 14.5pt; mso-fareast-font-family: "Times New Roman";"></span></b> </div><div class="MsoNormal" style="margin: 0in 0in 0pt;"><b><span style="font-size: 14.5pt; mso-fareast-font-family: "Times New Roman";"></span></b> </div><div class="MsoNormal" style="margin: 0in 0in 0pt;"><b><span style="font-size: 14.5pt; mso-fareast-font-family: "Times New Roman";"></span></b> </div><div class="MsoNormal" style="margin: 0in 0in 0pt;"><b><span style="font-size: 14.5pt; mso-fareast-font-family: "Times New Roman";"><a href="https://www.us-cert.gov/ncas/alerts/TA13-175A"><span style="color: blue;">TA13-175A: Risks of Default Passwords on the Internet</span></a><o:p></o:p></span></b></div><br /><div class="MsoNormal" style="margin: 0in 0in 0pt;"><i><span style="color: #666666; font-size: 11pt; mso-fareast-font-family: "Times New Roman";">06/24/2013 03:11 PM EDT<o:p></o:p></span></i></div><br /><div class="MsoNormal" style="margin: 0in 0in 0pt;"><span style="mso-fareast-font-family: "Times New Roman";">Original release date: June 24, 2013<o:p></o:p></span></div><br /><span style="mso-fareast-font-family: "Times New Roman";"><span style="font-size: medium;"><strong>Systems Affected<o:p></o:p></strong></span></span><br /><br />Any system using password authentication accessible from the internet may be affected. Critical infrastructure and other important embedded systems, appliances, and devices are of particular concern.<o:p></o:p><br /><br /><h3 style="margin: 1em 0in;"><span style="mso-fareast-font-family: "Times New Roman";"><span style="font-size: medium;">Overview<o:p></o:p></span></span></h3><br />Attackers can easily identify and access internet-connected systems that use shared default passwords. It is imperative to change default manufacturer passwords and restrict network access to critical and important systems.<o:p></o:p><br /><br /><h3 style="margin: 1em 0in;"><span style="mso-fareast-font-family: "Times New Roman";"><span style="font-size: medium;">Description<o:p></o:p></span></span></h3><br /><h4 style="margin: 1.33em 0in;"><span style="mso-fareast-font-family: "Times New Roman";">What Are Default Passwords?<o:p></o:p></span></h4><br />Factory default software configurations for embedded systems, devices, and appliances often include simple, publicly documented passwords. These systems usually do not provide a full operating system interface for user management, and the default passwords are typically identical (shared) among all systems from a vendor or within product lines. Default passwords are intended for initial testing, installation, and configuration operations, and many vendors recommend changing the default password before deploying the system in a production environment.<o:p></o:p><br /><br /><h4 style="margin: 1.33em 0in;"><span style="mso-fareast-font-family: "Times New Roman";">What Is the Risk?<o:p></o:p></span></h4><br />Attackers can easily obtain default passwords and identify internet-connected target systems. Passwords can be found in product documentation and compiled lists available on the internet. It is possible to identify exposed systems using search engines like <a href="http://www.shodanhq.com/"><span style="color: blue;">Shodan</span></a>, and it is feasible to scan the entire IPv4 internet, as demonstrated by such research as<o:p></o:p><br /><br /><ul type="disc"><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l3 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";"><a href="https://community.rapid7.com/community/metasploit/blog/2010/08/02/shiny-old-vxworks-vulnerabilities"><span style="color: blue;">Shiny Old VxWorks Vulnerabilities</span></a><o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l3 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";"><a href="https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play"><span style="color: blue;">Security Flaws in Universal Plug and Play: Unplug, Don't Play</span></a><o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l3 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";"><a href="https://community.rapid7.com/community/metasploit/blog/2013/04/23/serial-offenders-widespread-flaws-in-serial-port-servers"><span style="color: blue;">Serial Offenders: Widespread Flaws in Serial Port Servers</span></a><o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l3 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";"><a href="https://speakerdeck.com/hdm/derbycon-2012-the-wild-west"><span style="color: blue;">The Wild West</span></a><o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l3 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";"><a href="http://internetcensus2012.bitbucket.org/paper.html"><span style="color: blue;">Internet Census 2012</span></a><o:p></o:p></span></li></ul><br />Attempting to log in with blank, default, and common passwords is a widely used attack technique.<o:p></o:p><br /><br /><h3 style="margin: 1em 0in;"><span style="mso-fareast-font-family: "Times New Roman";"><span style="font-size: medium;">Impact<o:p></o:p></span></span></h3><br />An attacker with knowledge of the password and network access to a system can log in, usually with root or administrative privileges. Further consequences depend on the type and use of the compromised system. Examples of incident activity involving unchanged default passwords include<o:p></o:p><br /><br /><ul type="disc"><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l1 level1 lfo2; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";">Internet Census 2012 Carna Botnet distributed scanning<o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l1 level1 lfo2; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";">Fake Emergency Alert System (EAS) warnings about zombies<o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l1 level1 lfo2; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";">Stuxnet and Siemens SIMATIC WinCC software<o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l1 level1 lfo2; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";">Kaiten malware and older versions of Microsoft SQL Server<o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l1 level1 lfo2; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";">SSH access to jailbroken Apple iPhones<o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l1 level1 lfo2; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";">Cisco router default Telnet and enable passwords<o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l1 level1 lfo2; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";">SNMP community strings<o:p></o:p></span></li></ul><br /><h3 style="margin: 1em 0in;"><span style="mso-fareast-font-family: "Times New Roman";"><span style="font-size: medium;">Solution<o:p></o:p></span></span></h3><br /><h4 style="margin: 1.33em 0in;"><span style="mso-fareast-font-family: "Times New Roman";">Change Default Passwords<o:p></o:p></span></h4><br />Change default passwords as soon as possible and absolutely before deploying the system on an untrusted network such as the internet. Use a sufficiently strong and unique password. See US-CERT Security Tip <a href="http://www.us-cert.gov/ncas/tips/ST04-002"><span style="color: blue;">ST04-002</span></a> and <em><a href="https://www.us-cert.gov/reading_room/PasswordMgmt2012.pdf"><span style="color: blue;">Password Security, Protection, and Management</span></a></em> for more information on password security.<o:p></o:p><br /><br /><h4 style="margin: 1.33em 0in;"><span style="mso-fareast-font-family: "Times New Roman";">Use Unique Default Passwords<o:p></o:p></span></h4><br />Vendors can design systems that use unique default passwords. Such passwords may be based on some inherent characteristic of the system, like a MAC address, and the password may be physically printed on the system.<o:p></o:p><br /><br /><h4 style="margin: 1.33em 0in;"><span style="mso-fareast-font-family: "Times New Roman";">Use Alternative Authentication Mechanisms<o:p></o:p></span></h4><br />When possible, use alternative authentication mechanisms like Kerberos, x.509 certificates, public keys, or multi-factor authentication. Embedded systems may not support these authentication mechanisms and the associated infrastructure.<o:p></o:p><br /><br /><h4 style="margin: 1.33em 0in;"><span style="mso-fareast-font-family: "Times New Roman";">Force Default Password Changes<o:p></o:p></span></h4><br />Vendors can design systems to require password changes the first time a default password is used. Recent versions of DD-WRT wireless router firmware operate this way.<o:p></o:p><br /><br /><h4 style="margin: 1.33em 0in;"><span style="mso-fareast-font-family: "Times New Roman";">Restrict Network Access<o:p></o:p></span></h4><br />Restrict network access to trusted hosts and networks. Only allow internet access to required network services, and unless absolutely necessary, do not deploy systems that can be directly accessed from the internet. If remote access is required, consider using VPN, SSH, or other secure access methods and be sure to change default passwords.<o:p></o:p><br /><br />Vendors can design systems to only allow default or recovery password use on local interfaces, such as a serial console, or when the system is in maintenance mode and only accessible from a local network.<o:p></o:p><br /><br /><h4 style="margin: 1.33em 0in;"><strong><span style="mso-fareast-font-family: "Times New Roman";">Identify Affected Products</span></strong><span style="mso-fareast-font-family: "Times New Roman";"><o:p></o:p></span></h4><br />It is important to identify software and systems that are likely to use default passwords. The following list includes software, systems, and services that commonly use default passwords:<o:p></o:p><br /><br /><ul type="disc"><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l2 level1 lfo3; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";">Routers, access points, switches, firewalls, and other network equipment<o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l2 level1 lfo3; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";">Databases<o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l2 level1 lfo3; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";">Web applications<o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l2 level1 lfo3; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";">Industrial Control Systems (ICS) systems<o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l2 level1 lfo3; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";">Other embedded systems and devices<o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l2 level1 lfo3; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";">Remote terminal interfaces like Telnet and SSH<o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l2 level1 lfo3; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";">Administrative web interfaces<o:p></o:p></span></li></ul><br />Running a vulnerability scanner on your network can identify systems and services using default passwords. Freely available scanners include Metasploit and OpenVAS.<o:p></o:p><br /><br /><h3 style="margin: 1em 0in;"><span style="mso-fareast-font-family: "Times New Roman";"><span style="font-size: medium;">References<o:p></o:p></span></span></h3><br /><ul type="disc"><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l0 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";"><a href="https://www.us-cert.gov/Home-Network-Security"><span style="color: blue;">Home Network Security </span></a><o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l0 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";"><a href="http://www.us-cert.gov/ncas/tips/st04-002"><span style="color: blue;">Choosing and Protecting Passwords </span></a><o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l0 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";"><a href="https://www.us-cert.gov/reading_room/PasswordMgmt2012.pdf"><span style="color: blue;">Password Security, Protection, and Management </span></a><o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l0 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";"><a href="http://www.us-cert.gov/sites/default/files/publications/HomeRouterSecurity2011.pdf"><span style="color: blue;">Small Office/Home Office Router Security </span></a><o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l0 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";"><a href="http://www.sans.edu/research/security-laboratory/article/default-psswd"><span style="color: blue;">The Risk of Default Passwords</span></a><o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l0 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";"><a href="http://www.shodanhq.com/"><span style="color: blue;">SHODAN - Computer Search Engine</span></a><o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l0 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";"><a href="https://community.rapid7.com/community/metasploit/blog/2010/08/02/shiny-old-vxworks-vulnerabilities"><span style="color: blue;">Shiny Old VxWorks Vulnerabilities</span></a><o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l0 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";"><a href="https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play"><span style="color: blue;">Security Flaws in Universal Plug and Play: Unplug, Don't Play</span></a><o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l0 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";"><a href="https://community.rapid7.com/community/metasploit/blog/2013/04/23/serial-offenders-widespread-flaws-in-serial-port-servers"><span style="color: blue;">Serial Offenders: Widespread Flaws in Serial Port Servers</span></a><o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l0 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";"><a href="http://speakerdeck.com/hdm/derbycon-2012-the-wild-west"><span style="color: blue;">The Wild West</span></a><o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l0 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";"><a href="http://internetcensus2012.bitbucket.org/paper.html"><span style="color: blue;">Internet Census 2012</span></a><o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l0 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";"><a href="http://articles.chicagotribune.com/2013-02-14/business/chi-zombie-hack-blamed-on-easy-passwords-20130214_1_karole-white-ioactive-labs-passwords"><span style="color: blue;">Zombie hack blamed on easy passwords</span></a><o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l0 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";"><a href="http://www.thebdr.net/articles/fcc/eas/EAS-Q5.pdf"><span style="color: blue;">Secure EAS Codec s Prevent Zombie Attacks</span></a><o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l0 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";"><a href="http://www.wired.com/threatlevel/2010/07/siemens-scada/"><span style="color: blue;">SCADA System's Hard-Coded Password Circulated Online for Years</span></a><o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l0 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";"><a href="http://www.pcworld.com/article/201442/article.html"><span style="color: blue;">After Worm, Siemens Says Don't Change Passwords</span></a><o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l0 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";"><a href="http://www.cert.org/incident_notes/IN-2001-13.html"><span style="color: blue;">"Kaiten" Malicious Code Installed by Exploiting Null Default Passwords in Microsoft SQL Server</span></a><o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l0 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";"><a href="http://www.dd-wrt.com/wiki/index.php/Web_Interface#Username_and_Password"><span style="color: blue;">Web Interface - DD-WRT Wiki</span></a><o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l0 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";"><a href="http://www.metasploit.com/"><span style="color: blue;">Penetration Testing Software | Metasploit</span></a><o:p></o:p></span></li><li class="MsoNormal" style="margin: 0in 0in 0pt; mso-list: l0 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="mso-fareast-font-family: "Times New Roman";"><a href="http://www.openvas.org/"><span style="color: blue;">Open Vulnerability Assessment System</span></a><o:p></o:p></span></li></ul>You can learn more at the official US-CERT <a href="http://www.us-cert.gov/" target="_blank">website</a>. Anonymoushttp://www.blogger.com/profile/08811822556440072470noreply@blogger.com0tag:blogger.com,1999:blog-5013299283767098630.post-44887220703137738622013-06-24T04:47:00.000-07:002013-07-11T12:16:30.645-07:00Windows 8.1 PreviewIf you are currently using Windows 8 you are aware that it obviously is a work in progress. While Windows 8 works fine on touch screens it can be clunky on non-touch screens. In addition if Microsoft has dreams of the corporate world adopting Windows 8 in the workplace further development and customization is required. Microsoft has obviously been working on some of these issues as the upcoming release of Windows 8.1 (or Windows Blue) proves. As with Windows 8 and Office 2013 Microsoft will be releasing a "preview" a few months before the final release on June 26.<br /><br />It makes sense to look at what the Windows 8.1 Preview will bring to the table, and its requirements and changes, before you make a decision whether you should upgrade your system to the preview build right away.<br /><br />For many users, it may be better to wait until the final version of Windows 8.1 gets released. While there is no definite date set for that yet, it is likely that Microsoft will make it available just a couple of months after the release of the preview version.<br /><br /><strong>Requirements</strong><br />The system requirements have not changed at all.<br /><ul><li>1 GHz or faster processor.</li><li>1 Gigabyte or 2 Gigabyte of RAM depending on whether you are using a 32-bit or 64-bit system.</li><li>16 Gigabyte or 20 Gigabyte of hard drive space again depending on whether you are using a 32-bit or 64-bit system.</li><li>Microsoft DirectX 9 graphics card.</li></ul>Windows RT users need to have at least 10 Gigabyte of free storage on their device for the upgrade.<br />There is one main change though that users need to know about. You need to use a Microsoft account to sign in to PCs that run the preview build of Windows 8.1 There is no option to create a local account in the release, but Microsoft promises that it will be made available when the final version of Windows 8.1 gets released later this year.<br /><br />Windows 8.1 Preview will be made available via Windows Store as a direct download and as a Preview ISO image. If you want to download it from Windows Store, you need to install an update first on the system that you get from the Windows 8.1 Preview download page. Next time you start the system after installing the update you receive a notification that you can get Windows 8.1 Preview for free from the store.<br /><br />An Internet connection is needed to download the app from Store, but once it has been downloaded no Internet connection is required until the update has been successfully installed and the system rebooted.<br /><br />You can alternatively download the Windows 8.1 Preview ISO from the download page and use it to install the operating system. You will need a product key that Microsoft makes available on the download page. It is likely that this is a generic key that all users who install the preview build share.<br /><br /><br /><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiV7aVLwp6S9ms9IfCJSuG7zww4YqRTHPFLWFC8tBZwqKqncRE5_tBd9vnnCsgGzvFiKq8_HzyHYFSLmQ8DLQR8EiAzKovQxwVacOwtMYy1O8OUqtPv1jVrDt9JT5wZNlPsPm5okfF_jwGg/s1600/Windows%25208_1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="176" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiV7aVLwp6S9ms9IfCJSuG7zww4YqRTHPFLWFC8tBZwqKqncRE5_tBd9vnnCsgGzvFiKq8_HzyHYFSLmQ8DLQR8EiAzKovQxwVacOwtMYy1O8OUqtPv1jVrDt9JT5wZNlPsPm5okfF_jwGg/s320/Windows%25208_1.png" width="320" /></a></div><br /><br /><strong>What's New in Windows 8.1?</strong><br /><br /><li>Boot to Desktop</li><li>More rows on start screen and additional tile sizes.</li><li>Improvements for mouse and keyboard users on the desktop and start screen.</li><li>Snap View feature improved, supports now up to three apps.</li><li>Internet Explorer 11.</li><li>Windows Defender with network behavior monitoring.</li><li>Device Lockdown with Assigned Access (RT, Pro and Enterprise) to enable a "single Windows Store application experience on a device".</li><li>Pervasive Device Encryption for all Windows editions. Enabled out of the box and can be configured "with additional BitLocker protection and management capabilities".</li><li>Improved Biometrics including optimization for fingerprint based biometrics.</li><li>Remote Business data removal.</li><li>Support for a wider range of VPN clients and auto-triggered VPN.</li><li>Broadband tethering.</li><li>Windows Store enabled by default for Windows To Go users.</li><li>Bring your own Device enhancements such as work folders, Wi-Fi direct printing, RDS enhancements and web application proxy.</li><li>SkyDrive is integrated natively into Windows 8.1 but does not sync data automatically to the PC. Placeholders are displayed instead.</li><li>You need to sign in to a Microsoft account to use the store.</li><li>All Windows 8 apps will work on Windows 8.1 but not the other way round.</li><li>Apps are automatically updated unless you are connected to a metered Internet connection.</li><li>Desktop background can now be displayed on start screen.</li><li>Lock Screen slideshow of photos.</li><li>Aggregated search powered by Bing.</li><li>Improved stock apps and new apps such as a Calculator, Sound Recorder and new Alarm features.</li><li>PC Settings updated (the start screen control panel) so that it is no longer necessary to switch to the desktop Control Panel.</li><li>Start button that links to the start screen.</li><br /><strong>Unconfirmed</strong><br />You will lose access to apps and programs that you have installed on Windows 8.1 Preview systems when you upgrade to the final RTM version of the operating system.<br /><br />I may actually end up waiting if it is indeed true that all applications will need to be re-installed when moving from the preview release to the final RTM. I am still waiting on what is happening here before deciding what to do.<br /><br /><strong>Below is a video preview of Windows 8.1</strong><br /><br /><div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/VQb5caeSo00?feature=player_embedded' frameborder='0'></iframe></div><br />Anonymoushttp://www.blogger.com/profile/08811822556440072470noreply@blogger.com0tag:blogger.com,1999:blog-5013299283767098630.post-91600234901667848472013-06-23T18:58:00.000-07:002013-07-11T11:33:51.175-07:00GREAT article on the classical model...<br /><br /><a href="http://schoolsofthought.blogs.cnn.com/2013/06/21/classical-schools-put-plato-over-ipad/">http://schoolsofthought.blogs.cnn.com/2013/06/21/classical-schools-put-plato-over-ipad/</a>Anonymoushttp://www.blogger.com/profile/08811822556440072470noreply@blogger.com0tag:blogger.com,1999:blog-5013299283767098630.post-18572668858185954982013-06-21T09:41:00.000-07:002013-07-11T12:16:30.736-07:00West Chester Connect Is On The Horizon!Today the Windows Phone 8 app for <em>"West Chester Connect"</em> became available in the Windows Store. The iPhone and Android Apps are already available. Still waiting on Blackberry to approve our app, but that will not stop us from launching our very exciting new citizen engagement tool, "West Chester Connect" next month! Stay tuned for exciting details!<br /><br /><table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhEMa1Kw93hmteKcZ4KzteoaidifxWbpG4gc4XgYU-U4Q-Hd7KOTRU73rWjRSZk1fkIQi11lhuucasE1GnIC7R5JOlSxDcqA2VuZ31nC7xxzV6sBLLaTeh7jiNKs6v6yXbjXBfDlmNu4LG/s1600/wp_ss_20130621_0001.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhEMa1Kw93hmteKcZ4KzteoaidifxWbpG4gc4XgYU-U4Q-Hd7KOTRU73rWjRSZk1fkIQi11lhuucasE1GnIC7R5JOlSxDcqA2VuZ31nC7xxzV6sBLLaTeh7jiNKs6v6yXbjXBfDlmNu4LG/s320/wp_ss_20130621_0001.jpg" width="192" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">West Chester Connect in the Windows Phone Store!</td></tr></tbody></table><br /><div class="MsoNormal" style="margin: 0in 0in 8pt;"><span style="font-family: Calibri;">The mission of <i style="mso-bidi-font-style: normal;">“West Chester Connect”</i> is to provide enhanced communication between our community and our staff. Work Orders that are reported through <i style="mso-bidi-font-style: normal;">“West Chester Connect”</i> shall be handled in the same professional manner as service requests made by telephone, walk-in or email. <o:p></o:p></span></div><br /><div class="MsoNormal" style="margin: 0in 0in 8pt;"><span style="font-family: Calibri;">Work Orders shall be completed in a timely and professional manner at all times. It should be understood that anyone can access any work order filed through <i style="mso-bidi-font-style: normal;">“West Chester Connect”</i>. <o:p></o:p></span></div><br /><div class="MsoNormal" style="margin: 0in 0in 8pt;"><span style="font-family: Calibri;">Citizens who submit work orders have the ability to receive “push notifications” on their mobile device as the work order is processed.<o:p></o:p></span></div><br /><div class="MsoNormal" style="margin: 0in 0in 8pt;"><span style="font-family: Calibri;">Work Orders completed through <i style="mso-bidi-font-style: normal;">“West Chester Connect”</i> are a public record and shall be handled in the most efficient manner possible. <o:p></o:p></span></div><br /><div class="MsoNormal" style="margin: 0in 0in 8pt;"><span style="font-family: Calibri;">The Borough of West Chester is committed to utilizing technology whenever possible in order to improve engagement and involvement between the members of our community and our government.<o:p></o:p></span></div>Anonymoushttp://www.blogger.com/profile/08811822556440072470noreply@blogger.com0tag:blogger.com,1999:blog-5013299283767098630.post-14089933864207598662013-06-20T18:08:00.000-07:002013-07-11T11:33:51.183-07:00<br /><div style="text-align: center;">Foundations Summer Preparation Tips For Parents and Students</div><div style="text-align: center;"><br /></div>Please realize that we do not suggest students "memorize ahead" the upcoming cycle's memory work. Their tutors will introduce new topics in exciting ways every week, and we do not wish to detract from that experience for the students, but these are some great ideas to help your family get ready for the pace and the content of the Foundations program:<br /><br />Bible<br />Search out, display, and memorize scriptures as your family "mottos" on topics like diligence for the year ahead. You<br />may wish to get a gentle "jump start" on the long scripture passages recommended for memorization in the year ahead.<br /><br />English Grammar<br />Work lightly through an English text that is grade level appropriate for each (or all) of your Foundations children, to prepare them for certain terminology to be introduced in our memory work. Do grammar exercises aloud or written.<br /><br />Geography<br />Familiarize your children with globes and maps with fun activites, use directions on the map, explore water and land masses, and begin tracing/drawing locations, so this is not a challenge when it is introduced in Foundations.<br /><br />History<br />Read together a history series that covers the topics for the upcoming cycle, such as The Story of the World, to gain an "big picture" understanding, so that more detailed reading/projects/studies can take place at home, throughout the academic year, as the new memory work is introduced each week. Movies may be incorporated, as well as field trips, or other projects, to begin to provide "learning pegs" even before the history facts are introduced, and then memorized.<br /><br />Latin<br />You may wish to begin to work through Latin's Not So Tough beginner levels, Latin for Children, or another elementary Latin program, to familarize your students with the Latin, (but this is not a requirement of the Foundations program).<br /><br />Math<br />Introduce or review the Multiplication Tables, plus the cubes and squares, especially if your children are new to them.<br /><br />Science<br />Spend lots of time outside playing in nature. Read books including some science topics covered in the upcoming cycle.<br /><br />Timeline<br />Organize and preview the timeline cards and begin to read through the information provided on the back of the cards. This is one of the most challenging subjects for some families to "keep up" with, so a "gentle start" can be helpful here. Read books and view movies/documentaries on some of the history topics covered in the timeline cards, as there will not be sufficient time for all of the world events to be studied weekly, at this level of detail, during the busy school year.<br />Anonymoushttp://www.blogger.com/profile/08811822556440072470noreply@blogger.com0tag:blogger.com,1999:blog-5013299283767098630.post-89695605315119394322013-06-20T11:41:00.000-07:002013-07-11T12:16:30.761-07:00Pink Floyd Invades Spotify<div class="story-body">A month or so ago my son was praising the merits of the internet music service, Spotify. I checked it out and there is a lot to like about it but I had a couple of problems with it. </div><div class="story-body"> </div><table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifaYQr4OA0NDylv_1ne8XgYO-LWq3zE5nnzz0V3qlFKNvFpP2jkOv-Fh9sFzYmeQeKbhDQaowhrAnZp4sh73n4Hd_-kYggaoKv7K2uzj0KLKeiGaiPaiDkzZnyz5K7-i6krNaQcgEtYPow/s1600/floyd+spotify.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="118" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifaYQr4OA0NDylv_1ne8XgYO-LWq3zE5nnzz0V3qlFKNvFpP2jkOv-Fh9sFzYmeQeKbhDQaowhrAnZp4sh73n4Hd_-kYggaoKv7K2uzj0KLKeiGaiPaiDkzZnyz5K7-i6krNaQcgEtYPow/s320/floyd+spotify.jpg" width="320" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">You can now enjoy the entire awesome Pink Floyd catalog on Spotify.</td></tr></tbody></table><div class="story-body"> </div><div class="story-body">1. Although there is a free version of this - you can not listen to Spotify on mobile devices without paying $9.99 per month. That is too expensive for me, especially since I already am a subscriber to Sirius/XM Radio. </div><div class="story-body"> </div><div class="story-body">2. My son went on about the massive song selection, however I found that there was almost no <em>Pink Floyd</em> there. This was a big problem for me.</div><div class="story-body"> </div><div class="story-body">Meanwhile, shortly after I checked out and gave up on Spotify my favorite rock group <em>Pink Floyd</em> gave the green light to Spotify to host the band's entire catalog. Why did the greatest rock band ever formed do this? Well apparently Pink Floyd announced earlier this month that it would resist releasing its music on Spotify until the 1975 classic "Wish You Were Here" hit 1 million streams.</div><div class="story-body"> </div>Well, the song hit 1 million, and Spotify announced via Twitter that Pink Floyd's tunes are now unlocked. <br /><br />You can check out Spotify at <a href="http://www.spotify.com/">www.spotify.com</a>. <br /><br /><em>Now I have a decision to make....</em><br /><br />Anonymoushttp://www.blogger.com/profile/08811822556440072470noreply@blogger.com0tag:blogger.com,1999:blog-5013299283767098630.post-48941860946726944772013-06-20T05:24:00.000-07:002013-07-11T12:16:30.851-07:00NASA Seeks Your HelpOn Tuesday, June 18, 2013 NASA announced an<a href="http://www.nasa.gov/mission_pages/asteroids/initiative/asteroid_grand_challenge.html" target="_blank"> Asteroid Grand Challenge</a> that solicits the public’s help in proposing asteroid-wrangling strategies for the agency’s Asteroid Initiative.<br /><br /><em>"NASA already is working to find asteroids that might be a threat to our planet, and while we have found 95 percent of the large asteroids near the Earth's orbit, we need to find all those that might be a threat to Earth,"</em> said NASA Deputy Administrator Lori Garver, <a href="http://www.nasa.gov/mission_pages/asteroids/initiative/asteroid_grand_challenge.html" target="_blank">in a press release</a>. "<em>This Grand Challenge is focused on detecting and characterizing asteroids and learning how to deal with potential threats. We will also harness public engagement, open innovation and citizen science to help solve this global problem."</em>.<br /><br /><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguklhfLsupkK6z_JYsAC1pGle2rog_FMkbuUekPySPq3vH0Lb2E60up8UUKTnaQRyr5ztzJZV7apM0GQ30OpPkHDnQA1OKm0gHMHfiIQclaWaw9rjlYG8ESYYNuU9oEDQrGCRqrY2Be0RA/s1600/spacerock.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="201" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguklhfLsupkK6z_JYsAC1pGle2rog_FMkbuUekPySPq3vH0Lb2E60up8UUKTnaQRyr5ztzJZV7apM0GQ30OpPkHDnQA1OKm0gHMHfiIQclaWaw9rjlYG8ESYYNuU9oEDQrGCRqrY2Be0RA/s320/spacerock.jpg" width="320" /></a></div><br />Throughout recorded history there have been hundreds of Earth impacts with many of these occurrences causing death and destruction. Of course the one we are think of is the one that took out the dinosaurs 65 million years ago. There is some recent evidence that perhaps it was actually a comet that ruined everything for the dinosaurs, but even if was a comet - it was big - and it was from space. <br /><br />NASA seems too be on edge about asteroid strikes these days - and with good reason. Here are just some of the recent events if you missed them:<br /><br /><strong>1908</strong> - This is one of the most infamous events in modern times. The explosion of an asteroid of Siberia, Russia destroyed 80 million trees in a remote region. <br /><br /><strong>1913</strong> - A ship was destroyed when it was struck by a meteorite while sailing between Sydney and South America. <br /><br /><strong>1954</strong> - The first recorded case of a human being injured from space rocks occurred on November 30, in Alabama. <br /><br /><strong>1972</strong> - A meteorite which ranged in size from a house to a car was filmed over the Rocky Mountains. Luckily the rock was reduced in size enough as it travelled through the atmosphere <span style="color: #666666;">(photo below)</span>, otherwise the impact could have been a Hiroshima type event. <br /><br /><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6l_U6_Z1eI9AYbEqdi6Lzo_tDOkR1V6aOVeYHrZoASTvdJxDs2K5mmbstKnq-YxibIMh8YEpyyeOvSbqlCFYVP7NlxLGdan-NHgRlI81EohBpLuZBNFxghXaTof5jSoFLocoZrmH8vvtG/s1600/earthgrazer_ansmet_big.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6l_U6_Z1eI9AYbEqdi6Lzo_tDOkR1V6aOVeYHrZoASTvdJxDs2K5mmbstKnq-YxibIMh8YEpyyeOvSbqlCFYVP7NlxLGdan-NHgRlI81EohBpLuZBNFxghXaTof5jSoFLocoZrmH8vvtG/s320/earthgrazer_ansmet_big.jpg" width="320" /></a></div><br /><br /><strong>2000</strong> - A fireball exploded over the city of Whitehorse in the Canadian Yukon lighting up the night sky. The space rock that exploded was estimated to weigh about 180 tons. <br /><br /><strong>2007</strong> - On September 15, a chondritic meteor crashed near the village of Carancas in southeastern Peru near Lake Titicaca, leaving a water-filled hole <span style="color: #666666;">(photo below)</span> and spewing gases across the surrounding area. Many residents became ill, apparently from the noxious gases shortly after the impact.<br /><br /><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaBsZ-foKcJ2JaTDwSL5Fycwjpk4A_joSjo1EJM-w8ocdpcmewMFwendmc0NvpSr8LeIzkcsb4gqxJn4RvU-rR3WxfS-PxXvFwAm-XN1txB74NDxOU0J_mXl7eJE842v6shRhp2SvhZx11/s1600/070921-meteor-peru_big.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaBsZ-foKcJ2JaTDwSL5Fycwjpk4A_joSjo1EJM-w8ocdpcmewMFwendmc0NvpSr8LeIzkcsb4gqxJn4RvU-rR3WxfS-PxXvFwAm-XN1txB74NDxOU0J_mXl7eJE842v6shRhp2SvhZx11/s320/070921-meteor-peru_big.jpg" width="320" /></a></div><br /><br /><strong>2007</strong> - On October 7, a meteroid labeled <span class="nowrap">2008 TC<sub>3</sub></span> was tracked for 20 hours as it approached Earth and as it fell through the atmosphere and impacted in Sudan. This was the first time an object was detected <strong>before</strong> it reached the atmosphere and hundreds of pieces of the meteorite were recovered from the Nubian Desert.<br /><br /><strong>2013</strong> - On February 15 an asteroid entered Earth's atmosphere <span style="color: #666666;">(photo below)</span> over Russia as a fireball and exploded above the city of Chelyabinsk during its passage through the Ural Mountains region. The object's air burst occurred at an altitude between 19 and 31 miles above the ground. About 1,500 people were injured, mainly by broken window glass shattered by the shock wave.<br /><br /><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzEThUe6anHwRYLpJTHGzlW2nWF3wIuxF5u___CrcInvdN9FxzBGlHVr9s932CrIqaqyh63E-A5zAh6gDPpA2eh7t86pN-UitGUD6ci6bEWvMLwteSZr72ad5rVGUw9_5i-lNgWVHK6jHJ/s1600/russia_meteor_dashcam11341900348_jpg_CROP_original-original.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="176" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzEThUe6anHwRYLpJTHGzlW2nWF3wIuxF5u___CrcInvdN9FxzBGlHVr9s932CrIqaqyh63E-A5zAh6gDPpA2eh7t86pN-UitGUD6ci6bEWvMLwteSZr72ad5rVGUw9_5i-lNgWVHK6jHJ/s320/russia_meteor_dashcam11341900348_jpg_CROP_original-original.jpg" width="320" /></a></div><br /><br />These are just a small amount of the countless documented collisions between space debris and the Earth. The problem we have is that NASA's mission has been seriously damaged by recent cuts to it's budget. In addition there are actually some things that NASA could do if a space rock was observed hurtling toward our planet, however there simply is not the money to monitor the space in a way that we should be, especially considering we are living in the 21st century and that we landed on the Moon 44 years ago. <br /><br />You can learn more about NASA's Asteroid Initiative <a href="http://www.nasa.gov/mission_pages/asteroids/initiative/asteroid-rfi.html" target="_blank">here</a>.Anonymoushttp://www.blogger.com/profile/08811822556440072470noreply@blogger.com0tag:blogger.com,1999:blog-5013299283767098630.post-39916467005758536352013-06-20T04:32:00.000-07:002013-07-11T12:16:30.940-07:00Microsoft's Bounty Program<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNOUnIsR_RV8LQSHNi4Lzio0BWRND-7jYD7iSv-4tHMnYddhtPUBnRwGSb3k0YT5KDD7QxGsqOhSTvBU5jTsJkqMf259GT60WsjuEPDD6gdNAnHl8AQwhbtPziMzWEI-wiMzFMrFADlQv1/s1600/ie9-logo.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNOUnIsR_RV8LQSHNi4Lzio0BWRND-7jYD7iSv-4tHMnYddhtPUBnRwGSb3k0YT5KDD7QxGsqOhSTvBU5jTsJkqMf259GT60WsjuEPDD6gdNAnHl8AQwhbtPziMzWEI-wiMzFMrFADlQv1/s200/ie9-logo.png" width="200" /></a></div>Microsoft is following in the footsteps of Google, Facebook, and Mozilla by finally implementing a <a data-ls-seen="1" href="http://www.microsoft.com/security/msrc/report/bountyprograms.aspx" target="_blank">bug bounty program</a>. These programs have helped Google and Mozilla create very competitive internet browsers which of course have been stealing market share away from Microsoft's Internet Explorer for years. <br /><br />Starting on June 26, Redmond will kick off three bounty programs for exploits related to Windows 8.1 and Internet Explorer 11. Those who manage to crack Microsoft's programs can collect up to $100,000 in reward money.<br /><br />These programs will allow Microsoft to reward work by researchers and improve the security of their software — all to the benefit of consumers.<br /><br />The three programs include:<br /><!-- HTML MODULE 3710 --><!-- BEGIN Module 3710 --> <style type="text/css">ul.article_ul {list-style-type:disc!important;} ul.article_ul li {margin-left:30px!important; padding:0px 15px 5px 1px!important;} <style>table.pcm_table1 {border-collapse:collapse!important; border:1px solid #CCC!important;} table.pcm_table1 td, th {border:1px solid #CCC!important; padding:3px;} </style> <!-- END Module 3710 --> <br /><b>Mitigation Bypass Bounty:</b> Earn up to $100,000 for an exploit against Microsoft's upcoming Windows 8 update, <a data-ls-seen="1" href="http://www.pcmag.com/article2/0,2817,2419993,00.asp">Windows 8.1</a>.<br /><b></b><br /><b>BlueHat Bonus for Defense:</b> Earn up to $50,000 "for defensive ideas that accompany a qualifying Mitigation Bypass submission," Microsoft said.<br /><b></b><br /><b>Internet Explorer 11 Preview Bug Bounty:</b> Earn up to $11,000 for vulnerabilities on IE11 within Windows 8.1. <br /><br />Microsoft did not set a hard deadline for the first two programs, but participants have 30 days, or until July 26, to uncover a bug within IE11.<br /><br />The highest rewards will be given to those who demonstrate the ability of the exploit to bypass Microsoft's security layers.<br /><br />Aside from offering heaps of cash to researchers, the three researcher-focused programs <em>"will also help to fill gaps in the current marketplace and enhance our relationships within this invaluable community, all while making our products more secure for our customers,"</em> Mike Reavey, senior director of the Microsoft Security Response Center, said in a statement.<br /><br />This move marks Microsoft's first step into the world of bug bounties which their competitors have been using for years. I expect Microsoft's Internet Explorer to improve as a result of this new program. I just wish they had done this years ago. Anonymoushttp://www.blogger.com/profile/08811822556440072470noreply@blogger.com0tag:blogger.com,1999:blog-5013299283767098630.post-90334564033796042102013-06-19T08:53:00.000-07:002013-07-11T12:16:31.025-07:00Office 365 Arrives @ Apple - Sort OfTiming is everything. We here at the <em>Borough of West Chester</em> have been in Microsoft's (email) cloud for over 2 years now and in fact just a couple weeks ago we were upgraded to <strong>Microsoft 365</strong>. This week after more than a year of rumors, Microsoft has finally released a version of its Office suite for the iPhone (yes the iPhone). If you use an iPhone you can now access Office 365 from your smartphone. <br /><br /><table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6w4PqiIut-KIn5GKRNJwBFmbJxgNNTWTKHcVacPbW0Owk1-eFOIqsXC2RyX9z0BBcFbtJDLp2IyZXcPhuIU_1Do_mkuHxFqQL5btn8JidJXnwJ2bQuoTYqj85iBSfRj0hyphenhyphenXe-diRfeTgM/s1600/office1.JPG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6w4PqiIut-KIn5GKRNJwBFmbJxgNNTWTKHcVacPbW0Owk1-eFOIqsXC2RyX9z0BBcFbtJDLp2IyZXcPhuIU_1Do_mkuHxFqQL5btn8JidJXnwJ2bQuoTYqj85iBSfRj0hyphenhyphenXe-diRfeTgM/s320/office1.JPG" width="240" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">Office 365 in the iPhone App Store!</td></tr></tbody></table><br />The app, available for subscribers of Office 365, includes iPhone versions of Word, Excel, and PowerPoint, which will allow you to create, edit, and update all of your documents and sync them with Microsoft's SkyDrive cloud storage service.<br /><br />However the app is currently only being offered for the iPhone, not the iPad. You can get around this somewhat by searching in the store for it on your iPad but selecting iPhone apps. Once downloaded you will need to increase the size (2x) to fill your screen. Until a true iPad app is available this is the only option if you want to access your Office 365 account on your iPad. <br /><br /><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYKYYxd734eIFRpA1KQEt9ZV0UJurV9tYbBOVALEpu9gJEGzGUvMOmlwUyRxLRloN9Hm-He_oBk8Ye_xvnWkt-Exi4Ub7SYufh1GVr-m_OPTaS7FXeIB49q_SkdIGsAfHBUEvMpGsA9vdy/s1600/office2.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYKYYxd734eIFRpA1KQEt9ZV0UJurV9tYbBOVALEpu9gJEGzGUvMOmlwUyRxLRloN9Hm-He_oBk8Ye_xvnWkt-Exi4Ub7SYufh1GVr-m_OPTaS7FXeIB49q_SkdIGsAfHBUEvMpGsA9vdy/s320/office2.JPG" width="240" /></a></div><strong>Here is How to Setup Office 365 on Your iPhone or iPad</strong><br /><br />1. Search for Office 365 in the app store. If you are using an iPad make sure to select "iPhone Apps" or you will not see it. The app is free so there is no reason not to install it - if you have an Office 365 account. <br /><br />2. Once downloaded slide through the short tutorial and at the end you will be promoted to log into to your account. Select "I have an Office 365 subscription" and enter your email address to activate Office. <br /><br />3. It will then ask you what type of account you have. Select "Organizational Account". <br /><br />4. Once completed you will have access to any documents you have saved in SkyDrive or SharePoint. <br /><br />5. If you have an additional Skydrive account you can add it by selecting the "Open" folder and choosing Add a Place. <br /><br />With Microsoft now selling Office 365 as a subscription service to consumers I am sure a true iPad app as well one for Android devices is around the corner as well. <em>Stay tuned.</em>Anonymoushttp://www.blogger.com/profile/08811822556440072470noreply@blogger.com0tag:blogger.com,1999:blog-5013299283767098630.post-88956725553284976852013-06-17T08:13:00.000-07:002013-07-11T11:33:51.192-07:00Teach Them Diligently Conference in Oaks, PA!<br />Ken Hamm is the featured speaker in Philadelphia.<br />Visit teachthemdiligentlymarketplace.com for more information...<br /><br /><table align="center" border="0" cellpadding="0" cellspacing="0" style="background-color: white; border-spacing: 0px; border: none; font-family: Myriad, Helvetica, Tahoma, Arial, clean, sans-serif; font-size: 12px; margin: 0px 0px 60px; padding: 0px; width: 800px;"><tbody><tr><td style="margin: 0px; padding: 0px;"><center><table align="center" border="0" cellpadding="0" cellspacing="0" id="tblHdr" style="border-spacing: 0px; border: none; color: #252525; font-size: 12px; margin: 0px; padding: 0px; width: 600px;"><tbody><tr><td style="margin: 0px; padding: 0px; width: 288px;" valign="top"><div style="font-size: 1em; margin-bottom: 1.5em; margin-top: 1.5em; padding: 0px;"><br /></div><h2 style="font-size: 1.1667em; line-height: 1.286em; margin: 1.929em 0px 0.643em; padding: 0px;">A New Way to Experience <em>Teach Them Diligently</em> Near You!</h2><div style="color: white; font-size: 1em; margin-bottom: 1.5em; margin-top: 1.5em; padding: 0px 20px;">Thousands of families across the country have heard of the encouragement and discipleship focus of a Teach Them Diligently Convention. Now experience all of the wonderful encouragement of our larger conventions, but on a smaller scale and lower cost.</div><div style="font-size: 1em; margin-bottom: 1.5em; margin-top: 1.5em; padding: 0px;"><img alt="Teach Them Diligently Homeschool Marketplace" border="0" height="21" src="http://teachthemdiligently.net/e-templates/marketplace/colDiv.jpg" style="border: 0px none;" width="255" /></div><ul style="color: white; list-style: none; margin: 0px; padding: 0px;"><li style="font-size: 1em; line-height: 18px; margin: 0px; padding: 0px 0px 24px;"><img border="0" src="http://teachthemdiligently.net/e-templates/marketplace/bulletarrows_blue.jpg" style="border: 0px none; float: left; margin-right: 5px;" /><span style="color: #bae2f7; font-size: 15pt; font-weight: 900;">GREAT SPEAKERS</span><em> & Encouragement</em></li><li style="font-size: 1em; line-height: 18px; margin: 0px; padding: 0px 0px 24px;"><img border="0" src="http://teachthemdiligently.net/e-templates/marketplace/bulletarrows_blue.jpg" style="border: 0px none; float: left; margin-right: 5px;" /><span style="color: #bae2f7; font-size: 15pt; font-weight: 900;">LOW PRICES</span><em> on Homeschool Curriculum & Resources</em></li><li style="font-size: 1em; line-height: 18px; margin: 0px; padding: 0px 0px 24px;"><img border="0" src="http://teachthemdiligently.net/e-templates/marketplace/bulletarrows_blue.jpg" style="border: 0px none; float: left; margin-right: 5px;" /><span style="color: #bae2f7; font-size: 15pt; font-weight: 900;">MOMS RETREAT</span><em> sampler option the evening before</em></li><li style="font-size: 1em; line-height: 18px; margin: 0px; padding: 0px 0px 24px;"><img border="0" src="http://teachthemdiligently.net/e-templates/marketplace/bulletarrows_blue.jpg" style="border: 0px none; float: left; margin-right: 5px;" /><span style="color: #bae2f7; font-size: 15pt; font-weight: 900;">COMPARISON SHOPPING</span><em> easily evaluate homeschool curriculums side-by-side</em></li></ul></td><td style="margin: 0px; padding: 0px;" valign="top"><h1 style="font-size: 1.5em; font-weight: normal; line-height: 1em; margin: 1em 0px 0px; padding: 0px;"><strong>JOIN US!</strong><br /><span id="date">in Pittsburgh & Philly</span><br /><span id="venue">June 22 & 29</span></h1><div style="font-size: 1em; margin-bottom: 1.5em; margin-top: 1.5em; padding: 0px 0px 0px 60px;"><a href="http://r20.rs6.net/tn.jsp?e=0012htt5EWmsrM0gg-3gLEjBuiy9g3jxcfU_tw9wa77n-TyAysjaich_gK5D98L0YAfHfTEez-KUvVmgZ04PgQPQYJeu8ZBbhb7D0Iw8t6ehHwd77b-9VmIbA81lL9gEs_Gmmi5Zl4rjxwZcZnRaUZIxGxpalVmvVNS" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img alt="Teach Them Diligently Homeschool Marketplace" border="0" height="41" src="http://teachthemdiligently.net/e-templates/marketplace/15Registration.jpg" style="border: 0px none;" width="200" /></a><br /></div><div style="color: #ffff99; font-size: 10pt; margin-bottom: 1.5em; margin-top: 1.5em; padding: 0px; text-align: center;">Choose from these locations:</div><div id="locationslist" style="font-size: 1em; margin-bottom: 1.5em; margin-top: 1.5em; padding: 0px;"><br /></div><div style="font-size: 1em; margin-bottom: 1.5em; margin-top: 1.5em; padding: 35px 0px 0px; text-align: right;"><img alt="Teach Them Diligently Homeschool Marketplace" border="0" height="325" src="http://teachthemdiligently.net/e-templates/marketplace/Pennsylvania_Speakers.jpg" style="border: 0px none;" width="301" /></div></td></tr></tbody></table></center><center><br /></center><center><table align="center" border="0" cellpadding="0" cellspacing="0" style="border-spacing: 0px; border: none; font-size: 12px; margin: 0px; padding: 0px; width: 700px;"><tbody><tr><td style="margin: 0px; padding: 0px;"><div id="bodyContent" style="font-size: 11pt; margin: 0px; padding: 60px;"><div style="font-size: 1em; margin-bottom: 1.5em; margin-top: 1.5em; padding: 0px;"><img alt="Teach Them Diligently Homeschool Marketplace" border="0" height="150" src="http://teachthemdiligently.net/e-templates/marketplace/KenHam.jpg" style="border: 0px none; float: right; margin-bottom: 20px; margin-left: 30px;" width="200" /><span style="font-size: 1em;">This is a totally new concept in homeschool events which will feature an incredible selection of curriculum and educational materials in a manner that will allow you to compare them side by side to help you choose what is best for your family.</span></div><h2 style="font-size: 1.1667em; line-height: 1.286em; margin: 1.929em 0px 0.643em; padding: 0px;">Why Should You Attend?</h2><ul style="list-style: none; margin: 0px; padding: 0px;"><li style="clear: both; font-size: 1em; line-height: 16px; margin: 0px; padding: 0px 0px 20px;"><img border="0" height="33" src="http://teachthemdiligently.net/e-templates/marketplace/bulletarrows_gray.jpg" style="border: 0px none; float: left; margin-right: 5px;" width="33" /><strong><a href="http://r20.rs6.net/tn.jsp?e=0012htt5EWmsrPttCYRqBv13CgBXLOCgh5ho8hvfNwPwhNZRJy1yqaQlz3oYBRykN8KURrkPpfZDGVWes9DXoIfvtmRiiMe-Cjrwf9AKiYbFkaJV1pUXcxvHfAKltherUjvjAZiJn59_3-TOnOOZy1BitnNxAqMkZnZ" target="_blank">Camraderie and encouragement</a></strong> with large numbers of other homeschool mothers and families</li><li style="font-size: 1em; margin: 0px; padding: 0px 0px 20px;"><img border="0" height="33" src="http://teachthemdiligently.net/e-templates/marketplace/bulletarrows_gray.jpg" style="border: 0px none; float: left; margin-right: 5px;" width="33" /><strong><a href="http://r20.rs6.net/tn.jsp?e=0012htt5EWmsrPJeqBPNKxbqODZoIMHd9w5zOiq4nRypAKWs6YSvzNIGQakShrhfzKBxd4mhB1Nzfje4yLOE68mb-zFqwKvbHif_czuSM6YTrfI8DMgBLx6cG8zHPOYRW-gRaazUKbAfuR8X2WxfPwhn1cOO7UyRP_W" target="_blank">Great speakers</a></strong> that are experienced in homeschooling and able to equip you as a parent and homeschooler</li><li style="clear: both; font-size: 1em; line-height: 16px; margin: 0px; padding: 0px 0px 20px;"><img border="0" height="33" src="http://teachthemdiligently.net/e-templates/marketplace/bulletarrows_gray.jpg" style="border: 0px none; float: left; margin-right: 5px;" width="33" /><span style="display: block; padding-top: 8px;"><strong><a href="http://r20.rs6.net/tn.jsp?e=0012htt5EWmsrOWyZleuR9Bcoalk5gXJRRjpCxU-XEVstNxK3Fq6ZZDm-I-N0nNDAvPHvXFJZBvO2TZNcxEcG4_yEWUSslb0KTHosifA7cPATcUvUV_bzdpHMjy6QEe0bMnrd7K9hrCWrrfJxhApQV0bmbqpvfk8AfAdyoEd6MCbMY=" target="_blank">Breadth and depth of selection for trusted curriculum</a></strong> at great prices! Hundreds of different brands will be represented!</span></li><li style="clear: both; font-size: 1em; line-height: 16px; margin: 0px; padding: 0px 0px 20px;"><img border="0" height="33" src="http://teachthemdiligently.net/e-templates/marketplace/bulletarrows_gray.jpg" style="border: 0px none; float: left; margin-right: 5px;" width="33" /><span style="display: block; padding-top: 8px;"><strong>Curriculum Specialists </strong>to help you evaluate which curriculums will best suit your children's learning styles.</span></li><li style="clear: both; font-size: 1em; line-height: 16px; margin: 0px; padding: 0px 0px 20px;"><img border="0" height="33" src="http://teachthemdiligently.net/e-templates/marketplace/bulletarrows_gray.jpg" style="border: 0px none; float: left; margin-right: 5px;" width="33" /><span style="display: block; padding-top: 8px;"><strong>Heather Laurie </strong>of Special Needs Homeschooling will be with us in Pittsburgh to help special needs families.</span></li></ul><div style="font-size: 1em; margin-bottom: 1.5em; margin-top: 1.5em; padding: 0px;">No other homeschool convention can match the selection of curriculum and educational materials that we offer. We will even feature outstanding digital resources.<img alt="Teach Them Diligently Homeschool Marketplace" border="0" height="21" src="http://teachthemdiligently.net/e-templates/marketplace/pageDiv.jpg" style="border: 0px none; font-size: 1em; text-align: center;" width="559" /><span style="font-size: 1.1667em; line-height: 1.286em;">Teach Them Diligently Marketplace Event Schedules</span></div><table border="0" cellpadding="0" cellspacing="0" style="border-spacing: 0px; font-size: 15px; width: 100%px;"><tbody><tr><td style="font-size: 11pt; margin: 0px; padding: 0px; width: 580px;" valign="top"><h4 style="font-size: 12pt; letter-spacing: -1px; line-height: 1.5em; margin: 1.5em 0px 0px; padding: 0px;">Pittsburgh, PA Session Schedule - June 22</h4><div style="font-size: 1em; margin-bottom: 1.5em; margin-top: 1.5em; padding: 0px;">11 Sessions, 50 minutes each with 20 minute break in between sessions.</div><table border="0" cellpadding="0" cellspacing="0" id="sessiontable" style="border-spacing: 0px; font-size: 15px; width: 100%px;"><tbody><tr><td style="margin: 0px; padding: 0px;" width="87%"><em><strong>Carol Barnier</strong> - 17 Years of Homeschooling and I Hardly Twitch at All Anymore</em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top" width="13%">8:30 - 9:20</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Tim Chaffey</strong> - Is Genesis Relevant in Todays World?</em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">9:40 - 10:30</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Debra Bell</strong> - </em>Developing Motivation and Interest in Kids of All Ages </td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">10:50 - 11:40</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Zan Tyler</strong> - How Do I Teach My Elementary-Aged Children to Have a Biblical Worldview?</em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">12:00 - 12:50</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Carol Barnier</strong> - Teaching Your Child to Read...Made Easy</em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">1:10 - 2:00</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Tim Chaffey</strong> - Demolishing Supposed Bible Contradictions</em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">2:20 - 3:10</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Debra Bell</strong> - Why Homeschooling Works</em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">3:30 - 4:20</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Zan Tyler</strong> - Living in the Fiery Furnace: How to Avoid Homeschool Burnout</em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">4:40 - 5:30</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Tim Chaffey</strong> - Infallible Proofs for the Resurrection of Jesus Christ</em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">5:50 - 6:40</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Debra Bell</strong> - Twenty-First Century Homeschooling</em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">7:00 - 7:50</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Zan Tyler</strong> - Overwhelmed? How the Bible Can Solve Your Homeschooling Challenges</em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">8:10 - 9:00</td></tr></tbody></table></td></tr></tbody></table><table border="0" cellpadding="0" cellspacing="0" style="border-spacing: 0px; font-size: 15px; width: 100%px;"><tbody><tr><td style="font-size: 11pt; margin: 0px; padding: 0px; width: 580px;" valign="top"> </td></tr><tr><td style="font-size: 11pt; margin: 0px; padding: 0px; width: 580px;" valign="top"><h4 style="font-size: 12pt; letter-spacing: -1px; line-height: 1.5em; margin: 1.5em 0px 0px; padding: 0px;">Philadelphia, PA Session Schedule - June 29</h4><table border="0" cellpadding="0" cellspacing="0" id="sessiontable3" style="border-spacing: 0px; font-size: 15px; width: 100%px;"><tbody><tr><td style="margin: 0px; padding: 0px;" width="87%"><em><strong>Ken Ham</strong> - Is Genesis Relevant in 2013</em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top" width="13%">8:30 - 9:20</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Ken Ham</strong> - Science and the Bible-How to Defend the Christian Faith</em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">9:40 - 10:30</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Carol Barnier</strong> - </em>17 Years of Homeschooling and I Hardly Twitch at All Anymore</td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">10:50 - 11:40</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Hal & Melanie Young</strong> - Raising Real Men</em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">12:00 - 12:50</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Toni Anderson</strong> - Be a Yes Mom</em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">1:10 - 2:00</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Carol Barnier</strong> - Help! I Fell off my Lesson Plan!</em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">2:20 - 3:10</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Hal & Melanie Young</strong> - Ballistic Homeschooling: Teaching Boys</em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">3:30 - 4:20</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Toni Anderson</strong> - The Homeschool Mom's Guide to Getting Dinner on the Table</em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">4:40 - 5:30</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Carol Barnier</strong> - What are you THINKING? Learning Styles and Beyond</em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">5:50 - 6:40</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Hal & Melanie Young</strong> - Teach Discernment</em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">7:00 - 7:50</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Toni Anderson</strong> - How to Homeschool an Average Child</em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">8:10 - 9:00</td></tr></tbody></table></td></tr></tbody></table></div></td></tr></tbody></table><a href="http://r20.rs6.net/tn.jsp?e=0012htt5EWmsrOWyZleuR9Bcoalk5gXJRRjpCxU-XEVstNxK3Fq6ZZDm-I-N0nNDAvPHvXFJZBvO2TZNcxEcG4_yEWUSslb0KTHosifA7cPATcUvUV_bzdpHMjy6QEe0bMnrd7K9hrCWrrfJxhApQV0bmbqpvfk8AfAdyoEd6MCbMY=" target="_blank"><img alt="Teach Them Diligently Homeschool Marketplace" border="0" height="419" src="http://teachthemdiligently.net/e-templates/marketplace/CurriculumHdr.jpg" style="border: 0px none;" width="800" /></a><table align="center" border="0" cellpadding="0" cellspacing="0" style="background-image: url(http://teachthemdiligently.net/e-templates/marketplace/Ladies.jpg); background-position: 0% 100%; background-repeat: no-repeat no-repeat; border-spacing: 0px; border: none; font-size: 12px; height: 1800px; margin: 0px; padding: 0px; width: 700px;"><tbody><tr><td style="margin: 0px; padding: 0px;" valign="top"><div id="bodyContent" style="font-size: 11pt; margin: 0px; padding: 0px 60px 60px;"><div style="font-size: 1em; margin-bottom: 1.5em; margin-top: 1.5em; padding: 0px; text-align: center;"><a href="http://r20.rs6.net/tn.jsp?e=0012htt5EWmsrO77czkM5TbnsyMv4XsMpqOP92iA9A-DsijDFBCrHNsE_hREl2jmYx_MPzIhrr_eOfwYuSXsSENsqo5gtTpwprxq6G7MeXzXMl6dOV-rfoD8-HIMvxIWXLbR19SpgZ6hVlzVfBe4QNYEw==" target="_blank"><img alt="Teach Them Diligently Homeschool Marketplace" border="0" height="190" src="http://teachthemdiligently.net/e-templates/marketplace/email_JonathanPark.jpg" style="border: 0px none;" width="190" /></a><a href="http://r20.rs6.net/tn.jsp?e=0012htt5EWmsrO77czkM5TbnsyMv4XsMpqOP92iA9A-DsijDFBCrHNsE_hREl2jmYx_MPzIhrr_eOfwYuSXsSENsqo5gtTpwprxq6G7MeXzXMl6dOV-rfoD8-HIMvxIWXLbR19SpgZ6hVlzVfBe4QNYEw==" target="_blank"><img alt="Teach Them Diligently Homeschool Marketplace" border="0" height="190" src="http://teachthemdiligently.net/e-templates/marketplace/email_SaxonMath5-4.jpg" style="border: 0px none;" width="190" /></a><a href="http://r20.rs6.net/tn.jsp?e=0012htt5EWmsrO77czkM5TbnsyMv4XsMpqOP92iA9A-DsijDFBCrHNsE_hREl2jmYx_MPzIhrr_eOfwYuSXsSENsqo5gtTpwprxq6G7MeXzXMl6dOV-rfoD8-HIMvxIWXLbR19SpgZ6hVlzVfBe4QNYEw==" target="_blank"><img alt="Teach Them Diligently Homeschool Marketplace" border="0" height="190" src="http://teachthemdiligently.net/e-templates/marketplace/email_ExplodeTheCode.jpg" style="border: 0px none;" width="190" /></a></div><div style="font-size: 1em; margin-bottom: 1.5em; margin-top: 1.5em; padding: 0px;"><img alt="" border="0" height="33" src="http://teachthemdiligently.net/e-templates/marketplace/bulletarrows_gray.jpg" style="border: 0px none; float: left; margin-right: 5px;" width="33" /><span style="display: block; font-size: 13pt; font-style: italic; font-weight: bold; padding-top: 4px;"><a href="http://r20.rs6.net/tn.jsp?e=0012htt5EWmsrO77czkM5TbnsyMv4XsMpqOP92iA9A-DsijDFBCrHNsE_hREl2jmYx_MPzIhrr_eOfwYuSXsSENsqo5gtTpwprxq6G7MeXzXMl6dOV-rfoD8-HIMvxIWXLbR19SpgZ6hVlzVfBe4QNYEw==" style="color: #9a1c2f;" target="_blank">See more deals like these available on-site at a Marketplace event near you!</a></span></div><div style="font-size: 1em; margin-bottom: 1.5em; margin-top: 1.5em; padding: 0px; text-align: center;"><img alt="Teach Them Diligently Homeschool Marketplace" border="0" height="21" src="http://teachthemdiligently.net/e-templates/marketplace/pageDiv.jpg" style="border: 0px none;" width="559" /></div><h3 style="font-size: 14pt; letter-spacing: -1px; line-height: 1.5em; margin: 1.5em 0px 0px; padding: 0px;">One Day Isn't Enough For you? Come the night before Marketplace for the Apologia Real Refreshment Retreat Sampler</h3><h2 style="color: #75943b; font-size: 1.1667em; letter-spacing: -1px; line-height: 1.286em; margin: 1.929em 0px 0.643em; padding: 0px;">A Special Night of ENCOURAGEMENT for Homeschool Moms</h2><div style="font-size: 1em; margin-bottom: 1.5em; margin-top: 1.5em; padding: 0px;"><img alt="Teach Them Diligently Homeschool Marketplace" border="0" height="176" src="http://teachthemdiligently.net/e-templates/marketplace/RealRefresh.jpg" style="border: 0px none; float: right; margin-bottom: 10px; margin-left: 30px;" width="218" />Thousands of moms have experienced a full-course weekend of unparalleled homeschool encouragement offered at Apologia's Real Refreshment Retreats. Dynamic speakers have spoken life into their homeschool, refreshing their God-given vision of ministering to their families.</div><div style="font-size: 1em; margin-bottom: 1.5em; margin-top: 1.5em; padding: 0px;"><strong><em style="font-size: 13pt;">Now it's your turn.</em></strong></div><div style="font-size: 1em; margin-bottom: 1.5em; margin-top: 1.5em; padding: 0px;">These events have blessed so many moms across the country and now we're bringing a sampler to you! You can add the Refresh Retreat to your Marketplace experience for only $30 more!</div><div style="font-size: 1em; margin-bottom: 1.5em; margin-top: 1.5em; padding: 0px;">The Real Refreshment Sampler will be an exclusive event the evening before each Teach Them Diligently Marketplace. You will be treated to a chocolate reception followed by a feast of encouragement, renewal, and equipping. Join us as we fellowship together to recharge our spiritual batteries and satisfy our sweet tooth.</div><div style="font-size: 1em; margin-bottom: 1.5em; margin-top: 1.5em; padding: 0px;">How can you resist such a sweet invitation? Space is limited, so <strong><a href="http://r20.rs6.net/tn.jsp?e=0012htt5EWmsrM0gg-3gLEjBuiy9g3jxcfU_tw9wa77n-TyAysjaich_gK5D98L0YAfHfTEez-KUvVmgZ04PgQPQYJeu8ZBbhb7D0Iw8t6ehHwd77b-9VmIbA81lL9gEs_Gmmi5Zl4rjxwZcZnRaUZIxGxpalVmvVNS" target="_blank">register today</a></strong>. We are already praying for our time together.</div><h2 style="font-size: 1.1667em; line-height: 1.286em; margin: 1.929em 0px 0.643em; padding: 0px;">Real Refreshment Sampler Speaking Sessions</h2><table border="0" cellpadding="0" cellspacing="0" id="sessionstable" style="border-spacing: 0px; font-size: 15px; width: 100%px;"><tbody><tr><td style="margin: 0px; padding: 0px;" width="35%"><em><strong>Rachael Carman</strong></em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top" width="65%">Real Refreshment Redefined</td></tr><tr><td style="margin: 0px; padding: 0px;" valign="top"><em><strong>Sherri Seligson</strong></em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">How Should I think about Excellence? Seeing the Exceptional in the Everyday, the Phenomenal in the Nominal</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Debra Bell</strong></em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">The Comparison Trap</td></tr></tbody></table><h2 style="font-size: 1.1667em; line-height: 1.286em; margin: 1.929em 0px 0.643em; padding: 0px;">Real Refreshment Sampler Event Schedule</h2><table border="0" cellpadding="0" cellspacing="0" style="border-spacing: 0px; font-size: 15px; width: 100%px;"><tbody><tr><td style="font-size: 11pt; margin: 0px; padding: 0px; width: 580px;" valign="top"><table border="0" cellpadding="0" cellspacing="0" id="sessiontable2" style="border-spacing: 0px; font-size: 15px; width: 100%px;"><tbody><tr><td style="margin: 0px; padding: 0px;" width="87%"><em><strong>Registration Begins</strong></em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top" width="13%">4:45pm</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Chocolate Reception</strong></em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">5:00pm</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Welcome and Orientation to the Evening</strong></em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">5:30pm</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Presentation #1</strong></em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">5:45pm</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Prayer Circle</strong></em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">6:30pm</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Break</strong></em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">7:00pm</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Presentation #2</strong></em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">7:15pm</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Speaker Testimonial and Invitation to RRR</strong></em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">8:00pm</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Q&A Session</strong></em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">8:20pm</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Shop and Meet Speakers</strong></em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">8:40pm</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Closing Prayer</strong></em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">8:55pm</td></tr><tr><td style="margin: 0px; padding: 0px;"><em><strong>Dismiss</strong></em></td><td style="font-style: italic; margin: 0px; padding: 0px;" valign="top">9:00pm</td></tr></tbody></table></td></tr></tbody></table><div style="font-size: 9pt; font-style: italic; margin-bottom: 1.5em; margin-top: 1.5em; padding: 0px;">The Real Refreshment<br />Retreats Sampler is not<br />included as part of the<br />$15 family<br />registration.</div></div></td></tr></tbody></table><table align="center" border="0" cellpadding="0" cellspacing="0" style="border-spacing: 0px; border-style: solid none none; border-top-color: rgb(51, 51, 51); border-top-width: 10px; font-size: 12px; margin: 0px 0px 50px; padding: 0px; width: 700px;"><tbody><tr align="center" style="line-height: 0px;"><td align="center" style="margin: 0px; padding: 0px;"><div style="font-size: 1em; margin-bottom: 1.5em; margin-top: 1.5em; padding: 0px;"><a href="http://r20.rs6.net/tn.jsp?e=0012htt5EWmsrM0gg-3gLEjBuiy9g3jxcfU_tw9wa77n-TyAysjaich_gK5D98L0YAfHfTEez-KUvVmgZ04PgQPQYJeu8ZBbhb7D0Iw8t6ehHwd77b-9VmIbA81lL9gEs_Gmmi5Zl4rjxwZcZnRaUZIxGxpalVmvVNS" target="_blank"><img alt="" src="http://teachthemdiligentlymarketplace.com/images/btn_register_sm.png" style="border: 0px none;" /></a></div><div style="font-size: 1em; margin-bottom: 1.5em; margin-top: 1.5em; padding: 10px;"></div><center>Teach Them Diligently <em><strong>Marketplace</strong></em> is presented by...</center></td></tr><tr align="center" style="line-height: 0px;"><td align="center" style="margin: 0px; padding: 0px 0px 10px;"><center><a href="http://r20.rs6.net/tn.jsp?e=0012htt5EWmsrPdKPWry1jUtayrmvkHklR1LB7-Di08gJwnewRgjGbbI7gPyXTV6eUPPqEbVPyqbHmEX5W6x2p-E8xDXxmaXXd3Mq8aw4f--O3Obr0N9eHqxBbQ-nfHGyHi" target="_blank"><img alt="Teach Them Diligently Homeschool Marketplace" border="0" height="100" src="http://teachthemdiligently.net/e-templates/marketplace/AnwersInGenesis.jpg" style="border: 0px none;" width="100" /></a> <a href="http://r20.rs6.net/tn.jsp?e=0012htt5EWmsrMcDo-4kIoj3QNrKMY9gasygLN76BQESO8O9GFOk7z6FCovlUrgp7HZ7PHdfoppNdZYj-Hwd4rOK4EvgDVYD6XLcnyYqTTi3qXKoFuAHyITkA==" target="_blank"><img alt="Teach Them Diligently Homeschool Marketplace" border="0" height="100" src="http://teachthemdiligently.net/e-templates/marketplace/Apologia.jpg" style="border: 0px none;" width="100" /></a> <a href="http://r20.rs6.net/tn.jsp?e=0012htt5EWmsrMikvPrfEzr9FXQzryXgWgNxS4phqf70e0Sf0F43FD6PVq81y_jVFOdTbe2PmmS2SMbA1gn2miS8dMPsp3HmwY6tj30Pr-POCWGUfxn1UXaZw==" target="_blank"><img alt="Teach Them Diligently Homeschool Marketplace" border="0" height="100" src="http://teachthemdiligently.net/e-templates/marketplace/BJUPress.jpg" style="border: 0px none;" width="100" /></a> <a href="http://r20.rs6.net/tn.jsp?e=0012htt5EWmsrMoJYOd_wm3Eq_n-kxWOomBfrnoUnLKXhrlIuH7nJzPAHLbiLVUiVsEjU8dvpp2eiqFBWRSdmhaJ5nMkKgIia-DLoYRtN964yhPvdQDpJKRLxse1-0yelZvj3LGR2kwILY=" target="_blank"><img alt="Teach Them Diligently Homeschool Marketplace" border="0" height="100" src="http://teachthemdiligently.net/e-templates/marketplace/ClassicalConversations.jpg" style="border: 0px none;" width="100" /></a> <a href="http://r20.rs6.net/tn.jsp?e=0012htt5EWmsrO1j0WONJ7K__b09pea91oJy8t2VkUL24kPdWsf-er6azzga68UVHAHptbfzKAOYrdVZSLwZ42uFM_nlAPlwhd7GLuUWuMa_BLHtQ3QMaW7hA==" target="_blank"><img alt="Teach Them Diligently Homeschool Marketplace" border="0" height="100" src="http://teachthemdiligently.net/e-templates/marketplace/DewLearning.jpg" style="border: 0px none;" width="100" /></a> <a href="http://r20.rs6.net/tn.jsp?e=0012htt5EWmsrM3ALBxNJkCp0KgPn00B_eRvv3el8muCSFsVkdFX7msYykLp3QJyTm24eTyQL78Pl4TPvJxNn8cZkvfD80Y1_4VO5ael03SLv1G4s4MnixwKiGE0Xq1mKsIej3cqHQX7_c=" target="_blank"><img alt="Teach Them Diligently Homeschool Marketplace" border="0" height="100" src="http://teachthemdiligently.net/e-templates/marketplace/MasterBooks.jpg" style="border: 0px none;" width="100" /></a><a href="http://r20.rs6.net/tn.jsp?e=0012htt5EWmsrPhZ3cLMj19aFPVkX-OqcY9Fr7HkRluBqPEhkOmvEpMjWBwztwYrQRmSSPvS_RXhaw05VbxjZRPpq1CM6K6mVAX1EMZhbvU7h7LFIcpDUA-tQ==" target="_blank"></a></center></td></tr><tr style="line-height: 0px;"><td align="center" style="margin: 0px; padding: 0px;"><center><a href="http://r20.rs6.net/tn.jsp?e=0012htt5EWmsrMdLshj8DA3_QKgMoB-QxG9QIWwY5-R-HiPLtuV5MK1d6CaIcwuu0vrY4IiJew8tpm5l6BW3pDcTI4ZZpPxvxjD9bK_nnB2Pk5OR6-XKxKZmqxktj0hUTNxGL_RxCtqaVQ=" target="_blank"><img alt="Teach Them Diligently Homeschool Marketplace" border="0" height="94" src="http://teachthemdiligently.net/e-templates/marketplace/Marketplace_URL.jpg" style="border: 0px none; display: block;" width="700" /></a></center></td></tr><tr align="center" style="line-height: 0px;"><td align="center" style="height: 80px; margin: 0px; padding: 10px;" valign="top"><span align="center" style="display: block;"><br /></span></td></tr></tbody></table></center></td></tr></tbody></table>Anonymoushttp://www.blogger.com/profile/08811822556440072470noreply@blogger.com0tag:blogger.com,1999:blog-5013299283767098630.post-50531699135499681992013-06-14T07:35:00.000-07:002013-07-11T12:16:31.114-07:00Securing Your Mobile Devices<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW0FS5L02MLBLzcCIdNGWLoinExp4a2-Gi0XvdQwHLZSNo1baNanbc4h6N4iZLgP_xwbNPXd_AgBus0-H3uVg9GkmW5zfv5VgeoQXKXYu8Z9tAR5-L3pp0kOoO3_isD63xbkJrfWfvirMn/s1600/Mobile-Security.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW0FS5L02MLBLzcCIdNGWLoinExp4a2-Gi0XvdQwHLZSNo1baNanbc4h6N4iZLgP_xwbNPXd_AgBus0-H3uVg9GkmW5zfv5VgeoQXKXYu8Z9tAR5-L3pp0kOoO3_isD63xbkJrfWfvirMn/s200/Mobile-Security.jpg" width="171" /></a></div>Our mobile devices (smartphones and tablets) are becoming a bigger and more important part of our daily lives everyday. Because of this security concerns are growing and becoming more complex as well. I have written about this before and I am sure I will again as security concerns continue to impact how we use these devices. <br /><br />The threat to our mobile devices is especially challenging because our smartphones are always <em>connected</em>, and they carry personal data, as well as being equipped with cameras, microphones, and positioning device. Because there are many built-in device<span style="text-decoration: line-through;">s</span> options their operating systems and apps complex. All of this adds up to increasing the way that cybercriminals can take advantage of any security holes.<br /><br />Here are some things you can do to protect yourself in respect to your mobile devices.<br /><br /><b>Be careful when “checking in” on social sites:</b> This is one of my personal weaknesses. I love to check in so that my friends can know what I am going. This is because Facebook, FourSquare and other geo-location programs are fun and sometimes you can score some deals for “checking in” at locations. However you should to be cautious of letting people know where you are – especially if you’re away from home. <br /><br /><b>Don’t remember your passwords:</b> Don’t set user name and passwords to be remembered in your mobile browser or in apps and make sure you always log out of accounts when you access them. <br /><b></b><br /><b>Be careful what you share: </b>Yes it’s fine to stay in touch with our friends and family via social networks, but be careful what you share. Even if your privacy settings are set to only let your friends see the information, it’s best to take the approach that <strong>once something is online</strong>, <strong>it lives forever</strong>. Think if you’re really ok with your grandmother or boss to see that update, picture or video.<br /><br /><b>Don’t text or email personal information</b>: While this might seem pretty basic, we may find we need to share credit card numbers or personal details with another person. But this should be done via a secure site or app or use your mobile’s other function (the phone itself - voice call). Emails and texts can be intercepted and then your information can fall into the wrong hands. <br /><br />Always remember that legitimate organizations like banks will not ask you to text personal details! <br /><br /><b>Turn off your Bluetooth:</b> If you’re not using this connection, it’s best to turn it off. Not only will this help save your battery life, but it prevents hackers from accessing your device through this technology. Anonymoushttp://www.blogger.com/profile/08811822556440072470noreply@blogger.com0