The Internet of Things is Scary

The Internet of Things. We are headed in that direction. In some ways, we are already there. What really scares me is that one day a hacker may hack into my fridge and cause my milk to spoil.

In computing, the Internet of Things (also known as the Internet of Objects) refers to the networked interconnection of everyday objects.
source

spoiled milk glass
looks yummy, huh?

Cell phone carriers team up to cut down on stolen cell phone market

-source

In an effort to deter cell phone theft, U.S. wireless carriers have made a first step towards “a joint ‘blacklist’ database of identifying information about cell phones reported lost or stolen”. Now, cell phone companies check phones against the database before reactivating phones. Before this joint action, carriers would suspend the service on a phone after was reported as lost or stolen; this phone could still be reactivated by a thief on a new account. According to Chris Guttman-McCabe, vice president of regulatory affairs for CTIA, “the point of the blacklist database is to dry up the aftermarket for stolen phones. If you can’t reactivate a stolen phone, it’s just a worthless hunk of plastic and metal.” [1]

Cell phone theft is common because many users will leave them laying around and not keep a close eye on them. One the device has been stolen, Continue reading Cell phone carriers team up to cut down on stolen cell phone market

LG Scares the Crap Out of People in an Elevator to Show Off Its Monitors

LG has introduced this video of people getting a big scare thanks to the company’s high-res monitors.

To show off just how life-like the picture on its monitors can be, the company re-fitted the bottom of an elevator with the screens. The brand then recorded people’s reactions as the monitors — screens pointed up — displayed what looked like the bottom of the elevator floor dropping out. True, you could probably do that with a lot of monitors, but LG thought of it first. –source

Lining up a week before the iPhone 5 release

Jessica Mellow in the iPhone 5 waiting line.
(Credit: Greg Sandoval)

People have already begun to line up outside of the Cube, Apple’s 5th Avenue store. They have been there since Friday afternoon—one week before the release data for the iPhone 5. These people are sitting and sleeping out on the sidewalk in front of the store. Many will come to line up so they can buy an iPhone 5 on the very first day; however, some people do not just line up to buy the latest iPhone. People like Hazem Sayed and Jessica Mellow also camp out in line to promote or market something when interviewers come by. Sayed desires to get publicity for a software application. In addition to waiting in line to get an iPhone, Mellow camped out last October before the release of the iPhone 4s to promote a company. [1]

When it comes to Apple releasing new products, people can act strangely. Even Apple’s co-founder Steve Wozniak lines up to wait for a device. While waiting, he chats with Apple fans and signs their iPhones. Wozniak must love the experience because he “could certainly buy the product before it come[s] out”. Some will try to sell their spot in line; however, they have Continue reading Lining up a week before the iPhone 5 release

Hacker Group Steals Millions of Apple Device ID’s

source

AntiSec, short for anti-security, claims they stole 12 million Apple iOS device Unique Device Identifiers (UDIDs) by breaching FBI security. The group released a million of them on a website. AntiSec alleges they had a computer belonging to a FBI agent to gain access “to a file containing the list of the Apple IDs”. The online posting “did not identify the agent or who the ID numbers belonged to.” [1]

AntiSec said that they chose to only “release a portion of the Apple IDs list to get people’s attention to its claims that the FBI is gathering people’s Apple device details.” In the note that AntiSec posted online, AntiSec said they have learned that people do not pay attention when one says, “hey, FBI is using your device detail.” The AntiSec group claims that a portion of the devices on the list contains names, telephone numbers, addresses, and ZIP codes, but they chose to only reveal Continue reading Hacker Group Steals Millions of Apple Device ID’s

How secure are your passwords?

Mashable’s article titled “38% of us Would Rather Clean a Toilet Than Think of New Password” reports that login credentials and site authentications are a hassle for many people.  In a recent Harris Interactive poll, “some 38% of us think attempting to solve world peace would be a more manageable task than trying to deal with yet another set of login credentials.”  All of this hassle makes it easier for hackers to gain access to our online accounts because we tend to either use to same passwords for multiple accounts or we forget our passwords. [1]

I find it difficult to create and remember every password for every online account that I have.  For each site that I visit, there are different sets of password rules. The rules dictate how many Continue reading How secure are your passwords?

iOS 5.0.1 update bug fix

My wife has an iPhone 4s on the Verizon network. After I did an over the air (OTA) upgrade to 5.0.1, the phone would only show the phone number for the people that was texting and calling her (even though their contact information was still in the contact app).

Here is how I fixed the issue:

1) Open the Phone and dial *228. This is a Verizon over-the-air programming number.
2) When the system answers press 1 for “Program or activate your phone”
3) Wait for the call to disconnect. You should get a prompt stating something like, “Settings updated.”
4) Dial *228 again.
5) When the system answers press 2 for updating your roaming capabilities
6) Wait for the call to disconnect. You should get a prompt stating something like, “Settings updated.”
7) Open the Settings App.
8) In your mail and contact settings, delete the account(s) that you use to sync your contacts. This could be iCloud, Gmail (via Exchange), etc.
9) Open the Task Manager (double click the home button) and kill the open Applications by long tapping one of the icons. When the icons begin to shake, tap the red circle with the minus sign.
10) Turn off the iPhone. Then turn it back on.
11) Open the Settings App.
12) In your mail and contact settings, add back the account(s) that you deleted in step 8.
13) Wait a few minutes (3-5mins)
14) Open the Message App and Recent calls list to verify the fix.

Others have tried this fix:

1) Open the Settings App
2) Go to General > International > Language
3) Set the phone language to British English
4) Open the Task Manager (double click the home button) and kill the open Applications by long tapping one of the icons. When the icons begin to shake, tap the red circle with the minus sign.
5) Turn off the iPhone. Then turn it back on.
6) Open the Settings App
7) Go to General > International > Language
8) Set the phone back to US English

How to Make a Good Password and Protect It

A password needs to be unique.  A unique password is very important, because it is what keeps personal information secure.

Below are tips on how to create a secure password and keep bots from guessing your password.

– Be creative. Don’t use words that can be found in a dictionary.
– Use at least six characters.
– Don’t use a password that you have used elsewhere.
– Don’t use keyboard patterns (asdf) or sequential numbers (1234).
– Create an acronym. Don’t use a common one, like NASA or SCUBA. Don’t make your password solely an acronym, combine it with numbers and punctuation marks.
– Include punctuation marks. Mix capital and lowercase letters. Include numbers.
– Include similar looking substitutions, such as the number zero for the letter ‘O’ or $ for the letter ‘S’.
– Include phonetic replacements, such as ‘Luv 2 Laf’ for ‘Love to Laugh.’
– Don’t make your password all numbers, all uppercase letters, or all lowercase letters.
– Find ways of collecting random letters and numbers, such as opening books, looking at license plates or taking the third letter from the first ten words you see.
– Don’t use repeating characters (aa11).
– Don’t use a password that is listed as an example of how to pick a good password.

Tips for keeping your password secure:

– Never tell anyone your password. Don’t write it down.
Never send your password by email.
– Periodically change your password.

[source]

My First Mac

I got my first mac the other day. I purchased the Macbook Pro 13.3”. It has been an interesting journey learning the new operating system. So far, I am really enjoying it.

I got it to replace by older Hp Pavillion laptop. I got a new laptop that would last me through college and be fast enough to run the programs that I need for my engineering classes.

I installed Parallels Desktop 5 for Mac. It allows me to install other operating systems on virtual drives. So far, I have installed Windows 7, Chrome OS, and Ubuntu 9.10.

I have enjoyed learning my way around the Mac OS X and testing Chrome OS and Ubuntu.

Did You Know?

[if you are viewing this blog post in an email, the click this link to SEE  THE POST]

It is do amazing how fast our world is advancing in technology!

Did You Know 3.0 – 2008:

Did You Know 4.0 – 2009:

In a world that is advancing so quickly, it is hard to tell what we should/should not believe.  But one thing that we can be sure of is that God is on His throne!  God is not just some distant/non-existent being; He is very real, and He is as close as you let Him be.  If you want Him to be some distant God that does not aid your day-to-day life, then just walk away from Him.  But, if you want Him to be you very help in time of need, your source of strength, your healer, your deliver, your friend, … your everything … just come unto Him.  It is YOUR choice.  For Jesus said, “Come to Me, all you who labor and are heavy laden, and I will give you rest. [Matthew 11:28]”

As our world quickly advances, the time for Jesus’ return draws nearer.  Jesus told us in Revelation 22:12-13, “Behold, I am coming quickly, and My reward is with Me, to give to every one according to his work. I am the Alpha and the Omega, the Beginning and the End, the First and the Last.”  Christ is coming to gather those that have surrenderd their lives to Him.  He will give unto those the gift of eternal life and a new home on high in Heaven.  O’ Lord how I want to be in that number!  Those that believe in Christ Jesus will be rewarded for the works they have done.

Jesus is the only way into Heaven; there is no other way.  “I [Jesus] am the way, the truth, and the life.  No one comes to the Father except through Me. [John 14:6]”