Entries Tagged as ''

Republicans Go Tea Party

So the Republican’s have come up with a new pledge — a pledge of empty words, suspect promises, vague historical references, and twisted ideas.  Action speak louder than words, and their actions have spoken — incumbents are part of the problem, not part of the solution — VOTE THEM OUT.

I’d poke fun at all of this drivel; but I’ll just re-publish it here and let you try and read through it without laughing so hard you have to wipe off your monitor (multiple times).


A PLEDGE TO AMERICA

America is more than a country.

America is an idea – an idea that free people can govern themselves, that government’s powers are derived from the consent of the governed, that each of us is endowed by their Creator with the unalienable rights to life, liberty, and the pursuit of happiness. America is the belief that any man or woman can – given economic, political, and religious liberty – advance themselves, their families, and the common good.

America is an inspiration to those who yearn to be free and have the ability and the dignity to determine their own destiny.

Whenever the agenda of government becomes destructive of these ends, it is the right of the people to institute a new governing agenda and set a different course.

These first principles were proclaimed in the Declaration of Independence, enshrined in the Constitution, and have endured through hard sacrifice and commitment by generations of Americans.

In a self-governing society, the only bulwark against the power of the state is the consent of the governed, and regarding the policies of the current government, the governed do not consent.

An uncheckedexecutive, a compliant legislature, and an overreaching judiciary have combined to thwart the will of the people and overturn their votes and their values, striking down long-standing laws and institutions and scorning the deepest beliefs of the American people.

An arrogant and out-of-touch government of self-appointed elites makes decisions, issues mandates, and enacts laws without accepting or requesting the input of the many.

Rising joblessness, crushing debt, and a polarizing political environment are fraying the bonds among our people and blurring our sense of national purpose.

Like free peoples of the past, our citizens refuse to accommodate a government that believes it can replace the will of the people with its own. The American people are speaking out, demanding that we realign our country’s compass with its founding principles and apply those principles to solve our common problems for the common good.

The need for urgent action to repair our economy and reclaim our government for the people cannot be overstated.

With this document, we pledge to dedicate ourselves to the task of reconnecting our highest aspirations to the permanent truths of our founding by keeping faith with the values our nation was founded on, the principles we stand for, and the priorities of our people. This is our Pledge to America.

We pledge to honor the Constitution as constructed by its framers and honor the original intent of those precepts that have been consistently ignored – particularly the Tenth Amendment, which grants that all powers not delegated to the United States by the Constitution, nor prohibited by it to the states, are reserved to the states respectively, or to the people.

We pledge to advance policies that promote greater liberty, wider opportunity, a robust defense, and national economic prosperity.

We pledge to honor families, traditional marriage, life, and the private and faith-based organizations that form the core of our American values.

We pledge to make government more transparent in its actions, careful in its stewardship, and honest in its dealings.

We pledge to uphold the purpose and promise of a better America, knowing that to whom much is given, much is expected and that the blessings of our liberty buoy the hopes of mankind.

We make this pledge bearing true faith and allegiance to the people we represent, and we invite fellow citizens and patriots to join us in forming a new governing agenda for America.

I Wandered Lonely As A Cloud

I Wandered Lonely As A Cloud
by William Wordsworth

I wandered lonely as a cloud
That floats on high o’er vales and hills,
When all at once I saw a crowd,
A host, of golden daffodils;
Beside the lake, beneath the trees,
Fluttering and dancing in the breeze.

Continuous as the stars that shine
And twinkle on the milky way,
They stretched in never-ending line
Along the margin of a bay:
Ten thousand saw I at a glance,
Tossing their heads in sprightly dance.

The waves beside them danced, but they
Out-did the sparkling leaves in glee;
A poet could not be but gay,
In such a jocund company!
I gazed—and gazed—but little thought
What wealth the show to me had brought:

For oft, when on my couch I lie
In vacant or in pensive mood,
They flash upon that inward eye
Which is the bliss of solitude;
And then my heart with pleasure fills,
And dances with the daffodils.

Malwareapedia

Blackhats. Hackers who use their skills for explicitly criminal or other malicious ends, such as writing malware (malicious software) to steal credit card numbers and banking data or by phishing; a.k.a. the Bad Guys.

Phishing. The practice of sending out fake email messages that look as if they come from a trusted person or institution-usually a bank-in order to trick people into handing over confidential information. The emails often direct you to a website that looks like that of the real financial institution. But it is a fake and has been rigged to collect your personal information, such as passwords, credit card numbers and bank account numbers, and transmit them to the Bad Guys.

Man-in-the-middle. An attack in which a criminal hacker intercepts information sent between your computer and the website of your financial institution and then uses that information to impersonate you in cyberspace. The hacker is able to defeat even very sophisticated security measures and gain access to your account.

Botnet. Botnets consist of large numbers of hijacked computers that are under the remote control of a criminal or a criminal organization. The hijacked computers-a.k.a. “zombies” or “bots” (short for “robots”) – are recruited using viruses spread by email or drive-by downloads. Worms are used to find and recruit additional computers. The biggest botnets consist of thousands and even millions of computers, most often unprotected home computers.

Virus. A malicious program that usually requires some action on the part of a user in order to infect a computer; for example, opening an infected attachment or clicking on a link in a rigged email may trigger a virus to infect your computer.

Drive-by Download. A kind of malware that installs itself automatically when you visit a booby-trapped website. Symptoms of a drive-by download include: your homepage has been changed, unwanted toolbars have been added, and unfamiliar bookmarks appear in your browser.

Worm. Self-replicating malware that, for instance, hunts down unprotected computers and recruits them for criminal or other malicious purposes. Unlike a virus, worms do not require any action on your part in order to infect your computer.

Fake Anti-Virus. Fake anti-virus software purports to be a helpful program than can find and remove malware, but in fact it is malware–the very thing that it’s supposed to eliminate. After taking over your computer, it pretends to do security scans, tells you it has found malware, and then asks you to pay to have the non-existent malware removed. Whether or not you pay, fake anti-virus is likely to install more malware.

Whitehats. Hackers who use their skills for positive ends, and often for thwarting blackhats. Many whitehats are security professionals who spend their time identifying and fixing vulnerabilities in software that blackhats seek to exploit for criminal or other malicious purposes.

Security suite. A set of software applications designed to protect your computer that consists of anti-virus, anti-malware and a personal firewall.

Anti-virus and anti-malware. Helpful software applications that scan your computer for certain patterns of infection. The patterns they scan for are the signatures, or definitions, of known forms of malware. Since Bad Guys are creating new forms of malware continuously, it is important that you keep your anti-virus and anti-malware definitions updated. See the “Patches and Updates” section below.

Personal firewall. Software that monitors incoming and outgoing traffic on your computer and checks for suspicious patterns indicating the presence of malware or other malicious activity. A personal firewall alerts you to these threats and attempts to block them. Like anti-virus and anti-malware software, personal firewalls require frequent updates to provide effective protection.

Updates. Security software relies on frequent updates in order to be able to counteract previously undetected forms of malware. Consequently, your computer may suffer a “window of  vulnerability” between the time a new form of malware is identified and the time when your security software can block it or remove the infection. Set your security software to update automatically.

Patches. Operating systems, like Windows and OS X, and software applications, such as Internet Explorer and Firefox, may be found to contain security flaws or holes that make your computer vulnerable to attack. Their makers release patches to plug the holes. The fastest and surest way to get these installed quickly is to use auto-updating via the Internet. Some software applications require manual updating. See the “Patches and Updates” section below.

Black Tuesday a.k.a. Patch Tuesday. On the second Tuesday of each month Microsoft releases security patches for Windows, Internet Explorer, Office and its other software products. You can have these installed automatically using Microsoft Update. See the “Patches and Updates” section below.

Auto-updating. A software tool built into Windows (“Microsoft Update”) and OS X (“Auto Update”) and many other applications which can download and install important security updates and patches for software installed on your computer automatically. See the “Patches and Updates” section below.

From SANS Institute