Friday, August 31, 2007

Local bowler taped form USBC postion.

Finally some color added to my sport of bowling.

Detroit's Libbi Fletcher appointed to USBC Board of Directors

USBCLibbiFletcher.jpg United States Bowling Congress President Jeff Bojé has appointed Margaret (Libbi) Fletcher of Warren, Mich., to the USBC Board of Directors. She fills the vacancy that resulted from the recent retirement of Sylvia Broyles of Spring Branch, Texas.

Fletcher is the president of the Metro Detroit USBC Bowling Association and has extensive experience as a leader and administrator at the local, state and national levels. She was a director for the Women's International Bowling Congress for four years serving on the Strategic Planning, Certification Review, Collegiate, Transition and Bowling Technology Task Force committees, among others.

Fletcher, who is a sales support specialist for Logicalis, an international provider of high-performance IT integration solutions, was instrumental in the merger of Detroit area local associations, serving as chairperson for the transition committee for the merger of the Detroit Women's Bowling Association, Greater Detroit BA, Greater Detroit Young American Bowling Alliance Association and Pontiac (Mich.) WBA.

"Sylvia brought a wealth of knowledge about the feelings and concerns of our female members," said Bojé. "Libbi fills this valuable role on the Board. She is also smart, passionate and not afraid to aggressively champion the things she believes in on behalf of our sport, which are valuable traits."

Fletcher was the 2004-05 Detroit WBA Woman of the Year. She was a 2001 Pontiac WBA doubles champion, has a high average of 180, high game of 260 and high series of 689.

Thursday, August 30, 2007

Informal TAC meeting minutes .

Thanks to William for the meeting notes. TAC had an informal get together at Panera Beard.

BDPA TAC August 28, 2007 Meeting Notes

  • Gesu can have as many monitors as they want, however the number of desktops is still up in the air
  • William will check with them about a time to deliver them
  • Discussion about blogs
  1. Blogspot , members showed off their personal blogs
  • PHP tools for customizable web sites
  • The BDPA podcasts now publish to iTunes
  • The educational uses of Second Life
  • More information:
  • Can even be used to build online educational RPG games
  • Need to figure out the what topics to discuss at the upcoming TAC meetings
  1. Cliff will come up with some ideas and will post them
  2. Will will post his ideas to the e-group later this week.
  • Cost saving advantages of Linux versus Windows
  1. Much cheaper software
  2. Free versus 100s of dollars
  3. Less likely to be stolen, $200 LINUX laptops that are now available.
  4. Computers are cheaper and worth less
  5. Most criminals will not understand how to use Linux
  6. They can be marked and branded to further discourage theft; paint school logo or DPS ID on lid or laser etch it on.
  • MIT OpenCourseWare available online to use by teachers/students.
  • Free books in text and audio format are available through Gutenberg Project or use Google to locate other sources
  • There is even technology that provides audio tones during certain audio books that accompany e-books in PDF format.
  1. This is similar to children books from the eighties that played audio as a child read and would tone, when the child should turn a page.

Bloggers battered by viral storm

Bloggers battered by viral storm
Google's Blogger site is being used by malicious hackers who are posting fake entries to some blogs.

The fake entries contain weblinks that lead to booby-trapped downloads that could infect a Windows PC.

Infected computers are being hijacked by the gang behind the attacks and either mined for saleable data or used for other attacks.

The Blogger attack is the latest in a series by a gang that has managed to hijack hundreds of thousands of PCs.

Attack pattern

Security researcher Alex Eckelberry from Sunbelt Software first noticed the booby-trapped links turning up on Blogger on 27 August.

Now many hundreds of blogs on the site have been updated with a short entry containing the link.

Mr Eckelberry said it was not yet clear how the links were posted to blogs. The bogus entries could have exploited a Blogger feature that lets users e-mail entries to their journal.

The blogs themselves could also be fake and set up solely to act as hosts for spam.

are you kidding me? lol
Dude dont send that stuff to my home email...
Dude your gonna get caught, lol
HAHAHAHAHAHA, man your insane!
I cant belive you did this
LMAO, your crazy man
LOL, dude what are you doing
man, who filmed this thing?
oh man your nutz
OMG, what are you thinking
Google has yet to comment on the attack and how it might have been carried out.

The entries on the blogs have the same text as some of the spam distributed by the group behind the attacks. These attempt to trick people into clicking on links and downloading booby-trapped files using cleverly crafted messages.

Some pose as YouTube links others claim to be looking for testers of software packages or digital greetings cards.

The group behind the attack on Blogger is thought to have mounted a huge series of attacks since January.

The first attack used a spam that purported to give recipients more information about the severe storms seen in Europe in January. This led to the virus used by the gang being dubbed the "Storm Trojan".

Since January the group has been sending out huge numbers of different spam messages in a bid to trick people.

"The criminals responsible for this spam campaign are experts at exploiting social engineering to propagate their botnets," said Bradley Anstis from security firm Marshal.

The spam messages have been changed to capitalise on news events and the viral payload has been updated many times to fool anti-virus programs.

Mr Anstis said the sheer number of messages being sent by the group was staggering. On some days, he said, 4-6% of all the junk messages seen by Marshal were sent by the group.

Security experts estimate that the group can send out so much junk mail because they have hijacked so many Windows PCs via successive campaigns. Some suspect that the group has infected more than one million PCs over the last eight months.

Java demo of the power of Ten

A cool demo showing what is seen a varying magnifications. See what it means to view an object the size of a attometers.

Secret Worlds: The Universe Within

Wednesday, August 29, 2007

Educational Uses of Second Life

Thanks to Patrick Haggood for this interesting tidbit. Just keep the kids out of the adult zones.

Thursday, August 23, 2007

Google Sky allows Web surfers to tour the universe

Looks like Google has taken over the whole universe!! Whats next, Google alternate evil universe mapping.

Google Sky allows Web surfers to tour the universe( From GLIT Report)

The heavens are only a few mouse clicks away with Google Inc.'s latest free tool. A new feature in Google Earth, the company's satellite imagery-based mapping software, allows users to view the sky from their computers. The tool provides information about various celestial bodies, from stars to planets, and includes imagery from the Hubble Space Telescope and other sources. It also allows users to take virtual tours through galaxies, including the Milky Way, from any point on Earth they choose. There are other programs that provide information and pictures of the universe, but Google Sky blends it seamlessly, said Andrew Connolly, a University of Washington associate professor of astronomy and part of Google's visiting faculty program. More.

Monday, August 20, 2007

PubCon Street Tips: Giving a Kick Ass Presentation

Here are some excellent tips on enhancing your public speaking skills.

PubCon Conference Blog

Also on this site is info on a interesting conference in Sin City in December.

Thursday, August 16, 2007

Thursday, August 09, 2007

Rosa Parks Institute - 2007 Pathways to Freedom Program

Great presentation done by the youth of the Rosa Parks Institute

Pathways to Freedom Freedom Finale, we have posted the video presentation done by the children online for you all to see.

Mitch Dennison

Monday, August 06, 2007

Another E-mail virus Attack.

I have seen these messages in my Gmail spam box quite regularly. Be on the look out...

Someone send you an e-greeting? Don't open it

August 6, 2007



Feeling popular these days?

To judge by the amount of e-mail circulating through cyberspace claiming to be greeting cards sent by secret admirers, long-lost school chums or colleagues sending you their best wishes, it's like the Internet has turned into a delivery system for group hugs.

Don't fall for it.

There's nothing friendly at all about this sudden greeting card deluge. Instead, it's yet another effort by hackers and malicious virus-writers to infect your computer with junk that, at best, clogs and slows down your hard drive or, at worst, turns your computer into a zombie machine that the bad guys can control to spew out spam or launch cyberspace attacks.

"This is one of the worst attacks we've seen in years," said Adam Swidler, a senior manager with the Internet security company Postini. "The bottom line here is if you get a note saying you have an e-greeting card and to click a link to open it... whatever you do, don't."

Instead of a greeting, the link leads to what is known as the Storm Worm, a powerful snippet of code that installs on the unsuspecting user's computer and then begins to send out spam to everyone on the user's contact list.

Once installed, the computer, in effect, becomes what is known as a bot, as in robot, remotely programmed to send out e-mail announcing the phony greeting cards to everyone on the user's address book.

Both the FBI and the U.S. Federal Trade Commission have issued official warnings to consumers about the e-greeting card scam and the malware -- short for malicious software -- it installs.

"Like many other Internet fraud schemes, the perpetrators use social engineering tactics to entice the victim, claiming the card is from a family member or friend," according to the official warning from the FBI's Computer Crime Complaint Center. "Although there have been variations in the spam message and attached malware, generally the spam directs the recipient to click the link provided in the e-mail to view their e-card. Upon clicking the link, the recipient is unknowingly taken to a malicious Web page."

The Web pages are taken down as soon as a worldwide team of spam fighters identifies them. But the people behind the attack have been setting up new sites with each barrage of e-mails and it is from a link on those sites that the malware is installed.

The Storm Worm first surfaced in Europe in January and is so named because the first messages tried to capitalize on a series of winter storms there, urging recipients to click a link for storm-related information.

It died down quickly only to begin with again with a vengeance earlier this summer, this time attached to the e-greeting card spam scam.

Swidler says it identified more than 400 million of the fake greeting card messages in July alone.

"This is one of the worst and sustained attacks the Net has undergone and quite frankly, there's an incredible amount of concern that whoever is behind this has assembled a bot army that is going to continue this for some time," he said. "This is quite ominous, really."

So far for 2007, the number of virus and worms being circulated on the Net is twice what it was last year at the same time, said Swidler. "On some days over the last month, it's been 10 times more. This is a very difficult problem to contain and so far, whoever is behind it is way ahead of those trying to stop them."

MIKE WENDLAND is the Convergence Editor and Video Columnist for the Free Press. He can be reached at or 313-222-8861. To see Mike's video report on this, go to

Wednesday, August 01, 2007

10 tech skills you should develop during the next five years

10 tech skills you should develop during the next five years

* Blogger: Debra Littlejohn Shinder

If you want a job where you can train in a particular skill set and then never have to learn anything new, IT isn’t the field for you. But if you like to be constantly learning new things and developing new skills, you’re in the right business. In the late 80s, NetWare and IPX/SPX administration were the skills to have. Today, it’s all about TCP/IP and the Internet.

Let’s take a look at some of the skills you should be thinking about developing to keep on top of things in the tech world in the next five years.

#1: Voice over IP

Many companies and consumers are already using VoIP for telephone services due to cost and convenience factors. According to a article in June 2007, sales of pure IP PBX systems for the first quarter of 2007 increased 76% over the first quarter of the previous year.

More and more companies are expected to go to VoIP, to either supplement or replace their traditional phone lines. And because VoIP runs on the TCP/IP network, IT administrators will in many cases be expected to take responsibility for VoIP implementation and ongoing administration.
#2: Unified communications

Along with the growing popularity of VoIP, the concept of unified communications — the convergence of different communications technologies, such as e-mail, voicemail, text messaging, and fax — looks to be the wave of the future. Users will expect to have access to all their communications from a single interface, such as their Inbox, and from a variety of devices: PCs, laptops, smart phones/PDAs, traditional phones, etc.

Convergence makes networks more complex, and IT administrators will need to develop skills for managing converged networks to compete in tomorrow’s job market.
#3: Hybrid networks

The day of the all-Windows or all-UNIX network is already past, and networks are likely to grow more, rather than less hybridized in the future. As new versions of Linux, such as Ubuntu, become friendlier for end users, we’re likely to see some organizations deploying it on the desktop for certain users. However, it’s likely that other users will continue to use Windows because of application requirements and/or personal preferences, and there may very well be Macintosh users in the mix as well, especially in graphics environments.

IT pros will no longer be able to get by with expertise in only one platform; you’ll need to be able to support and troubleshoot different operating systems.
#4: Wireless technology

Wireless networking is still in its infancy in the enterprise. Companies are (often grudgingly) establishing wireless LANs for the use of employees and visitors because it’s the most convenient way for portable computers to connect to the network, but many organizations are still wary of wireless (rightly so), particularly its security implications.

But wireless isn’t going away, and the future promises faster and more secure wireless technologies. You’ll need to know about 802.11n, a new standard now in development and estimated to be released in late 2008, which will provide for a typical throughput of 74 Mbps with a theoretical maximum data rate of 248 Mbps and a longer range than current 802.11a/b/g standards (about 70 meters, or approximately 230 feet).
#5: Remote user support

The trend is toward more employees working off-site: executives taking their laptops on the road, telecommuters working from home at least a few days per week, personnel in the field connecting back to the LAN, and so forth. The IT staff will need to be able to support these remote users while maintaining the security of the internal network.

It will be important to learn skills relating to different VPN technologies (including SSL VPN) and technologies for health monitoring and quarantining of remote clients to prevent those that don’t meet minimal criteria (antivirus installed and updated, firewall enabled, etc.) from connecting to the LAN and putting the rest of the network at risk.
#6: Mobile user support

Cell phones, Blackberries, and other ultra-portable devices are becoming ubiquitous and will likely grow more sophisticated in the future. Employees will expect to get their corporate e-mail on their phones and in some cases (such as Windows Mobile devices), to use terminal services client software to connect these small devices to the company LAN.

IT staff members will need to develop a plethora of skills to support mobile users, including expertise in configuration of mail servers and knowledge of security implications of the devices.
#7: Software as a service

Web 2.0, the next generation of the Internet, is all about SaaS, or Software as a Service. SaaS involves delivering applications over the Web, rather than installing those applications on individual users’ machines. Some IT pundits have warned that SaaS will do away with IT administrators’ jobs entirely, but the more likely scenario is that the job description will change to one with less focus on deployment and maintenance of applications and more emphasis on broader-based planning, convergence, etc.

If SaaS takes off, the job market may also shift so that more jobs are concentrated in the application provider sector rather than in companies’ in-house IT departments. In that situation, IT pros who have the skills relating to service provision and multi-tenant architecture will have a head start when it comes to getting and staying employed.
#8: Virtualization

Virtualization has been around for a while, but now, with Microsoft heavily investing in the technology with its Windows hypervisor (Viridian), which will run on Windows Server 2008, VMWare offering VMWare Server for free, and Red Hat and SuSE planning to include Xen hypervisor technology in the next versions of their server products, we can expect the concept of virtual machines to go to a whole new level in the next few years.

Managing a VM-based network environment is a skill that will be not just handy, but essential, as more and more companies look to virtualization to consolidate servers and save on hardware costs.
#9: IPv6

Widespread adoption of the next generation of the Internet Protocol (IPv6) hasn’t come about as quickly as originally predicted, in large part because technologies such as NAT prevented the depletion of available IP addresses from happening as soon as anticipated.

However, with the number of hosts on the Internet growing steadily, the larger address space will eventually be critical to further expansion. IPv6 also offers better security with IPsec, a part of the basic protocol suite. Perhaps the inevitability of the transition is best indicated by the fact that Windows Vista, Windows Server 2008, Mac OS X 10.3, and the latest versions of other operating systems have IPv6 enabled by default.

With an entirely different address notation, called CIDR, and addresses written in hexadecimal instead of the familiar four octets of decimal numbers used by IPv4, there will be a learning curve for IT administrators. The time to tune up your IPv6 skills is now, before the transition becomes mandatory.
#10: Security

Smart IT pros have been developing their security skills for the last several years, but the future will bring new security challenges and new security mechanisms. Technologies such as VoIP and mobile computing bring new security issues and challenges. Authentication methods are evolving from a password-based model to multifactor models, and biometrics are likely to become more important in the future.

As threats become more sophisticated, shifting from teenage hackers defacing Web sites “just for fun” to well financed corporate espionage agents and cyberterrorists bent on bringing down the country’s vital infrastructure by attacking the networks that run it, security skills must keep up.

In addition to proactive measures, IT pros will need to know more about computer forensics and be able to track what is happening and has happened on their networks.