Friday, October 20, 2017

The Blues After The Bushwalking at the Mountain

On the more sober note, Our ABC at Ultimo is a pleasant place to spent Friday evening ... Chris Taylor cuts through the noise on Screen Time - Lunch With Myf | Double J. Chris as David Stratton is lot more entertaining ;-) Judith Lucy as Margaret Pomeranz a total scream especially with her observations about New mini series 'Deuce' and that Hollywood *****er Harvey Weinstein ( List of Harvey Weinstein's accusers grows as ripple of effects spread globally)    .... ABC launches new series for entertainment addicts
Why the world Is (still) better than you think— new evidence for abundance – things may not be as bad as we think...

NIST Blog, Mike Garcia: “…First, I’m going to share the takeaways from our new password guidance. Simply put: Use passphrases, not passwords. Then, I’m going to explain the absolute most important thing to know about passwords: Try not to use them at all. And if you do, don’t rely on passwords, or even passphrases, alone. Over the years, our reliance on passwords, and the ease with which our adversaries can defeat those passwords,  resulted in a negative feedback loop where users were subjected to increasingly complex, stressful and exhausting composition rules (upper, lower, and special characters, oh my!), increasing length requirements, password rotation requirements, and on and on. Like pounding out more and more miles faster and faster, these looked like gains on paper but undermined the outcome we wanted: a safer and more convenient online experience…” 
   Next Life: What Will Happen To MEdia Dragon and Our Emails When We Die?  “Life keeps us so busy writing emails that most of us haven’t considered what happens to our electronic communications when we’re dead. Can they be accessed by your family, or by a representative you designated in life? 

Police probe brutal murder of tax officer, 32, in cemetery

Police probing the violent murder of a 32-year-old tax inspector in an Athens cemetery have not ruled out the possibility of a link to one of the ...

Income Tax officer's son Sharath, 19, found dead in Bengaluru lake ...


For too long in our hallowed halls of government, academia, and media we have been told, “Don’t worry. China takes the long view and would rather kick the can down the road than confront a dispute head on.” That belief has been the accepted conventional wisdom for the past 40 years, but the falseness of this view now is becoming incontrovertible.  
Understanding this reality is critical for the U.S. military—and the U.S. Navy in particular—when it comes to how and when Taiwan will be attacked from the Chinese mainland. The question no longer is a theoretical, open-ended affair; President Xi’s words in Zhurihe do not stand alone as an empty proclamation. Instead, they are a reminder of the continuity of Chinese leaders’ devotion to the reunification of the motherland, and when it comes to reunification, Taiwan stands at the top of the list of unrestored territories.  
One should not forget that in 2013, Taiwan’s Ministry of National Defense reported that China’s leaders had recommitted themselves to “continue the 2020 Plan,” whereby they would be able to “build and deploy a complete operational capability to use force against Taiwan by that year.” By implication, these leaders believe that by 2020, the PLA also will be able to fend off U.S. forces and thus be able to successfully invade Taiwan. 
As such, President Xi’s Zhurihe speech can and should be interpreted as certifying that the PLA (all Chinese military forces) has achieved the capability to “safeguard China’s national sovereignty”—two years ahead of schedule.
So, what does this mean strategically? 

Dark Web, Kristin Finklea, Specialist in Domestic Security. March 10, 2017. via FAS

“The layers of the Internet go far beyond the surface content that many can easily access in their daily searches ...

From FBI News Release, October 17, 2017: “In conjunction with National Cyber Security Awareness Month, the FBI is re-iterating the growing concern of cyber criminals targeting unsecure Internet of Things (IoT) devices. The number of IoT devices in use is expected to increase from 5 billion in 2016 to an estimated 20 to 50 billion by 2020. Once an IoT device is compromised, cyber criminals can facilitate attacks on other systems or networks, send spam e-mails, steal personal information, interfere with physical safety, and leverage compromised devices for participation in distributed denial of service (DDoS) attacks

Harvey Weinstein cried to an assistant following bombshell report

 HARVEY Weinstein sobbed and pleaded, “I'm not that guy. I'm not that guy,” to an assistant after the first bombshell article on the movie mogul's sexual harassment allegations came out, according ...