Archive for the ‘Humor’ Category

Emojipedia

Thursday, August 17th, 2017

Emojipedia

If you aren’t familiar with Emojipedia, be forewarned: It’s a real time sink! 😉

In small doses it’s highly entertaining and a necessity in some communities.

Enjoy!

Theresa May (UK) Out Dumbs Donald Trump (USA)

Monday, June 5th, 2017

Theresa May (UK) has made a dumber proposal than Donald Trump (USA), at least this week. But it is only Monday.

The Independent reports Theresa May is calling for regulation of the internet, after a van and knife on London Bridge.

From the story:


“We cannot allow this ideology the safe space it needs to breed – yet that is precisely what the internet, and the big companies that provide internet-based services provide,” Ms May said.

“We need to work with allied democratic governments to reach international agreements to regulate cyberspace to prevent the spread of extremist and terrorism planning.”

She warned there was “a new trend in the threat we face” and that while the three recent terror attacks in the UK were not linked by “common networks”, they were “bound together by the single evil ideology of Islamic extremism”.

Completely unhinged.

Do take the threats of regulation seriously.

Search for and publish 0Days upon discovery. Computers are breached may belong to governments attempting to regulate the internet. Any diminishing of their capabilities and/or secrecy, is a win for everyone.

The “blue screen of death” lives! (Humorous HTML Links)

Monday, May 29th, 2017

A simple file naming bug can crash Windows 8.1 and earlier by Steve J. Vaughan-Nichols.

From the post:

In a blast from the past, a Russian researcher has uncovered a simple bug in the NTFS file system that consistently crashed Windows Vista to 8.1 PCs.

Like the infamous Windows 95/98 /con/con bug, by simply entering a file name with “$MFT” the file-system bug locks up Windows at best, or dumps it into a “blue screen of death” at worse.

The bug won’t deliver malware but since it works in URLs (except for Chrome), humorous HTML links in emails are the order of the day.

Enjoy!

Critical: Draw Coffee Cup In TeX/LaTeX

Thursday, May 25th, 2017

How to draw a coffee cup.

I’m sure everyone who has ever seen a post, article, book on TeX/LaTeX has lost sleep over how to draw a coffee cup.

Thanks to a tweet from @TeXtip, we can all rest easier. Or at least be bothered by other problems.

@TeXtip points to answers to vexing questions such as how to draw a coffee cup and acts as a reminder to use a little TeX/LaTeX everyday.

Enjoy!

Executive Order on Cybersecurity [“No Snide Remark Seems Adequate”]

Thursday, May 11th, 2017

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

You do remember this Dilbert cartoon from May 23, 1989?

Laptops Banned To Drive Alcohol Consumption

Wednesday, May 10th, 2017

Clive Irving writes in U.S. to Ban Laptops in All Cabins of Flights From Europe:


The Department of Homeland Security will ban laptops in the cabins of all flights from Europe to the United States, European security officials told The Daily Beast. The announcement is expected Thursday.

Irving does a good job of illustrating the increased risk from the laptop ban, but misses the real motivation behind the ban. Yes, yes, DHS says it:

…continues to evaluate the threat environment and will make changes when necessary to keep air travelers safe.

“Threat environment” my ass!

Remember the UK has been reduced to claiming people with knives are terrorists.

Armed police carrying out a counterterrorism operation Thursday swooped in on a man they said was carrying knives in a bag near Britain’s Parliament and arrested him on suspicion of planning terrorist acts.

A European security official familiar with the individual said the suspect was known to British security agencies and was thought to have been inspired by the Islamic State group.

The official, who spoke on condition of anonymity to discuss sensitive intelligence matters, said the discovery of knives suggested an attack might have been close to fruition. Authorities haven’t released the man’s name.

London’s Metropolitan Police said the 27-year-old suspect was stopped and detained “as part of an ongoing operation” by the force’s counterterrorism unit.

“…swooped in on a man they said was carrying knives in a bag…”

That sounds more like a Saturday Night Live skit than a terrorist attack or potential one.

Shake the Department of Homeland Security (DHS) tree really hard, by leakers or FOIA requests and I’m betting the following will fall out:

Alcoholic Drink Consumption On Europe to US Flights

  • Underage and kill-joys: 0
  • Parent with one child: 3
  • Parent with two children: 5
  • Business flyer with no laptop: 1 per hour of flight time

Once this data began to circulate among airline companies, the fate of laptops was sealed.

Increase alcohol sales are the primary goal of the laptop ban.

PS: If you think I am being cavalier about the risk from terrorism, consider that 963 people were killed by police officers in 2016. Versus 54 people in “terrorist” attacks, all by US citizens.

Interstellar Cybersquatting (Humor)

Wednesday, February 22nd, 2017

The inhabitants of one or more of the planets orbiting Trappist-1:

  1. Are unaware the name of their system is Trappist-1
  2. Are unaware their domain, www.trappist.one, has been registered by an interstellar cybersquatter.

Some days it doesn’t pay to read interstellar news!

Question:

At 25% of the speed of light, that’s approximately 156 years one way or 312 round trip, allowing three years for pleadings to be drafted, so 315 years before litigation over the cybersquatting to begin.

Is anyone looking for particles entangled with particles at Trappist-1?

Might not be able to visit but a conference call perhaps? 😉

The Best And Worst Data Stories Of 2016

Sunday, January 1st, 2017

The Best And Worst Data Stories Of 2016 by Walt Hickey.

From the post:

It’s time once again to dole out FiveThirtyEight’s Data Awards, our annual (OK, we’ve done it once before) chance to honor those who did remarkably good stuff with data, to shame those who did remarkably bad stuff with data, and to acknowledge the key numbers that help describe what went down over the past year. As always, these are based on the considered analysis of an esteemed panel of judges, by which I mean that I pestered people around the FiveThirtyEight offices until they gave me some suggestions.

I had to list this under both data science and humor. 😉

What “…bad stuff with data…” stories do you know and how will you avoid being listed in 2017? (Assuming there is another listing.)

I suspect we learn more from data fail stories than ones that report success.

You?

Enjoy!

The best of Lower Case 2016 (CJR)

Saturday, December 31st, 2016

The best of Lower Case 2016

From the post:

IF WE HAD TO PICK ONE CJR tradition in particular that has survived and thrived in the digital age, it’s The Lower Case, our weekly look at unfortunate, cringe-worthy, or ironic headlines.

It turns out headlines can be just as awkward and occasionally inappropriate on digital stories and social-media posts, even though these days we have to catch them before a sneaky editor covers up the evidence (alas, there’s no more paper trail). Luckily, our readers continue to help us out, delivering screenshots of Lower Case offenders to our inbox at editors@cjr.org.

The editors who wrote these headlines probably would prefer a do-over, but they should take heart: All of us can all learn from headlines gone wrong, and hopefully enjoy a chuckle in the process. Here are some highlights from 2016, including classics from the archives:
…(emphasis in original)

A column you defend to friends by saying: “I read other parts of the CJR too!”

😉

Enjoy!

The Course of Science

Wednesday, December 21st, 2016

No doubt you will recognize “other” scientists in this description:

scientific-process

Select the image to get a larger and legible view.

I should point out that “facts” and “truth” have been debated recently in the news media without a Jesuit in sight. So, science isn’t the only area with “iffy” processes and results.

Posted by AlessondraSpringmann on Twitter.

Geek Jeopardy – Display Random Man Page

Tuesday, November 22nd, 2016

While writing up Julia Evans’ Things to learn about Linux, I thought it would be cool to display random man pages.

Which resulted in this one-liner in an executable file (man-random, invoke ./man-random):

man $(ls /usr/share/man/man* | shuf -n1 | cut -d. -f1)

As written, it displays a random page from the directories man1 – man8.

If you replace /man* with /man1/, you will only get results for man1 (the usual default).

All of which made me think of Geek Jeopardy!

Can you name this commands from their first paragraph descriptions? (omit their names)

  • remove sections from each line of files
  • pattern scanning and processing language
  • stream editor for filtering and transforming text
  • generate random permutations
  • filter reverse line feeds from input
  • dump files in octal and other formats

Looks easy now, but after a few glasses of holiday cheer? With spectators? Ready to try another man page section?

Enjoy!

Solution:

  • cut: remove sections from each line of files
  • awk: pattern scanning and processing language
  • sed: stream editor for filtering and transforming text
  • shuf: generate random permutations
  • col: filter reverse line feeds from input
  • od: dump files in octal and other formats

PS: I changed the wildcard in the fourth suggested solution from “?” to “*” to arrive at my solution. (Ubuntu 14.04)

Phishing John Podesta

Thursday, November 3rd, 2016

Reconstructions of the phishing email and Google login were posted to Twitter. I make no warranty as to their accuracy and/or resemblance to what may or may not have been seen by John Podesta.

podesta-google-phishing-email

podesta-google-login

(selecting the images will display a larger version)

Recognition Warning: A phishing email sent to you will have your name, not John Podesta, in the email. The alleged Google login page will have your image and your name.

If you get the fake Google password page for John Podesta, that is a poor phishing attempt.

If you would fall for this phishing attempt addressed to you (or John Podesta):

Turn off your computer. Unplug your computer (to avoid accidentally starting it).

Inform your employer you require a position that does not involve computers.

Thanks for making the internet safer for your employer and everyone else!

George Carlin’s Seven Dirty Words in Podesta Emails – Discovered 981 Unindexed Documents

Thursday, October 13th, 2016

While taking a break from serious crunching of the Podesta emails I discovered 981 unindexed documents at Wikileaks!

Try searching for Carlin’s seven dirty words at The Podesta Emails:

  • shit – 44
  • piss – 19
  • fuck – 13
  • cunt – 0
  • cocksucker – 0
  • motherfucker – 0 (?)
  • tits – 0

I have a ? after “motherfucker” because working with the raw files I show one (1) hit for “motherfucker” and one (1) hit for “motherfucking.” Separate emails.

For “motherfucker,” American Sniper–the movie, responded to by Chris Hedges – From:magazine@tikkun.org To: Podesta@Law.Georgetown.Edu

For “motherfucking,” H4A News Clips 5.31.15 – From/To: aphillips@hillaryclinton.com.

“Motherfucker” and “motherfucking” occur in text attachments to emails, which Wikileaks does not search.

If you do a blank search for file attachments, Wikileaks reports there are 2427 file attachments.

Searching the Podesta emails at Wikileaks excludes the contents of 2427 files from your search results.

How significant is that?

Hmmm, 302 pdf, 501 docx, 167 doc, 12 xls, 9 xlsx – 981 documents excluded from your searches at Wikileaks.

For 9,011 emails, as of AM today, my local.

How comfortable are you with not searching those 981 documents? (Or additional documents that may follow?)

Self-Destruct Smart Phone Feature

Saturday, September 10th, 2016

The Samsung Galaxy 7 Note offer a self-destruct feature may defeat even quantum computers. It melts itself.

Like most new features, it’s erratic and difficult to invoke reliably. The 35 known cases don’t establish a pattern of how to make the Galaxy 7 Note explode on-demand, an essential characteristic for a self-destruct feature.

Having discovered this feature accidentally, one expects Samsung to offer the self-destruct feature on a standard Galaxy 8. Pricing has yet to be determined.

😉

From the post:

samsung-galaxy-note-7-fire-front-460

PS: The self-destruct UI should be two-buttons. Say on/off plus phone. Something easy to remember and perform as you are being seized.

Frinkaic (Simpsons)

Saturday, August 20th, 2016

Frinkaic

From the webpage:

Frinkiac has nearly 3 million Simpsons screencaps so get to searching for crying out glayvin!

With a link to Morbotron as well.

Once you recover, consider reading: Introducing Frinkiac, The Simpsons Search Engine Built by Rackers by Abe Selig.

Where you aren’t trying to boil the ocean with search, the results can be pretty damned amazing.

Nomination For #1 Impediment To IT Reform

Wednesday, August 17th, 2016

I saw this on Twitter and nominate it as the #1 impediment to IT reform. In government or private industry (in case you think there is a difference).

mistakes-460

Your nominations?

iTunes Prohibits Development of WMDs

Monday, August 1st, 2016

apple-wmds-460

I feel certain that if I were planning on developing a weapon of mass destruction, a device that could only be used to cause widespread death and suffering, fear of violating the iTunes EULA would end my efforts in that direction.

Would be WMD developing tyrants should take fair warning to stay off of iTunes. Apple lawyers will gobble you up!

The Apple EULA.

Threats Against Democracy – Try Threats Against “Innocent” Users

Monday, August 1st, 2016

After posting about truth telling being a threat to democracy, in the eyes of some, I encountered: Facebook Phishing Scam Using Pornographic Images to Steal Login Data, which reads in part:

There is no way to stop cyber criminals from stealing login credentials of innocent social media users — Recently, one of the HackRead’s writers found a Facebook phishing scam targeting users and stealing their login data. What makes this phishing scam dangerous is the fact that apparently non of the phishing filters have detected any wrongdoing with the links used in this campaign.

Cyber criminals behind this scam have three motives one is to steal users’ login credentials, the second is to get some likes on their Facebook page and third is to profit financially. It starts with scammers posting a link in the comments section of several Facebook groups with a large thumbnail of a nude girl but to make it look like a legit link scammers also mention that video already got hundreds of comments, shares plus thousands of views. The description on the link goes something like this ”groups teen-girl-japannese-18-[retracted]–010 Click HERE to view video recorded 2.381 Likes, 749 Comments, 9.185 Views, 571 Share.”

Now there’s a serious security issue!

Taking advantage of users who are surfing Facebook for porn.

Talk about fishing (sorry) in the shallow end of the security pool.

Hard to say what other access could be leveraged using Facebook logins of such users.

Nuclear launch computers, remote admin at NSA, White House switchboard, free pizza line at Papa Johns. I take that back, Papa Johns probably has better OpSec than the others I mentioned. (That’s sarcasm for all the literalists in the crowd.)

Phishing With Pornography would make a great book title but I don’t know what sort of animal(s) should go on the cover. (Something from National Lampoon perhaps?)

Suggestions?

PS: If you think this indicates I have little sympathy for victims of pornography-based phishing schemes, take a point for your house.

How-To Get Published In Scientific American

Friday, July 29th, 2016

Summarize the obvious:

sci-am-hackers-460

“There are hackers, hackers I say that are breaking into computer systems!”

If the near omnipresence of hackers in all information systems surprises you, may I suggest that you join a survivalist community at your earliest opportunity?

The rest of the post summarizes the conclusion-rich but fact-poor popular opinions of US security contractors whose Magic-8 ball pointed towards Russia for this latest hacking incident.

Skip this article if you are looking for “scientific” content in Scientific American.

Ferengi Rules of Acquisition

Thursday, June 30th, 2016

Ferengi Rules of Acquisition

From the webpage:

The Ferengi Rules of Acquisition are a collection of two hundred and eighty-five sayings that form the basis of Ferengi philosophy.

The jury verdict against Oracle and in favor of HP for $3 billion reminded me of rule #8:

“Small print leads to large risk.”

You would think Ellison could recite them from memory by now. 😉

Scientists reportedly close to finding a use for LinkedIn

Monday, June 13th, 2016

Scientists reportedly close to finding a use for LinkedIn

Following a four-year multinational, interdisciplinary, cross-disciplinary study involving social scientists, computer scientists, algorithm developers, statisticians, mathematicians, programmers, engineers and clairvoyants, reports are circulating that there may be a breakthrough in the search for a use for the LinkedIn social network website.

“We don’t want to get people’s hopes up too much”, said Prof. Don Key of Stanford West University, “but we feel we are nearly there”.

“We have partnered with IBM and have used several hundred racks of their BlueGene/Q platform for the past four years and the results will almost certainly be out by next Friday”, said Prof. Key.

😉

One serious use of LinkedIn is to collect images for your facial recognition cameras.

LinkedIn is one of the many “leaky” public sources of data. Even without breaching its security.

You can find stories similar to this one at: The allium.

PS: I just saw this news scrolling across the screen: “Study confirms the wicked get 63% less rest.”

May’s fake news quiz (FirstDraft News)

Friday, June 10th, 2016

May’s fake news quiz

Best played on smart phones, in a group, at a bar.

Hilarity will ensue!

Enjoy!

Hacker puppets explain why malware and popups are still a thing online

Wednesday, June 8th, 2016

>Hacker puppets explain why malware and popups are still a thing online by Cory Doctorow.

This may not improve security at your office but at least it is an entertaining lesson on cybersecurity.

The intern memorizing the name of their anti-virus software is insufficient.

For virus notifications of any kind:

  1. Close browser
  2. Run your anti-virus software

Do not depend on names in notifications.

People who will lie about “anti-virus” warnings will also lie about software names.

For all virus warnings, run your anti-virus software. If true, your software will find them again.

iPad Security – Just Brick It! Just Brick It!

Wednesday, May 18th, 2016

bricks-450

Apple has released a new method for securing your iPad, brick it!

Darren Pauli reports in Apple’s iOS updates brick iPads the brick your iPad upgrade process is 100% effective at securing iPads, at least until restored by users and/or Apple support is contacted.

Office of Personnel Management managers have expressed interest in iPad bricking in light of its most recent IT security fiasco. The cost of upgrading to iPads, suitable for bricking, is unknown.

A Linguistic Divide: Cow Tipping vs. Fly-tipping

Monday, May 16th, 2016

When I read Private landowners face increasing costs and fines as fly-tipping reaches one million cases a year, I immediately thought of the urban legend of cow tipping.

Stories about cow tipping usually involve intoxicated people who attempt to push over, “tip,” a sleeping cow onto its side.

Before you verify for yourself that such deeds are urban legends, be aware that cows are quite large, often accompanied by bulls and always owned by people who take exception to drunks molesting their cattle at night. You have been warned.

When the story mentioned England and Wales, the idea of “fly-tipping” made a little more sense but not the increased costs and fines.

Who cares if drunk English/Welshmen want to tip over flies or not?

It does sound very British doesn’t it?

In any event, reading further revealed the unfortunate usage of “fly-tipping,” to mean “illegal dumping.”

Why the British have departed from the mainstream usage of “illegal dumping” to use “fly-tipping” isn’t clear.

But, if you are making a list of ill-advised synonyms, be sure to add “fly-tipping” to your list.

Moderate Rebels ™

Wednesday, May 11th, 2016

By the U.S. Dept. of Fear.

sailingtois-450

FYI, why sailing from Australia to join ISIS is a bad idea:

syria-google-450

I keep expecting either governments or terrorists to up their game but so far, no joy.

Is that intentional?

With an unknown number of terrorists about, governments can justify their terrorism budgets. Ineffectual and counter-productive government strategies to fight terrorism, writes terrorist recruitment literature for them.

Could it be that governments need terrorists and terrorists need governments?

Saving Time With Automation (Regex for USTR?)

Friday, April 29th, 2016

Some humor to get started on a beautiful Friday (near Atlanta, GA.). Your local conditions may vary!

tasks

Speaking of automation, does anyone have a regex for United States Trade Representative, USTR, or named staff of the USTR?

It could be used in filters that pipe USTR comments, emails, webpages, reports, etc., to /dev/null.

Pointers anyone?

Seriously, Who’s Gonna Find It?

Monday, April 25th, 2016

infrastructure-online-humor

Graphic whimsy via Bruce Sterling, bruces@well.com.

Are your information requirements met by finding something or by finding the right thing?

Clojure Code Sample Appears to VBA team

Thursday, April 14th, 2016

clojure-code-sample-vba-team

The caption as reported at: Classic Programmer Paintings reads:

“Consultant shows Clojure code sample to VBA team”, Rembrandt, Oil on canvas, 1635

Whether shown by a consultant or being written on the wall by a disembodied hand, I suspect the impact would be the same. 😉

There is a Bosch triplet at Classic Programmer Paintings.

I was about to lament the lack of high-resolution Bosch images but then discovered Extraordinary Interactive Hi-Res Exhibit of Bosch’s ‘Garden of Earthly Delights’ by Christopher Jobson.

As Jobson comments:

This is the internet we were promised.

Enjoy!

If At First You Don’t Deceive, Try, Try…

Tuesday, March 8th, 2016

Kremlin Falls for Its Own Fake Satellite Imagery by Ian Robertson.

From the post:

The Turkish downing of the Russian SU-24 jet last November saw a predictable series of statements from each side claiming complete innocence and blaming the other entirely. Social media was a key battleground for both sides—the Turkish and Russian governments, along with their supporters—as each tried to establish a dominant narrative explanation for what had just happened.

In the midst of the online competition, a little-observed, funhouse mirror of an online hoax was brilliantly perpetrated, one with consequences likely exceeding the expectation of the hoaxster. The Russian Ministry of Defense was duped by a fake image that Russian state media itself had circulated more than a year earlier, as a way to deny Moscow’s involvement in the downing of Malaysia Airlines Flight 17.

A great read about a failed attempt at deception that when used by others, deceives the original source.

Another illustration why it is important to verify images. 😉