I cant speel or gramer to good.
People poke me with pointy stiks wen I spel bad, but still I sucks.
Seriously though, I have never been able to spell and get silly words mixed up (like then and than or there, their and they’re). Attending school in a time before computers were common made this more problimatic. Spell and grammer check have helped me a great deal but have become dependant on them.
My thinking and research are sound, and I enjoy publishing my work, but if I only had a secretary. 🙂
Missy and I brewed up our first Mead the other day. I have been using The Complete MeadMaker by Ken Schramm and Making Wild Wines & Meads by Pattie Vargas & Rich Gulling as my resources.
We decided to make a braggot instead of a straight up mead. That is a very honey heavy beer. Mead with malt, carbonation and sometimes hops.
Normally a beer with honey contains about 1lb of honey… this braggot contains 15 lbs. We are calling it the “+1 Braggot of Drunkening”.
Leafing through these two books brought question to how I have always brewed with honey.
On page 41 of The Complete Meadmaker I read:
“Dr. Johnathan White of United States Department of Agriculture (retired) did a tremendous amount of research on honey and concluded that the amount of heat exposure needed to kill off the wild yeast in honey is as little as fine minutes at 150 F (66 C), or about 22 minutes at 140 F (60 C).”
In making previous batches of beer we added the honey at the beginning of the boil so the honey is exposed to 60-90 minutes of boiling temperatures. According to this research that will kill a great deal of the aroma and flavor that honey contributes.
Brewing with honey, according to this research can be difficult. We heated the honey in a seperate brew kettle (140 F for 22 minutes) and timed it so that its cook time ended about 10 minutes after the wort boil.
I have a brewmometer on my kettle so I waited till my wort chiller brought the wort to 140 F and then added the honey.
Our braggot is about 1-2 days from being transfered to the secondary. I will let everyone know how it turns out. If you know me, maybe you will be lucky enough to score a bottle or two. 🙂
When you see a day in the forecast that has a predicted high of 0 degrees F, its time to move.
The case against Connecticut substitute teacher Julie Amero has finally
come to a close. Prosecutors dropped the felony charges against her,
but the agreement called for a guilty plea to a misdemeanor charge of
disorderly conduct and surrender of her state teaching credential.
Amero had previously been convicted of endangering minors and faced 40
years in prison. Prosecutors alleged that in 2004 she had surfed to
dubious websites that displayed pornographic pop-ups on a computer in
the classroom; when security specialists caught wind of the case, they
pushed to examine the computer in question and found that the school
district had inadequate anti-malware protection on that computer and the
pop-ups were not Amero’s fault.
This is easily one of the most frustrating InfoSec stories of recent years. In case you are unaware, some poor substitute teacher in Conn was using a computer in a classroom when a flood of pornographic pop-ups (induced by malware) came on the screen. She found herself in court facing Child Endangerment charges and up to 40 years in prison.
This highlights how scary our legal system can get. If you have no idea what a case is about do not try to render a verdict. Defer it to another judge, a jury or call in some experts. For gods sake, don’t sentence someone for not doing anything wrong.
Had this been a real blog post it would contain real info… but it doesn’t… so its not.
I don’t need to lecture everyone on why this is so important… your reading this so you are obviously literate and therefor fully aware of why you need to vote today.
I also don’t need to beat the dead horse of vote fraud alarmism, although its still something you need to be very aware of. In the past I have posted links to different voting awareness sites in posts like “Mid-Term Elections” and “e-voteing“. All of the information contained in these posts (sadly) still holds true today.
Be aware of your voter rights, and what to look for to ensure voter fraud isn’t happening.
Visit Black Box voting article “What to expect and look for…“
A Cisco-commissioned study found that employees at businesses in 10 countries around the world are often unaware of their companies’ security polices, or the employees ignore the policies because they hinder productivity. When surveyed about whether their companies had security policies, there was a 20 to 30 percent gap between responses from IT professionals and other employees. When asked why security policies are violated, IT professionals pointed to ignorance, while other employees said it was because the policies made it more difficult for them to do their jobs. The study surveyed more than 2,000 employees and IT professionals at companies in the US, the UK, France, Germany, Italy, Japan, China, India, Australia and Brazil.
Unfortunately I have seen the same thing in every orginization I have ever worked in. Another unfortunate fact is that no real solution exists to this problem. Most orginizations will do a security awareness program that consists of InfoSec trying to convey the inportance of this information without putting everyone to sleep, and the standard “signing of the security policy every year”.
Neither of these work, but they are better than nothing.
Does anyone else have any unique or effective methods they have used?
FoxNews (not one of my normal news sites… I promise) just posted a story entitled “World Bank Under Cyber Siege in ‘Unprecedented Crisis’“.
The details are fairly chilling and include some amazingly upbeat quotes like…
“While it remains unclear how much data has been pilfered from the bank, it’s a lot. According to internal memos, “a minimum of 18 servers have been compromised,” including some of the bank’s most sensitive systems — ranging from the bank’s security and password server to a Human Resources server “that contains scanned images of staff documents.””
“The World Bank Group’s computer network — one of the largest repositories of sensitive data about the economies of every nation — has been raided repeatedly by outsiders for more than a year, FOX News has learned.”
This is certainly disturbing news for a number of reasons. Most importantly the fact that the worlds financial system is serious peril and this…
In a frantic midnight e-mail to colleagues, the bank’s senior technology manager referred to the situation as an “unprecedented crisis.” In fact, it may be the worst security breach ever at a global financial institution. And it has left bank officials scrambling to try to understand the nature of the year-long cyber-assault, while also trying to keep the news from leaking to the public.
The italicised text is what I find very disturbing. GLB, SOX and a slew of other laws all have strict disclosure guidelines. Trying to hide something of this magnitude is not only futile but also illegal.
As I mentioned previosly, Missy and I have started brewing our own beer. We are starting to produce some respectable ales and are cranking out many diverse batches.
Last weekend we kicked it up to the next level and purchased an Oster 5cubic foot fridge, 4 corny kegs and all the CO2 gear to keg our brews.
Its amazing to be able to skip the botteling step and have draft beer on tap in my ‘man cave’.
Bottling involves de-labeling and sanitizing 52 12oz beer bottles, cooking a batch of ‘priming sugar’, sticking the beer in the bottles and capping them. Then you wait at least 2 weeks for ‘bottle conditioning’ and you drink.
With kegging you transfer from your secondary fermentation vessel to the keg, pressurize it, roll it around a bit and wait a few hours. You are drinking your beer in less than a day as opposed to two weeks.
I will post pictures and tutorials for the kegging project once its finished.
Arpwatch is an amazingly useful tool that promiscuously listens on a specified interface for arp broadcasts. It takes what it learns and saves the the output in a database for later reference in the following format.
mac_address ip unix_date/time hostname
It will take any changes/additions and log them to /var/log/messages as well as optionally emailing them.
This functionality is useful for detecting
- Man-in-the-middle attacks
- Arp spoofing/poisoning
- Session hijacking attacks
- New hosts introduced onto your network
Set up and configuration is easy. Just download and compile arpwatch from lbnl’s site, create an arpwatch user (unless you want it to run as root… which you don’t), create an empty arpwatch database (touch/home/arpwatch/arp.dat) and run it.
The command line arguments you run will differ depending on how your network is set up, so check out the man page to be safe. The following should work for most situations.
/usr/sbin/arpwatch -i eth0 -u arpwatch -f /home/arpwatch/arp.dat -n x.x.x.x/21 -e –
-i eth0 tells it to listen on /dev/eth0 only. You can run multiple instances of arpwatch for each nic/network if you are multihomed.
-u arpwatch tell it to run as the user ‘arpwatch’ instead of root.
-f /home/arpwatch/arp.dat tells it to save the arp database in that file instead of the default location
-n x.x.x.x/21 tells it that an additional address range is in use on this interface. If you have IPs outside of those defined on your monitor nic it will report them as bogon.
-e – tells it not to email you with every thing it discovers. You will want to run it this way the first time to avoid flooding your mail box.