Friday, August 31, 2018

"Fingerhut", one of the greatest "legal" scams around


 Look carefully at the price of this chain.


 Here are the specs > 

Specifications
Brand Non Branded
Model # PEN13-24
Manufacturer Color Name Gold
Additional Necklace(s) Details None
Chain Color 14k Yellow Gold
Chain Material 14K Gold
Chain Type None
Chain Width (mm) 2.25
Disclose any stone enhancements /treatments etc. No Stone
Does this item contain lead? No
If yes, are lead test reports available? Yes
Finish Polished
Finished Gram Wt. 10.6
Gender Unisex
Jewelry Category Fine
Jewelry Material Category Gold
MFR Included Warranty Type No manufacturer warranty.
Necklace Design Chain
Necklace Length (in.) 24
Number of Personalized Characters (Including Spaces) 0
Pendant Color No Pendant
Pendant Design No Pendant
Pendant Included No
Pendant Length (in.) 0
Pendant Width (in.) 0
Personalization Available No
Personalization Location None
Plating Content None
Plating Thickness 0
Product Type Necklaces
Special Care Instructions N/A
Was cadmium used in the manufacturing of this product? No
If yes, are cadmium test reports available? Yes
Warranty Labor (Days) 0
Warranty Parts (Days) 0
Warranty Type Included No manufacturer warranty.

 And here's what it's worth > 

Now you want to verify a business *This is free, the tools I use cost $$$


  Simply enter the domain name and see if what you've read or been told lines up with the information here.

Find Email Address Source *It would be in your best interest to pay attention


In the following steps you'll learn how to find and copy an email header and paste it into the Trace Email Analyzer to get the sender's IP address and track the source.
Would you like to track down (or trace) where an email that you received came from?
This Trace Email tool can help you do precisely that. It works by examining the header that is a part of the emails you receive to find the IP address. If you read the IP Lookup page, you'll get a clear idea of what information an IP address can reveal.
(A header is the unseen part of every sent and received email. To learn a little bit more on headers, click here. You can see an example of a header at the end of this article.)

What email provider do you use?

To find the IP address of a received email you're curious about, open the email and look for the header details. How you find that email's header depends on the email program you use. Do you use Gmail or Yahoo? Hotmail or Outlook?
For example, if you're a Gmail user, here are the steps you'd take:
  1. Open the message you want to view
  2. Click the down arrow next to the "Reply" link
  3. Select "Show Original" to open a new window with the full headers
Note: We are in the process of compiling instructions from a variety of popular webmail services and email applications. In the meantime, if you have a question about your email provider, please post it in the Email Tracing Forum.

STEPS TO TRACING AN EMAIL:

  1. Get instructions for locating a header for your email provider here
  2. Open the email you want to trace and find its header
  3. Copy the header, then paste it into the Trace Email Analyzer below
  4. Press the "Get Source" button
  5. Scroll down below the box for the Trace Email results!
You should know that in some instances people send emails with false or "forged" headers, which are common in spam and unwanted or even malicious e-mail. Our Trace Email tool does not and cannot detect forged e-mail. That's why that person forged the header to begin with!

Wow, why are people doing this to me *Why I stopped dating

 I grew up in a time when dating/relationships were 50 / 50. Nowadays, for me, dating and relationships have become 95 / 5 and you'll never guess who the 95% falls on. It's simply not fair.
 I own a small business and at least 3 of my "x's" would ask me for cash but never asked me for a little work to earn some money.
I could work with a woman willing to work.

 This may seem small to some but it means a lot to me, I don't go to dives when I go out, I seek the better restaurants and accommodations around the world. *Maybe it's just Florida thing but I can't even find a woman that wears shoes or has a passport.

 You asked and I answered.




 You don't have to believe me but I have learned a valuable rule, "Never date outside your status". It may seem cold but it's not, the "truth" isn't always kind.

People can be hateful of your success *The Crab Theory / Updated

 You've stayed at home and studied while your friends went out and had a good time, you invested time and energy into your future but you're getting a negative vibe from your "so called" friends.

 Buy a bushel of crabs, remove the lid and go to bed.



 In the morning when you awake, you will find all the crabs still in the bushel, why? The crabs have been clawing at each other not allowing any escape for any of the other crabs.

 Now, cook all the crabs except two and leave them in the bushel. If you turn your back for 10 seconds, those crabs will be Gone! 



  You can now look at the attitudes and disposition of those around you to discern whether they are crabs or friends.

*You may find that individuals that like to sit on their asses all day tend to like those around them to join in and keep them company in their nothingness.

Thursday, August 30, 2018

Rent, rent to own, own, whatever floats your boat

I have a 40' Mainship Express that I'm going to rent out. I'm going about a mile away to breed Akitas. Anyway, as best as I can describe it, this is an efficiency with one small bedroom, it has it's own small bathroom and shower, refrigerator/freezer and a freezer out back, will come with a flatscreen, two eyed electric stove + hot plate, coffee maker, marine air and a portable A/C, microwave and small but adequate storage space.













































You'd be looking at $700 a month which includes electric, trash removal, water, internet and free roam of about two acres of nicely kept lawns and property all with a view if the basin and river.

I also have a 14' Carolina Skiff, no idea of where the title is at but it's for sale or you can purchase the engine 15hp Evinrude for $400

*If you don't have good credit, don't waste your time.

I was just offered a job in Kuwait

 And you had better bet your ass that if all the paperwork goes through, I'm gone! I'd rather die there than continue to live here.



 ...and yes, the status quo will still be sitting on the same couch watching the same shit "if" I make it or decide to come back. Come back? Excuse me for a second of insanity.

Gosh Knows I Love My Self Awareness Quiz's

Let's Go

New Bluetooth Hack Affects Millions of Devices from Major Vendors

 People see me with my wired headset and think I'm silly. I see them with their Bluetooth and think words much more offensive. The hacking methods are "not" limited to what's described here.


Yet another bluetooth hacking technique has been uncovered.

A highly critical cryptographic vulnerability has been found affecting some Bluetooth implementations that could allow an unauthenticated, remote attacker in physical proximity of targeted devices to intercept, monitor or manipulate the traffic they exchange.

The Bluetooth hacking vulnerability, tracked as CVE-2018-5383, affects firmware or operating system software drivers from some major vendors including Apple, Broadcom, Intel, and Qualcomm, while the implication of the bug on Google, Android and Linux are still unknown.


The security vulnerability is related to two Bluetooth features—Bluetooth low energy (LE) implementations of Secure Connections Pairing in operating system software, and BR/EDR implementations of Secure Simple Pairing in device firmware.

How the Bluetooth Hack Works?


Researchers from the Israel Institute of Technology discovered that the Bluetooth specification recommends, but does not mandate devices supporting the two features to validate the public encryption key received over-the-air during secure pairing.

Since this specification is optional, some vendors' Bluetooth products supporting the two features do not sufficiently validate elliptic curve parameters used to generate public keys during the Diffie-Hellman key exchange.

In this case, an unauthenticated, remote attacker within the range of targeted devices during the pairing process can launch a man-in-the-middle attack to obtain the cryptographic key used by the device, allowing them to potentially snoop on supposedly encrypted device communication to steal data going over-the-air, and inject malware.

Here's what the Bluetooth Special Interest Group (SIG), the maintainers of the technology, says about the flaw:

"For an attack to be successful, an attacking device would need to be within wireless range of two vulnerable Bluetooth devices that were going through a pairing procedure."

"The attacking device would need to intercept the public key exchange by blocking each transmission, sending an acknowledgment to the sending device, and then injecting the malicious packet to the receiving device within a narrow time window. If only one device had the vulnerability, the attack would not be successful."
On Monday, CERT/CC also released a security advisory, which includes additional technical details about the Bluetooth vulnerability and attack method.

According to the CERT/CC, Bluetooth makes use of a device pairing mechanism based on elliptic-curve Diffie-Hellman (ECDH) key exchange to allow encrypted communication between devices.


The ECDH key exchange involves a private and a public key, and the public keys are exchanged to produce a shared pairing key.

The devices must also agree on the elliptic curve parameters being used, but in some implementations, these parameters are not sufficiently validated, allowing remote attackers within wireless range "to inject an invalid public key to determine the session key with high probability."

Stop Bluetooth Hacking—Install Patches from Vendors


To fix the issue, the Bluetooth SIG has now updated the Bluetooth specification to require products to validate public keys received as part of public key-based security procedures.

Moreover, the organization has also added testing for this vulnerability within its Bluetooth Qualification Process.

The CERT/CC says patches are needed both in firmware or operating system software drivers, which should be obtained from vendors and developers of the affected products, and installed—if at all possible.

Also Read: BlueBorne Attack Critical Bluetooth Attack Puts Billions of Devices at Risk of Hacking

Apple, Broadcom, Intel, and Qualcomm Found Affected


So far, Apple, Broadcom, Intel, and Qualcomm have been found including affected Bluetooth chipsets in their devices, while Google, Android, and Linux have yet to confirm the existence of the vulnerability in their respective products. Microsoft products are not vulnerable.

Apple and Intel have already released patches for this security vulnerability. Apple fixed the bug with the release of macOS High Sierra 10.13.5, iOS 11.4, watchOS 4.3.1, and tvOS 11.4.


Featured Posts

Rental Properties for Sale, Santa Marianita, Ecuador

  Beautiful rental with beach access. Utilities and WiFi are included, just bring your food and move in. *Be sure to ask about our long-term...

Popular Posts