Jump to content

qwertyaccount

Elite Member
  • Content Count

    1922
  • Joined

  • Last visited

Everything posted by qwertyaccount

  1. I use a tally counter to keep track of my number, and every time I meet a new girl I reset it to zero making her my first. I expect no more or less of the young lady.
  2. N is for Never ending -- which is what we would like our magical moments to be.
  3. A second SIM card is much easier to hide, and if need be, explain away, than a second phone. The virtual number Vitto suggested is a good idea too.
  4. No matter how hard I try not to, I just have to look!
  5. My dating choices: Now if I had to pick a fictional location to live, it would have to be Wonder Woman's home Paradise Island.
  6. Operation Petticoat (1959) with Carry Grant and Tony Curtis. "World War 2 comedy about a submarine commander who finds himself stuck with a decrepit (and pink) sub, a con-man executive officer and a group of army nurses." Mr. Blandings Builds His Dream House (1948 ) with Carry Grant "A man and his wife decide they can afford to have a house in the country built to their specifications. It's a lot more trouble than they think." If you ever think of building your own home, watch this movie first. Having been there, done that, I can tell you first hand the movie doesn't exaggerate much, if at all.
  7. Happy birthday! Enjoy your special day with someone special. P.S. All ladies are special.
  8. A witch appears to be screaming out into space in this new image of the Witch Head nebula from NASA's Wide-Field Infrared Survey Explorer, or WISE, released on Halloween:
  9. Karis, an 8 week old lion cub, growls at a pumpkin as she explores a Halloween treat put in her enclosure by staff at Blair Drummond Safari Park near Stirling, Scotland: Everest, a nearly 4-month-old snow leopard cub at the Brookfield Zoo received an early Halloween treat during the zoo's annual Cat Awareness Weekend in Brookfield, Ill:
  10. Could be just the rain, dark sky and shorter days. I've never tried it but have heard good things said about light therapy:
  11. It's taken a long time, and I still have some work to do, but learning to say "no" has saved me much time, money and aggravation: No, I won't help you paint your house No, I won't help you move No, you can't borrow $50 No, my schedule is full, I can't take on any new projects No, I do not want to mega-size my order No, I don't want to help a Nigerian prince with his $300 million inheritance No, those pants do not make you look fat No, don't stop!
  12. Console TVs dot matrix printers typewriters people reading George Orwell's book "1984" in 1984.
  13. I like to watch scary movies, especially under the following conditions: -It's night -It's thunder storming -I'm cuddled up with a fine lass -I've seen the movie before and she hasn't
  14. Watching porn alone - you bet! Watching porn cuddled up with a special lady with her pointing to something and saying "I want you to do that with me now!" - fantastic! Having porn playing in the background during "funtime" -- no thanks, the lady is all the stimulation I need.
  15. Thank you for your feedback ladies - much appreciated!
  16. As a former trick-or-treater, I like the idea of something different, but don't think cans of pop or juice boxes would be a good idea - they weigh too much. Fruit of course isn't a treat and often results in a trick, like it being chucked onto your roof. Peanut butter cups were always one of my favourite; you can never give out too much chocolate!
  17. Great points guys! It's too bad that the mainstream media, very rarely makes the study paper available and all we have is the dumbed down version. The mainstream media reports the news they want to report, the way they want to report it, and considering the number of typos, grammar and other errors I find in many "news" articles, not much if any editing had been done, which means little or no fact checking was done -- frankly these days I can't trust the mainstream media any more than internet bloggers.
  18. Since he's a long time member, I'm sure he's just curious about everyone's opinion. If he were a new member, I'd say he's just trying to stir up the bees nest and enjoy watching everyone's reaction. If these threads keep going, this may turn into a discussion of "by the second" billing like a long distance plan. Here's just what's needed, and it includes the option of "extras" and a print out for one's scrap book to memorialize the visit:
  19. Article: By Sean Michael Kerner Posted 2013-10-29 Security researchers from mobile security firm Skycure today revealed details on a new type of mobile threat that potentially puts millions of users at risk of being exploited. The new threat, called HTTP Request Hijacking (HRH), could be responsible for redirecting mobile users to malicious Websites. The HRH flaw is particularly dangerous because countless numbers of existing mobile applications are already vulnerable, Skycure Chief Technology Officer and co-founder Yair Amit explained to eWEEK. The flaw involves a persistent caching feature in code running on mobile operating systems, in particular Apple's iOS. The way the HRH flaw works is a user using a public WiFi network is targeted by a hacker using a man-in-the-middle (MiTM) attack. In an MiTM attack, an attacker intercepts the user's WiFi connection and then inserts a 301 redirect code, which is an HTTP response code that permanently redirects traffic to a different address. The HRH flaw isn't the MiTM attack itself, which is enabled by having an open, unencrypted WiFi access point. The flaw lies with the 301 redirect. Amit noted that the way Apple iOS works is that the 301 redirect is cached by the application on the mobile operating system. As such, even after the user has disconnected from the open access point and has connected at a secured home or office access point, the connection for a specific site could still be redirected. Amit noted that the code that enables the persistence of the 301 redirect is common across countless mobile applications, which means that users are already potentially at risk. The Fix One of the ways users can protect themselves from being the victim of an HRH attack is by using Secure Sockets Layer (SSL) encrypted Websites. An SSL Website, when properly configured, is not easily redirected. An SSL certificate that is issued by a Certificate Authority (CA) can be checked via the browser or operating system when visiting a site to ensure authenticity. At a coding level, there is code that application developers can insert into their application to protect apps and their users. Amit said developers just need to create a code object that prevents the application from caching 301 redirects. "By not caching the 301 redirects, users are no longer at risk," he said.
×
×
  • Create New...