How High Tech loves to Blame the victim

If you’re like me, you get lots of spam, and a lot of it harbors a malicious intent.  People are constantly trying to get me to cough up user ids and passwords, bank accounts, or unwittingly install malware on my computer.  I’m pretty skeptical about email and so far (knock on wood) I’ve managed to avoid falling for them.

Don't click!!!

Don’t click!!!

For the most part, that’s not hard to do.  Most people sending phishing email do an incredibly bad job of mimicking the real thing, so it usually doesn’t look good.  Every once in a while one looks really good, but that just gets me more excited to find its tell. And they all have tells … which means that, if you’re really good at looking for them, and extremely diligent, you should never fall victim to one of these scams.

Continue reading

10 Ways the Secret Service can Defend Against Drones

With the accidental (and apparently innocent) crash of a DJI Phantom quadcopter on the White House lawn, there’s an urgency to the question of how the Secret Service can defend against a small drone that’s been launched with malicious intent.  The key is malicious — people who are actively hoping to evade detection (otherwise, rule and regulations will suffice, no?).  There’s two problems to solve, really.  The first is detection, and the second is stopping a drone.

Continue reading

What Oliver North could have taught Sony Executives about Email

In late 1986, the White House was on the cusp of a huge scandal involving Iran-Contra, a complicated and illegal program to sell arms to Iran and route the proceeds to the Contras, a guerrilla organization dedicated to the overthrow of Nicaragua’s leftist, Sandinista regime. To try to destroy incriminating evidence, National Security Advisor John Poindexter and his assistant, Lieutenant Colonel Oliver North shredded the paper trail and methodically set out to delete all of their emails related to the program.  When done, they felt confident that they had erased anything that could have tied them and the White House to the illegal program. But that was a false confidence.

Continue reading

Creating a 3D Printed Heart Charm in Blender

I am working on a project to make earrings, and I wanted to add a heart in the middle of of each earring where it’s connected via a jump ring to the element above and below it.  This meant adding a ring at the top and bottom of the heart.

I’m using Blender to model the earrings, and it turned out to be surprisingly hard to get it so the heart would print right.  Even though it looked fine in Blender, viewed properly in Slic3r, it still ended up printing wrong from the generated g-code.  The ring, even though it was unioned with the heart in Blender would end up looking like it had been intersected, resulting in a gap in the heart, or it would end up filling the interior of the ring, which was not what I wanted either:


Continue reading

Fixing the Mac Messages Program When it Can’t Login

A while back, I noticed something strange — I couldn’t log into the Messages program on my Mac Mini.  The Messages program interacts with iMessage, which means you can use it to send (essentially) text messages to any iPhone or iPad.  It’s great when communicating with people who are using iPhones because you have the full computer keyboard and display to use instead of an iDevice’s more limited capabilities.

But all of a sudden a while back, when I tried to log into Messages, it just spun and spun and spun but never got anywhere — just on the Mac Mini.  On my MacBook Air, it still worked perfectly fine.  I tried all the various solutions I found on the net — deleting various files and directories, logging in and out of accounts, etc.  But nothing worked … until … well, a story first.

Continue reading