by cloudier

Ortolan Bunting

For centuries, a rite of passage for French gourmets has been the eating of the Ortolan. These tiny birds—captured alive, force-fed, then drowned in Armagnac—were roasted whole and eaten that way, bones and all, while the diner draped his head with a linen napkin to preserve the precious aromas and, some believe, to hide from God.

64% of all Microsoft vulnerabilities for 2009 mitigated by Least Privilege accounts

  • Cybercrime is not driven by the use of zero day flaws, but by the millions of people using the Internet with outdated software – It’s a simple fact that has so far contributed to the rise and rise of some of the most prolific botnets, and outdated flaws within popular applications remain the main vehicle for Zeus crimeware infections. Naturally, there are campaigns that exclusively rely on recently published flaws, but the window of opportunity offered by those would be closed sooner than the one of all the outdated applications running on the same PC, combined. It’s the cybercriminal’s mentality of traffic optimization for malicious purposes, (See example: Money Mule Recruitment Campaign Serving Adobe/Client-Side Exploits), that offers the highest probability of infection.
  • Microsoft OS/software specific vulnerabilities are only a part of the drive-by exploits cocktail served by web malware exploitation kits – You would be surprised to know how many people are so obsessed with “Patch Tuesday” that they exclude the decent number of outdated browser plugins and third-party software installed on their PCs. The result? A false feeling of security, which combined with an outdated situational awareness on how modern web malware exploitation kits work, leads to a successful drive-by attack. It shouldn’t come to as a surprise that, not only did malicious PDF files comprise 80 percent of all exploits for 2009, but also, the use of Microsoft Office files for targeted attacks is declining. Two years ago, Microsoft in fact confirmed this trend – Microsoft: Third party apps killing our security.

Malicious PDF files comprised 80 percent of all exploits for 2009

Therefore, the increasing use of malicious PDFs can also be interpreted as the direct result of the millions of users using outdated and exploitable Adobe products, with the only preference a malicious attacker could have in this case remaining the incentive based on the 99% penetration of Adobe Flash on Internet-enabled PCs. But how is the possible that with such a high market share, ScanSafe’s report shows that Adobe Acrobat/Reader exploits grew while the use of Flash exploits declined?

Bone Marrow

The two types of bone marrow are medulla ossium rubra (red marrow), which consists mainly of hematopoietic tissue, and medulla ossium flava (yellow marrow), which is mainly made up of fat cells.

Little Big Details: Facebook – When it’s your friend’s birthday it suggests you post about it.

Urban Outfitters: Truly Madly Deeply French Cross Text Muscle Tank Top

saw this at market city for $40.

oof but the print is so nice.

What are the most common ways passwords are stolen?

Many security experts recommend turning off Wi-Fi in your phone whenever you leave home or a secure location.

What are good ways to protect yourself from identity theft?

  1. Keep all of your personal papers locked up at home.
  2. Shred all old bills and documents that you no longer need.
  3. Don’t carry any personal identification documents that don’t need (SS card, passport,etc) on your person or in a bag or purse.
  4. Only provide personal identity information when there is a clear and compelling need to do as such
  5. Review your credit report at least once a year and take note of any unusual charges or unexplained accounts.
  6. Limit  access to your home. This includes not throwing a lot of parties,  inviting only people that you really KNOW to your home and staying close  when contractors and tradespeople are working in your residence.
  7. If  you have relatives or friends who have alcohol, drug and gambling  problems, keep a close eye on them and their actions. Most ID theft  cases are caused by people who you know and that you thought you could  trust.
  8. Keep an ID protection service to help monitor your credit like While it will cannot guarantee 100% protection, it will help it your ID is stolen and will offer protection against fraud.
  9. Make copies of everything in your wallet to report to the police in case your wallet is ever lost or stolen.

Identity theft

Treat your trash carefully. Shred or destroy papers containing your personal information including credit card offers and “convenience checks” that you don’t use. Remember that Dumpster-diving is an increasingly lucrative and common occurrence. The Federal Trade Commission recommends everyone purchase a shredder.