Archive for September 2009

Barrier Canyon Style Rock Art I Canyonlands National Park   Leave a comment

Barrier Canyon Style rock art is the oldest pictography on the Colorado Plateau. The style is equated with the Archaic Culture. Within the Fremont culture region it is a distinct style. It is centered near the Green-Colorado confluence. The type locality is in Barrier Canyon, also known as Horseshoe Canyon. Because of the importance of the rock art the area was designated a detached unit of Canyonlands National Park. The “Great Gallery” is the type site for the style. The vast Great Gallery murals represents one of the greatest pictograph sites anywhere. The area is remote backcountry and the footpath descending into the canyon is steep and rough. If you hike in watch for well-camouflaged rattlesnakes sunning themselves on the path.
Ghost Panel, 279 x 288 pixels
The oldest stratigraphically dated rock art in Utah is an incised pebble from an 8,700 year old level in Cowboy Cave, up canyon from the Great Gallery site. Several petroglyphs are found at Cowboy Cave, including a figure with very enlarged feet. In 1957 Jesse D. Jennings dated the Archaic Native American culture in Danger Cave to 11,000 B.P. Sites in Arizona, New Mexico and Nevada corroborate the antiquity of Archaic culture in the southwest. While some rock art may be as old as human occupation, almost all the art is attributed to recent millennia.

Powered by ScribeFire.

Advertisements

Posted 15 September 2009 by chrismmm in Uncategorized

Quick Wireless LAN Security – Do It!   Leave a comment


Checklist from Wardrive.net
(***)

Things you can do to secure your wireless network.

  1. Change the default Admin password on your Access Point (this includes the webinterface).
  2. Check if the firmware for your Wireless Access Point and drivers for your Wireless Adapter(s) are up to date. Update if necessary. Keep checking for new releases in the future.
  3. Use a high level of encryption (WPA2/802.11i strongly preferred) — Use decent keys.
  4. Authenticate wireless users with protocols like 802.1X, RADIUS, EAP (including EAP-PAX, EAP-PSK, EAP-TLS, EAP-TTLS, EAP-FAST, EAP-POTP, EAP-IKEv2, EAP-GPSK, PEAP, and EAP-SIM). These protocols support authentication credentials that include digital certificates, usernames and passwords, secure tokens, and SIM secrets.
  5. Use strong encryption for all (userland) applications you use over the wireless network, e.g., use SSH and TLS/HTTPS.
  6. Encrypt wireless traffic using a VPN (Virtual Private Network), e.g. using IPSEC or other VPN solutions.
  7. Use WLAN Security Tools for securing the wireless network. This software is specifically designed for securing 802.11 wireless networks.
  8. Create a dedicated segment for your Wireless Network, and take additional steps to restrict access to this segment.
  9. Use a proxy with access control for outgoing requests (web proxy, and others).
  10. Regularly TEST the security of your wireless network, using the latest Wardriving Tools (the same tools the attacker will use). Don’t use these tools on other networks, and always check local laws and regulations before using any wardriving tools.
  11. Enable strict (sys)logging on all devices, and check your (wireless) log files regularly to see if your security policy is still adequate.
  12. (only provides very little security)Enable MAC address filtering on your Access Point. Note that MAC addresses can be changed easily by the attacker.

Powered by ScribeFire.

Posted 14 September 2009 by chrismmm in Uncategorized

Twain Quotes   Leave a comment

History does not repeat itself, but it rhymes.
posted: gandalf
   saved: 
174 
If voting made any difference they wouldn’t let us do it.
posted: gandalf
   saved: 
152 
Twenty years from now you will be more disappointed by the things that you didn’t do than by the ones you did do. So throw off the bowlines. Sail away from the safe harbor. Catch the trade winds in your sails. Explore. Dream. Discover.
posted: gandalf
   saved: 
136 
If you don’t read the newspaper, you are uninformed; if you do read the newspaper, you are misinformed.
posted: gandalf
   saved: 
118 
Sometimes I wonder whether the world is being run by smart people who are putting us on, or by imbeciles who really mean it.
posted: gandalf
   saved: 
117 
Suppose you were an idiot. And suppose you were a member of Congress. But I repeat myself.
posted: gandalf
   saved: 
109 
“I do not fear death. I had been dead for billions and billions of years before I was born, and had not suffered the slightest inconvenience from it.”
posted: supaflybri
   saved: 
99 
I’ve never killed a man, but I’ve read many an obituary with a great deal of satisfaction.
posted: gandalf
   saved: 
84 
They did not know it was impossible, so they did it!
posted: gandalf
   saved: 
81 
Patriotism is supporting your country all the time, and your government when it deserves it.

Powered by ScribeFire.

Posted 14 September 2009 by chrismmm in Uncategorized

Do you know why swimming in the Congo river is prohibited? This is why…   Leave a comment

Pirhania only a little bigger

from:http://hqvia.com/swimming-congo-river-prohibited/

Posted 11 September 2009 by chrismmm in Uncategorized