Off-Duty Police Officer Steals iPad From TSA Checkpoint

Evidently you can\’t trust the police that much, at least not the off-duty officers at Miami International Airport…

The Fullerton off-duty Police officer was arrested for stealing an iPad at the TSA checkpoint last month (5/2011).

Excuse me, he shouldn\’t be an officer…  He should know that the TSA checkpoints are video \”taped\”.  He expected to get away with it?  This is a 6+ year veteran of the force, and makes around $86,000 per year.
I\’m just disgusted…  Read the article here…  Fullerton Cop Arrested for Stealing iPad at TSA Checkpoint

Kaba Faces Suit Over Push-Button Locks Breached With Magnet

Yeshai M. Kutoff was house-proud, having bought a home in Cleveland Heights, Ohio, for his family of five. And as an Orthodox Jew, he bought push-button locks for the doors — an accommodation for the Sabbath, when many of the devout do not carry keys.
Yeshai M. Kutoff had push-button locks installed at his home in Cleveland Heights, Ohio. When a neighbor told him that the locks he had bought could be opened by a powerful magnet costing about $30, Mr. Kutoff was perturbed. “It does bother me that other people could easily figure it out,” he said. Mr. Kutoff did not buy a magnet to see for himself. “It doesn’t interest me to know how to break into my own lock,” he said.
If this were a problem with security software instead of errant bits of steel, a company could send out a patch. If this was someplace other than the United States in the 21st century, Mr. Kutoff might have called a locksmith. But because it is the United States in the 21st century, lawyers are involved.
Read the rest at the NYTimes… Kaba Faces Suit Over Push-Button Locks Breached With Magnet.

Should I Change My Password?

Should I Change My Password? has a lookup form where you can enter your email address to see if it was in one of the databases with login info that has been compromised and released to the public.
ShouldIChangeMyPassword.com has been created to help the average person check if their password(s) may have been compromised and need to be changed.
This site uses a number of databases that have been released by hackers to the public. No passwords are stored in the ShouldIChangeMyPassword.com database.

Doctor Who\’s Matt Smith suits up to play a VERY confused Batman | Blastr

\"smith-bathman\"

The 11th Doctor, actor Matt Smith, traded his Doctor Who attire of tweed jacket and bow tie for the Batman cape and cowl over the weekend. Batman is cool.
If you\’ve been holding your breath for a few short seconds now, you can start breathing: Matt Smith is NOT trying to replace Christian Bale as Batman. (Whew!)
Instead, the British actor was playing a comedic Batman over the weekend for an event called 24 Hour Plays (the plays are written the night before by various playwrights, then the actors have only a day of rehearsals before going live on stage) in Santa Monica, Calif.

(See the Rest of the Story at Doctor Who\’s Matt Smith suits up to play a VERY confused Batman | Blastr.)

What is a Port Number & Common Ports

What Is a Port Number?
To the uninitiated or the otherwise-gifted computer user, technical geek-speak can be rather frustrating and aggravating. When instructions are filled with such things as \”port,\” \”TCP,\” \”UDP,\” and other acronyms or technical terminology, the user feels more isolated and rarely finds a solution or comprehension. Fortunately, comprehension is just moments away.
Port
Picture a bay where there are lots of private boats are docked. The overall location is called a seaport, literally a port at or on the sea. Everyone wanting to dock there, requesting landing services, uses the same port. Seaports work with berth numbers assigned to individual boats. The port name and the berth number combine into the \”who, what, and where\” of boat identification.
The berth numbers on the Internet are Internet Protocol or IP addresses, a user\’s numerical identifier on the Internet. Depending on connection type and service provider, a user\’s IP address may or may not remain the same with each connection to or \”docking\” on the Internet.
A computer port is a type of electronic, software- or programming-related docking point through which information flows from a program on your computer or to your computer from the Internet or another computer in a network.
Ports are numbered for consistency and programming. The most commonly used and best known ports are those numbered 0 to 1023 dedicated for Internet use, but they can extend far higher for specialized purposes. Each port set or range is assigned specialized jobs or functions, and that\’s generally all they do. Usually, all identical system services or functions use the same port numbers on the receiving servers.
For example, all computers accessing or requesting Quote of the Day will always use port 17, because that port is officially reserved for that purpose, and only requests for that service use port 17. Outgoing information is channeled through a different or private port, keeping the \”incoming line\” open for others. Email received on a local computer generally uses a TCP port 25. File Transport Protocol or FTP uses port 21, to name only a few port assignments.
TCP/UDP

TCP stands for Transmission Control Protocol, and UDP is the abbreviation for User Datagram Protocol. Both pertain to data transmissions on the Internet, but they work very differently.
TCP is considerably more reliable. It is connection-based transmission of data. TCP requires that the data being sent is received in the order that it was sent. The only transmission that fails is one that is broken (for instance, if the transmitting point\’s Internet connection was lost or a receiver\’s website is down or an email address is no longer valid. The email server is the receiving point that counts thereÑnot the user name.)
UDP is connectionless protocol. Data is sent regardless of the receiving destination\’s status. Unfortunately, there is no guarantee that the data will ever be received, in what order, or in what condition. If the data is received out of order, the receiving computer must piece it back together properly.
Another difference between TCP and UDP surrounds data streaming. Data sets sent via TCP are sent seamlessly; there is no separation between bits of data which allows for a smoother viewing or listening experience.
UDP streaming data sets or packages are guaranteed to arrive, but they do so individually. Slightly lagging or jerking pictures or sound may result as each separately arriving package is received, read, and played. While seeming to contradict the above, the difference is in the data \”packaging\” aspect. Bits of data, those individual letters, aren\’t guaranteed to arrive or in what shape. The streaming data is packaged \”in bulk,\” and boxes are sent, not envelopes. The streaming data \”boxes\” are sent along more reliably, and if they\’re requested, they\’ll be delivered. Consider the delivery of a higher priority, air travel versus ground transportation or certified mail versus standard mail.
Port Range Groups

0 to 1023 – Well known port numbers. Only special companies like Apple QuickTime, MSN, SQL Services, Gopher Services and other prominent services have these port numbers.
1024 to 49151 – Registered ports; meaning they can be registered to specific protocols by software corporations.
49152 to 65536 – Dynamic or private ports; meaning that they can be used by just about anybody.

[iframe https://spreadsheets.google.com/a/schollnick.net/spreadsheet/pub?hl=en_US&hl=en_US&key=0AhQhKlmhdew8dFRudllwN05zbEVpMVZnVVkzWk42MUE&output=html]