Christine's Site

Christine Barry

Mobile Home Repair | Manufactured Home Repair


Mobile Home Repair | Manufactured Home Repair
Mobile Home Repair You've reached the internet's #1 Web site for helping you, the consumer, repair and understand your manufactured home. Whether your searching for instructions, parts or advice, you've come to the right place. Featured Repair & Home Improvement Articles Mobile Home Insurance: An Overview There is no question that you have to have homeowners insurance if you own your own home, but did you know that you need it even if you live in a mobile or manufactured home, just as you do if...

9 Foundational Habits Young Men Should Start Now to Raise Themselves Right | The Art of Manliness


9 Foundational Habits Young Men Should Start Now to Raise Themselves Right | The Art of Manliness
The Child Is the Father to the Man: 9 Foundational Habits Young Men Should Start Now to Raise Themselves Right by Brett & Kate McKay on September 16, 2013 · 64 comments in A Man's Life Awhile back I was driving through the place where I grew up – Edmond, Oklahoma – and happened to pass by my old high school. This wasn’t an unusual event; I now live just an hour and a half from Edmond and my parents still reside there, so I’m back fairly frequently and sometimes pass the school. But this time so...

Zombie Squad • View topic - MOAB's INCH Bag. UPDATED 8/29/12.


Zombie Squad • View topic - MOAB's INCH Bag. UPDATED 8/29/12.
UPDATE 8/29/12 I've started adding pics below. With details of each segment of my load out. See below the pics for a full description of my INCH bag. And a complete list of what's in it. Complete weight is 55lbs without firearms, ammo or water. That will dictate how much ammo I can take for the AK and the .22 pistol. Water is limited to one 2L camelbak and one USGI canteen. Because this is an INCH bag I could use all the suggestions I could get for things I have not thought of and better yet th...

The 100 Blogs You Need in Your Life (LWB 100, 4th Edition)


The 100 Blogs You Need in Your Life (LWB 100, 4th Edition)
The 100 Blogs You Need in Your Life (LWB 100, 4th Edition) by Tom Ewer on December 10, 2013 38 The Leaving Work Behind 100 series is getting on for two years old. In that time I have published three editions (now four) of the list and featured many different blogs, past and present. For those of you who don’t know what the Leaving Work Behind 100 is, the list you will find below is a collection of the top 100 blogs that can help you to quit your job and build a successful online business , as p...

Plex - A Complete Media Solution

home theater, media, digitize

Plex - A Complete Media Solution
All your media, wherever you are Plex on Your Desktop Experience your media on a visually stunning, easy to use interface on your computer or Home Theater PC. Your media has never looked this good! Plex for Mobile Devices Effortlessly connect to all of your favorite local and online content, all presented seamlessly on your iPhone, iPad, iPod Touch, Android and Windows Phone 7 devices. Plex for Connected Devices Extend the functionality of connected TVs, add low cost streaming with a Roku or Go...

Prep & Pantry review

I thought I'd write a review on the Prep & Pantry app.

Summary:

From the Prep & Pantry site:

Prep & Pantry is your tracking solution for food storage and preparedness supplies! Track stored item locations, quantities, and expiration dates. The cost of the app is more than repaid by the decrease in food waste.

In short, this app allows you to scan or otherwise input your inventory and all associated data. You can set minimum quantities and the app will generate a shopping list for you based on your actual inventory against your minimum quantities. It will also generate various reports such as expired items and non-zero inventory.

You can add organizational data, just as,

Location - where you are storing it
Tags - just like it sounds
Store - where you bought it

Tags have been helpful to us in that we can just use the "lunch" tag to see what lunch items we have, "dog" to see our dog food inventory, and so on. Location has allowed me to see what we have in the kitchen v the basement, etc. I don't use the Store data.

It has a sync capability that allows you to create a "group" in the Prep & Pantry cloud. Other Prep & Pantry users can join the group if they know the group name and the password. All users in the group can sync to the group. I am running the app across 3 accounts on 4 devices and have never experienced any conflicts in syncing across devices.

You can export all of your data to a csv and send it to yourself in an email. A csv export was an absolute must for me. No way was I putting all of this data into something that I could not pull data out of.

The app can be used to track more than just food .. you can use it for gear, medical, etc. I just use it for food and pharmacy. I initially tried to use it for EDC and other supplies, but it's cumbersome for that. If you like organizing yourself via tags and locations then it would work fine for those things. Ultimately I discovered that I just didn't want gear in this app.

In order to use the sync feature and the other higher end features you have to purchase the full version. It's $7.99 for the full version, and I've had to pay that for both the iOS and the Android versions, but I think it has been worth it.

I have tried multiple apps and methods, and this is the only one that has worked for me so far.

One thing to remember if you do purchase this app, is that you only have to purchase each version once, per account. I bought the app on my iPhone, expecting to install it on the iPad without paying again, just like every other app from the app store. However when I installed it on the iPad it looked like a new purchase and it asked for the full price again. If you look around you can find the instructions to "restore" the app, and that will allow you to install it for free. Not sure if that's how it is on the Android. I have it running on 2 Android devices, but it's across 2 different accounts.

Screenshots and observations.

Here's the main screen on the iOS app:




This is the first screen that you see when you open the app. It's super easy to scan here, and the interface is pretty intuitive so you shouldn't have trouble finding your way around.

When you scan a code, it may or may not have that code in the system. If it does, you will see something like this:



So you can accept this an it will auto-populate whatever it knows. You are left to input things like location and expiration date, which is helpful if you have multiple food storage locations. You can also input servings and calories.

In the event that the Prep & Pantry system does not recognize your code, you can go ahead and input the data yourself. You have the option to submit your data to the Prep & Pantry cloud, so that others can benefit from your data entry. So once the data is put in once, the system should recognize that code from then on.

If you call up the list view your inventory, you'll see something like this



Here you can see the list by alphabetical order. Each item is shown with the weight and a minimum quantity (Qm) and the quantity on hand (Qt).

Across the top you can see the 4 options in List view. The above is the alphabetical view. This is the Exp view, which is expiration dates:



The other two options in List view are "location" and "tag."

The next view across the bottom is the cart. Here's mine:



It tells you the quantity info, how many you need, and the store location. I use pretty much the same store for everything so it really isn't a useful field for me. I don't use this cart view much.

The Android app is a little different. When I get some time I will upload screenshots from that one.

TLDR:

The Prep & Pantry app is everything it says it is. It's worth the money and it's easy to use.

Hope this helps, and feel free to let me know if you have questions.


Prep & Pantry website

thanks to The Daily Prep for the app recommendation



















I use the ioS app on my iPhone 4 and iPad Air. My Droid device is a Samsung Galaxy S4.



Though the performance and interface seem to be identical, I prefer using my phone.

Yellowstone's Megavolcano is more than twice the beast we feared

Yellowstone's Megavolcano is more than twice the beast we feared

Beneath Yellowstone National Park lurks a vast caldera – a high-pressure volcanic cauldron brimming with enough gas and magma to make Mount St. Helens' 1980-eruption look like a middle school science project by comparison. Now, newly reported findings suggest this megavolcanic reservoir is even bigger than previously believed. Much, much bigger.

7 Questions to Ask Before Starting a Business in 2014








If your New Year’s resolutions include quitting your job and starting a business, you’re not alone. What could be more fulfilling than calling the shots, setting your own hours, and making things happen?


However, going off on your own is no easy feat, and many would-be entrepreneurs quickly become unsettled by the hard work and uncertainty of the lifestyle.



You can’t prepare yourself for every aspect of running your own business, but here are some key questions to ask yourself before taking the plunge. Read more...


1. How well do you work without a playbook?


More about Small Business, Startups, Features, Business, and Entrepreneurs



IT General

via Mashable http://mashable.com/stories/?utm_campaign=Mash-Prod-RSS-Feedburner-All-Partial&utm_cid=Mash-Prod-RSS-Feedburner-All-Partial&utm_medium=feed&utm_source=rss

December 11, 2013 at 05:04AM

Repeated attacks hijack huge chunks of Internet traffic, researchers warn | Ars Technica


Repeated attacks hijack huge chunks of Internet traffic, researchers warn

Man-in-the-middle attacks divert data on scale never before seen in the wild.

Huge chunks of Internet traffic belonging to financial institutions, government agencies, and network service providers have repeatedly been diverted to distant locations under unexplained circumstances that are stoking suspicions the traffic may be surreptitiously monitored or modified before being passed along to its final destination.

Researchers from network intelligence firm Renesys made that sobering assessment in a blog post published Tuesday . Since February, they have observed 38 distinct events in which large blocks of traffic have been improperly redirected to routers at Belarusian or Icelandic service providers. The hacks, which exploit implicit trust placed in the border gateway protocol used to exchange data between large service providers, affected "major financial institutions, governments, and network service providers" in the US, South Korea, Germany, the Czech Republic, Lithuania, Libya, and Iran.

Further Reading

Insecure routing redirects YouTube to Pakistan

A black hole route to implement Pakistan's ban on YouTube got out into the …

The ease of altering or deleting authorized BGP routes, or of creating new ones, has long been considered a potential Achilles Heel for the Internet. Indeed, in 2008, YouTube became unreachable for virtually all Internet users after a Pakistani ISP altered a route in a ham-fisted attempt to block the service in just that country. Later that year, researchers at the Defcon hacker conference showed how BGP routes could be manipulated to redirect huge swaths of Internet traffic . By diverting it to unauthorized routers under control of hackers, they were then free to monitor or tamper with any data that was unencrypted before sending it to its intended recipient with little sign of what had just taken place.

"This year, that potential has become reality," Renesys researcher Jim Cowie wrote. "We have actually observed live man-in-the-middle (MitM) hijacks on more than 60 days so far this year. About 1,500 individual IP blocks have been hijacked, in events lasting from minutes to days, by attackers working from various countries."

At least one unidentified voice-over-IP provider has also been targeted. In all, data destined for 150 cities have been intercepted. The attacks are serious because they affect the Internet equivalents of a US interstate that can carry data for hundreds of thousands or even millions of people. And unlike the typical BGP glitches that arise from time to time, the attacks observed by Renesys provide few outward signs to users that anything is amiss.

"The recipient, perhaps sitting at home in a pleasant Virginia suburb drinking his morning coffee, has no idea that someone in Minsk has the ability to watch him surf the Web," Cowie wrote. "Even if he ran his own traceroute to verify connectivity to the world, the paths he'd see would be the usual ones. The reverse path, carrying content back to him from all over the world, has been invisibly tampered with."

Guadalajara to Washington via Belarus

Renesys observed the first route hijacking in February when various routes across the globe were mysteriously funneled through Belarusian ISP GlobalOneBel before being delivered to their final destination. One trace, traveling from Guadalajara, Mexico, to Washington, DC, normally would have been handed from Mexican provider Alestra to US provider PCCW in Laredo, Texas, and from there to the DC metro area and then, finally, delivered to users through the Qwest/Centurylink service provider. According to Cowie:

Instead, however, PCCW gives it to Level3 (previously Global Crossing), who is advertising a false Belarus route, having heard it from Russia’s TransTelecom, who heard it from their customer, Belarus Telecom. Level3 carries the traffic to London, where it delivers it to Transtelecom, who takes it to Moscow and on to Belarus. Beltelecom has a chance to examine the traffic and then sends it back out on the “clean path" through Russian provider ReTN (recently acquired by Rostelecom). ReTN delivers it to Frankfurt and hands it to NTT, who takes it to New York. Finally, NTT hands it off to Qwest/Centurylink in Washington DC, and the traffic is delivered.

Such redirections occurred on an almost daily basis throughout February, with the set of affected networks changing every 24 hours or so. The diversions stopped in March. When they resumed in May, they used a different customer of Bel Telecom as the source. In all, Renesys researchers saw 21 redirections. Then, also during May, they saw something completely new: a hijack lasting only five minutes diverting traffic to Nyherji hf (also known as AS29689 , short for autonomous system 29689), a small provider based in Iceland.

Renesys didn't see anything more until July 31 when redirections through Iceland began in earnest. When they first resumed, the source was provider Opin Kerfi (AS48685 ).

Cowie continued:

In fact, this was one of seventeen Icelandic events, spread over the period July 31 to August 19. And Opin Kerfi was not the only Icelandic company that appeared to announce international IP address space: in all, we saw traffic redirections from nine different Icelandic autonomous systems, all customers of (or belonging to) the national incumbent Síminn. Hijacks affected victims in several different countries during these events, following the same pattern: false routes sent to Síminn's peers in London, leaving 'clean paths' to North America to carry the redirected traffic back to its intended destination.

In all, Renesys observed 17 redirections to Iceland. To appreciate how circuitous some of the routes were, consider the case of traffic passing between two locations in Denver. As the graphic below traces, it traveled all the way to Iceland through a series of hops before finally reaching its intended destination.

Cowie said Renesys' researchers still don't know who is carrying out the attacks, what their motivation is, or exactly how they're pulling them off. Members of Icelandic telecommunications company Síminn , which provides Internet backbone services in that country, told Renesys the redirections to Iceland were the result of a software bug and that the problem had gone away once it was patched. They told the researchers they didn't believe the diversions had a malicious origin.

Cowie said that explanation is "unlikely." He went on to say that even if it does prove correct, it's nonetheless highly troubling.

"If this is a bug, it's a dangerous one, capable of simulating an extremely subtle traffic redirection/interception attack that plays out in multiple episodes, with varying targets, over a period of weeks," he wrote. "If it's a bug that can be exploited remotely, it needs to be discussed more widely within the global networking community and eradicated."