Friday, August 17, 2007

S: Is for spy ware

If you read my column yesterday you know I was having computer trouble. The trouble was I thought a friend had sent me an e-mail card and so I went to open it. When I did nothing happened, so I thought. My computer had been dormant for approximately 24 hours. When I did open it there was this blue screen stating spooldr.sys had infected my computer. Now you would think because I write a column I am computer literate. I am not! I know enough to get by, but that is it. I spent hours trying to understand it. Thank-God my landlord has a computer so I went to look up spooldr.sys. To my surprise I found over 400 articles on this. It turns out spooldr.sys is a trojan virus and a nasty one. A Trojan horse is a program that installs malicious software while under the guise of doing something else. They are notorious for installing backdoor programs which allow unauthorized remote access to the victim's machine by unwanted parties - normally with malicious intentions. Unlike a computer virus, a Trojan horse does not propagate by inserting its code into other computer files. The term is derived from the classical myth of the Trojan Horse. Like the mythical Trojan Horse, the malicious code is hidden in a computer program or other computer file which may appear to be useful, interesting, or at the very least harmless to an unsuspecting user. There are two common types of Trojan horses. One is ordinary software that has been corrupted by a hacker. A cracker inserts malicious code into the program that executes while the program is used. Examples include various implementations of weather alerting programs, computer clock setting software, and peer-to-peer file sharing utilities. The other type of Trojan is a standalone program that masquerades as something else, like a game or image file, in order to trick the user into executing the file. Trojan horse payloads are almost always designed to do various harmful things, but can also be harmless. They are broken down in classification based on how they breach and damage systems. The nine main types of Trojan horse payloads are:

Remote Access
Email Sending
Data Destruction
Downloader
Proxy Trojan (disguising others as the infected computer)
FTP Trojan (adding or copying data from the infected computer)
security software disabler
denial-of-service attack (DoS)
URL trojan (directing the infected computer to only connect to the internet via an expensive dial-up connection)
Some examples of damage are:

erasing or overwriting data on a computer
encrypting files in a cryptoviral extortion attack
corrupting files in a subtle way
upload and download files
allowing remote access to the victim's computer. This is called a RAT (remote administration tool)
spreading other malware, such as viruses: this type of Trojan horse is called a 'dropper' or 'vector'
setting up networks of zombie computers in order to launch DDoS attacks or send spam.
spying on the user of a computer and covertly reporting data like browsing habits to other people (see the article on spyware)
making screenshots
logging keystrokes to steal information such as passwords and credit card numbers
phishing for bank or other account details, which can be used for criminal activities
installing a backdoor on a computer system
opening and closing CD-ROM tray
harvesting e-mail addresses and using them for spam
restarting the computer whenever the infected program is started
deactivating or interfering with anti-virus and firewall programs
deactivating or interfering with other competing forms of malware

They also run on time bombs."Time bombs" activate on particular dates and/or times. "Logic bombs" activate on certain conditions met by the computer. They are sneeky too. Droppers perform two tasks at once. A dropper performs a legitimate task but also installs a computer virus or a computer worm on a system or disk at the same time.

Under the names spooldr.sys, spooldr.exe, spooldr.ini. It replaces your tcpip.sys with a trojaned one that will hide and load the others. You can't even see them, let alone remove them. It sends out such much spam that appeared to originate from our IP, that companies have gotten banned from communicating with msn.com and comcast.net. It's outbound connections on the firewall, connects to thousands of random IPs on random ports.

I write this column to inform you as well as myself. I have yet to have figured out why someone would do this to somebody. It truly ruins a portion of their life. We have turned into such a uncaring, manipulative race where only our own agenda's matter. If you need help recovering your work e-mail me and I will tell you what I did. Hopefully I will have my Internet back and will be able to tell you how I did that as well. Remember it is important to know the F.A.C.T.S.

Thursday, August 16, 2007

T: Is for time long past

From about A.D 200 different styles of glass came from all parts of the Roman Empire. Thousands of bottles were made to hold oil, wine, and other liquids and they were often square in shape so that could be packed together conveniently without wasting space. In the villas of the rich, the windows had glass. Glass for ordinary use often had a pleasant blue, green or brown tinge, for although the glass-makers could make clear glass it was very expensive. The Roman crafts-men decorated their glass by almost every method known today and even some that are no longer used. For instance they produced gold-leaf (gold beaten out to a very thin sheet), sandwiched between layers of protective glass. The Roman Empire broke up in 5th century A.D and the glass industry was scattered. Rough greenish-coloured drinking vessels like those the Romans had made went on being produced in all kinds of local variety up until the 15th and 16th centuries, but by this time a new sort of glass from Venice was beginning to be popular all over Europe. Inspired by remnants uncovered on archaeological sites through out Israel, Roman glass fragments gives us a clue to our past. Years ago jewelry designers started to put it into pieces and a history was manifested into true beauty.

It is called glass (vitcrum) because of it's clarity making it transparent to vision. Now offered in a wide variety of pieces: earrings, necklaces, pendants, bracelets, rings and pins, these pieces allow you to journey to the past. Each piece of ancient Roman Glass starts it's journey as a genuine artifact found in archaeological dig sites across Israel. Modern glass makers still, have yet to be able to replicate the Ancient Romans' glass making process. Each piece of Roman Glass jewelry is a unique artifact, carefully hand-crafted and ships complete with history card, certificate of authenticity and pouch. Since my computer was hit with a Trojan Virus I can not share pictures with you so here are some websites to xplore. www.sapphirelane.com/Roman_Glass_Jewelry.htm and altamworks.com

I have long been a fan of this unique expression of art and to me history should be kept alive. These pieces not only are gorgeous but do just that and that is a F.A.C.T.

Wednesday, August 15, 2007

C: Is for cast Iron Fairies





A little piece of western Australia is exhibiting at the gift show and soon will float to their new home in the East Village. The Iron Fairies, is not just a book for children; it is also an underground journey. With hand-crafted collectibles and an interactive website, it is based on 1 of 3 small diaries - dropped by a little miner one night as he was placing his precious fairies out in the garden, and discovered the next day by a group of children whilst they were playing in the tree. If you believe in fairies author Ashley Sutton offers you a chance to collect some of your own. In this book, you, the reader, become part of the adventure! The Iron Fairies must be read very carefully. Hidden in the pages are answers to secret codes. To help a Blue Fairy escape the casting room where she has been locked up, you must collect the 3 pieces of the key, which will unlock the door to the casting room. Once you have saved her, the company will send you a special Iron Fairy that is not sold in any store! However, to get each piece of the key you’ll need to visit www.theironfairies.com make your descent into the mine, pass through 5 doors and crack a "Blue Fairy Code."
Each iron fairy is a work of art hand crafted and made from Iron Ore (steel). No two fairies are the same. If your fairy has a green rusted tone it is considered a well behaved fairy, whereas a blue tone means she’s "cheeky and naughty". When you purchase an iron fairy you’re asked to place her where she can see the morning sunlight. Your fairy comes with a tiny envelope of "fairy dust" which you sprinkle on her to make a wish. In order to make your way through the aforementioned 5th door, you’ll need to purchase 3 fairies.

Sometimes being a child or an adult is magical and that is a F.A.C.T.

Tuesday, August 14, 2007

A: Is for the art of design

Well it's that time of the year when the Javit's opens it's arms to the International Gift Show. This six day event has me working for one of the most ingenious designers around. I look forward to seeing what new visions they have for my eyes to lust after and my nose to become sensually addicted to. Once you've had a peek at the new products from Michel Design Works (they really are beautiful) you will be hooked. The packaging which is charming, is well thought out and is a feast for anyone's vision. The scents are gorgeous. You won't believe the Chocolate candle. It's hard not to take a bite of the scented candle! The China Blue is reminiscent of the classic Ralph Lauren pattern, but it is the fragrance of Jasmine infused with lotus that has me applying it lavishly so I can be engulfed in it's aroma. The Vegetable Therapy Kitchen Hand Wash smells fresh and it's antibacterial! Does the approaching fall season bring to mind the scent of ripe pear with a tang? A Tuscan Pear Reed Diffuser is the perfect way to satisfy those memories and keep a room fragrant and fresh. Pomegranate, pine, exotic spice, green tea, gin and tonic, Cinnamon and lavender are just a few of the scents to entice. All are picked and hand labored over by Deborah and Bruce the husband and wife team who are the creators of this delightful visionary experience. You can bask in their world at the Javit's until Thursday. To find them just go to the lobby at the 34th street building. You see even the show recognizes them as the best in their class and has put them for all to see. Sometimes art is in the things we find in the gifts that are given and that is a F.A.C.T.

Monday, August 13, 2007

F: Is for animal free.

Vegan is a philosophy that does not use or consume animal products of any kind. The amount of vegan websites and restaurants in New York means that this is a trend that is not going away, but growing. A transition to a vegan diet is simple as there is no shortage of vegan foods nor recipes. In fact, most of the food we eat is vegan, without us knowing it! To get you started here is a recipe for fudge that sounds amazing. Basically, it's everything you ever dreamed chocolate fudge could be. And no one will believe that there's no dairy, butter, or evaporated milk in here. It can be a bit soft, though, especially if you add the optional marshmallow fluff, so keep it well refrigerated.
4 cups powdered sugar
½ cup cocoa powder
½ cup nondairy milk
2 tablespoons nonhydrogenated margarine
1 ½ teaspoons vanilla
½ cup vegan chocolate chips
1 cup cut up vegan marshmallows or ½ cup Ricemellow Creme (optional but sooo good)
½ cup chopped nuts. Spray a 9-inch x 9-inch baking pan well with nonstick spray and set aside. Sift the powdered sugar and cocoa powder together into a large mixing bowl, add the chocolate chips, and set aside. In a small saucepan, heat the nondairy milk and margarine to a boil over medium-high heat, stirring constantly to avoid burning. When the milk is at a steady, strong boil, pour it over the powdered sugar mixture and stir well with a wooden spoon until everything is well combined and the heat has melted the chocolate chips. Stir in the vanilla, then fold in the marshmallows or Ricemellow Creme and the nuts. Spread the fudge out into the prepared pan(s) and refrigerate for a day or more to solidify.

For those winter nights soon to be upon us, how about a Moroccan stew
2 cups onion, diced
2 t. olive oil
1 T. tomato paste
5 cups vegetable stock, divided
2 cups acorn or delicata squash, peeled, deseeded, and cut into 1-inch pieces
2 cups butternut squash, peeled, deseeded, and cut into 1-inch pieces
1 1/2 cups turnips, peeled, and cut into 1-inch pieces
1 1/2 cups carrot, cut in half lengthwise, and cut into 1-inch pieces
1 1/2 cups celery (including the green tops), cut into 1-inch pieces
1 1/2 T. ground cumin
2 t. paprika
1 t. salt
1/2 t. freshly ground black pepper
2 cups cabbage, cut into 1-inch pieces
1 1/2 cups zucchini, cut in half lengthwise, and cut into 1-inch pieces
1 - 15 oz. can chickpeas, drained and rinsed
1/3 cup freshly chopped Italian parsley
2 cups couscous
1/2 t. salt
2 T. freshly chopped dill
In a large pot, saute the onion in olive oil for 5 minutes or until soft. Add the tomato paste, stir well to coat the onions, and saute an additional minute to release its flavor. Add 2 cups vegetable stock, acorn squash, butternut, turnips, carrot, celery, cumin, paprika, salt, and pepper, and stir well to combine. Cover, reduce the heat to low, and simmer for 20 minutes. Add the cabbage, zucchini, and chickpeas, stir well, cover, and simmer an additional 15 minutes or until the vegetables are tender. Add 3 T. chopped parsley, taste, and adjust seasonings as needed. Meanwhile, in a large saucepan, place the remaining 3 cups vegetable stock, and bring to a boil. Add the couscous and salt, cover, remove from the heat, and set aside for 5 minutes. Fluff the couscous with a fork and stir in the remaining chopped parsley and chopped dill, and fluff lightly to incorporate. Serve individual servings in bowls and top with a sprinkle of additional ground cumin, if desired. Serves 8-10

What with mad cow and the bird flu looming over us, maybe these recipes will help us to stay safe without feeling deprived and that is a F.A.C.T.