You are currently browsing the daily archive for September 27, 2010.
Blanda almost single-handedly turned me into a Raiders fan.
Blanda was the league’s all-time leading scorer when he retired in 1976 after 26 seasons as a quarterback/place-kicker. A first-ballot Hall of Famer, Blanda played with the Chicago Bears, Houston Oilers, and finally with the Oakland Raiders. He won AFL titles with the Oilers in 1960 and 1961.
Blanda started out as just a kicker in Chicago, but he became a record setting quarterback in Houston. He’s perhaps best known for being the most improbable Player of the Year award winner (then called the Bert Bell Award) in history at age 43.
Cut at the beginning of the 1970 season and 12 seasons after his first retirement, Blanda went on an insane five-week run where he either replaced Raiders quarterback Daryle LaMonica to lead the Raiders to a comeback victory or kicked a winning or tying field goal. Every single week.
Blanda is the placekicker on the All-Time AFL Team and didn’t retire until he was 48 years old.
I just bought her video today and also her song. The only two I have of hers.
And the one they refused.
WASHINGTON – Broad new regulations being drafted by the Obama administration would make it easier for law enforcement and national security officials to eavesdrop on Internet and e-mail communications like social networking Web sites and BlackBerries, The New York Times reported Monday.
He said he was going to protect our freedoms, not repress them.
“The fact that we see so many more infections in Iran than anywhere else in the world makes us think this threat was targeted at Iran and that there was something in Iran that was of very, very high value to whomever wrote it,” Liam O’Murchu of security firm Symantec, who has tracked the worm since it was first detected, told BBC News.
. . . .
Unlike most viruses, the worm targets systems that are traditionally not connected to the internet for security reasons.
Instead it infects Windows machines via USB keys – commonly used to move files around – infected with malware.
Once it has infected a machine on a firm’s internal network, it seeks out a specific configuration of industrial control software made by Siemens.
Once hijacked, the code can reprogram so-called PLC (programmable logic control) software to give attached industrial machinery new instructions.
“[PLCs] turn on and off motors, monitor temperature, turn on coolers if a gauge goes over a certain temperature,” said Mr O’Murchu.
“Those have never been attacked before that we have seen.”
If it does not find the specific configuration, the virus remains relatively benign.
However, the worm has also raised eyebrows because of the complexity of the code used and the fact that it bundled so many different techniques into one payload.
“There are a lot of new, unknown techniques being used that we have never seen before,” he said These include tricks to hide itself on PLCs and USB sticks as well as up to six different methods that allowed it to spread.
In addition, it exploited several previously unknown and unpatched vulnerabilities in Windows, known as zero-day exploits.
“It is rare to see an attack using one zero-day exploit,” Mikko Hypponen, chief research officer at security firm F-Secure, told BBC News. “Stuxnet used not one, not two, but four.”