Diary of a Network Geek

The trials and tribulations of a Certified Novell Engineer who's been stranded in Houston, Texas.

1/31/2007

AOL Mail Problems

Filed under: Criticism, Marginalia, and Notes,News and Current Events,Personal,The Network Geek at Home — Posted by the Network Geek during the Hour of the Horse which is around lunchtime or 1:15 pm for you boring, normal people.
The moon is Waxing Gibbous

Not the best way to communicate this, but…

For those of you who contact me via e-mail with an AOL address, I’ve had trouble getting a reply through to you.  Apparently, my ISP, SBC/AT&T/Whatever they call themselves this week, is having some kind of communictation problem with AOL’s servers.
So, I got your e-mails, but I can’t get a reply back to you.

In essence, though, everyone just wrote “Um, hello?  Still there?  Couldn’t write a bit more to let us know you’re still alive?”.  So, let me go on record that there’s more coming, as soon as I have a bit of time to think the posts through and edit them and all that.

In short, more soon.

Tags: , ,

3/8/2005

Bleeding Edge Topics

Filed under: Advice from your Uncle Jim,Deep Thoughts,Geek Work,News and Current Events — Posted by the Network Geek during the Hour of the Rooster which is in the early evening or 6:16 pm for you boring, normal people.
The moon is Waning Crescent

Well, apparently, I am in touch with the bleeding edge of the IT industry.
Just Saturday I was talking about anonymous browsing, and then yesterday, I got an update from a news feed with an article about just that! This article on InformIT is certainly more detailed that I was and warns you about the potential hazards of being too smug when browsing anonymously. It also goes into a bunch of different options for concealing your identity and doing so at varying levels of security, not to mention the fact that it goes into hiding yourself on the Internet for more than just browsing. (Yes, young’uns, the Internet is much, much more than just the World Wide Web, in spite of what AOL and Microsoft have told you.)
So, though I may be handing dangerous people more sharp objects to play with, I reccomend going and reading the article. For one thing, if you needed me to point these resources out, you probably aren’t really dangerous to me anyway. For another, if you are familiar with the basic techniques, you already know most of what’s in the article. But, no matter your Internet security background, it’s worth reading the article for the review, if nothing else.


Advice from your Uncle Jim:
" Reasonable men adapt themselves to their environment; unreasonable men try to adapt their environment to themselves. Thus all progress is the result of the efforts of unreasonable men."
   --George Berbard Shaw


Powered by WordPress
Any links to sites selling any reviewed item, including but not limited to Amazon, may be affiliate links which will pay me some tiny bit of money if used to purchase the item, but this site does no paid reviews and all opinions are my own.