THE TROJAN HORSE AND HOW IT WORKS
Trojan horses are named for the ur-Horse of Greek mythology, where the hapless Trojans didn't realize they had been invaded before it was too late. They’re getting more sophisticated by the day and your computer could easily be targeted.So a review of how you protect yourself from hackers, viruses and Trojan horses is in order. And while your Internet service provider has already probably sent you an e-mail urging you to sign up for premium safety services, there are some things you can do on your own that will probably protect you just as effectively - for a lot less money.
FROM COMPUTER SPEAKERS TO STEREO SPEAKERS
A twofer this week from The Wizard, who got carried away and wrote a second column. Enjoy!Tinny. That's the word for music delivered through computer speakers off an Internet stream or an MP3 file. The sound quality is just not up to the sophisticated sounds most people want to hear when they download MP3s or play CDs. Why can't there be a way to bypass those tinny computer speakers and play your music on a good set of stereo speakers via a wireless signal -- kind of like a router? Turns out there is.
Chapter Five: THE LEADER
The leader of the strangers stood underneath the big ceiba tree he had slashed with his sword. He addressed the sub-chiefs assembled in front of him through the stranger who spoke Maya.“I come to you from the greatest king in the world, His Majesty Don Carlos of Spain. The mighty country of Spain lies on the other side of the Great Ocean, and we have crossed it to trade peacefully with you and to instruct you in the religion of the One True God.“His Majesty Dos Carlos commands us to come in peace, yet you attacked us and tried to kill us for no reason. We do not understand why you attacked us, but you must understand that if you try to attack us again we will kill you. You saw yesterday the power of our lightning-bearers. The lightning-bearers are still angry with you, and it is hard for us to control the death-fire they carry in their bellies…”Without warning, one of the huge metal tubes lined up on the edge of the square went off with an enormous explosion and belch of fire. No one was hurt, but just the same, Malinali fell to the ground terrified like all the sub-chiefs, who proceeded to call out to the strangers’ leader asking his forgiveness for their aggression and disobedience.
A CABINET OF EVIL
Iranian President Ahmadi Nejad has been busy putting together a cabinet for the Islamic republic. While all real power remains firmly in the clammy hands of Supreme Leader Khamenei, it's worth taking a look at some of the new ministers, if only because it tells us two important things: (1) The face the regime wishes to show to the world at large, and (2) the policies the regime intends to unleash on the long-suffering Iranian people.Let's start with the interior minister:
THE PERSIAN RATCHET
The war between Persia and the West is very ancient, well over a thousand years older than the war between Islam and Christianity.
Western Civilization originated in a strip of land 90 miles long and 30 miles wide along the Mediterranean coast of Asia Minor (Turkey today) known as Ionia. The Greeks who settled there in the 9th and 8th centuries BC colonized such cities as Ephesus and Miletus, where the first philosophers in history (like Thales, 635-543 BC) offered natural explanations of the world rather than superstition and myth.
The founder of the Persian Empire, Cyrus the Great (576-529
THE VIRTUAL CD-ROM CONTROL PANEL FOR WINDOWS XP
Last week I used Microsoft’s material to explain that an ISO file is an exact image of a CD-ROM or a DVD. Why would someone use Virtual instead of using Nero (that we discussed last week) or a similar application to burn the ISO to disk?Today almost every laptop comes with a CD-DVD burner. But even a year-old laptop may be fitted with only a CD burner. And a two year-old laptop might have a CD-ROM that only reads CDs, but doesn’t write to them.Add a year or two for a desktop and you may have no choice but to use Virtual.Without further ado, download Virtual by clicking Virtual CD-ROM Control Panel for Windows XP
JEWISH COWBOYS
You’re a cowboy out in the Wild West. You and your fellow cowboys are surrounded by a horde of bloodthirsty Indians dressed in warpaint and issuing bloodcurdling whoops for your scalps. There’s a dozen of you versus two thousand of them. Even John Wayne would know it’s time to retreat.Especially if Wayne knew the Indians were from different tribes that hated each other, and by vamoosing, they’d start to fight among themselves, going at each others’ throats while you could get safely back to Fort Apache.Pretty much sums up the situation in Gaza.
FROGMARCHED INTO RAILROAD CITY
You saw the above-the-fold front page headlines, saw the prime time television news stories late last week about Adam Kidan being arrested by federal agents for wire fraud, right? What’s that? You never heard of Adam Kidan? Of course you haven’t because he’s a nobody. That’s why the feds politely called his lawyer and asked he show up at their offices in Florida at a convenient time for him. The fellow you read about on the front page and saw getting busted on national TV was Kidan’s business partner - someone the Washington Post and the New York Times have spent years demonizing, the infamous Jack Abramoff.
Chapter Four: STRANGERS
And so Malinali trudged through the forest and swamps to Pontochan, where Forearms sold her to the King and she moved into the palace - living in a palace again, but now as a slave and not a princess.Malinali became very appreciative of Ciuacuatl’s lessons, for with her skills at sewing, cooking, and medicine, she was assigned to the household staff and not put out into the maize or cacao fields for manual drudgery.Five winters passed. She became fluent in Maya, and learned how to do her work well and quietly, so as to be noticed as little as possible. She listened attentively, however, and began hearing talk of mysterious strangers who lived in gigantic war canoes. No one knew where they came from. Their skin was light and they had hair on their faces. Some wore metal on their bodies. Their canoes had carried them across the salt water from the south. They stopped at the mouth of the Pontochan River and talked to a group of Mayas but no one could understand what they were saying. They continued across the water to the north and were never seen again.
ABLE DANGER AND ATTA
At first I thought there was a short circuit in my ouija board, because there were sparks coming out of the thing, just when I thought I’d finally connected with my old friend, the late James Jesus Angleton, former legendary head of CIA counterintelligence. But then I realized that it was, indeed, Angleton, cursing and sputtering (his poetic side — the side that made him the editor of The Yale Literary Review when he was an undergraduate in New Haven back in 1940 — somehow got lost when he got angry).ML: Hey! That used to be my ear...JJA: Sorry, sorry, but this Able Danger business is just too much.ML: You mean Congressman Curt Weldon’s discovering that a military intelligence unit called Able Danger figured out a year before 9/11 — from open sources — that Mohammed Atta was part of an al Qaeda cell inside the United States, but Clinton Deputy Attorney General Jamie Gorelick stopped them (three times!) from telling the FBI?JJA: Damn right, but that’s not even the half of it. All these stories, all this faux shock, “oh my gosh, we knew it but we couldn’t act on it”, they just make me sick.