Мы пошли по тому же пути

Мы пошли по тому же пути, что и Вы сразу - дать как можно информации о товаре. Но скажу очевивидную вещь, да, - клиент будет ходить к Вам за информацией, но это не значит, что он будет покупать у Вас. Он, получив всю инфу, пойдет забьет в поиск нужную вещь и будет искать, где дешевле ее купить. Как и любой человек, как и мы с вами, да? Это не значит, что этого не надо делать, пусть клиент ходит и, может, он чего-нибудь да и купит когда-нибудь. Но не это дает покупателей, это только одна составляющая и не самая главная. Главная - это удобство получения товара и цена. 
Devil horn crossing

LOLz from the folks at Nellis AFB

LOLz from the folks at Nellis AFB:


Unsecured networks open door for hackers, spies

By Airman 1st Class Andrew Dumboski
99th Air Base Wing Public Affairs

NELLIS AIR FORCE BASE, Nev. (AFPN) -- With wireless technology, consumers can easily network their computers within their household and access the Internet through any of their computers.

Consumers can sit in a lawn chair on their back porch and catch up on their e-mail and news, even do some online banking. But with this newfound convenience lies a new danger.


Bla bla bla


(no subject)

Has anybody else noticed wireless networks named "HomelandSecurity" popping up around where you live? I found one a few days ago about 20 minutes away from where I live, and just today I noticed a new one with the same name in range of my house. They're WEP encrypted but that's all. Any idea what they are?
ocean birds at Redondo beach

(no subject)

I'm not a radio expert but have been working on a project where we are trying to use 802.11a technology in a mobile vehicle. I was looking into building a more robust wifi omni antenna for 802.11a. We have been playing with a omni directional antenna, but it's RF patterns are very narrow in the elevation azimuth and we need more range. I'm thinking that the range could be increased by either
1. some type of electronics that aims the beam to the access point.
2. a passive reflector or beam shaping device around the omni antenna, that causes incoming off center waves to either be discarded or bent. Something like a RF lens. That way reflected radio waves from the ground and such do not arrive out of phase to the line of sight signal (and cancel each other out).

Any ideas? ALso I posted a bid to work on the project, if interested.

Devil horn crossing

GCN article: WiFi is taking flight

I was wondering wthat those access points were that I found in the wardriving logs.....

From Goverment Computer News (GCN):

WiFi is taking flight

By Doug Beizer,

Tucked in a corner of an airplane hangar in Iraq, an Air Force mechanic is repairing a plane’s hydraulic landing gear system when he hits a snag and needs to refer to the aircraft’s maintenance manual.

He doesn’t stop working to search for a paper manual, which may or may not be in the hangar. Instead, he pulls out a ruggedized tablet computer to access the LAN. Within minutes, he has downloaded the information he needs from a U.S.-based database and is back to work on the plane.

That scenario is a reality, said Tom Badders, director of wireless strategic development for Telos Corp. of Ashburn, Va.

Ubiquitous network connection is happening, thanks in large part to the proliferation of wireless networks for both civilian and Defense agencies.

Wireless makes sense

In many cases, wireless makes the most sense, whether it’s because of the devices people are using or because of the physical requirements of bases, buildings or conference rooms.

Telos has installed wireless networks at 85 of the Air Force’s 108 bases as well as 11 other Air Force sites worldwide, Badders said. “Primarily, it’s for maintenance and logistics operations, so we put wireless LAN coverage on flight lines, inside hangars, back shops, wherever maintenance and logistics operations are taking place.”

The wireless infrastructure extends the Air Force’s enterprise network to those whose job is to get aircraft back in the air, and increases the service’s supply chain efficiencies. Constant connection to the network lets personnel tie into maintenance databases, check tech orders on supply and logistics applications, fix equipment, update orders, read technical manuals, and order and track parts through the supply chain.


x-posted to the usual places
  • Current Music
    Imperial Teen
Fighter of H8

Attention All LJ-ers with AIM screennames!!

For you LJ users out there, you might want to read this:

Tesser Activity

Apparently, there is a hacker relay bot that uses AIM on the loose. It takes your AIM name and another AIM user and links the two, each starting with the phrase, "I say, old bean, have you seen my hat?"

The above link explains how it works, and just be aware that if you receive this message from a screenname you don't know, don't respond. Just block the user.
Fighter of H8

Ban Trusted Computing

From the againsttcpa.com:

"In the USA there's a planed bill, the so called CBDPTA (Consumer Broadband and Digital Television Promotion Act). First it was callen SSSCA (Security Systems Standards and Certification Act). The new name reads much more harmless. Looks like the first name made it too easy to discover the purpose of this bill.

This bill plans to legally force secure (TCPA-conform) systems. So in the USA it would then not be allowed to buy or sell systems that are not TCPA-conform. Passing this law would be punished with up to 5 years of prision and up to $500.000 fine. The same would apply for development of "open" software. Open means that it would work on systems that're not TCPA-conform.

Even if this bill would only valid in the USA it would have catastrophically effects worldwide. Because US companies are not allowed to develop and sell "unsecure" software, others would have to jump onto the TCP-train, so they would give total control over themself to the TCPA (USA?), or they would have to live completely without software and harware from US-companies. No Windows, Solaris, MacOS, Photoshop, Winamp or to say it short: The largest part of all software that's used on this planet would not be usable.

Trusted Computing Video

If we would like to continue operating our computers and other appliances as we see fit, we should try everything in our powers to stop Trusted Computing from changing the computer industry.

(X-posted to several forums) Spread the word. Stay in the know. Bring down Trusted Computing, and keep our computers ours.
  • Current Music
    Dances With Wolves - Hollywood Heroes