A Week in Reivew – May 10th, 2014

.

Danny Hanning of The Other Shoe - May 6th, 2014

Danny Hanning of The Other Shoe – May 6th, 2014

.

           Welcome back My Dear Readers to The Other Shoe. My Dear Readers, I know that I haven’t published in several days, For that, there is a good reason that started Friday afternoon. I only have Allen as any kind of caregiver. As my disease state progresses, this is getting to be a less tenable situation. Case in point, this Friday afternoon, I was preparing to bathe… which in good circumstances is a difficult task. I had already bathed Alexander and he was drying in the front room.

.

When I had drained the tub, after Alex’s bath, I began to run it for myself, and left the bathroom with Alex in tow. For whatever reason… I get distracted… I was involved in getting Alex dried… For whatever reason, I took way too long. Suddenly I think the water is running in the bathroom!

.

Bye the time I get into the bathroom… it is flooded… as is the adjoining kitchen. I rush to the tub and turn off the water and pull the plug. How I am left alone in the house, with about an inch to two inches of standing water all over the bathroom and kitchen. Get everything off the floor… take off your slippers and socks… too late they are all ready ruined… still getting e3verything off the floor and into the front room… front room carpet is now getting wet… grab towels and begin this process – soak up water into large bath towel… lift bath towel from floor… rest half under my left arm at the shoulder… grip towel between upper left arm and shoulder and right hand… twist… repeat… about… ten THOUSAND times… Bye the time Allen got home, at 2PM, there was still about an inch of water all over the floors.

.

Now, did my best to clean up the mess I made. It left me in terrible pain for the past three days. It is Sunday morning, and I am still so very very sore. This, My Dear Readers, is why I have not published in several days. I hope that everyone understands, and returns to the blog… now that I am writing. It has been a very difficult and painful several days. Now, if I could actually afford a caregiver… anyway. Now, on with ‘A Week in Review’!

.

I must admit, and am very happy to announce, I managed to publish seven articles this week. Still keeping up this pace, for now the fourth month in a row!! I had a doctor’s appointment, this week, in L.A. and still managed to write and publish a full week’s work of seven articles. Yeah, I am pretty darn proud of that fact. Now, without further adieu I give you ‘A Week in Review’:

.

  • Sunday Funnies – May 4th, 2014 : “Welcome back My Dear Readers to The Other Shoe. If it is Sunday, then it is time for ‘Sunday Funnies’! This week has been a difficult week for me, My Dear Readers. My neck is swollen… actually the lymph nodes in my neck are swollen. All day Thursday thru Saturday I was running fevers of between 101 – 102 degrees. I have a horrible raspy cough, that crackles in my lungs like gravel, and I ache all over.” No wonder it’s been a rough week, all around. This is how it started out… with fevers, chills, and being sick! I had totally forgot that I was sick, just one week ago. Now, it is Sunday again, and I am just so very sore all over. I can hardly lift my hands to type, and my back is in terrible pain from my neck to my butt. Once I am finished with this article… and then ‘Sunday Funnies’ I am taking the rest of the day off!
  • The Mars Report – May 5th, 2014 : “Welcome back My Dear Readers to The Other Shoe. A big welcome back to ‘The Mars Report’ for May 5th, 2014. Tomorrow I must make a journey, by mass transit, from here in Orange County all the way into Los Angeles County, Rolling Hills Estates. I leave at 8:30AM and return home at 8PM. Yes, a twelve hour journey to see one doctor. Anywho, I am mentioning this because I am pressed for time, today. Therefore, this will be a shortened version of this storied series. Not to diminish this edition, because in this edition you will get to witness… … … Martian Dunes MOVE!” Amazing that while this was published and most of you , My Dear Readers, were reading this on Monday I was preparing for my visit, the very next afternoon. It HAS been a terribly eventful and stressful week, for Danny. Yes… I AM resting for the rest of this Sunday!
  • Lost In Space – May 6th, 2014 : “Welcome back My Dear Readers to The Other Shoe. An amazing fact came to my attention, just today. You see… I have been In LOVE with; Space, Space Flight, Space Exploration, Space Images, Star Gazing, Star Maps… you get the idea, since I was like an aware human being. Like most star-nuts I have a favorite constellation. The amazing fact is that in all the editions of ‘Lost in Space’ I have not once featured my favorite constellation. Therefore, the image you see above addresses this shortcoming!” Truly AMAZING was while you all were reading THIS article I was in transit to and back from Los Angeles! It was a very good visit, and we are working to get to the bottom of my frequent fevers and illness. This edition of ‘Lost in Space’ ended up being a very good edition, in deed. In spite of the terrible frantic pace of the week, I was still managing to mange my workload and some private time… some. In this edition, there are some incredible images from millions to billions of light years away. I hope that everyone takes the time and gives this edition a good look-see. ENJOY!
  • Notes from Behind the Keyboard – May 7th, 2014 : “Welcome back My Dear Readers to The Other Shoe. Now, before I get started on today’s edition of ‘Notes from Behind the Keyboard’ I wanted to take a moment to express my ‘Thanks!’ to people, without whom, my journey yesterday would not have been possible. I would like to say “Thank you!” to: All the drivers and support people at Orange County Para-Transit Access, Los Angeles County Para-Transit Access, the good people at OCTA and MTA, all of the nurses and support people at Palos Verdes Medical Group, my Primary Physician Dr. L. Gorlick, the phlebotomist and technicians from Memorial Medical Services at PVMD, and my caregiver and significant other of 27 years Glen Allen. Yesterday was my quarterly follow-up visit to my primary care giver, and good friend Dr. Laurence Gorlick.” Always wanting, and working, to keep you, My Dear Readers, in the loop… here are some photos taken while I was on my journey, and a flayer from the mall where my doctor’s office… is. It was quite a difficult journey, but time well spent. Take a moment and read about my journey, and see the photos and the flyer.
  • REVIEW – ‘The Horror in Smithville’ First Seven Parts! : “Welcome back My Dear Readers to The Other Shoe. I am sitting here, in an apartment way too hot to work… or even live, trying to get cool enough to start writing Part Eight of ‘The Horror in Smithville’ when I had a great idea. Prior to returning to writing the next chapter… maybe I should present a review of the first Seven parts! This will give me a chance for the room to cool…. Hopefully… and a chance to review everything that has happened to Timmy and Archer in the first sixty-five pages.” Here are LINKS to ALL of the FIRST seven episodes of ‘The Horror in Smithville’. I, originally, published this article to fill in time, and to encourage people to check out this on-going series. Much to my surprise, a Facebook friend (and someone from my childhood and hometown, Pearland,) asked me, on Friday, is there was a single place where she could get caught up with the story. Where are the first seven episodes? She asked. I would it terrible coincidental that just days before, I had published an article with just such a list, and links to all seven previous episode. Now, here is your chance to get caught up in, and caught up on ‘The Horror in Smithville’… This story really is gaining traction! YEAH!
  • The Horror in Smithville – Part EIGHT : “Welcome back My Dear Readers to The Other Shoe. Just as promised, I have worked through the night, and most of this morning, to make sure I was able to publish the much anticipated (and slightly tardy) Part EIGHT – ‘The Horror in Smithville’! You know, My Dear Readers, I am really glad that I didn’t promise any particular; plot twists, character changes, plot lines or story lines prior to writing.” Here it IS!! After many readers having waited another week, just to read this episode, here is the much anticipated PART EIGHT of The Horror in Smithville’!!! I am not sharing any spoilers, here today… so if you want to know “what happens”? You will just have to take a few moments and read this great episode, yourself! ENJOY!
  • The Deep Web – Review of First Three Issues : “Welcome back My Dear Readers to The Other Shoe. Today, Friday, I have decided to take the time to review the first three issues of ‘The Deep Web’ prior to continuing with this series. From what I am seeing in my traffic reports, a good many of my current readers are ‘new’ readers. New to The Other Shoe. Having said, I think it prudent that I review the very first three issues so that these ‘new’ readers can catch-up on this series.” After careful consideration, and much hand wringing, I decide to return to this series. Therefore, in order to get everyone up to speed, I have published this review of the first three articles. Be sure to check back, right here, nest Friday for Part Four, of this very controversial and informative series.

.

Well, My Dear Readers, that brings us to the very end of this week’s review. I hope everyone had enjoyed this romp through the collective works of the past seven days. I am simply amazed, looking back on the events of the week, that I managed to write and publish all this work. It just goes to show you, I really do want to share and inform.

.

Now, I a simply must rush. For I have, still, to publish this then write ‘Sunday Funnies’ and publish… before I can rest… again. Thank you for all your kindness and until we meet, again,…

.

Adieu!

.

Thank YOU!

.

The Other Shoe eBay Store

http://www.ebay.com/usr/enzomatrixlt

.

Danny Hanning of The Other Shoe - May 6th, 2014

Danny Hanning of The Other Shoe – May 6th, 2014

 

The Deep Web – A Review of The First Three Issues

.

Access is FORBIDDEN The Deep Web

Access is FORBIDDEN The Deep Web

.

          Welcome back My Dear Readers to The Other Shoe. Today, Friday, I have decided to take the time to review the first three issues of ‘The Deep Web’ prior to continuing with this series. From what I am seeing in my traffic reports, a good many of my current readers are ‘new’ readers. New to The Other Shoe. Having said, I think it prudent that I review the very first three issues so that these ‘new’ readers can catch-up on this series.

.

First, as I wrote and published in the first issue of this series I take no responsibility for your adventures on/in The Deep Web. FYI there are millions of Americans that have very safe and entertaining adventures in/on The Deep Web every single year. Conversely, every year there are many Americans that loose money, their identity, and even access to their bank accounts after just one visit to The Deep Web.

.

As with many aspects of adult life, fore warned is fore armed, and the better you prepare yourself and your computer before you connect to The Deep Web? The better the chance you have of not becoming a statistic, and/or victim. I really want all of you, My Dear Readers, to enjoy reading about this other web, I want you to explore if that is your desire. I just… really want everyone to be safe. As well, I accept no responsibility for any knarlly… yuda, yuda, yuda. (I have a good friend that is always cautioning me to write disclaimers… You know who you are J)

.

Now, just as soon as I have published this review of the first three articles in this series, I am going to write and publish the remaining issues. I have, yet, to share even more information and I want to relay to you some of my experiences in this other web. (Other web… at the Other shoe… how neat!)

.

Now, without further adieu I bring you ‘The Deep Web’ the Review!

.

  • Introduction to The Deep Web – Part One : “Welcome back My Dear Readers, to The Other Shoe. For many months now I have fought an internal battle, with myself. A battle that was not easily lost, nor won. A battle that, unfortunately, I (in some small way) will now hand over to you, My Dear Readers. The battle was/is one of conscience, in that I had to choose a course of action. The ‘high road’ would have left you, My Dear Readers, without knowledge and insight (from me at least) regarding a growing danger. Conversely, the ‘low road’ is the one where I explain to you, My Dear Readers, about this growing danger. In so doing, though, I expose you directly to this danger… and place in your hands the very crisis of conscience I have fought now for many months.” This was the very first article in the series. As such I did my best to introduce you, My Dear Readers, to the LARGER part of the web. You see everyone knows about the World Wide Web (www.), yet it is estimated that less than 20% of Americans (at the time this article was first released) even know of the existence of ‘The Deep Web’. That statistic is changing, and rapidly. I have read that nearly 200,000 new Americans are connecting to this other web each and every month. This is good, and this is bad. Good because this other web is more than 100 times LARGER than the WWW. Bad because venturing into this other web is far more dangerous, and requires much more diligence and understanding of; computers, networking, secure socket layers, computer security, and network security. This is not easy work, and not all Americans are suited for absorbing this knowledge. Those that do venture into this other web without proper preparation and precautions? Run a huge and real risk of having financial information stolen and/or their computer damaged. My writing this series was my attempt to prepare you, My Dear Readers, just in case you were tempted to venture into this other world.
  • The Deep Web – Part Two : “Welcome back My Dear Readers to The Other Shoe. Welcome back to my ongoing series about ‘The Deep Web’, Part Two. First, a little review of some of the material we have already covered.What is Tor? – Tor is an anonymizing browser meant to take advantage of an anonymizing network. This is meant to protect you, the end user, from piracy and hackers by routing your connection to the ‘Deep Web’ through bridges and concealing your IP address.” In this issue, My Dear Readers, I introduce you to the browser best used when venturing or adventuring into The Deep Web. I show you where you can go to download Tor. I explain how to run Tor, how to configure Tor, and how to connect using ‘Bridge Relays’. Further I explain to you all, My Dear Readers, the ‘Rules of the Road’ when venturing into this other web. I give you a lot of the ‘new’ nomenclature for this other web, and some very good words of warning. You see, My Dear Readers, the single best thing I can hope to accomplish is to instill in you, My Dear Readers, the genuine level of… concern… awareness… security awareness…. Paranoia to survive a healthy adventure into the other web.
  • The Deep Web – Part Three : “Welcome back My Dear Readers to The Other Shoe and ‘Part Three’ of ‘The Deep Web’. My ongoing series about the other web, the darker side of the World Wide Web. Today I am going to talk to you, My Dear Readers about two new topics. First, I want to explain and discuss ‘Bridges’ to “The Deep Web’. Second, I want to explain and inform you, My Dear Readers, about creating a ‘virtual Machine’ on your computer as a means of protecting yourself and your computer.” In this issue I had two major objectives. First, I wanted to share with you, My Dear Readers, a scary tale of an old friend who ventures into this other web: A) Unprepared & B) WHILE ARE WORK! Talk about adding insult to injury. If he had been properly prepared, prior to connecting to the other web. Doing so at work would not have resulted in his termination of employment and he would have kept; his apartment, his wife, his car, and his ability to work in his chosen field. [I know this… because I was the one that caught him… and I was the one that ended up firing him… at my boss’s demand] I told a tale of how a young man with a bright future in IT lost that future, due in large part to hubris, because he connected to this other web at work on an unprotected computer placing the private personal information of hundreds of paying clients into the wrong hands. Second, I explained what bridge relays are, how to get a listing of them, and how to connect to this other web via a bridge relay. If your ISP (Internet Service Provider) has rules prohibiting you connecting to this other web, you can use bridge relays to bypass their software/hardware keeping you from connecting. Further, using private bridge relays can protect you for the prying eyes of; hackers, ‘Black Hats’, and all other kind of ‘Bad guys’ that lurk around this other web 24/7/365. As I have stated, repeatedly, My Dear Readers… IF you are going to adventure into this other web I want to do everything I can to help protect you from the (literally) millions of sharks swimming the waters of The Deep Web just waiting for ‘Newand unsuspectingsurfers. My Dear Readers, there is no reason that you should not be able to use and take advantage of, all that this other web has to offer. Just read my articles carefully, take all precautions and follow all directions and you should be safe.

.

Well now, My Dear Readers, which brings us to the very end of this review of the ‘The Deep Web’ @ The Other Shoe. I really hope that you have enjoyed this review, and that once you have read all three of the articles, you come back to read all the rest. Honestly, I never thought that I would ever be writing an article about this other web. Just five years ago, I wouldn’t even have mentioned (on line) that I knew about this other web. For fear that I might be investigated for; having terrorist ties, involved in identity theft, or suspect of trafficking in stolen or illegal goods.

.

Until recently that was pretty much the only reasons one would go to this other web, with any regularity. My Dear Readers, I can tell you truthfully that I have never been involved with any of the activities I just listed, above. Heck, I haven’t had so much as a speeding ticket in more than three decades! My best friend, of 27 years, calls me ‘The Last Boy Scout’… and with good reason.

.

Getting back on point, it is my desire to continue this article series next Friday. Next Friday you should see the fourth issue in this series, all about ‘Virtual Machines’. I will explain just what is a virtual machine, and how to set one up on your computer. I will have links to any needed software and I hope to have a step by step guide. AS well, I will explain just how a virtual machine will protect you as you venture or adventure in/on this other web. Finally, depending on the version of Windows, I will explain if it is really necessary for you to run a virtual machine for your protection. I look forward to bringing this information to you, one week from Friday.

.

It has been my pleasure, as always, to share this information and my time with you, My Dear Readers. Until you visit here, again…

.

Adieu!

.

Thank YOU!

 

.

The Other Shoe eBay Store

http://www.ebay.com/usr/enzomatrixlt

.

Danny Hanning of The Other Shoe - May 6th, 2014

Danny Hanning of The Other Shoe – May 6th, 2014

A Week in Review – April 5th, 2014

.

Daneil Hanning of The Other Shoe 2001

Daneil Hanning of The Other Shoe 2001

               

.

 Welcome back My Dear Readers to The Other Shoe. Well, here we are to Saturday again, already. So, if it is Saturday then I it is time for ‘A Week in Review’ here at The Other Shoe. This is a rather special review as this week was host to some new articles here, and more than one pivotal article in our favorite series. A rather impressive accomplishment if you consider just how sick I have been for the past several weeks. My apologies for the tardiness of this piece. The night, behind us, was long and eventful… for me, and as such, my hands and body took their time… getting ready.                 

.

Regardless of my personal woes, the work must continue unabated. Amazingly, in spite of fevers and other physical woes and frights, Nine articles were published in just this last week. I must say, for just one person; researching, documenting, writing, editing, and publishing every one of those nine articles brings me great pride. As well, I do not know if anyone but me looks at it… but, there is a traffic counter, over in the right hand bar. This week we saw this traffic counter enter unknown territory .

.

For it was this week that this traffic counter entered and remained in the fifties for all week. It was much to my surprise that the counter, at one point, reaching the all time high of fifty-nine! AS I wrote this article, Saturday afternoon, it was flirting with 51-53. Just how could a man, a writer, not feel great pride in seeing this sight? One thought comes right to mind… “Thank YOU!”

.

Yes, for it is you, My Dear Readers, that drive that counter and are the source of my pride. Each visit, each page turned, each article read you bring pride to my heart and soul. It is with every word, of mine, that you read you bestow upon me a great honor. Like a renaissance minstrel, I come here every day and spin webs of words for you to untangle. Without fail, every day, and every week, you return to me and toil in my webs. You do me a great honor, one that I will not soon forget… if ever.

.

Now, before I bring tears to my eyes (hah! Too late) let me share with you the fruit of this week’s labors. My Dear Readers, my health is failing… I have written an article… explaining my current state… my maladies and shortcomings. I hesitate to publish this work, for it was written in darkness. Darkness in my mind, in my heart and in my soul. There is one… of those maladies I mentioned.

.

Back to point, my health is failing. As I knew it would, as I had been so often warned, and as I have feared. Last night, was a terrible trip fraught with personal battles… that I barely escaped. Even nightfall… night, no longer gives me rest or respite… anymore. I say this not for… pity or any other selfish reason. I say this, more, as a warning. This blog is my life-blood. In it I have poured all that is myself. Men, all of us, seek immortality from birth.

.

Many men seek it through exploits; in sport, in business, in commerce and even in battle. Many more men seek it in progeny, the furtherance of self through birth of new life. That goal, has repeatedly escaped me, and not from a lack of trying… or ability. Seems the women I chose to bed, had no desire to raise young. Anywho, this blog and all my writings are my progeny … my immortality. They will live on past me, in my wake they will still thrill and challenge, enrage and entertain. Just as I have done, in life.

.

Honestly, I hope to live many more years and put a great many of you in the ground. Hope… is not a thing that changes destiny or fate, regardless of what children’s stories portend. I am bound by the cards I have drawn and the fate and destiny that they hold, for me. Be I here for another day, or another decade I promise you, My Dear Readers, that for so long as there is breath in my lungs, strength in my body and thoughts in my mind… I will come here and share.

.

No man can promise more, no person could expect any more.

.

Having said, we continue on to today’s faire here at The Other Shoe. As mentioned, above, this week was (for me) a glorious week. I shared often, I shared soulfully, and from this week’s numbers you, My Dear Readers, drank deep at the chalice of my words. I hope that, in drinking, they brought you pleasure as much as I in bringing them to you.

.

So, without further adieu… I bring you ‘A Week in Review!

.

  • Sunday Funnies – March 30th, 2014 : “After many weeks of trying, I have finally managed to get some footage of Mr. Alexander’s unique personal habit. You see, Alexander is unique. Not just in this habit, but in a great many ways, every single day. He talks… constantly. He is kind and loving, true and forgiving. For today, we focus on one of his unique, and entertaining, personal habits.” This week’s videos were a major coupe. Many week’s, I have spent, in the single endeavor of capturing this, for you. Alexander is very dear to me, you see. He is very unique, in a great many ways. What you witnessed here this day, in the videos that I shared, was a very personal habit, he enjoys. Yes, it is cute and entertaining. But, please understand, too, that it is a quite personal thing… to Alexander, too. Enjoy!
  • Coming This Week – March 30/31st, 2014 : “Welcome back My Dear Reader to The Other Shoe. Well now, I would usually write and publish this article on Monday. Yet, something just caught my eye, and I just had to share it with you, My Dear Readers. If you are reading this article on Sunday March 30th, 2014 (or have visited and read articles between Friday March 28th and Sunday March 30th), you are taking part in the single largest influx of visitors my blogs have ever seen. Yes, I have two locations for The Other Shoe. The primary blog located at blog.com and secondary located at wordpress.com. I saw secondary only because it was the second location of my blog launched. Remember, I do everything at both blog locations. Writing, editing, publishing, promotions… everything.” Short, sweet and to the point, what more could one ask for. This single article, the one featured above, set in motion one of the single busiest weeks this blog has ever seen. It was with great pride, and great effort, each story was wrought. Each word and each image, into each went great thought. If you have not yet ventured, through this week’s stories and tales, an adventure you have lost.
  • The Mars Report – March 31st, 2014 : “Welcome back My Dear Readers to The Other Shoe. Today I have a very informative edition of ‘The Mars Report’ for all of you, My Dear Readers. The image you see above is an artist’s concept of the Mars Reconnaissance Orbiter. This orbiter has many missions and two of them are in support to the rover Curiosity. First, this orbiter takes high-resolution images of the Martian surface. These images are then used to plot Curiosity’s navigation and course. Second, the orbiter relays information and images from the rover to earth.” In this week’s edition, of ‘The Mars Report’, we ventured where no human has ever before. With each passing day, we get closer, to the mountain named Sharp. Along the way it will make discoveries, and share them I will. One need look no further, than this article to be sure, to get their fill. Of all things Martian, and a few extraterrestrial thrills.
  • News from Around the World : “Just as the Founding Fathers designed. Yes, the Senate is the Elder body of our Congress, in that it is the senior and most reasoned body. The Founding Fathers knew (foresaw) that destructive populist movements might well gain a majority in the lower house of Congress. As a boy, and young man, I read “The Federalist Papers’ and ‘Articles of Confederation’. It was in these documents that our nation’s democracy were brought to fruition. They outlined how the lower house of a Congress was ‘The People’s House’ and, as such, could easily fall prey to populist ideals that ran contrary to the continued health of our democracy and our Republic.” A little ‘American’ news, mixed with stories from afar. This is what I wanted.. This week saw the unveiling of this ‘new’ article series, ‘News from Around the World’. It is my hopes that it catches on, with all of you, My Dear Readers. It is my hope that I can share meaningful news from afar. ENJOY!
  • Lost in Space – April 2nd, 2014 : “Welcome back My Dear Readers to The Other Shoe. A very special welcome, indeed, to this the second edition of ‘Lost in Space’! I am quite proud to announce that last week’s, premier, edition of this article helped spearhead the single largest increase in visitor traffic (at both locations) for my blog(s). It would seem, that I am not the only person that enjoys looking at beautiful images from outer space. Kudos to all of you, My Dear Readers, which visited between Wednesday and Sunday of last week as your visits helped. You helped propel my work to ever-growing levels of popularity. That’s a ‘Good Thing’!” Nowhere else, have I seen a larger collection, every single week, of images strung, from the heavens they come, together from afar. I bring to you, My Dear Readers, each and every week. Celestial visions, a sight to behold, I bring to these pages for young and for old. Mankind’s future rests in these stars. When I was younger… we worked among the stars.
  • Personal-Medical Update – April 3rd 2014 : “Welcome back My Dear Readers to The Other Shoe. First, I would like to thank everyone for their kind words of support during my difficult day yesterday. Yesterday I had an appointment with the doctor to evaluate a lump on my face, at my jaw line. Thankfully this lump is not any kind of tumor. For that news I am extremely grateful. However, I was told that it is a swollen lymph node.” It sucks to be sick, on top of my pain. Bad news just keeps coming, my way. Keep you posted, I will as I know. Just sucks being this weak and… stricken… at such a young age.
  • The Horror in Smithville – Part Four: “Archer was cold. Like, really cold to the bones. He reached out to feel for the sleeping bag, or a blanket. Sometimes, when it got really cold during the night, Timmy would put a nice wool blanket on top of his sleeping bag. That always chased the cold away, and he would half-wake-up ­and pull it around him. Nothing. He felt around and around… then two things occurred to Archer. First, his hands and feet seemed to move in slow motion. The next, he wasn’t breathing!” This one is easy; I wish that they were so. Quite simply; if you haven’t read this, then DO!
  • The Deep Web – Part Three : “Remember, venturing into this darker and hacker-filled part of the web is a venture fraught with danger and exposure. Exposure to people and organizations that would just a soon as take your identity and all your money, as give you the time of day. If you recall these darker recesses of the web are populated by (either); Black Hats [hackers with deception and theft only in mind] and White Hats [hackers that have made a conscious choice to use their computer skills to protect or improve the life of their friends and clients]. Most of the time, My Dear Readers, you will not know which you are dealing with… until it is too late.” Quite simply put… this is a ‘Must Read’ for anyone with the courage, the WWW to leave. I told you in the beginning, yet here I will remind you again. In the ENTIRE World Wide Web, of which this blog is part, what you are seeing… what you know of… is only such a very small part. ‘The Deep Web’ is thousands of times larger than that which you know. Like a Pirate’s Adventure this other web will you show. You venture at your own peril, if this series you do not first read. I pity those that go there, unprepared. Like lambs to the slaughter, but they will see.

.

By gum, that brings us to the close, of this article… this week… this adventure, we close. My time, well spent, if it brought you some joy. If it made you; think, or scrim, laugh, or cry, want to live or want to try.

.

It is with a sadness, I bring it to an end. Hopeful that next week, we can start it all over again. Till then, I will bid you adieu. Take care, look both ways, be kind to another… as you would have them be kind to… you.

.

As always… I am so deeply honored by each of your visits. Come back often, and visit.

.

Thank YOU!

.

The Other Shoe eBay Store

The Other Shoe eBay Store

http://www.ebay.com/usr/enzomatrixlt

.

The Other Shoe's Daniel Hanning

The Other Shoe’s Daniel Hanning 2/2014

The Deep Web – Part Three

.

Forbidden Access _ The Deep Web

Forbidden Access _ The Deep Web

.

                Welcome back My Dear Readers to The Other Shoe and ‘Part Three’ of ‘The Deep Web’. My ongoing series about the other web, the darker side of the World Wide Web. Today I am going to talk to you, My Dear Readers about two new topics. First, I want to explain and discuss ‘Bridges’ to “The Deep Web’. Second, I want to explain and inform you, My Dear Readers, about creating a ‘virtual Machine’ on your computer as a means of protecting yourself and your computer.          

.

Remember, venturing into this darker and hacker-filled part of the web is a venture fraught with danger and exposure. Exposure to people and organizations that would just a soon as take your identity and all your money, as give you the time of day. If you recall these darker recesses of the web are populated by (either); Black Hats [hackers with deception and theft only in mind] and White Hats [hackers that have made a conscious choice to use their computer skills to protect or improve the life of their friends and clients]. Most of the time, My Dear Readers, you will not know which you are dealing with… until it is too late.

.

That is why I have decided to focus today’s edition on two methods of protecting your self, your computer and all the computers on your network. Now, I might not have mentioned this in the two previous editions of ‘The Deep Web’. Though, thinking about it… I do not think I could mention this fact ‘too many’ times. When (if) you go to surf “The Deep Web’ you must bear in mind that you are exposing all computers on your network to risk! Not just the computer that you install Tor on, and connect to ‘The Deep Web’, rather all of the computers on; your home network, your company’s network (if you surf from work… something I strongly discourage), or the public or private network you use to connect. As well, if you improperly connect (like directly connecting) to ‘The Deep Web’ the risk will continue long after you have disconnected and turned off your computer.

.

See, the highly skilled ‘Black Hats’ can use information (collected from an improperly connected device to “The Deep Web’) to infiltrate and entire network. They can create ‘Back Doors’ to your home or work network, making it very easy for them to not only gain access. Not only gain access but even commandeer or take control of you; hotspot, Wi-Fi network, LAN network, either home or work public or private. This can occur each and every time you connect to the deep web. Please, keep that in mind every time you connect and all the time you are connected. Vigilance = safety.

.

Once you have downloaded Tor, from a reputable source like the ones I have listed in ‘Part One’. You need to now read about, and understand how to use Bridges (or Bridge Relays) to connect to ‘The Deep Web’. You do not want to connect directly to ‘The Deep Web’ using Tor and no bridges. As well, many Internet Service Providers (Time Warner, Clear Wire, Earthlink, AOL, and others) may work to block you connecting. Many of these companies ‘see’ merely your use of Tor and any efforts to connect to ‘The Deep Web’ as a violation of your ‘Terms of Use’.

.

They can, and many do, use this perceived violation to terminate your internet connection and any contract you have signed. Now, honestly, I have not seen this happen many times at all. However, there is a way that you can greatly decrease the chance they can ‘see’ you use Tor and your connection outside the normal web.

.

Regardless of the reason, be it your access is blocked or you just want to make sure your activities are not ‘seen’ the use of a ‘bridge’ is your best bet. My Dear Readers, I would like to make something abundantly clear! It is my suggestion that you, My Dear Readers, always use a ‘Bridge’ or ‘Bridge Relay’ to make your connections to ‘The Deep Web’. It is my humble opinion that one simply cannot be ‘too careful’ when it comes to surfing and accessing ‘The Deep Web’. I have heard some really terrifying ‘horror stories’ from users. Stories of private networks (at their well paying jobs) being infiltrated, and commandeered, by ‘Black Hats’ with just one connection and/or one transaction.

.

One individual, exercising very poor judgment, did so at their job over the weekend. He was there working on a project on a Saturday, and became bored. He and I had been discussing ‘The Deep Web’ that week while playing WoW together. He had the wherewithal to not use his home computer, and thought that the network at work had enough; hardware firewalls, software firewalls, anti-virus software, Malware scanners, and adequate configuration to protect him and the corporate network. He, not only, connected directly to ‘The Deep Web’ he engaged in a transaction! Yeapers, he connected via one computer to a ‘Bitcoin’ vendor. With another computer he connected directly to ‘The Deep Web’ and went about making a purchase of… (let’s just say) ‘an illegal product’ for his personal enjoyment.

.

See, he did not want his wife to find out he was purchasing… this product. Nor did he want his wife to know that he was using their money to purchase bitcoins and, in turn, the illegal substance. The transaction went through (so he thought) without a hitch. He left his place of work that Saturday afternoon about 2PM, thinking he had ‘scored’ something he really wanted… without a hitch and without anyone being the wiser.

.

Stop THINK and PROTECT Your Family and Your Computer!

Stop THINK and PROTECT Your Family and Your Computer!

.

This is the lesson. He returned to work on Monday morning, bounce in his step because he had finished all the work on the assigned project ahead of time. Much to his dismay; he pulled into work to find unmarked law enforcement vehicles in the lot, a swarm of plain-clothes officers in the hallways, and an IT Director frazzled and sweating bullets. Shortly after getting to his desk he was called into the C.O.O.’s (Chief Operating Officer) office. He was informed that, sometime Sunday, their corporate network was infiltrated.

.

That, just in a matter of a couple of hours, these infiltrators had; managed to commandeer the entire network bypassing all firewalls and software/hardware protocols, hacking their encrypted client database, and stole the financial information of several dozen clients. They had managed to steal financial information of; clients, vendors, workers, contractors and even personal financial information of the Owner. It was a major ‘data breech’ and it looked like they had managed to transfer over ten thousand dollars of corporate assets. They were still contacting their vendors and clients, but it looked like several if each had experienced ‘data breeches’, too.

.

Once these hackers had finished they worked to cover their tracks. They had uploaded a worm, a ‘Logic Bomb’ that went about formatting all computers at the location. They had lost terabytes of information and were working to restore data from disc backups kept off property. However, they did have a time index for the infiltration. A time index that pointed a finger squarely at the weekend worker. Our cleaver ‘Deep Web’ surfer and purchaser of illegal goods. They also had some internal close circuit camera footage that showed he was the only person in the building and using a the computers shortly prior to the ‘data breech’.

.

Needless to say, this individual was immediately fired and escorted out of the building. Lucky for him they were never able to rebuild their servers adequately to directly connect him to the connection to ‘The Deep Web’ that lead to the horrific ‘data breech’. However, if they would have been able to connect this individual to the connection to “The Deep Web’ that lead to the data breech? That person would have been on the hook for; criminal charges and huge financial liabilities. We has so very lucky that those hackers had decided to use heavy handed techniques to cover their electronic tracks. This is the reason that you will want to make sure that you use Bridges or Bridge Relays to connect to ‘The Deep Web’ every single time, and never connect while you are at work!

.

Now, the very first thing you want to do is to download a version of Tor with the Vidalia Bridge Bundle. You can download it here:

.

Tor WITH Vidalia Bridge Bundle

.

For more information on how to use the Vidalia Bundle go here:

.

Further Information on Vidalia Bridge Bundle

.

For a video on how to configure the Vidalia Bundle and how to obtain Bridge Relays go here:

.

Video on Tor Vidalia Bridge Bundle

.

In the video is information on where to send an email (and how to address said email properly) to obtain ‘Tor Vidalia Bridge Relays’. In order to avoid problems with (both) of my blog(s) servers and administrators I am not publishing this information directly. If you follow the links above, you can read and watch videos that make this whole process very easy to follow and execute. If this blog was on my own server I would make my own (up to date) video with step by step directions. However, since I do not want to have my blog(s) blocked or removed for “violations of user agreements…” regarding the publication of “illicit or illegal information” this is the best I can do… at this time. Thank you for your understanding.

.

The bridges are simply a listing of URL(s) like this; https://555.1212. Once you have the listing(s) in the return email, or you know people in your area that are running ‘Tor Bridges’ input this information in the Vidalia ‘Network Settings’ after clicking the box “My ISP blocks Tor connections’. Clicking that box will open up a oblong dialog box. This is where you write/input the ‘Tor Bridges’ and press ‘return’. Once you press return the information you input will appear in the large box below the oblong input box. Once you have more than one bridge relay address’ just double click on the one you want to use and Vidalia will start Tor using the bridge relay of your choice.

.

YES! I know that this is a bit confusing, at first. However, if you feel it is too much effort… or you just do not think I need to? Read the story above, again. I am writing this separate article and stressing these steps and the use of ‘Tro Bridge Relays’ to protect YOU, My Dear Readers.

.

That brings us to the end of ‘The Deep Web – Part Three’. I was going to include the ‘creation of a virtul machine’ in this issue. However, considering the current length of this article and just how confusing this article will become if I continue? I have made the decision to move the process of creating ‘Virtual Machines’ until next week, and Part Four. I hope that I have presented this information in a manner that is understandable.

.

If you have any questions feel free to visit the links, above, and watch the videos and read more about it. I understand that it can be difficult, but we are talking about keeping your computer and your family’s network and computers SAFE! Come back next week for explinations on how to create a Virtual Machine’ on your computer to add a layer of protection to ANY machine or natwork.

.

As always I am deeply honored that you come here to read my work.

.

Thank YOU!

.

The Other Shoe eBay Store

The Other Shoe eBay Store

 

.

The Other Shoe's Daniel Hanning

The Other Shoe’s Daniel Hanning 2/2014

Coming This Week – March 30/31st, 2014

 

The Other Shoe's Daniel Hanning

The Other Shoe’s Daniel Hanning 2/2014

Welcome back My Dear Reader to The Other Shoe. Well now, I would usually write and publish this article on Monday. Yet, something just caught my eye, and I just had to share it with you, My Dear Readers. If you are reading this article on Sunday March 30th, 2014 (or have visited and read articles between Friday March 28th and Sunday March 30th), you are taking part in the single largest influx of visitors my blogs have ever seen. Yes, I have two locations for The Other Shoe. The primary blog located at blog.com and secondary located at wordpress.com. I saw secondary only because it was the second location of my blog launched. Remember, I do everything at both blog locations. Writing, editing, publishing, promotions… everything.

.

On Friday March 28th, the secondary location (at wordpress.com) reached an all time high at eighteen visitors in one day. The following day, March the 29th, my primary blog location (blog.com) had an all time high of twenty-two visitors in one day. Yes, I know… in the grand scheme of things… that is not a lot of visitors. Although, for a my blog… Well, I am proud to announce this news. See, I have Google Analytics monitoring my blog.com location and the sister location at WordPress provides their own analytics, that I check regularly. For those of you, My Dear Readers, that have been with me for awhile, two or more years out of the past four.

.

You will know that I used to publish a series of articles where I shared the results of the analytics. I did this for three years, then I just stopped. I am not too sure as to why. Honestly, it always felt a bit too much like… bragging. Showing off and… well, that is just not me. I am proud when my efforts merit. However, and you can ask anyone that I went to Middle, High School or college with… I do not like to brag, about myself.

.

I am very proud of the traffic I experienced this week, at both blogs. Now, I have worked extremely hard these past three weeks at writing and publishing quality content on a regular basis. Just over the past three weeks I have introduced FOUR new article series. I hope that it is these new articles series that are driving this increase in traffic, and not some factor that I cannot replicate.

.

Now, I would like to share with you, My Dear Readers, what I have planned for the coming week, here at The Other Shoe. Monday, would have… should have seen the publication of this article. However, since I wanted everyone to know (they are part of a historic weekend of traffic), I am not really sure exactly what I will write… tomorrow. I would not be surprised if you saw a new edition of ‘The Mars Report’ or ‘Lost in Space’. Let me tell you all that those two series are the most difficult for me to publish. Writing them is not very difficult. In fact, I greatly enjoy creating the narrative for the images I choose. It is the; downloading of, uploading of, embedding of, and choosing of these images that is quite difficult. I am not complaining, just explaining.

.

This week you, My Dear Readers, will be privy to; an all new episode of ‘The Horror in Smithville’. The boys have… fallen… yeah, right… ‘fallen’ to sleep… and we all know what happens when young boys fall asleepon a rainy night full of thunder and lightening. Next, you will be treated with a new edition of (both); ‘The Mars Report’ and ‘Lost in Space’. Well, that is what I have written right here in my day planner for writing. Yes, I have a writing schedule written out in my day planner.

.

Coming up next will be an all new issue of ‘The Deep Web’. This edition will get a bit more technical, and once done… you will be better prepared to venture into the dark and deep web than ever before. Finally, you will enjoy another episode of your regulars; ‘A Week in Review’ and ‘Sunday Funnies’. Now, I think that I have mentioned it before, I am looking for a political cartoonist. I simply cannot pay, but anyone that would like the practice and exposure for their work, I am looking for someone to add to my ‘Sunday Funnies’ with political cartoons.

.

That brings us to the end of the week of articles, and to the end of this preview of the coming week. FYI – Wednesday afternoon I do have a doctor’s appointment to look at a… ‘growth’ on my jawbone. If that goes poorly… it may negatively impact my writing schedule. However, if it goes well.. then I just might be of the temperament to write additional works not mentioned in this preview.

.

Well, My Dear Readers that brings us to the end of this week’s ‘Coming This Week’. I hope that you have all enjoyed the previews of what is to come… and I hope that you all enjoy the fact that (if you are here on Sunday) you, My Dear Readers, have been part of the single largest influx of visitor traffic in the history of my blogs.

.

As always I am deeply honored that you came here and read my work.

.

Thank YOU!

.

The Other Shoe eBay Store

The Other Shoe eBay Store

http://www.ebay.com/usr/enzomatrixlt

.

A Week in Review – March 29th, 2014

           Welcome back My Dear Readers to The Other Shoe. Well, if it is Saturday then it is time for… … … that’s right, ‘A Week in Review’! And what a week it’s been for you and for me right here at The Other Shoe. We started two all new articles series with; ‘Coming This Week!’ and ‘Lost in Space’. Not to think that we have thrown out all the old, just to make room for the new. We had; ‘The Deep Web – Part Two’ and ‘The Horror in Smithville – Part Three’. If I say so, myself, all in all a busy week indeed!

.

Now, for all of you, My Dear Readers, that are just too busy during the week to read? This is the place to be. Here at ‘A Week in Review’ I post links to all the articles of the week. AS well, I include a short excerpt from the article and a little insight into the origin of the article or some other personal notes. Really, that means that everyone that checks out this series, gets a little more information and insight than those that just read during the week. Making you, a very special My Dear Reader… indeed.

.

So, see as there is quite a bit of content to cover, in this issue, I will cut this introduction a little short and get right to the meat of things. Without further adieu, here is ‘A Week in Review’!

.

  • Sunday Funnies March 23rd, 2014 : “That means that Alex is down to the dregs of his food supply. Long gone are the crunchy corn meal squares he so enjoys. He is out of hazelnuts and down to peanuts and the little tiny bits of food left at the bottom of the bag. Unfortunately, for Alexander, Allen and I are quite bereft of funds to purchase a new bag of ‘Macaw Parrot Food – Kaytee’.” Thanks to the generosity of a very good friend, Alexander got his new bag of ‘Macaw Parrot Food by Kaytee earlier this week. Alexander is very grateful to you, you know who you are… J So, there is no more scrounging around in the bottom of a mostly empty bag of food, and this week Alexander had all of the tidbits and treats he so much enjoys. This Sunday… well, I managed to capture it… You will have to look very close… but I got some footage of Alexander… cleaning his paws on my sheets! Never had a rat do this quite like Alexander, before… it is unique and it make him quite unique, too. ENJOY!
  • Coming THIS Week at The Other Shoe – March 24th, 2014: “This series will be brief. In it I will preview what articles you can come to expect, in the following week. This way all of you, My Dear Readers, can make plans to drop by and read upcoming favorites like; ‘The Horror in Smithville’, ‘The Deep Web’, and ‘The Mars Report’. Knowing that a ‘new’ episode of your favorite article will peak interest, and (hopefully) improve traffic.” And that it seemed to do just fine, indeed. Traffic is up here at The Other Shoe, and that is always a welcome trend. Therefore, I will be continuing this series of previews of the articles to come, in the coming week. This is/was one of the all new articles that came this week. I really put on my ‘Thinking Cap’ and knocked one out of the park, I did. The articles just seem better, the writing… just a bit crisper… and the feeling, well much more jubilant, indeed. We are off to a great start, for the second four years… and the next 400 articles. On with the show!
  • The Mars Report – March 24th, 2013: “Welcome back My Dear Readers to The Other Shoe and ‘The Mars Report’ for March 24th, 2014. With the lost airliner in Asia, the turmoil brewing in the Ukraine, it is difficult to pull our eyes away from all this disaster and look to the skies. However, that is exactly what I did today, and what I am asking you MY Dear Readers to do for the next few moments. Actually, it is comforting to think that not all of our human condition is pain and suffering of other humans. Though it occupies little real estate in; newspapers, Television reporting, cable news networks and even blogs.” This was a smashingly great episode of ‘The Mars Report’. With looks back at where we have been, from overhead in orbit and the ‘MastCam’, too. With spring coming to the Martian surface, we are seeing many sights that only come, one time a year. From sand dunes that look like communicator badges from ‘Star Trek’, to striking pictures of thawing tops to more snad dunes. With the addition of ‘Lost in Space’ this blog has taken a marked turn towards the heavens. I always have looked to the starts, for inspiration and more. Seems my basic impulses have served me well, indeed.
  • The Deep Web – Part Two: “Welcome back My Dear Readers to The Other Shoe. Welcome back to my ongoing series about ‘The Deep Web’, Part Two. First, a little review of some of the material we have already covered.” That we did, review. Then moved on to the most important of all, the ‘Rules of the Raod’. The majorly improatant Do’s and Don’ts of surfing in unsafe territories. If you haven’t, then do you must, read! This issue is the most important to review and read. If I might suggest, this one would be good to print out and keep… by the computer, when ever you desire a venture into ‘The Deep Web’, you go. Serve you well, these rules will, if far from the trodden path your ventures take you.
  • March 25th Personal Update and Video: “Welcome back My Dear Readers to The Other Shoe. Late last week I made a video in celebration of the publication of my 400th article and FOUR YEARS of writing and publishing here at The Other Shoe. I am really happy and very proud of these two accomplishments. Writing was a skill that I picked up late in life, and have run with since day one. This first four years, and first four hundred articles, is just a beginning for me.” Not even noticed, did I that I misspelled ‘Update’ in the title, till now. Oui! I have been quite busy… ‘nose to the grindstone’ even. Well, every once in awhile I like to make a video and show. I am still kicking and that a drug addict, I have not become. So, take a vidie, and enjoy!
  • Lost in Space #1 – March 26th, 2014: “Welcome back MY Dear Readers to The Other Shoe. Today, and with this article, I am launching a brand-new series of articles for The Other Shoe. As you can see from the title of this article the name of this all-new series is ‘Lost in Space’. Yes, I lifted the name from a TV series I very much enjoyed as a boy. However, every month I find more and more articles, about space, that just do not fit into ‘The Mars Report’. Therefore, from this day forward every article about space exploration, space flight, experimentations and space flight, the potential commercial colonization of Mars, and/or any other article I find about space will be found here every week in ‘Lost in Space’.” Very well received, this article was, by you, My Dear Readers. I just had so much more material, from space, that I was dying to share. Create an all new article series, just for you (and the material I had laying about). It went over well, and was not that hard to complete. Therefore, there is a good chance it will be back, in weeks to come. I just love looking at images from space. Time, I seem to make, in every week to see something new. I look forward to sharing even more, in the weeks and months to come. I look forward to seeing you, My Dear Readers, here too!
  • The Horror in Smithville – Part Three: “Yes, I do give a lot of thought to what I am going to write during the day. No, I do not set out dialogue or paragraphs. I see it as it happens, in my mind. Take tonight’s dinner, I saw this dinner several times over the past two weeks, in my mind. However, things happened when I wrote it that I did not see until I sat down today and put voice to program. This story is just growing out of me and I am very much enjoying this process.” I am most happy to say, that this story just keeps growing out of me. I sit down to write a story, and out it comes all fun and ready. This week I have yet to come to gore, nor blood. However, this week we did get quite a little scare! I must say, from what my dreams, and day-dreams, show… this coming week… will likely scare you half to death. Be ready!
  • Words of WARNING!: “Welcome back My Dear Readers to The Other Shoe. Today is Friday, as such this (according to my all ‘new’ writing schedule) is a ‘free’ day. Meaning I leave the day open so that I can write what strikes me, or more on a story that has dominated the week’s news. Quite honestly? The missing airliner… while my thoughts and prayers go out to all those lost… I fear it might be months before we have any kind of closure… maybe even next year with the building winter season and winter weather rapidly closing in on the search teams.” Fridays are an ‘Open Day’ here at my blog. That means that on Fridays I can write what ever takes my whim. Most of the time I write politics, of the continuation of a popular articles from the week. This week, I opened up and shared, with you. Grave concerns I have, about just how sfae any and all of our financial information, is. You see, visiting ‘The Deep Web’ I am hearing… things. Things that worry me so. Worry me with concerns of safety. Safety of our banking and credit and financial everything, I am concerned. You see… there are lots… and lots… and LOTS of people that would like nothing more… than to just burn it all down. Make everybody’s money… GO AWAY! This worries me greatly, indeed. Therefore, I have taken a day, and an article, to share these concerns, and more. Shared, I did, how to make sure you stay safe. How to protect, how to keep safe. Read, and be informed.

.

Well, My Dear Readers, that brings us to the end. The end of another week’s articles, and this wonderful review. Oh, you know that I will be back, soon. I never can seem to stay away. FYI NINE articles, I did write and publish, this week! Weee!

.

Tomorrow, a couple of shorts… of Alexander cleaning his hands! He does it in such a cute way. I hope that you drop by and take a look… see.

.

ENJOY!

.

 

The Other Shoe eBay Store

The Other Shoe eBay Store

 

.

The Other Shoe's Daniel Hanning

The Other Shoe’s Daniel Hanning 2/2014

Words of WARNING!

.

Forbidden Access _ The Deep Web

Forbidden Access – Cyber Terrorsits NOT Allowed!

.        

             .Welcome back My Dear Readers to The Other Shoe. Today is Friday, as such this (according to my all ‘new’ writing schedule) is a ‘free’ day. Meaning I leave the day open so that I can write what strikes me, or more on a story that has dominated the week’s news. Quite honestly? The missing airliner… while my thoughts and prayers go out to all those lost… I fear it might be months before we have any kind of closure… maybe even next year with the building winter season and winter weather rapidly closing in on the search teams.

.

The next two stories; the Ukrainian crisis, and the pseudo-conclusion to ‘Bridgegate’ have cannot build an entire article on either. The Ukrainian crisis has broken, in the favor of the European Union, America, Freedom, self-determination and the real Ukrainian people. Russian President blinked, today. He called President Obama, earlier this week, capitulating to Secretary Kerry’s overtures in the Netherlands. Honestly, winning a stacked) referendum that gave Russia the illusion of control over a province landlocked away from the Russian nation.

.

Russian, and President Putin, were desperate to keep the Ukraine in Russian control, and they ended up with the little tiny Crimea. President Putin won the battle, to loose the war. Not really anything to crow about, and he has now come to President Obama, hat in hand, asking for forgiveness and an end to the crippling sanctions. Bottom line? President Obama won the day, internationally, diplomatically, and for the future of democracy.

.

“Bridgegate’ got a million dollar ‘White-Wash’ a la Governor Christie’s wallet, mayhaps the people of New Jersey will ultimately pay that price. NO interviews are given, no testimony was given, nothing was really investigated and (from what I have read, and heard so far) this was more of a vehicle for personal attacks against two of his favorite people. Don’t be fooled, the real investigation is still underway by; The Legislature of New Jersey, the District Attorney’s Office(s) of the two areas, and a Federal Attorney General’s Office. Those are the investigations that will give us facts and testimony. I can wait… this is not going anywhere, and not going away any time soon.

.

Now, for the topic of this article… My words of warning for all of you, My Dear Readers. Today I saw an article about another company getting hacked and thousands of customer’s card numbers, and other sensitive information, was stolen.

.

The Spec’s warehouse-size superstore… Credit card, debit card and private check information for an estimated half-million or so customers was exposed at 34 of 155 wine and liquor stores owned by Spec’s, including 21 in the greater Houston area, over the past year and a half, the company said Friday.

“The exposure may include customers’ bank routing numbers, card security codes and other payment card and check information.”[1]

.

This data breech affected nearly a half-million customers of this company. The complete scope will be revealed over the coming months. However, this is small potatoes when compared with the major data breech of last year, TARGET. During the holiday shopping season Target was hacked at a historic level.

.

At up to 40 million customers, the breach ranks among the biggest in U.S. corporate history. In 2007, the data of more than 45 million customers was stolen from stores including T.J. Maxx and Marshalls.”[2]

.

Dwarfed by the ‘Crime of the Century’;

.

And in 2011, a hack exposed the credit card information of 100 million user accounts on the Sony PlayStation video game network.”[3]

.

The Target Debacle resulted in every single piece of plastic, in my wallet, being replaced by the end of last year. I didn’t even have to make any requests, as I am a frequent shopper at Target and had used most of all my debit and credit cards at my local Target stores. MY Dear Readers, this is not something on the wane. On the contrary, you can reasonably expect to see this happen more, and more often in the months and years to come.

.

If you are a frequent readers, here at The Other Shoe, then you know that I have started an educational series named ‘The Deep Web’. I started this article series for you, My Dear Readers. You see I understand that most of you have never spent a single moment outside the World Wide Web. Most believe that this part of the internet, is all there is. Far from the truth, as a matter of fact? The Deep Web (aka as ‘The Dark Web’ & “The Spice Road’) is several times larger than the WWW you are familiar. As I explain in my very first edition, the common internet is about 1.5 terabytes is size. Whereas, ‘The Dark Web’ is 7,500 Terabytes in size.

.

Made up of, mostly, ‘White Hats’ and ‘Dark Hats’ this other web is everything you can imagine, and more. I am a “White Hat’ meaning I generally use my computer knowledge for the benefit of others and only engage in writing code for personal use. Conversely, ‘Black Hats’ are all those that seek to use computer knowledge for personal gain, and/or the destruction of virtual realty and wealth. I started learning about computers; learning binary, ‘C’, and other machine and programming languages, in the early 80’s. Actually, I first used a networked computer in 1978 when I played a ‘Star Trek’ based game in a teletype machine via a cradle modem. My father collected teletype machines, starting in 1972. We had two by the time he left the family.

.

Even with my father gone, I continued to work with the teletype machines and taught myself how to connect to early network servers and primitive Bulletin Boards. I just loved all things electronic, and electrical. Computers were a marriage between what I already knew and all new technologies. I continued my studies when I was hired as a answering service operator, in Beverly Hills, that was undergoing a huge upgrade. Upgrading from old cord boards to an electronic switching system and an Hybrid Computer driver Automatic Call Distribution System (ACD). The owner did not know of my pervious electronic and communication experiences until they started the upgrade.

.

Very quickly opportunities presented themselves for me to display my knowledge and understanding. I had already moved up from operator to Morning Shift Supervisor, which gave me ample opportunity to shine. Soon I was going to Answering Service Conventions, Educational Classes at the Manufacture’s Corporate Offices (Star-Tel made the ACD and electronic/Digital switches), and ultimately classes at A.T.&T. offices here in Los Angeles studying Unix.

.

You see, I knew way back in 1983 that the whole future of communications and information was the digital realm. Skills in this area (also known as Kung Foo) would be invaluable in the years and decades to come. Now, I will be the first to admit that my Kung Foo is not so good… kind of dated. However, I have skills enough to warn and to inform. Today I am here to signal a warning to all of you, My Dear Readers.

.

First, I would suggest that you take a look at my series ‘The Deep Web’ right here at The Other Shoe. Now I am not advocating that everyone should surf The Deep Web. On the contrary, unless you have a strong background in information technology I would advise that you stay away from The Deep Web. Many ISP (Internet Service Providers) block access to this part of the web, and some will even discontinue your internet access without warning just for connecting.

.

Blocked access can be circumvented by using bridges (I will be explaining this process and how to use bridges next week in Part Three of ‘The Deep Web’). Although… to be brutally honest? I would suggest that everyone learns as much as you can about this internet, and ‘The Deep Web’. ‘Knowledge is power’[4] (Francis Bacon) is more truthful today, than anytime in history. Many companies that ‘protect your identity’ already check The Deep Web for signs of your; credit card numbers, banking information, social security number and other digital identifiers in order to head off data attacks and identity theft. Yes, My Dear Readers, was are already… there…

.

In preparing readers for engaging with, and surfing, The Deep Web I have outlined practices that are great habits to form, even if you have no intention of ever surfing The Deep Web. They are outlined in Part Two, but I will be reiterating them in upcoming editions of this series, too. Good computing habits are beneficial to everyone and in all situations. I started teaching ‘Good Computing Habits’ back in 1981 to my answering service staff. In our capacity as answering service personnel, we were privy to great deal of; personal information, private data transfers, and sensitive information. Tel-Us, that was/is the name of the service, also provided Telex services, along with answering service, paging, and text transmission of telephone messages. That one was my favorite, and the one service that I sold exclusively.

.

Even in 1983 I could transmit a paper copy of a telephone message to a text printer I installed in your home of office. That way, without anyone calling you on the phone, or disturbing the client, I could forward important or time sensitive messages to a client silently and discreetly. I know, given today’s technology and messaging abilities, it doesn’t sound like much. However, Henry Mancini thought it was a great product and I installed one of our message printers into his home office, personally. The walls of his office were lined with awards, and on the shelves were Oscars and other Academy Awards for his work in soundtracks and the like. Yeah, I really loved that job!

.

My Dear Readers, I want you to keep your eyes on the headlines. Keep watching and mark my words, you will be seeing more and more ‘data breeches’ in the news as the months and years pass. You see, there are huge populations of ‘Black Hat’ hackers in; Russia, China, North Korea and old USSR satellite nations that spend all day every day working to break; firewalls, encryption technologies, data encryption and hardware firewalls in servers. They are raised on this stuff, from a very early age.

.

I was unfortunate enough to, while working as property manager in Westwood, have my identity stolen. I worked with an FBI agent, out of the Westwood office, that worked solely in identity theft and information technology theft-virtual theft. Not only had my identity been stolen, so had a lot of information off of the office computer. Since the company computer had been hacked, corporate executives demanded that I gain all the information I could from this FBI agent.

.

He was the one that enlightened me that there were/are teenage hackers in Russia that spend all night and day doing nothing more than working to steal; credit card numbers, debit card information, banking information, and other sensitive financial information via; phishing, direct computer hacking, and server attacks. These young people are trained, from a very young age, in; computer languages, firewall protocols, encryption technology, and firewall protocols and technology. They are told that the only way they will get out of poverty is if they steal their way out.

.

I want you all to understand the immensity of the problem. How frequent these attacks have become, and how often they are successful. That this problem is only going to get worse, long before it gets better. You see, corporations are insured against these losses to a certain point. However, as a consumer? Your threshold of liability is much higher. Your exposure is far greater. Your losses could be financially crippling, and some could never really recover.

.

Your only defense is; better computer habits, better financial habits, and always be aware when on line. After the Target data breech I received new; debit card (with entirely new information; number, expiration date, security number), credit cards and I was warned in writing to not use my cards inside Target. In the letter it was suggested that I go to a branch bank, withdraw needed funds, and shop with cash at Target “until further notice”. Target was very neglectful in their data practices. They were warned prior to the event, and that is in articles on the web for you to verify.

.

Every single time you swipe your debit card or credit card you take a huge risk. There are even devices that can read credit card information off your card while it is in your wallet. In restaurants there are handheld devices that your server can use to swipe your credit cardand steal all the information that is stored on the magnetic strip. Now, I never let my card out of my sight, when out dining. I try to always shop with cash and only take money out of my account in person in my bank.

.

That is a bit much… for most people. However, I have very limited resources My Dear Readers, and any loss could result in homelessness. Yeah… I live that close to the edge.

.

Today was my ‘Free Day’ here at The Other Shoe. I could take this opportunity to write about anything I wanted. Today, this week, I choose to take the time to sound a warning. A warning to all of you, My Dear Readers, to develop and/or engage in better data practices. Be cautious, as I have explained my current practices with limiting debit/credit card use, make more of a habit of withdrawing money at your bank branch and shop more often with cash. When engaging in purchases and/or financial exchanges on the internet, ALWAYS MAKE SURE you are using a SECURE version of the web site. Look for ‘HTTPS’ up in the URL box at the top of your browser and it should say (in the lower bar) ‘Secure Server’. If you are unsure? CALL their support number and ASK!

.

At home, RUN WEEKLY MALWARE AND ROOTKIT SCANS! Don’t just scan for ‘viruses’ and consider yourself ‘protected’. Here is a very good FREE ‘Malware Scanning Software’ Malwarebuytes[5] (click on that word or use the link below in footnotes). UPDATE this software WEEKLY (at least, I do it EVERY DAY). Also, RUN ‘ROOTKIT’ SCANS WEEKLY (at least). Here are TWO very good – great FREE programs; Malwarebytes-Antirootkit[6], and SOPHOS[7]. Run these scans religiously every week at least, along with your normal weekly Antivirus scans. Once a month, use your Anti-Virus software and run a ‘COMPLETE COMPUTER SCAN’! If your computer has been used by; a friend, a neighbor, a child or grandchild NEVER USE IT for financial transactions or purchasing UNTIL YOU RUN ALL THREE SCANS! (Anti-Virus, Malware and ROOTKIT).

.

I am so sorry if I have scared any of you, My Dear Readers, but these ‘Good Computing Habits’ can protect you, and could (possibly) prevent major financial losses. Check out my series ‘The Deep Web’[8], too. In it I am sharing a lot of ‘Good Computer Habits’ and teaching how to be aware when on line. Developing these good computing habits will benefit you!

.

In closing, My Dear Readers, if EVER I can; be of assistance, provide information, help with a potentially infect computer, provide resources for scanners or removal or ANY data and information references, software suggestions? PLEASE DO NOT HESTITATE TO CONTACT ME! You can leave a message as a comment here at the blogs, you can ‘Friend’ me on Facebook and we can communicate there, or I have left my email several times on this blog. I WILL ALWAYS HELP anyway I can, and it will be my pleasure to help you STAY SAFE!

.

As always I am deeply honored that you come here and read my work.

.

Thank YOU!

.

P.S. My Dear Readers, I have written and presented this article because I CARE! I have GRAVE concerns over the increase of cyber-terrorism… and have this… suspicion that… soon… it will become… much worse. Please exercise caution and read this article as many times as needed… to gain a FULL understanding of this gorwing and dire problem. Take Care! 🙂

.

The Other Shoe eBay Store

The Other Shoe eBay Store

http://www.ebay.com/usr/enzomatrixlt

.

The Other Shoe's Daniel Hanning

The Other Shoe’s Daniel Hanning 2/2014

 

The Deep Web – Part Two

.

Forbidden Access _ The Deep Web

Forbidden Access _ The Deep Web

.

 

Welcome back My Dear Readers to The Other Shoe. Welcome back to my ongoing series about ‘The Deep Web’, Part Two. First, a little review of some of the material we have already covered.

.

What is Tor? – Tor is an anonymizing browser meant to take advantage of an anonymizing network. This is meant to protect you, the end user, from piracy and hackers by routing your connection to the ‘Deep Web’ through bridges and concealing your IP address.

.

Tor cannot sove all anonymity problems. It focuses on protecting the transport of data. Using the ‘Tor Browser Bundle’ while browsing the ‘Deep Web’ will work to withhold some information about your computer’s configuration. Information about your computer’s configuration is golden to hackers, as they use this information to find and exploit weaknesses in said configuration.

.

Unlike in the regular web, and your normal web browser. Tor works to build a network of encrypted connections. Building connections one hop at a time. This means that on one connection has any more information than the hop before, and after. Regular browsers just connected you directly to the web site like; Amazon, eBay or Netflix.

.

That is it for the review of our previous edition of ‘The Deep Web’. Now, I would like to move forward with an itemization of Do’s & Don’ts. These are rules of surfing that should be ever present when one is surfing ‘The Deep Web’. To disregard these rules of use, is to place your computer and all computers in your home or on your network in jeopardy. Hackers are very sophisticated, today. They only need one opening, one moment of distraction or forgetfulness to take advantage and damage your computer(s), and your life.

.

Access Forbidden Screen

Access Forbidden Screen

.

Rules to Follow on The Deep Web

  1. Always use a anonmyizing browser or browser bundle like Tor. Always make sure that you are using the most recent version of the browser and/or browser bundle.
  2. NEVER ‘torrent’ over the Tor browser/ These torrent applications ignore proxy settings and make a direct connections when they are told to use Tor. It will send your real IP address in the GET tracker request. Not only do you deanonmyzie your torrent traffic, you may also slow down the entire Tor network! BAD MOJO!
  3. NEVER enable or install browser plug-ins such as; Flash, Real Player, Quicktime and others. As they can be manipulated by hackers to reveal your Real IP Address. Tor does not recommend installing additional add-ons or plug-ins to the Tor browser.
  4. ALWAYS use HTTPS versions of web sites when surfing The Deep Web. In the normal web you susaly only use the HTTPS versions of; banking web sites, financial planning web sites, eBay, Amazon or other purchasing web sites. You must always check and make sure you are connecting via a S (HTTPS) or secure version. Tor pushes HTTPS everywhere you surf, though one must always check the type of web site and make double sure it is an HTTPS version.
  5. NEVER Open documents downloaded from The Deep Web while still connected to The Deep Web or regular internet. You shouldbe very vigilant to not download documents via Tor. ‘DOC’ and ‘PDF’ files can contain internt resources that will be accessed and/or used and downloaded OUTSIDE of Tor. This may reveal your Real IP addy and other computer confirguation specifics. If you must read a document downloaded from The Deep Web? It is strongly suggested that you do so using; a disconnected computer, using a Virtual Box[1], or using with a Virtual Machine[2]. Use a computer with the Wi-Fi turned off and the LAN cable removed. Asl well, do not reconnect LAN or turn on Wi-Fi without scanning with a Malware scanner, ROOTKIT scanner and rebooting your computer.
  6. USE bridges or find companies that provide bridges to The Deep Web . Tor tries to prevent attackers from learning what destination websites you connect to. To increase security and decrease risk you should configure your Tor browser to use a bridge-relay rather than connect directly to the Tor public network. You can find out more about bridge-relays[3] in the coming episode of ‘The Deep Web’ right here at The Other Shoe.
  7. Get a Gmail account to use for use for communication with Tor community and any communication out of furtherance with contacts with The Deep Web. Gmail uses HTTPS secure servers.
  8. USE Tor version 3.5.3 or greater only.
  9. ALWAYS use Bitcoin[4] ONLY for any and all transactions on The Deep Web. NEVER use your credit or debit card under any circumstances for transactions on The Deep Web.

.

That brings us to the end of the most fundamental Do’s & Don’ts for The Deep Web. I have one final, personal, suggestion. When working in/on The Deep Web? Pretend that you are dealing with pirates and thieves ALWAYS. Never let you guard slip, even for a single moment. You can survive engagements and transactions on The Deep Web millions of people do every dingle day. However, NEVER let your guard down, not even for one moment. It could make the difference between a profitable engagement, and costing you; your computer, your financial resources, your credit rating, and even your HOME.

.

Access is FORBIDDEN The Deep Web

Access is FORBIDDEN The Deep Web

.

Next week, right here at ‘The Deep Web – Part Three’ I will share information on; bridges, virtual boxes, virtual machines and how to create these shields between you and The Deep Web.

.

As always I am deeply honored that you come here and read my work.

.

Thank YOU!

.

The Other Shoe eBay Store

The Other Shoe eBay Store

http://www.ebay.com/usr/enzomatrixlt

.

The Other Shoe's Daniel Hanning

The Other Shoe’s Daniel Hanning 2/2014

 

[1] http://en.wikipedia.org/wiki/VirtualBox

 

[2] http://en.wikipedia.org/wiki/Virtual_machine

 

[3] https://bridges.torproject.org/

 

 

[4] https://bitcoin.org/en/

 

James Radcliffe

Meditations on Philosophy, Strategy, and Life

Otrazhenie

Reflection

Allen's World

Personal Blog of Allen Hanning

J T Weaver

When you got nothing, you got nothing to lose. — Dylan.

Invisible Mikey

philosophic topics and the arts

tigerboose

a videolog about tigers

Hiking Photography

Beautiful photos of hiking and other outdoor adventures.

Movie Dr

Independent movie reviews and more...

palisadespete

10 Facts to Get You Started

The Other Shoe

Home to; 'Lost in Space', 'The Mars Report', 'News From Around the World', 'A Week In Review', and 'Sunday Funnies'

Ruijssantos's Blog

Na na na na naaaaa

%d bloggers like this: