Disassembling a Lionel 1001, 1060, 8902 or 8302 locomotive isn’t too difficult. The biggest problem is knowing where the three screws are that you have to remove.
These particular locomotives weren’t really designed to be repaired, but there’s some basic work you can do on them with household tools. The 8902 and 8302 locomotives can be cheap sources of a motor for other projects.
Continue reading How to disassemble a Lionel 1001, 1060 or 8902 locomotive
A former coworker contacted me last week. He’d been employed in the same place for the last 16 or 17 years and he couldn’t remember how to look for a job. Who better to ask than a guy who’s changed jobs 9 times in the same timeframe? One obvious question to ask regards job hunting on your own vs. using a recruiter.
In fairness to myself, government contracting causes a lot of job-hopping. And in fairness to him, the game’s changed a lot since the last time he had to play. IT Recruiters existed back then, but back then when you wanted a new job, you found it yourself.
I still use both methods.
Continue reading Job hunting on your own vs. using a recruiter
One of the most frequent questions I see or receive directly about Marx trains is what a Marx train is worth, or the value of a Marx train. Of course without seeing the train, it’s nearly impossible to give a good estimate, but there are some general rules that you can follow, either to protect yourself as a buyer, or to keep your expectations realistic as a seller.
Continue reading Estimating the value of a Marx train
The other day I heard a reference to the “high side vs low side” of a computer system in a podcast, and the speaker didn’t stop to clarify. Worse yet is when you hear “on the low side” or “on the high side.” I came from the private sector into government contracting myself. I wasn’t born knowing this jargon either, so I’ll explain it.
Continue reading High side vs low side
The other question that came out of my recommended DD-WRT settings was why not filter MAC addresses. I hate to be flip, but MAC address filtering doesn’t help, so why bother?
The reason is because your MAC addresses are broadcast as part of the network traffic, and it’s unencrypted. So your MAC addresses aren’t any secret at all. So it doesn’t do any good. One could argue it doesn’t do any harm. But it adds an extra step every time you put something on your wireless network. Why go to the inconvenience if you don’t gain anything from it?
Continue reading Why MAC address filtering doesn’t help security
I scored a Weller 8200 soldering gun at an estate sale one street over from me for a few dollars. They didn’t know what they had. I got it home and it didn’t work–it wouldn’t heat up–so maybe they knew exactly what they had. Lucky for me, it’s easy to learn how to repair a Weller soldering gun yourself.
It turns out the most common problem with these guns is very easy to fix and doesn’t cost anything. But if you’re like me and got a gun alone, without the case or instructions or the tool they give you, you’d never know.
Continue reading Repair a Weller soldering gun
One of the best things you can do to improve your security in a corporate environment is to limit the use of Java, or whitelist Java. Undoubtedly there will be one or more legacy web applications your company uses that require Java, and it’s almost inevitable that at least two of them will be certified for one and only one version of the JRE, and it won’t be the same one.
Believe it or not there’s a solution to the problem of conflicting JREs, but it took me years to find it, because I had no idea that Oracle called it “Deployment Rule Set.” The secret’s out now. If you run Java, and you want security, you need Deployment Rule Set.
Continue reading Whitelist Java to provide better security and a better user experience
Cheap laptops are nothing new this time of year–they’ve been practically a holiday tradition since 2002 when Sotec released a decent laptop for $900, which was jaw-droppingly low for the time–but this year, Best Buy is selling a Lenovo Ideapad 100s for $149.99, which, while not jaw-droppingly low given the number of $199 laptops that were available last year, is still the cheapest name-brand laptop I’ve seen. Note: Best Buy has since raised the price to $199, but Ebay has limited stock of the same item for $129.
I’ve seen some reviews, but there is one thing I haven’t seen anyone bring up yet: This is a netbook in every way, except I think we’re supposed to call them cloudbooks now. So keep that in mind. The machine is probably worth $149.99, but it made some compromises to reach that price point.
Continue reading Lenovo and Best Buy team up for a $149 laptop this year
This past summer I toured a large company’s “innovation center,” where they try new, risky things. “We don’t involve the legal or IT security departments in this stuff,” the tour guide said.
I wish I was surprised. And while I’m sure the tour guide thinks he isn’t missing much, it could be a missed opportunity.
Continue reading Involving security in your top-secret projects
I got a point-blank question in the comments earlier this week: Did Hillary Clinton’s home-made mail server put national secrets at risk of being hacked by our enemies?
Depending on the enemies, maybe marginally. But not enough that any security professional that I know of is worried about it. Here’s why.
Continue reading Hillary, hackers, threats, and national security