Supermoon

Now here’s a sight to see tomorrow night (depending on the cloud cover) -monday 14th november  a Supermoon so called due the elliptical orbit bringing the moon to the closest point to the planet since 1948, you will not get another one till  the mid 2030’s . The moon is expected to appear 30% bigger so it might be worth taking a snap depends on the weather of course.

So take a look tomorrow night, the following nights might also be worth a look . Check it out….moon_history_com

U.S.A 2016 Presidential election

usa_2016The day is finally here and its the 8th November- election day in the U.S.Don’t exactly know what way it will go but Mrs Clinton is the favourite of the establishment. Mr Trump is looked on as somewhat of a outsider. Hopefully the americans will put an end to it and have the results sometime on Tuesday night. There is apparently more than two candidates, who we never heard of so here is Jill stein of the Green party.

 

Mobile Phone top-ups

Just noticed last week my mobile was out of credit, after hardly any usage.  I recently got the phone as a present yes the fabled “Santa” at my age !!! (only joking) Didn’t use it much just to be contactable but it now seems I will have to top the mobile up monthly regardless of usage. Was using the landline but will have to reverse to the mobile now. Anyone else have the same situation ?

prepay_plans

Who’s reading your email – Electronic eavesdropping

repost of who’s reading your email September 29th 2008

Or how the state listens in on your computer.

This is a topic of an interest of mine and I have wanted to put up a post on it for some time. Not many people realise that the State can “tap” your computer and record all your going’s on. A brief explanation of how the Internet works and why it is a unsecure medium is required.

As you can gather, the Internet is a series of interconnected networks (this is done by using standard communication protocols). The Internet works by breaking down files into packets which contain both the sender and recipients Internet Protocol (I.P) addresses. These packets are then moved around by specialised computers called Routers which determine the most appropriate route. Your data passes through a number of third party routers, all of which have the potenial to read your data. A computer which is set up to intercept data is know as a packet sniffer. These can be programmed to intercept traffic from certain users etc..

A Packet sniffer located at your ISP would be able to monitor all of your online activities such as

  • What websites you visit.
  • What you look at.
  • Where you send email and what is in the email.
  • What you download.
  • Who visits your site.
  • Other forms of internet communications such as instant messaging, internet phone calls etc..

The most famous Packet Sniffer is one developed by the F.B.I called Carnivore and the later version called Omnivore. This system is configured with the suspect’s IP address, it intercepts and copies all data coming from and to the suspect’s computer.

Interesting sources of information are

more to follow…