Error message

  • Deprecated function: Array and string offset access syntax with curly braces is deprecated in include_once() (line 20 of /home/drbiz/public/2013.realism.com/includes/file.phar.inc).
  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home/drbiz/public/2013.realism.com/includes/common.inc).

Leonard Daly's blog

Net Neutrality

Net Neutrality is showing up as one of the top stories shortly after the 2014 elections. It is not an easy topic to understand, especially with all of the claims and counter-claims flying around the Internet. Many of the statements are made by people who have no idea what is involved but are taking their position purely for political or personal financial reasosns. This post is an attempt to explain in relatively simple terms what is involved in Net Neutrality by using familiar analogies.

3D Google Cardboard

In a previous post I showed how a scene could be displayed in a browser and viewed stereoscopicly with Google Cardboard. This post describes a more efficient means of creating the display. In both cases, the browser screen is split in half with slightly different viewpoints so the eyes/brain combination views the result with depth.

Weak Passwords At Fault for "Morto A"

This is a short follow-on to the Passwords and Hacking series.

The Internet worm "Morto A" continues to infect computers. It uses Microsoft's Remote Desktop to spread. It attempts to gain access to your computer using Remote Desktop's protocol. It will succeed if your password is one of 37 simple passwords listed below.

Solution: Don't use a simple password. See Passwords and Hacking for various means to create complex passwords.

Internet Explorer has Major Bug

Microsoft has confirmed that Internet Explorer (all versions) has a bug that allows the browser to run software as you on your computer. Making it happen is rather technical, but it can happen when you go to a "specially crafted"1 web site that downloads the code into the browser than causes the browser to execute the code as if it were part of the browser's regular code. The attacks "in the wild"2 use Flash on IE V9, 10, and 11.

Cloud Computing Opportunities

Various connections to the Internet cloud.Cloud computing offers small and medium businesses (SMB) many opportunities to reduce computing costs and improve their internal computing operations. The attached file contains the slides from a presentation I made to a group of SMB executives. The discussion below is my slide-by-slide notes.

Pages