TJ's Blog

Search results for 'opinion' returned 6 results: Main Blog

Posted by TJ on Monday December 15, 2008 @ 10:45 AM
[Tags: opinion, thoughts, rant]

Among several holiday traditions I can't stand are those Salvation Santa Clauses that appear way to early in the holiday season outside the local supermarket, Walmart, city corner, or shopping mall. I find them equivalent to the homeless panhandler and find the bell irritating. My deep despise of these Santa has led to my boycott of their purpose and their change kettles. I ask that all my readers join me in my boycott and maybe we can eliminate this holiday tradition like the way of the fruit cake.

But WAIT before you call me a self centered prick read on...

I am not saying don't donate to the salvation army. Actually, I want to encourage you to donate to them. With the current state of the economy charities or having a particularly difficult time. So donate... please donate just don't give it to Santa use other means. Use their website to make a donation or call 1-800-SAL-ARMY to donate by phone. If you donate just $10 you probably make up for 20-30 people who add their spare change into the red kettle. If you and everyone donates $10 through the website instead of the red bin the Salvation Army Santa's will have no reason to stand in the cold ringing that annoying bell. You can finally exit your shopping mall without the guilt because you walked right passed Santa without even establishing eye contact. People you can gain your sanity back and you CAN make a difference, it's Christmas for god sakes.

Donate Now

Posted by TJ on Monday October 15, 2007 @ 04:36 PM
[Tags: politics, news, opinion]

Everyone is pointing fingures at the government, how they should have been able to prevent the attacks and had information beforehand that could of helped prevent the attacks on America.

On the other note what we learn in economics about the stock markets is you can not use currents news to base your decision on whether to buy or sells stocks becuase that news is already reflected in the price of stock.

If you look at a graph of the stock market 2-3 weeks before the September 11, 2001 you will see a gradial decline the market. Starting on August 24, 2001 and decreasing all the way through September 21, 2001. We all know why the stocks decreased after September 11, 2001 but made the stocks decrease before the attacks? Was a steep decline bound to happen anyway? Or, did investors have advance knowledge of these attacks?

Just something to think about next time the market is in a gradial decline.

Posted by TJ on Tuesday August 7, 2007 @ 11:25 AM
[Tags: news, opinion, internet]

The Wallstreet Journal is trying to get into the technology market...

...and they failed.

Below is an article from the Wallstreet Journal<(

Office Technology
Ten Things Your IT Department Won't Tell You
July 30, 2007; Page R1

Admit it: For many of us, our work computer is a home away from home.

It seems only fair, since our home computer is typically an office away from the office. So in between typing up reports and poring over spreadsheets, we use our office PCs to keep up with our lives. We do birthday shopping, check out funny clips on YouTube and catch up with friends by email or instant message.

And often it's just easier to accomplish certain tasks using consumer technology than using the sometimes clunky office technology our company gives us -- compare Gmail with a corporate email account.

Security expert Mark Lobel of PricewaterhouseCoopers describes the most common things employees do on the internet to jeopardize company security.
There's only one problem with what we're doing: Our employers sometimes don't like it. Partly, they want us to work while we're at work. And partly, they're afraid that what we're doing compromises the company's computer network -- putting the company at risk in a host of ways. So they've asked their information-technology departments to block us from bringing our home to work.

End of story? Not so fast. To find out whether it's possible to get around the IT departments, we asked Web experts for some advice. Specifically, we asked them to find the top 10 secrets our IT departments don't want us to know. How to surf to blocked sites without leaving any traces, for instance, or carry on instant-message chats without having to download software.

But, to keep everybody honest, we also turned to security pros to learn just what chances we take by doing an end run around the IT department.

For hacking advice, we asked Gina Trapani, editor of, an online guide to being more productive on the Web; Leon Ho, editor of, a blog with a similar mission; and Mark Frauenfelder, founder of the wide-ranging blog and editor of the do-it-yourself technology magazine Make.

To find out the risks, we talked to three experts who make a living helping IT departments make the rules and track down the rogue employees who break them. They are: John Pironti, chief information risk strategist at Amsterdam-based IT-consulting firm Getronics NV; Mark Lobel, a security expert in PricewaterhouseCoopers's advisory practice; and Craig Schmugar, a threat researcher at security-software maker McAfee Inc.

* * *

The Problem: Everybody needs to email big files from time to time, everything from big marketing presentations to vacation photos. But if you send anything larger than a few megabytes, chances are you'll get an email saying you've hit the company's limit.

Companies cap the amount of data employees can send and store in email for a very simple reason: They want to avoid filling up their servers, and thus slowing them down, says messaging-research firm Osterman Research Inc., of Black Diamond, Wash. And getting your company to increase your email limit can be a convoluted process.

The Trick: Use online services such as YouSendIt Inc., SendThisFile Inc. and Carson Systems Ltd.'s DropSend, which let you send large files -- sometimes up to a few gigabytes in size -- free of charge. To use the services, you typically have to register, supplying personal information such as name and email address. You can then enter the recipient's email address and a message to him or her, and the site will give you instructions for uploading the file. In most cases, the site will send the recipient a link that he or she can click to download the file.

Because these services send your files over the Web, they're outside of your company's control. That makes it easier for a wily hacker to intercept files during their travels.

How to Stay Safe: Some of the services are more reputable than others. YouSendIt, for instance, is a start-up run by a former Adobe Systems Inc. executive and funded by well-known venture-capital firms. Others offer little information on their sites about themselves and could be more susceptible to security holes that could let a hacker steal your information.

If the site's backers aren't immediately apparent, there are other clues that can help. Look for a "secure" icon -- in Internet Explorer, it's a little lock on the bottom of the screen -- which signifies that the site is using encryption to protect its visitors' confidential information. A logo from a security company such as VeriSign Inc., meanwhile, means VeriSign has confirmed the identity of the site's owner.

* * *

The Problem: Many companies require that employees get permission from the IT department to download software. But that can be problematic if you're trying to download software that your IT department has blacklisted.

The Trick: There are two easy ways around this: finding Web-based alternatives or bringing in the software on an outside device.

The first is easier. Say your company won't let you download the popular AOL Instant Messenger program, from Time Warner Inc.'s AOL unit. You can still instant-message with colleagues and friends using a Web-based version of the service called AIM Express ( There's also Google Inc.'s instant-messaging service, Google Talk, accessible at There are Web-based equivalents of software such as music players and videogames, too -- typically, skimpier versions with fewer features than the regular programs.

The other approach to this problem is more involved but gives you access to actual software programs on your computer. All three of our experts pointed to a company called Rare Ideas LLC (, which offers free versions of popular programs such as Firefox and OpenOffice. You can download the software onto a portable device like an iPod or a USB stick, through a service called Portable Apps ( Then hook the device up to your work computer, and you're ready to go. (But if your company blocks you from using external devices, you're out of luck.)

The Risk: Using Web-based services can be a strain on your company's resources. And bringing in software on outside devices can present a security problem. IT departments like to keep track of all the software used by employees, so that if a bug or other security problem arises, they can easily put fixes in place. That's not the case if you've brought the program in on your own.

Another thing to keep in mind: Some less reputable software programs, especially underground file-sharing programs, could come loaded with spyware and make it possible for your own files to leak onto the Web.

How to Stay Safe: If you bring in software on an outside device, says Mr. Lobel, make sure you at least tweak the security settings on your computer's antivirus software so that it scans the device for potential threats. That's easy to do, usually through an Options or Settings menu. Likewise, if you use a file-sharing service, set it up so that others can't access your own files, also through an Options or Settings area.

* * *

The Problem: Companies often block employees from visiting certain sites -- ranging from the really nefarious (porn) to probably bad (gambling) to mostly innocuous (Web-based email services).

The Trick: Even if your company won't let you visit those sites by typing their Web addresses into your browser, you can still sometimes sneak your way onto them. You travel to a third-party site, called a proxy, and type the Web address you want into a search box. Then the proxy site travels to the site you want and displays it for you -- so you can see the site without actually visiting it., for one, features a list of more than 4,000 proxies.

Another way to accomplish the same thing, from Mr. Frauenfelder and Ms. Trapani: Use Google's translation service, asking it to do an English-to-English translation. Just enter this --|en& -- replacing "" with the Web address of the site you want to visit. Google effectively acts as a proxy, calling up the site for you.

The Risk: If you use a proxy to, say, catch up on email or watch a YouTube video, the main risk is getting caught by your boss. But there are scarier security risks: Online bad guys sometimes buy Web addresses that are misspellings of popular sites, then use them to infect visitors' computers, warns Mr. Lobel. Companies often block those sites, too -- but you won't be protected from them if you use a proxy.

How to Stay Safe: Don't make a habit of using proxies for all your Web surfing. Use them only to visit specific sites that your company blocks for productivity-related reasons -- say, YouTube. And watch your spelling.

* * *

The Problem: If you use a company-owned laptop at home, chances are you use it for personal tasks: planning family vacations, shopping for beach books, organizing online photo albums and so on. Many companies reserve the right to monitor all that activity, because the laptops are technically their property. So what happens if your -- ahem -- friend accidentally surfs onto a porn site or does a Web search for some embarrassing ailment?

The Trick: The latest versions of the Internet Explorer and Firefox browsers both make it easy to clear your tracks. In IE7, click on Tools, then Delete Browsing History. From there, you can either delete all your history by clicking Delete All or choose one or a few kinds of data to delete. In Firefox, just hit Ctrl-Shift-Del -- or click Clear Private Data under the Tools menu.

The Risk: Even if you clear your tracks, you still face risks from roaming all over the Web. You could unintentionally install spyware on your computer from visiting a sketchy site or get your boss involved in legal problems for your behavior. If you're caught, it could mean (at best) embarrassment or (at worst) joblessness.

How to Stay Safe: Clear your private data as often as possible. Better yet, don't use your work computer to do anything you wouldn't want your boss to know about.

* * *

The Problem: You're catching up on work late at night or over the weekend -- but the documents you need to search through are stuck on your office PC.

The Trick: Google, Microsoft, Yahoo and IAC/InterActiveCorp's Ask unit have all released software that lets you quickly search your desktop documents. On top of that, some will let you search through documents saved on one computer from another one. How does it work? The search company keeps a copy of your documents on its own server. So it can scan those copies when you do a search remotely.

To use Google's software -- among the most popular -- follow these steps on both your work and home PC. First, you'll need to set up a Google account on both machines by visiting (Be sure to use the same account on both computers.) Then go to to download the search software. When it's up and running -- again, do this on both machines -- click on Desktop Preferences, then Google Account Features. From there, check the box next to Search Across Computers. After that point, any document you open on either machine will be copied to Google's servers -- and will be searchable from either machine.

The Risk: Corporate technology managers offer this nightmare scenario: You've saved top-secret financial information on your work PC. You set up desktop-search software so that you can access those files when working from home on your laptop. Then you lose your laptop. Uh-oh.

Getting hold of your company's internal documents could give others insight into your plans, and losing certain information could have legal repercussions. In particular, myriad state laws regulate how a company has to react when it loses private information about customers or employees; most require notifying those people about the breach in writing. Sending those notifications can be costly for your company -- not to mention damaging to its reputation.

On top of that threat, researchers have found vulnerabilities in Google's desktop-search software that could let a hacker trick a user into giving up access to files, says Mr. Schmugar of McAfee. (Those vulnerabilities have since been fixed, but more could crop up, he says.)

Matt Glotzbach, product management director for Google Enterprise, says there are bound to be vulnerabilities in any software and that, to the best of his knowledge, none of the Google Desktop vulnerabilities were exploited by hackers. He adds that when Google finds out about a vulnerability, it quickly fixes it and notifies users.

How to Stay Safe: If you have any files on your work PC that shouldn't be made public, ask your IT administrator to help you set up Google Desktop to avoid accidental leaks.

* * *

The Problem: Desktop search aside, most people who often work away from the office have come up with their own solution to getting access to work files. They save them on a disk or a portable device and then plug it into a home computer. Or they store the files on the company network, then access the network remotely. But portable devices can be cumbersome, and company-network connections can be slow and unreliable.

The Trick: Use an online-storage service from the likes of Inc., Streamload Inc. or AOL-owned Xdrive. ( also offers its service inside the social-networking site Facebook.) Most offer some free storage, from one to five gigabytes, and charge a few dollars a month for premium packages with extra space. Another guerrilla storage solution is to email files to your private, Web-based email account, such as Gmail or Hotmail.

The Risk: A bad guy could steal your password for one of these sites and quickly grab copies of your company's sensitive files.

How to Stay Safe: When you're thinking about storing a file online, ask yourself if it would be OK for that file to be splashed all over the Internet or sent to the CEO of your company's top rival. If so, go for it. If not, don't.

* * *

The Problem: Many companies now have the ability to track employees' emails, both on work email accounts and personal Web-based accounts, as well as IM conversations.

The Trick: When you send emails -- using either your work or personal email address -- you can encrypt them, so that only you and the recipient can read them. In Microsoft Outlook, click on Tools, then Options and choose the Security tab. There, you can enter a password -- and nobody can open a note from you without supplying it. (Of course, you'll have to tell people the code beforehand.)

For Web-based personal email, try this trick from Mr. Frauenfelder: When checking email, add an "s" to the end of the "http" in front of your email provider's Web address -- for instance, This throws you into a secure session, so that nobody can track your email. Not all Web services may support this, however.

To encrypt IM conversations, meanwhile, try the IM service Trillian from Cerulean Studios LLC, which lets you connect to AOL Instant Messenger, Yahoo Messenger and others -- and lets you encrypt your IM conversations so that they can't be read.

The Risk: The main reason companies monitor email is to catch employees who are leaking confidential information. By using these tricks, you may set off false alarms and make it harder for the IT crew to manage real threats.

How to Stay Safe: Use these tricks only occasionally, instead of as a default.

* * *

The Problem: Anyone without a BlackBerry knows the feeling: There's a lull in the conversation when you're out to dinner or an after-work beer, and everyone reaches for their pocket to grab their BlackBerry, leaving you alone to stir your drink.

The Trick: You, too, can stay up to date on work email, using any number of consumer-oriented hand-held devices. Just set up your work email so that all your emails get forwarded to your personal email account.

In Microsoft Outlook, you can do this by right-clicking on any email, choosing Create Rule, and asking that all your email be forwarded to another address. Then, set up your hand-held to receive your personal email, by following instructions from the service provider for your hand-held. (That's the company that sends you your bill.)

The Risk: Now, not only can hackers break into your personal account by going online on a computer, they can also break into it by exploiting security vulnerabilities on your mobile device.

How to Stay Safe: There's a kosher way to access work email on some devices, by getting passwords and other information from your IT department.

* * *

The Problem: If you do have a BlackBerry, you've probably got a different problem: You want to get your personal email just as easily as work email.

The Trick: Look at the Settings area of your personal email account, and make sure you've enabled POP -- Post Office Protocol -- a method used to retrieve email from elsewhere. Then log in to the Web site for your BlackBerry service provider. Click on the Profile button, look for the Email Accounts section and click on Other Email Accounts. Then click Add Account and enter the information for your Web-based email account. Now your personal emails will pop up on the same screen as your company email.

The Risk: Your company probably uses a whole bunch of security technology to keep viruses and spies out of your files. When you receive personal email on your BlackBerry, it's coming to you without passing through your company's firewall. That means viruses or spyware could sneak onto your BlackBerry via a personal email, says Mr. Schmugar of McAfee. Worse yet, he says, when you plug your BlackBerry into your work computer, there's a chance that the malicious software could jump onto your hard drive.

How to Stay Safe: Cross your fingers and hope that your personal email provider is doing a decent job weeding out viruses, spyware and other intruders. (Chances are, it is.)

* * *

The Problem: You're doing some vital Web surfing and your boss turns the corner. What do you do?

The Trick: Hit Alt-Tab to quickly minimize one window (say, the one where you're browsing and maximize another (like that presentation that's due today).

The Risk: The good news is that there are no known security risks.

How to Stay Safe: Get back to work.
    There are several problems with this article
  • Wallstreet Journal is for wallstreet not h4ck3rs 4 dummies.
  • The wallstreet articles should be professional and not a guide how to circumvent your companies internal security measures.
  • It is not good advice to put confindential files up on a website for download.
  • A person who wants to keep their job should not upload their companies files to a third party website for searching while they are at home with out permission by their employers.
  • Some of these "hints" could lead to violations of the Sarbanes Oxley act. Sections 302(a)(4) and 404 require a public company to make disclosures and certifications to the Securities and Exchange Commission regarding the company's system of internal controls.

I think WSJ should stick with Wallstreet.

Posted by TJ on Wednesday July 18, 2007 @ 02:49 PM
[Tags: tv, opinion, guide]

Here is my take on the various Late Night Talk Shows.
I dedicate this to the late Tom Snyder who died on July 29, 2007 from complication with leukemia. Snyder was one of early pioneers of late night talk shows with "Tomorrow" in the 80's and 90's and was host of the CBS's The Late Late Show in 1990's.

CBS - The Late Show with Dave Letterman
I find Letterman extremely funny. Being from NY definitely makes his show even better to watch as he frequently does local stuff involving the city and surrounding area. Dave has a way of making ordinary people into comic geniuses as he has done with stage manager Biff Henderson, Handyman George Clark and Deli owner Rupert Jee, these sketches are what make the late show original and funny. What I do not like about the show is the numerous pointless unfunny skits that are done from time to time like "will it float?" , stump the band, and "Is this Anything", and most of Alan Kaulter's skits. Dave's show is well known for the Stupid Human Tricks and the Top Ten list.

NBC - The Tonight Show with Jay Leno
This is most watched late show and has surpassed the late show every year since the 90's. I am not sure why as I don't really find Jay funny. He gets old ripping on the band leader Kevin Eubanks. I find that the writers for the show aren't that good as his jokes often get no laughs and Leno is not that great with covering it up. His most popular feature is headlines on Monday and this a rip off of David Letterman's skit "Dumb Ads" that Dave introduced in the 80's. Yes that is right, Leno is actually ripping off Dave, not as you may have thought as Letterman re-introduced this skit under the name "Small Town News" in 2004 to compete with Leno's segment.

CBS - The Late Late Show with Craig Ferguson Craig's Gig is "Let's repeat the same sayings every episode that make people laugh" This is how a normal episode of CBS late late show goes. 1. Craig Ferguson enters saying to the audience "Enjoy the show, sit down , lay down...take off your pants." 2. Craig opens email bag tell audience to email him at "" 3. Craig Calls voice mail and pertains to dial 10,000 numbers just to get to his voice mail as if this demands laughter every single time. I do not know how people can watch his show every day with out getting annoyed at the amount of the stuff he repeats each day. I get tired of it after watching twice in a week. This show would be funny if it didn't have the repetitive crap.

NBC - Late Night with Conan O'Brien When I heard that O'brian was replacing Leno on the Late show in 10 years (less now) I was not that excited. Conan to me was the combination of "Let's act stupid and people will laugh" and "Lets make of fun of myself so people laugh". However Conan has some great monologue's and skits and they never get old.

Last Call with Carson Daly, NBC There is nothing much to say about this show. When I watch him he always look as if he doesn't even know why he's there, and with good reason. The show does not have much content and Carson is just so bleh. The only good thing about this show is it pulls in some good music talent.

The Daily Show with Jon Stewart, Comedy Central I think Jon Stewart is great and I'm not sure why but I do not watch his show much. I think a lot has to do with the fact his show is on Comedy central and not a major network. His show is more geared toward turning current news into humor and does a great job at it! I feel Stewart would make a great replacement for Letterman.

Posted by TJ on Monday June 4, 2007 @ 04:40 PM
[Tags: rant, personal, opinion]

What? .. Let me explain...

First before you spend(ask for) a favor you have to make sure you enough in the bank. Ask yourself have I done something for this person that would make them want to help?

Bank your favors Always invest your favors so when you'll need a favor you can withdraw.

Make sure your investing in the right favor funds
Ask yourself: Has the fund helped me when in need? Am I just putting all my favors in and not getting any favors in return? You want to make sure you your getting a good return on investment.

Limit your loans Nobody likes debt. If you have a a favor loan make sure to repay quickly. Interest does accrue and is unfortunately not a viable tax deduction.

Posted by TJ on Tuesday May 8, 2007 @ 10:27 PM
[Tags: tv, opinion, politics]

John Stewart of the Daily Show is the smartest journalist on TV and here is the video to prove it.

Everything he says is absolutely true.