tag:blogger.com,1999:blog-36574175506825642872024-03-14T01:42:23.542-04:00Kettlebells, politics, computers, and other ramblesA blog for exercise, politics, computers, and other rambles from my point of view.Chris Jhttp://www.blogger.com/profile/12969869698106366643noreply@blogger.comBlogger453125tag:blogger.com,1999:blog-3657417550682564287.post-1552776644557830402020-06-14T20:47:00.001-04:002020-06-14T20:47:26.341-04:00I'm back with a workout update.Been a while. Way too long.<br />
<br />
I'm going through the hundred push-up challenge again. But because I'm trying to lose weight and fat, I'm using the same numbers for all big 4 movements. Push, Pull, Squat, Hip Hinge. In the past, I was in good enough shape that I could do use column 3, starting week 3 for the first week. More than 25 pushups weren't a problem.<br />
<br />
But it's been a while since I worked out consistently and steadily. Last few months, during quarantine, I'd work out a little and then do something else, no real plan. I don't know why I grabbed the Hundred Pushup challenge again.<br />
<br />
This time around, I hit enough to do week 1 in column 3, but at the start of this week's round, I was feeling a little worn out. May have been the less than 4 hours of sleep that day. I was also worried about volume after not working out in so long. So I started in column 2.<br />
<br />
Week 1, Day 1:<br />
<br />
<table style="width: 100%;">
<tbody>
<tr>
<th>Push-up</th>
<th>Squat</th>
<th>Inverted Row on TRX</th>
<th>Two-hand 24kg Kettlebell swing</th>
</tr>
<tr>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
</tr>
<tr>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
</tr>
<tr>
<td>4</td>
<td>4</td>
<td>4</td>
<td>4</td>
</tr>
<tr>
<td>4</td>
<td>4</td>
<td>4</td>
<td>4</td>
</tr>
<tr>
<td>7</td>
<td>10</td>
<td>8</td>
<td>10</td>
</tr>
</tbody></table>
Totals: 27, 30, 28, 30<br />
Problems: squat round 4, timer problem, extra rest. I-row feet round 2 slid across the floor, changing the angle to harder. Swing round 1, left hand slipped off kettlebell.<br />
<br />
Week 1, Day 2:<br />
<table style="width: 100%;">
<tbody>
<tr>
<th>Push-up</th>
<th>Squat</th>
<th>I-Row on TRX</th>
<th>Two-hand 24kg KB swing</th>
</tr>
<tr>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
</tr>
<tr>
<td>8</td>
<td>8</td>
<td>8</td>
<td>8</td>
</tr>
<tr>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
</tr>
<tr>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
</tr>
<tr>
<td>8</td>
<td>14</td>
<td>9</td>
<td>20</td>
</tr>
</tbody></table>
Totals: 34, 40, 35, 46<br />
<br />
Week 1, Day 3:<br />
<table style="width: 100%;">
<tbody>
<tr>
<th>Push-up</th>
<th>Squat</th>
<th>I-Row on TRX</th>
<th>Two-hand 24kg KB swing</th>
</tr>
<tr>
<td>8</td>
<td>8</td>
<td>8</td>
<td>8</td>
</tr>
<tr>
<td>10</td>
<td>10</td>
<td>10</td>
<td>10</td>
</tr>
<tr>
<td>7</td>
<td>7</td>
<td>7</td>
<td>7</td>
</tr>
<tr>
<td>7</td>
<td>7</td>
<td>7</td>
<td>7</td>
</tr>
<tr>
<td>11</td>
<td>12</td>
<td>10</td>
<td>20</td>
</tr>
</tbody></table>
Totals: 43, 44, 42, 52<br />
<br />
Now to rest until Tuesday and start week 2. <div class="blogger-post-footer"><hr /> <a href="http://chrisrattis.blogspot.com/">Kettlebells, politics, computers, and other rambles</a></div>Chris Jhttp://www.blogger.com/profile/12969869698106366643noreply@blogger.com0tag:blogger.com,1999:blog-3657417550682564287.post-60589702346812864032014-12-16T15:01:00.000-05:002014-12-16T15:01:17.889-05:00Last Night's workout and other thoughtsSo here I am again, back to where I was in 2006. Just before Christmas and weighing 265lbs. Unlike the last time which was a slow road from 170 in 2003 to 265 in 2006, this one was shorter. Probably because 245 is the lightest I've been i the last couple of years.<br />
<br />
I've ran 2 Tough Mudders. 1 in 2012, and one in 2013. I didn't run any this year. I haven't done much training in anything other than my mind in the last 2 years. Thanks to taking 9+ credits at term, and working full time. In fact I've gone to school year round (at least 1 class every term) for the last 2 years. I have my Bachelor of Science now, well... maybe / kind of. Graduation is Thursday, commencement Saturday, Final Grades next Tuesday. No idea when the actual paper will arrive.<br />
<br />
But the not training has taken it's toll. I've tried. I had a small gym set up in my garage, but lost it due to the basement flooding. I have no where else to put my power tower, or my heavy bag right now.<br />
<br />
Last night was the first workout I've done in a while.<br />
<br />
3 sets of 5:<br />
5 push ups<br />
1 arm rows, R/L @16kg kettlebell<br />
goblet squats @16kg. kettlebell<br />
<br />
10 2hand kettlebell swigns @ 16kg. The floor didn't like that.<br />
10 R/L slow front kicks, toes above eye level. again, floor didn't like that.<br />
<br />
I might grab some mats or something on the way home tonight.<br />
<br />
Tonight's plan:<br />
couch to 5k (even though used to be able to run 5k)<br />
5-4-3-2-1 per side Turkish Get-ups (if I can find a stable spot in the house with a high enough ceiling).<br />
<br /><div class="blogger-post-footer"><hr /> <a href="http://chrisrattis.blogspot.com/">Kettlebells, politics, computers, and other rambles</a></div>Chris Jhttp://www.blogger.com/profile/12969869698106366643noreply@blogger.com0tag:blogger.com,1999:blog-3657417550682564287.post-60909824695659842392014-12-16T14:41:00.002-05:002014-12-16T14:42:08.458-05:00ChangesIf you're looking for my Computer / Information Security / Physcial Security stuff, you can go to www.rattis.net. That's where I'm writing that stuff at. Not that I've been writing as much as I'd like.<br />
<br />
This site is going to be more more a workout and food journal.<div class="blogger-post-footer"><hr /> <a href="http://chrisrattis.blogspot.com/">Kettlebells, politics, computers, and other rambles</a></div>Chris Jhttp://www.blogger.com/profile/12969869698106366643noreply@blogger.com0tag:blogger.com,1999:blog-3657417550682564287.post-30750380564664075682013-10-01T22:08:00.003-04:002013-10-01T22:08:38.818-04:00Driver ProblemSo after the last post, an going out to dinner, I started reading up on the Yahoo Group for the BaoFeng UV-5R series, they point to a site I found last night and read through.<br />
<br />
Turns out that with the chip in the USB to serial cable (chip built in to USB Plug), you have to use the right driver. I had the newer driver 3.4 something, and it would transmit at random. I down graded to the 3.2.0.0 driver, and I haven't had it try to transmit yet.<br />
<br />
So if you're having problems with random transmitting when you're trying to program your BaoFeng UV-5R or other, check your driver make sure you're using the right one.<div class="blogger-post-footer"><hr /> <a href="http://chrisrattis.blogspot.com/">Kettlebells, politics, computers, and other rambles</a></div>Chris Jhttp://www.blogger.com/profile/12969869698106366643noreply@blogger.com0tag:blogger.com,1999:blog-3657417550682564287.post-32399889973144359442013-10-01T20:33:00.001-04:002013-10-01T20:33:34.500-04:00When they said RF burns hurt they meant it.So I recently got my Amateur Radio License, in the class they before the exam, they said RF burns really hurt. I can say they do.<br />
<br />
Here's the details:<br />
<br />
I have a Technician Class License. KD8VPJ.<br />
<br />
I bought a BaoFeng UV-5R+. I'm using Chirp to program it.<br />
<br />
When I have the HT plugged in to the computer, at random the transmit light starts. No idea why it's doing that. So I pulled the antenna off, and happened to pick the device up while the screen was Orange (transmit). I hit the spot where the antenna connects, while orange. Got a nice little RF burn on my middle finger. Man that hurts.<div class="blogger-post-footer"><hr /> <a href="http://chrisrattis.blogspot.com/">Kettlebells, politics, computers, and other rambles</a></div>Chris Jhttp://www.blogger.com/profile/12969869698106366643noreply@blogger.com0tag:blogger.com,1999:blog-3657417550682564287.post-36625575195697242462013-09-20T01:04:00.001-04:002013-09-20T01:09:59.509-04:00Apple Account part 2So quick recap. I got an email saying a new iphone 5 has logged in to my imessage account. Problem is, I don't own an iphone, I don't know what imessage is, and the email in the salutation isn't mine. The account has someone else's name and contact information, someone from Finland, but MY EMAIL ADDRESS as the verified account.<br />
<br />
I've gone through the find my apple id, and all the info is right when I log in that way, using MY EMAIL ADDRESS for the recovery. When I log in with the apple id it emailed me, I get my stuff in English. When I use my email address as the apple id, nothing is right.<br />
<br />
So after I got home, I did some more digging. I found out how to at least "disable" the account even though I couldn't permanently delete it.<br />
<br />
Going through itunes, yes I had to install it, I could see that person's information. Not all of it, but some of it. Name, address etc. Same stuff I could see via the apple site.<br />
<br />
More checking between the two accounts, I note that my email apple ID is verified, my other one is not. But both accounts have the same email address. Ok, I'll verify it on the account where everything is in English. Only the site won't let me. It's already been verified elsewhere and in use.<br />
<br />
WTF...<br />
<br />
The best I can figure out, Apple is using email addresses as their primary keys for the accounts now. Something they were not doing when I first signed up in 2005. Since I first signed up they are verifying accounts as well. Once verified that becomes another account key, secondary, or primary in a second table. The problem is, someone not me was able to get my address listed as their verified address and their account.<br />
<br />
I ended up un-associated MY ADDRESS With the account, and sent it off in to never land. I hope they have good luck getting their information and account back. I've verified my email address, and have now set it as my account name, with a 30 character password. I'd turn on two factor auth, but I don't own an apple device and that's required.<br />
<br />
So the short version of the story. Someone got their Apple account associated with my email address. Claimed my address as their own and got it verified somehow. I got a notification when they used a new phone to log in to the account. Took control of the account, because they had used my email address, de-associated the account with my email address, and then made sure that my account was verified with my email address.<div class="blogger-post-footer"><hr /> <a href="http://chrisrattis.blogspot.com/">Kettlebells, politics, computers, and other rambles</a></div>Chris Jhttp://www.blogger.com/profile/12969869698106366643noreply@blogger.com0tag:blogger.com,1999:blog-3657417550682564287.post-71542907530991188482013-09-20T00:50:00.000-04:002013-09-20T01:09:38.982-04:00Apple Account part 1<span style="font-family: inherit;">So today, I got a strange email. I chalked it up to a phishing attempt at first, but it actually turned out to be something way more interesting.</span><br />
<span style="font-family: inherit;"><br /></span>
The way it started:<br />
<blockquote class="tr_bq">
<span style="font-family: inherit;">Dear Paula,</span><span style="font-family: inherit;"><span style="background-color: white; line-height: 20px;">Your Apple ID (</span><span style="background-color: white; line-height: 20px;"><span style="color: black;">m</span>y email address</span><span style="background-color: white; line-height: 20px;">) was used to sign in to iMessage on an iPhone 5 named “iPhone (Paula)”</span></span><span style="font-family: inherit;"><span style="background-color: white; line-height: 20px;">If you have not recently set up an iPhone with your Apple ID, then you should change your Apple ID password. </span><span style="color: black;">Learn more</span><span style="background-color: white; line-height: 20px;">.</span></span><span style="background-color: white; font-family: inherit; line-height: 20px;">Apple Support</span></blockquote>
Well that's odd, my name isn't Puala, and while I own an IPod Color from 2005, I don't use apple products. In fact I have no idea where that IPod is.<br />
<br />
Wait a tick, didn't I get an email a few months ago asking to to verify my apple id? The other email I thought was a phishing spam... (it's been more than 30 days and I deleted it when it came in).<br />
<br />
Well no way this is right. I know, I'll prove it's spam. I'm not going to click shit. I'm going to go to apple.com and try to log in.<br />
<br />
So I go there, try logging in with my email address, and told invalid password. WTF, okay lets try reset password. And Lo I get an email with the steps to reset my password, and I follow suit.<br />
<br />
Go to the account page, some one in Finland, with a UK phone number. WTF. Well this can't be right. Someone set up an account, with a verified email address of MY EMAIL ADDRESS, but that's not me. So thinking someone popped my un-used account.<br />
<br />
After not being able to get past the Finish security questions, I decide to call Apple Support. I open a case, and talk to a guy. He tried to help, but in the end, without my IPod or some other way to prove my account (the credit card number wasn't mine either). There was little he could do for me. I will say this for Apple, they do try to take your account security seriously, even if they won't let you delete your account.<br />
<br />
The Apple Guy did think of one thing he could do. He walked me through the find my apple id part of the stie. It asked for my name, email address, other possible email address, home address, etc. The next page my DOB (month and day) and then the next page that asked for my security question. A question I wasn't expecting, but knew it was mine. One that only I would know the answer to. And then I was able to change my password.<br />
<br />
Then I get an email. Saying my id, yet another one, has had it's password changed. Talk about more confusion. But it was time to leave for ISSA, and I was on my marry way, knowing that both accounts had 30 character random passwords.<br />
<br />
to be contenuied<br />
<br /><div class="blogger-post-footer"><hr /> <a href="http://chrisrattis.blogspot.com/">Kettlebells, politics, computers, and other rambles</a></div>Chris Jhttp://www.blogger.com/profile/12969869698106366643noreply@blogger.com0tag:blogger.com,1999:blog-3657417550682564287.post-83195913785873750082013-03-01T09:00:00.001-05:002013-09-20T01:10:53.611-04:00Locksport F.U.D.<br />
Below is an email I sent to a "journalist" named Chip Johnson and the editor of his paper, about the recent hatchet job he posted in SFGate about locksport.<br />
<br />
I quote the words Journalist, because Mr. Johnson, in my opinion did not stand up to the journalistic qualities I learned while writing for a college news paper. I actually think that this article wouldn't even have been accepted by said college news paper. The article Mr. Johnson wrote was filled with senstionalist quotes, and a lack of understanding that is the core of Locksport and the value it brings.<br />
<br />
Read the article here: http://www.sfgate.com/bayarea/article/Quan-s-wrong-note-on-lock-picking-class-4318130.php<br />
<br />
--- begin email ---<br />
<br />
From: <span class="Apple-tab-span" style="white-space: pre;"> </span>Chris J <chrisj redacted=""></chrisj><br />
To: <span class="Apple-tab-span" style="white-space: pre;"> </span>chjohnson@sfchronicle.com<br />
Cc: <span class="Apple-tab-span" style="white-space: pre;"> </span>wbushee@sfchronicle.com, deviant.ollam@toool.us<br />
Subject: <span class="Apple-tab-span" style="white-space: pre;"> </span>recent lock picking article<br />
Date: <span class="Apple-tab-span" style="white-space: pre;"> </span>Thu, 28 Feb 2013 23:32:33 -0500<br />
<br />
<br />
Dear Mr. Johnson,<br />
<br />
I recently read your article on SFGate Chronical's site about Quan's<br />
news letter containing lock picking. I found the article poorly<br />
researched, and borderline libelous.<br />
http://www.sfgate.com/bayarea/article/Quan-s-wrong-note-on-lock-picking-class-4318130.php<br />
<br />
I teach lock picking, along with other forms of physical security. While<br />
I run a lock sport group, I am not speaking for any organization.<br />
<br />
The poorly researched aspect:<br />
<br />
The lock on the door to your home, is based on a design that dates back<br />
to the ancient Egyptians. The current style of lock most people are<br />
familiar with, is the Yale style lock. It's design dates back to the the<br />
1800s. Created in the 1840s by Linus Yale Senior, and patented in 1861<br />
by his son Linus Yale Junior.<br />
http://www.yalelock.com/en/yale/com/About-Yale/History-of-Yale/<br />
<br />
If you were to look deeper, you'll see that most of the features that<br />
have improved locks in the last several years are because of groups like<br />
TOOOL, Locksport International, The Fraternal Order Of Lockpickers, and<br />
others. By showing people how weak the security really is, consumers<br />
have started to demand better quality products.<br />
<br />
Did you know you can either bounce most safes, or hit them with a hammer<br />
and open them? These include gun safes. The groups you link to criminals<br />
do, and they share that information with the world.<br />
http://lifehacker.com/5853610/crack-almost-any-electronic-safe-with-just-a-bounce<br />
<br />
At Maker Faire (http://makerfaire.com/), a huge event held in the Bay<br />
Area, you'll find they have a Lockpick Village there as well. It is<br />
usually staffed by lock sport enthusiasts sharing the skills and<br />
knowledge.<br />
<br />
<br />
The Borderline Libelous aspect.<br />
<br />
In your article, you have associated lock picking with crime and<br />
terrorism, and did little to argue against that.<br />
<br />
Picking locks takes time, and skill. It is much faster to do a smash and<br />
grab. Was any research done, looking in to how many homes in your area<br />
were burglarized that had the locks picked?<br />
<br />
Is picking a lock you own illegal?<br />
<br />
quote:<br />
' "Oakland Police Chief Howard Jordan was not pleased.<br />
<br />
"I'm in shock that people would provide a class to teach people a skill<br />
to violate the law," Jordan said. "It's unconscionable."'<br />
<br />
One thing that is stressed is to only pick locks one has permission to<br />
pick.<br />
<br />
<br />
Picking a lock, is not like building an IED. But your article associates<br />
lock picking to terrorism, and terrorist acts.<br />
quote:<br />
' "Given the uncontrollable crime in Oakland, we are beyond ourselves<br />
that Oakland can advertise an event on lock-picking. It's akin to<br />
teaching a class on making IEDs in Iraq." '<br />
<br />
<br />
The call a locksmith comment by the Chief of Police also does your<br />
readers a dis-service.<br />
<br />
quote:<br />
'Jordan has a more conventional solution to that problem: "Call a<br />
locksmith!"'<br />
<br />
There are plenty of cases where people have created fraudulent locksmith<br />
companies, and are preying on people.<br />
http://consumerist.com/tag/locksmiths/<br />
<br />
By learning the skills of lock picking, it helps to protect people from<br />
being preyed upon.<br />
<br />
<br />
The truth is, locksport is one of the ways to improve security for<br />
everyone. It gives people a better understanding of the things securing<br />
their lives, instead of them taking "you're secure" on blind faith. It<br />
prevents them from being taken advantage of. Kids learning how to pick<br />
locks today, are given an opportunity to learn a recession proof skill,<br />
that can lead to a decent living as a Locksmith, or in personal<br />
security.<br />
<br />
Christopher Jenks<br />
<br /><div class="blogger-post-footer"><hr /> <a href="http://chrisrattis.blogspot.com/">Kettlebells, politics, computers, and other rambles</a></div>Chris Jhttp://www.blogger.com/profile/12969869698106366643noreply@blogger.com1tag:blogger.com,1999:blog-3657417550682564287.post-6774331522638454752013-02-05T19:18:00.001-05:002013-02-05T19:18:57.387-05:00Open Letter to Auto IndustryDear Auto Industry.<br />
<br />
I understand that brand loyalty is important to you, so I'm left wondering why building said loyalty isn't considered an important part of your business.<br />
<br />
Zappos has been known as one of the better places to buy shoes from. Part of this is because to them Customer Service is important to them, and actually make all there staff work the customer service department when they first start. Domino's knows that making the best possible pizza is the important part of their business, and all there staff work in a kitchen for a week on at least once a year.<br />
<br />
If American car makers, or any other for that matter, want to build loyalty, may I suggest that you make your car designers and anyone not working a line, to work in a factory for at least a week. I would also suggest following that up with having them work in garages fixing the cars for a week.<br />
<br />
The garage week should be spent doing simple tasks. Replacing radios, changing light bulbs, fixing squeaky doors, fixing broken windows and the mechanisms that allow the windows to go up and down, and changing oil. Mainly the things that should be simple tasks for those that like to feel an owner ship of their car by fixing the small things themselves. For example I'm sure if the people designing the engine compartment had to take the battery out, and force a bundle of wires out of the way just to change a light bulb, they'd design better engine compartments.<br />
<br />
If they don't have a passion for the car, why do you want them working for you anyway. It's like when Zappos offers to buy out and employee after a week of two of work. It shows if the person is there because they want the paycheck, or because they love the product. Sadly Henry Ford didn't have the foresight to come up with that. Instead he created the $5.00 day. Which brought people who cared about pay more than building the car.<br />
<br />
It's time to change the culture, and start making cars that people enjoy working on, and driving so they will have a brand loyalty to you. The Maker culture is here and it is growing. People are remembering working with their hands and doing something themselves gives them a great feeling. You should embrace that more than alienate them. I know for a fact that there are Makers working "White Collar" jobs in the auto industry. I've worked with several of them at 2 of the Big Three. Heck one of my co-workers, in a white collar position at one of the Big 3, is looking at buying a project car. And I of course like to change the light bulbs when they burn out, without having the pull a battery, and force wires out of the way.<br />
<br /><div class="blogger-post-footer"><hr /> <a href="http://chrisrattis.blogspot.com/">Kettlebells, politics, computers, and other rambles</a></div>Chris Jhttp://www.blogger.com/profile/12969869698106366643noreply@blogger.com0tag:blogger.com,1999:blog-3657417550682564287.post-47538866679209509842013-01-27T01:12:00.002-05:002013-01-27T01:13:18.833-05:00Really?<br />
<div class="account-summary cf" style="background-color: #26282a; color: #bbbbbb; font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, Verdana, sans-serif; font-size: 13px; line-height: 16px;">
<a class="obj-left item-img" href="http://twitter.com/DallasPD" rel="user" style="color: #7aa2c0; float: left; margin-right: 10px; outline: 0px; width: 48px;" tabindex="-1" target="_blank"><img alt="DallasPD's avatar" class="tweet-avatar avatar pull-right" height="48" src="https://si0.twimg.com/profile_images/121150017/Badge2_normal.JPG" style="border-bottom-left-radius: 3px; border-bottom-right-radius: 3px; border-top-left-radius: 3px; border-top-right-radius: 3px; border: 0px; float: right; height: 48px; margin-bottom: 2px; margin-top: 2px; width: 48px;" width="48" /></a><br />
<div class="nbfc-alt padding-tl" style="display: table-cell; padding-top: 10px !important; width: 10000px; word-break: break-word; word-wrap: break-word;">
<div class="nbfc" style="overflow: hidden; word-break: break-word; word-wrap: break-word;">
<a class="account-link link-complex inline-block" href="http://twitter.com/DallasPD" rel="user" style="background-color: white; display: inline-block !important; max-width: 100%; text-decoration: initial;" target="_blank"><span style="color: black;"><span class="block" style="display: block !important;"><b class="fullname link-complex-target txt-ellipsis" style="max-width: 100%; overflow: hidden; text-overflow: ellipsis; white-space: nowrap; word-wrap: normal;">Dallas Police Depart</b></span><span class="username block txt-ellipsis txt-mute" style="direction: ltr; display: block !important; font-size: 0.8571rem; max-width: 100%; overflow: hidden; text-overflow: ellipsis; unicode-bidi: embed; white-space: nowrap; word-wrap: normal;"><span class="at">@</span>DallasPD</span></span></a></div>
</div>
</div>
<div class="txt-large txt-serif margin-vl" style="font-family: Georgia, 'Times New Roman', serif; font-size: 1.2857rem; margin-bottom: 10px !important; margin-top: 10px !important;">
<span style="background-color: white;">Our apologies for the fruit Ninja tweet sent earlier. One of our kids played the game on our iPhone and unknowingly tweeted their score.</span></div>
<div class="margin-tl txt-mute txt-small" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, Verdana, sans-serif; font-size: 0.8571rem; margin-top: 10px !important;">
<span style="background-color: white;"><a href="https://twitter.com/DallasPD/status/295401314727370752" rel="url" style="text-decoration: initial;" target="_blank">12:22am · 27 Jan 13</a> · <a href="http://twitter.com/download/iphone" rel="url" style="text-decoration: initial;" target="_blank">Twitter for iPhone</a></span></div>
<div class="margin-tl txt-mute txt-small" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, Verdana, sans-serif; font-size: 0.8571rem; margin-top: 10px !important;">
<br /></div>
<div class="margin-tl txt-mute txt-small" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, Verdana, sans-serif; font-size: 0.8571rem; margin-top: 10px !important;">
<br /></div>
<div class="margin-tl txt-mute txt-small" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, Verdana, sans-serif; font-size: 0.8571rem; margin-top: 10px !important;">
Really? Seriously? I'm left wondering. Was this IPhone issued by the department? If it was, why was it where a child could reach it. If I was his superior, I would seriously be asking some questions. Maybe I'm jaded from the bs that happened with the ex-Mayor in Detroit.</div>
<div class="margin-tl txt-mute txt-small" style="margin-top: 10px !important;">
<span style="font-family: HelveticaNeue, Helvetica Neue, Helvetica, Arial, Verdana, sans-serif;"><span style="font-size: 0.8571rem;">Look, I get that Chefs bring their own knives, and that mechanics bring their own tools. However... BYOD is a bad idea. Tell me when has an accountant, a CEO, Lawyer, or any other business unit brought their own filing cabinet, </span><span style="font-size: 14px;">corporate</span><span style="font-size: 0.8571rem;"> ledger, etc. Ok I know they have the briefcases, file folios</span></span><span style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, Verdana, sans-serif; font-size: 0.8571rem;"> and the like, but the damage is smaller with those. It's not everything.</span></div>
<div class="margin-tl txt-mute txt-small" style="margin-top: 10px !important;">
<span style="font-family: HelveticaNeue, Helvetica Neue, Helvetica, Arial, Verdana, sans-serif;"><span style="font-size: 14px;">I understand we have commoditized computers and technology, but people really need to think about what that piece of tech does before that hand it someone else.</span></span></div>
<div class="margin-tl txt-mute txt-small" style="margin-top: 10px !important;">
<span style="font-family: HelveticaNeue, Helvetica Neue, Helvetica, Arial, Verdana, sans-serif;"><span style="font-size: 14px;">Sure there are some questions, was it a work phone or a personal phone. If it's personal why does it have work stuff on it? If it's business why is he being handed to a kid, I'd be worried about them reading the other stuff on the phone.</span></span></div>
<div class="margin-tl txt-mute txt-small" style="margin-top: 10px !important;">
<span style="font-family: HelveticaNeue, Helvetica Neue, Helvetica, Arial, Verdana, sans-serif;"><span style="font-size: 14px;">Lastly I'm curious, would this officer hand his service weapon to his child to play with, or leave it laying around where the kid could get it? I'm sure he is shamed by this point, but seriously it is time to have grown up conversations about BYOD and how the devices are used outside of work. </span></span></div>
<div class="blogger-post-footer"><hr /> <a href="http://chrisrattis.blogspot.com/">Kettlebells, politics, computers, and other rambles</a></div>Chris Jhttp://www.blogger.com/profile/12969869698106366643noreply@blogger.com0tag:blogger.com,1999:blog-3657417550682564287.post-83897261931158253052013-01-16T07:33:00.002-05:002013-01-16T07:33:43.792-05:00Finally...After 140+ miles, 38 hours and 6 minutes of training time, and just over 2 years (Started in December of 2010), I finally, FINALLY cleared 5k.<br />
<br />
Down sides. on a treadmill. 5 minutes walking, 30 jogging / running, 5 minutes walking. total time 40 minutes.<br />
<br />
I never got past week 8 of couch to 5k (offically), but I do know week 9 was the times I listed above. So I call couch to 5k complete. Now to improve my time.<div class="blogger-post-footer"><hr /> <a href="http://chrisrattis.blogspot.com/">Kettlebells, politics, computers, and other rambles</a></div>Chris Jhttp://www.blogger.com/profile/12969869698106366643noreply@blogger.com0tag:blogger.com,1999:blog-3657417550682564287.post-84787707566448475942012-12-31T04:43:00.002-05:002012-12-31T04:43:43.334-05:00All these years and I still don't get it.So back in the day, when the internet was new (and I really mean that, when it was new), a co-worker of mine was blown away. We were NOC techs (and he the senior tech) for one of the original six backbone providers; the people the government turned the DARPANet over to, to be the Internet. I told you I was serious about the internet being new.<br />
<br />
Anyway, CIDR was still something everyone was trying to get their heads around. There was a great cheat sheet someone had made, but we couldn't remember where to get it. So my co-worker went to a search engine (back before there was Google), yahoo I think, or maybe dogpile.<br />
<br />
Anyway, my co-worker searched for it on the internet. He went from his computer in the Network Operations Center, to a computer in California, only to find that the first link was on a computer sitting 10 feet away from us.<br />
<br />
For some reason, this blew his mind, and he spent a good hour of our shift flipping out over it and trying to make me understand just how awesome it was that a computer in California, knew the contents of the computer behind us in the NOC.<br />
<br />
Still don't see why it was so awesome...<br />
<br />
Probably because I spent time on BBS systems connected to DARPANent when I was teen, and was already used to it.<div class="blogger-post-footer"><hr /> <a href="http://chrisrattis.blogspot.com/">Kettlebells, politics, computers, and other rambles</a></div>Chris Jhttp://www.blogger.com/profile/12969869698106366643noreply@blogger.com0tag:blogger.com,1999:blog-3657417550682564287.post-25977229162250824652012-10-20T22:33:00.001-04:002012-10-20T22:33:25.724-04:00looks like someone's tool is a little brokenSo got a bunch of emails today, via deny hosts. Lots of traffic at my ssh server. Running failed (there is an old version on the blog, I'll add the latest version below), I saw the typical automated attack mess. But one thing caught my eye. In the invalid user section.<br />
<br />
<br />
Oct 20 18:56:52 from root<br />
Oct 20 19:23:57 from root<br />
<br />
Hmm... those don't conform to my normal search for that section.<br />
<br />
Now all failed does, is goes through and parses my auth / secure log for matched failed instances. And here is what was in the log file.<br />
<br />
<br />
Oct 20 18:56:52 $SERVER_NAME sshd[11347]: Failed password for invalid user root b0#pdl!PP from $ATTACK_IP port 55778 ssh2<br />
<div>
<br /></div>
<div>
<div>
Oct 20 19:23:57 $SERVER_NAME sshd[31205]: Failed password for invalid user root c from $ATTACK_IP port 42388 ssh2</div>
</div>
<div>
<br /></div>
<div>
From the lines in the logs. It looks like they sent the password as part of the user name. that or my system was being slow and their's faster.</div>
<div>
<br /></div>
<div>
<br /></div>
<div>
The shell script "failed"</div>
<div>
<br /></div>
<div>
<div>
#! /bin/sh</div>
<div>
# checks for /var/log/auth.log for login failures.</div>
<div>
# version 0.2</div>
<div>
# chrisj@rattis.net</div>
<div>
<br /></div>
<div>
# prints failed invalid users</div>
<div>
echo "Failed Invalid User Attempts"</div>
<div>
grep "Failed" /var/log/auth.log | grep -i 'invalid' | awk '{print $1,$2,$3,$13,$11}' | sort -u</div>
<div>
<br /></div>
<div>
echo ' '</div>
<div>
#prints failed vailid users, except for me.</div>
<div>
echo "Failed Valid User Attempts"</div>
<div>
grep "Failed" /var/log/auth.log | grep -vi 'invalid' | awk '{print $1,$2,$3,$11,$9}' | sort -u</div>
<div>
echo ' '</div>
</div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<br />
<div class="blogger-post-footer"><hr /> <a href="http://chrisrattis.blogspot.com/">Kettlebells, politics, computers, and other rambles</a></div>Chris Jhttp://www.blogger.com/profile/12969869698106366643noreply@blogger.com0tag:blogger.com,1999:blog-3657417550682564287.post-16576913953298922222012-09-25T16:08:00.001-04:002012-09-25T16:08:20.797-04:00if you want to be a hacker, go read thisAlex, a good friend of mine and a former Eastern Michigan IA student, wrote a great article for his company's blog. You really should go read it<br />
<br />
<a href="http://blog.spiderlabs.com/2012/09/the-first-few-months-of-penetration-testing-what-they-dont-teach-you-in-school.html">"The first few months of penetration testing, what they don't teach you in school."</a><div class="blogger-post-footer"><hr /> <a href="http://chrisrattis.blogspot.com/">Kettlebells, politics, computers, and other rambles</a></div>Chris Jhttp://www.blogger.com/profile/12969869698106366643noreply@blogger.com0tag:blogger.com,1999:blog-3657417550682564287.post-9292710128730739682012-09-21T23:03:00.000-04:002012-09-21T23:03:02.544-04:00One of the ones I didn't likeSo I mentioned in the <a href="http://chrisrattis.blogspot.com/2012/09/plan-for-ia-240-at-eastern-mi.html">Plan for IA240</a> blog post, I had some other ideas. Ones that I decided to not go with for various reasons.<br />
<br />
One to those ideas that I rejected:<br />
<br />
Using a tablet, with my cell phone as a tether. I tried using my cellphone in class the first night. It didn't work too well. It was rather slow Googling questions the professor was asking.<br />
<br />
I also didn't like the idea for a hand full of reasons. I could be wrong, because I don't understand all the tech.<br />
<br />
First the tethering. I have a rooted (running cyanogen mod) cell phone, but every time I tried, I get messages saying the network I have for service is blocking it.<br />
<br />
I'm still creating a wireless network that someone could try attacking. Other people wanting to connect. Not saying people would, but hacking wifi isn't that hard, and if they're willing to go after a laptop, why not go easier with a wifi connection.<br />
<br />
I've only used Shark for Root sparingly. As I understand it, it can do 3g packet captures. I'm not sure if that's only for the phone it's on, or if it can grab any 3g signal. I also haven't found much documentation on it. I also don't have the equipment to test it properly at this time. Maybe we can set something like that up to EMU's IA Club, where we can play around with it and see what it does.<br />
<br />
Just one of the ideas, I tossed to the side. I'll talk about another one some other time.<br />
<br />
<br /><div class="blogger-post-footer"><hr /> <a href="http://chrisrattis.blogspot.com/">Kettlebells, politics, computers, and other rambles</a></div>Chris Jhttp://www.blogger.com/profile/12969869698106366643noreply@blogger.com0tag:blogger.com,1999:blog-3657417550682564287.post-27326836113105168352012-09-21T17:25:00.000-04:002012-09-21T17:25:17.160-04:00Well Tails works...Sitting at Eastern Michigan University on the wireless network using T.A.I.L.S. It's a little slow, but that's ok. I'm riding across TOR to an exit node in germany.<br />
<br />
To get this to work:<br />
I loaded the system from the Live CD.<br />
<br />
Then using the unsafe browser, I was able to get to the capture portal. To do that, you need to go to a non-https site. I like to use www.sluggy.com. Going to www.google.com got grabbed by HTTPSeverywhere, and was dragged to encrypted.google.com. Sadly that doesn't work with EMU's capture portal.<br />
<br />
After that, started the ice-weasel browser to make sure it worked right. Which it did. Then shutdown the unsafe browser.<br />
<br />
So this works.<div class="blogger-post-footer"><hr /> <a href="http://chrisrattis.blogspot.com/">Kettlebells, politics, computers, and other rambles</a></div>Chris Jhttp://www.blogger.com/profile/12969869698106366643noreply@blogger.com0tag:blogger.com,1999:blog-3657417550682564287.post-22505998594416773282012-09-20T00:11:00.000-04:002012-09-21T23:06:11.948-04:00Can't wait for FridayI found out tonight that the IASA (Information Assurance Student Association) is having their kick off meeting Friday. At 5. Time sucks, but meh.<br />
<br />
I'm actually thinking of tossing my id in the bit-bucket for an officer position. Don't know which one yet. I'm sure that'll fly like the <span style="background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.200000762939453px;">NX37602</span>. There are some things I think we could do better as students. Yeah it means more work for us, but in the long run, it makes us better students. No it's not hacking each other. Although some Saturday CTF in L6 would't be too bad. If allowed.<br />
<br />
I also got to do some reading on T.A.I.L.S. tonight. I figured I could't be the only one that was having problems with capture portals (have to log in to use wireless). Looks like I was right. And I have something to test on Friday now.<br />
<br />
Also, new version of T.A.I.L.S came out tonight. Version 0.13.0.<div class="blogger-post-footer"><hr /> <a href="http://chrisrattis.blogspot.com/">Kettlebells, politics, computers, and other rambles</a></div>Chris Jhttp://www.blogger.com/profile/12969869698106366643noreply@blogger.com0tag:blogger.com,1999:blog-3657417550682564287.post-70035094009021032562012-09-18T21:58:00.000-04:002012-09-21T17:26:47.064-04:00Need to look in to T.A.I.L.S some more.I couldn't get T.A.I.L.S to work on campus tonight. The wireless would assoicate, but I then have to log in to the back end server. However I was never seeing a re-direct. I think I managed to disable tor, in case that was the problem. But I have also seen problems with other systems like that in the past and HTTPS everywhere.<br />
<br />
I need to find some time to look in to it.<div class="blogger-post-footer"><hr /> <a href="http://chrisrattis.blogspot.com/">Kettlebells, politics, computers, and other rambles</a></div>Chris Jhttp://www.blogger.com/profile/12969869698106366643noreply@blogger.com0tag:blogger.com,1999:blog-3657417550682564287.post-2076116059419109852012-09-17T00:14:00.000-04:002012-09-17T00:14:40.055-04:00There will be some more posts comingSo I've tested T.A.I.L.S, it comes with sshfs pre-installed. It's also really easy to use. It looks like all the traffic goes through T.O.R. Next step will to see if it works with the University's wifi.<br />
<br />
I've been asked to do a talk on it.<br />
<br />
I'm also going to do some write ups on the options I didn't use and why I didn't want to use them.<div class="blogger-post-footer"><hr /> <a href="http://chrisrattis.blogspot.com/">Kettlebells, politics, computers, and other rambles</a></div>Chris Jhttp://www.blogger.com/profile/12969869698106366643noreply@blogger.com0tag:blogger.com,1999:blog-3657417550682564287.post-29453822808927966722012-09-15T15:37:00.000-04:002012-09-21T17:26:47.062-04:00Plan for IA-240 at Eastern Mi.** This has been updated:<br />
<br />
So one of the classes I'm taking this term is required for my degree. And I have to worry about protecting my computer in it.
<br />
<br />
The course:
<br />
<a href="http://catalog.emich.edu/preview_course_nopop.php?catoid=11&coid=90061">IA 240</a>. The main point of the class, that I took away from the first night, is to learn how to write Analyst reports. The over all goal is to give us the skills required to go work for a government agency. (The program has a lot of students leave and get jobs in the public sector).
<br />
<br />
The Final:
<br />
The professor will assign us something to do an analysis report on at the end of the semester. To teach us on Operational Security, we have to protect our final project from our class mates. He gives extra credit for each student we got information from.<br />
<br />
The Problem:<br />
The professor has already said we are required to bring laptops to class, and class mates, as in the past, will try hacking that computer to get your final project. **Update-1: This was said in a warning, not in a you will be hacking each other in this class.<br />
<br />
Over all, knowing the above, one really wants to get your hacks in early, get a back door, and be able to come in to the classmates boxes at will. Lots of way to do that. But I'm about not being an easy target. In fact I don't want my system compromised.
<br />
<br />
Options to protect me:
<br />
- Change operating systems every class, either local install, from USB, or DVD / CD.<br />
- Run <a href="http://www.backtrack-linux.org/">Backtrack</a>, and use that as the the desktop (not meant for that).<br />
- Run <a href="https://tails.boum.org/index.en.html">TAILS</a><br />
- buy dedicated machine, and use nothing on it, doing forensics on it at the end of the semester, and keep nothing on it.<br />
- Be really evil... (run vm or a dedicated box with a sticky honeypot).
<br />
<br />
The Plan:
<br />
I don't have the money for the dedicated machines.<br />
<br />
I thought about putting my money where my mouth is and installing Backtrack, on an old hard drive, then harden it. This would fit in with my Linux Hardening applied to BackTrack talk. However don't like the idea of swapping the hardware that often. Trying to hack my class mates would be un-ethical in my eyes anyway.<br />
<br />
I don't have an interest in hacking my class mates. Just not being hacked.<br />
<br />
So, I've already got Full Disk Encryption, I'm going run with The Amnesic Incognito Live System (TAILS). I'll take an energy hit, the main hard drive won't be touched.<br />
<br />
The only thing I have to worry about is saving my work from class (not that I type much in class, I'm more about pen and paper). But if there is something I need to save, I have things for that. I'm using Google's two factor authentication. I also could look into doing File System over SSH. Not sure if I'll have to go that far. <br />
<br />
<br />
<br class="Apple-interchange-newline" />*Update-1: the professor was not giving permission. he was giving a warning.<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br /><div class="blogger-post-footer"><hr /> <a href="http://chrisrattis.blogspot.com/">Kettlebells, politics, computers, and other rambles</a></div>Chris Jhttp://www.blogger.com/profile/12969869698106366643noreply@blogger.com0tag:blogger.com,1999:blog-3657417550682564287.post-65118998814488795272012-08-14T22:14:00.001-04:002012-08-14T22:15:42.534-04:00out of shapeyep...
running, between 2.2 and 2.4 miles in 35 minutes (couch to 5k, wearing 20lbs weight vest, and VFF). and that's on week 5. granted took a week off between 3 and 4, and this is my second time on week 5, failed horribly last week.
Swings, had to change after every 25 at the fitness center tonight. my 16kg kettlebells. farmer walked there and back, down stairs and up, and 700 feet 1 way.
only made it through 2 minutes of Tabata thrusters at 16kg. used to be way better. and could only lift about 5 times every 20 seconds.
I hate being out of shape.
246, 22.8% (give or take) body fat.
Yes, I know, better shape than I was in almost two months ago, but still just depressing, when I used to do all of that much better.<div class="blogger-post-footer"><hr /> <a href="http://chrisrattis.blogspot.com/">Kettlebells, politics, computers, and other rambles</a></div>Chris Jhttp://www.blogger.com/profile/12969869698106366643noreply@blogger.com0tag:blogger.com,1999:blog-3657417550682564287.post-50732428166703722242012-06-21T10:06:00.001-04:002012-06-21T10:06:42.959-04:00Wow, not liking the new look of blogger, but that's something for later. Really need to get my site set up. Time is an issue. I'll have to go back over my time management skills and then get them rolling again.
Anyway this post is a public shaming. Updated numbers for body fat checking
Weight 260.8
waist 46 inches (at navel)
hips 47 inches
forearm 13 inches
wrist 8 inches
works out to be 26.4% body fat or something like that.
Started reading The 4 Hour Body (4HB). The personal GPS numbers:
Mid-Bicept 14 inches L 14 inches R
Waist 46
hips 47
Mid-Thigh 25 inches L 25 inches R
Total inches (add all those numbers together) 171.
I'm going to modify the slow-carb (almost no carb) diet some. Plus couch to 5k (C25k) with 20lbs weight vest, and a Kettlebell program I have going through my head.
good mornings, halos, 2 hand swings, shoulder presses, push-ups, rows, squats. 5 sets.
We'll see what happens between now and July 31st.<div class="blogger-post-footer"><hr /> <a href="http://chrisrattis.blogspot.com/">Kettlebells, politics, computers, and other rambles</a></div>Chris Jhttp://www.blogger.com/profile/12969869698106366643noreply@blogger.com0tag:blogger.com,1999:blog-3657417550682564287.post-50987428602617760322012-04-11T01:22:00.002-04:002012-04-11T01:30:35.520-04:00Centos 6 Guest on Virtual BoxMaybe someday I'll get the other blog up and running, but right now I'm working on a project. one of the things I needed to do, was set up a lab.<br /><br />CentOS 6.2, Virtualbox.<br /><br />After installing the Development Tools group, and the kernel-devel package, I kept getting errors saying it couldn't find the source code to build. Dug around. finally looked at the run script for the Additions software.<br /><br />while the kernel and the kernel-devel package were both 2.6.32-220, the directory under /usr/src/kernel/ was called 2.6.32-220.7.1.el6.i686. The installer was looking for 2.6.32-220.el6.i686.<br /><br />a quick ln -s exiting looked worked magic, it finished with no errors.<br /><br />The console still doesn't look right, but that is going to have to wait.<div class="blogger-post-footer"><hr /> <a href="http://chrisrattis.blogspot.com/">Kettlebells, politics, computers, and other rambles</a></div>Chris Jhttp://www.blogger.com/profile/12969869698106366643noreply@blogger.com0tag:blogger.com,1999:blog-3657417550682564287.post-22473437838970771122011-12-11T14:20:00.009-05:002011-12-11T15:17:22.835-05:00more on the new side projectSo after looking around, asking a few people and doing a little reading I've updated www.ratsandrogues.com. Kind of funny that that is going faster than setting up rattis.net.<br /><br />So yesterday, I set up WordPress, and re-wrote the two entries that were on the Rats and Rogues page. Then created two accounts. Then finally set up email using virtual domains (Postfix + Mysql + dovecot, etc).<br /><br />Wish I could say it was all easy and simple. But it wasn't.<br /><br /><span style="font-weight:bold;">Problems I came across:</span><br />Wordpress:<br /><br />1) www.ratsandrogues.com/feed wasn't working. The feed validator sites were saying not feed webpage. Going there got a 404 error.<br /><br />2) If I set the url to be a custom for the entries, I could get a 404 error. But leaving the urls set as standard instead of custom would work.<br /><br />2.5) the settings page for custom url said that .htaccess was not writable.<br /><br /><span style="font-weight:bold;">Solution</span><br />It looks like all three issues were related. One large problem with simple solutions but took forever to research.<br /><br />2.5) created the .htaccess file in the root directory for the wordpress site. then changed ownership to the apache daemon user name.<br /><br />That allowed the site's setting page to update the .htaccess file.<br /><br />1 & 2) This one took more time, and lots more research. It looked like that .htaccess file was being ignored. I remember disabling .htaccess when I set up mod_security. Did some reading. I had set AllowOverride NONE in the config file, and I've had to make changes to the vhosts under that global directive. Once I changed that for only the Rats and Rogues site both the rewrites for custom URLS and the feed started working.<br /><br /><span style="font-weight:bold;">Email:</span><br />Uh this one was a mess.<br />1) getting the alias forwarding table to push to multiple people.<br />2) getting email to forward to the people above.<br /><br /><span style="font-weight:bold;">Solutions:</span><br />1) I searched around forever trying to figure out how to insert more than one name in the time. I saw some screen grabs that showed it but no idea how they did it. Then one webpage said that most use PHPMyAdmin. Yeah, didn't want to install that. To make it work:<br /><br /><code><br />INSERT INTO forwarding (`source`, `destination`) VALUES ('aliasemail@example.com', 'email1@example.com, email2@example.com');<br /></code><br /><br />Which is just the written out way of saying give the value of the 2 columns, 'source' and 'destination', with 2 elements. The first one is the alias email. the second one is a list of emails seperated by commas (,) between the single quotes (') for the second element.<br /><br />2) With both names in the forwarding table, I gave it a test.<br /><code><br /><user2@example.com> (expanded from <alias@example.com>): User<br /> unknown in virtual alias table<br /><br /><user1@example.com> (expanded from <alias@example.com>): User<br /> unknown in virtual alias table<br /></code><br /><br />Fixing that required commenting out:<br /><code><br />receive_override_options = no_address_mappings<br /></code><br />in the Postfix main.cf<br /><br />Which left me with:<br /><code><br />User unknown in virtual alias table<br /></code><br /><br />which was there because while trying to fix the other problem I set the domain name in<br /><code><br />virtual_alias_domains = <br /></code><br /><br />once I fixed that, everything worked.<div class="blogger-post-footer"><hr /> <a href="http://chrisrattis.blogspot.com/">Kettlebells, politics, computers, and other rambles</a></div>Chris Jhttp://www.blogger.com/profile/12969869698106366643noreply@blogger.com0tag:blogger.com,1999:blog-3657417550682564287.post-72358943662408087792011-12-06T22:57:00.003-05:002011-12-06T22:57:58.255-05:00Hey look I have new side projectThe Rats and Rogues InfoSec Podcast.<br /><br />www.ratsandrogues.com<div class="blogger-post-footer"><hr /> <a href="http://chrisrattis.blogspot.com/">Kettlebells, politics, computers, and other rambles</a></div>Chris Jhttp://www.blogger.com/profile/12969869698106366643noreply@blogger.com0