Archive for the ‘Uncategorized’ Category

I knew the economic conditions in Massachusetts have been steadily deteriorating since Governor Charlie Baker single handedly began our state’s Coronavirus lockdown. I had no idea just how bad things have gotten here until the June unemployment numbers were released. Howie Carr very colorfully breaks down the numbers in this Boston Herald editorial Charlie Baker is leading … us right down the drain

It took a while, but thanks to Gov. Charlie Parker, Maskachusetts now has the worst unemployment rate in the United States — 17.4%.

Very impressive, because while recording the state’s highest unemployment numbers since the Bureau of Labor Statistics (BLS) began tracking statistics in 1976, the commonwealth also has the third-highest virus death toll among the 50 states.

Massachusetts is not alone when it comes to economic carnage caused by Coronavirus lockdowns.  According to the Howie Carr editorial several other states are nearly as bad.

For the record, the runner-up to Maskachusetts in the June BLS stats is New Jersey, with 16.6% unemployment. The benighted Garden State’s governor, Phil Murphy, just happens to be a Needham High School classmate of … Charlie Parker’s. Not to mention Harvard College. Coincidence?

Gov. Andrew Cuomo’s New York finished third with a dismal 15.7% unemployment rate. Thanks to Cuomo’s decision to infect nursing homes with COVID-19 patients early on, the Empire State still has by far the highest number of deaths, followed by NJ and MA.

Do you begin to detect a pattern here? The more draconian the state shutdowns, the more impervious the governors are to the actual facts on the ground, the higher both the states’ death tolls and the unemployment numbers.

Before the Coronavirus panic began the economy of Massachusetts was in good shape,

A year ago, the MA unemployment rate was 2.9%. So was Maine’s. Yet even with Janet Mills, a governor almost as unhinged as Baker, Maine’s unemployment rate has only risen to 6.6%.

None of the lockdowns were necessary.  They were brought about because of junk science, deeply flawed models, and an over reliance on scientific experts that are just as flawed as the models.  This is chronicled in the Federalist article How Have Our Scientific Experts Gotten So Much Wrong?

There have been a lot of mistakes made by our betters with fancy letters after their name, but perhaps none so consequential as the wildly inflated mortality rate back in February and March. To put it in perspective, at a 3.4 percent death rate if 50 million Americans contracted Covid, 1.7 million would die. At the mortality rate of .4 percent that number shrinks to 200,000. All loss of life is tragic, but scientists were having us destroy the economy and people’s lives based on a woefully faulty number.

The lockdowns and business shutdowns were sold to in this state as necessary to bend the curve.  As you can see from this chart that I copied from the WCVB channel 5 news station daily Coronavirus tracker web page, the curve was bent way back months ago.  The daily case numbers are way down yet unemployment is way up because so many businesses remain closed thanks to our governor.  Deaths are also way down from the peak, along with hospitalizations.

Before my wife finally got her negative COVID test back allowing me to return to work (for some reason they didn’t record she was a healthcare worker and her case wasn’t expedited so poof went days of pay for us both) I had an interesting exchange with a fellow concerning what’s going on in Portland Ore where the family of DaWife’s father is from and where I almost moved after honeymooning there (Apparently the best non-move I ever made in my life).

Along with the standard mostly un-poisoned soup arguments about how peaceful most of the protesters who have been rioting for two months are I heard one argument against the Department of Homeland Security Troops being there that did have some resonance (no it wasn’t the “secret police” nonsense that my sons friends are falling for and some democrats are pushing).

This argument is that this is a local matter and in one sense he had a point. The citizens of Portland districts elected their Democrat city counsel that has supported this nonsense, the citizens of Portland as a whole elected their Democrat Mayor who has allowed these riots to take place and handcuffed their Police, the citizens of the Oregon district that includes Portland elected the Democrat congressmen defending this stuff and opposing the feds protecting federal property and the citizens of Oregon as a whole elected the Democrat governor and Democrat senators who have turned a blind eye to the violence, except to attack Federal Agents in general and President Donald Trump in particular for trying to stop it, at least when they go after Federal locations. So they’re getting what they voted for.

In fact Erick Erickson argues Let Portland Burn:

Let the market decision by letting the actions of a free people control their fate.

The President should withdraw from Portland immediately and let the city burn, if it will, or thrive if it will, but it is the choice of the people there.

A President sending in a police force to a city is a dangerous precedent that will be expanded upon even though the United States Constitution lacks a general police power. A city allowed to chose its own fate is a positive precedent from which we can all draw lessons.

Let Portland burn or not, but let it decide without intervention from Washington.

And Jazz Shaw notes:

the people of these cities continue to elect the same group of Democratic hand-wringers year after year no matter how badly conditions on the ground deteriorate. So does this mean that the rest of the nation and the federal government are out of options besides just waiting for the cities to implode?

There’s clearly an argument to be made in favor of such a conclusion, though it’s an ugly thought to contemplate. As Erickson suggests, there must surely come a point where the remaining sane people in Portland and these other cities will look around at the shootings, the rapes, the arson and the looting and come to the conclusion that something isn’t working. This relies on the old adage which holds that a liberal is just a conservative who hasn’t been mugged yet.

Now I must confess that there is some appeal in this. Why waste federal resources to protect people from their own bad decisions? I’ve heard variants of this concerning folks who build in areas that are regularly threatened by Hurricanes or Wildfires. Why should my federal tax dollars be spent to protect these fools from themselves?

But what really funny about this argument I’ve been reading these exact same points, argued by southern supporters of slavery during the 1850 up to the start of the civil war.

As I’ve mentioned before I’ve been reading Hart’s brilliant American History told by Contemporaries during my lunch break, I’m on volume four and have for the last month (not including during quarantine) been reading argument after argument by congressmen, senators, governors writers newspaper and thinkers and ordinary people both defending and opposing slavery and one of the arguments that is constantly being made by the Democrats concerning slavery is that it’s none of the North’s damn business what the south chooses to do about slavery. It’s not a federal issue but an issue for the individual states whose citizens support the institution. Here is one example:

Never, in a single instance, has the South, in any shape or form, interfered with the North in her municipal regulations ; but, on the contrary, has tamely submitted to paying tribute to the support of her manufactures, and the establishment of her commercial greatness; yet, lie the “serpent warmed in the husbandman’s bosom,” she turns upon us and stings us to the heart. If Great Briton or any foreign power, had heaped upon us the long catalog of insult and abuses that the North has, there is not a man in the whole South who would not have long since shouldered his musket, and, if necessary split his heart’s blood to have avenged them. But because we are members of the same political family it is contended we must not quarrel, but suffer all the impositions at their hands that in their fanatical spleen they may choose to heap on us.

That’s the Charleston Mercury circa 1860 which sounds an awful like the Democrats today. But you know who sounds more like them. Democrat President James Buchanan who sat back while the slave states seceded and seized federal property and arsenals:

How easy would it be for the American people to settle the slavery question forever, and to restore peace and harmony to this distracted country! They, and they alone, can do it. All that is necessary to accomplish the object, and all for which the slave States have ever contended, is to be let alone and permitted to manage their domestic institutions in their own way.

Doesn’t that sound like the whole Pelosi/Media meme of the violence will all go away and the people of Portland will be fine if Trump just ignores what’s going on.

But we don’t have to go back to the 1800’s for these words. We can go back to living memory, 1957, to the floor of the US Senate to hear the arguments of Senator Richard Russell (D-GA) made against the 1957 Civil rights act on the floor of the Senate during the Debates chronicled in Robert Caro’s extraordinary biography of Lyndon Johnson The Years of Lyndon Johnson specifically in volume three Master of the Senate (another set of books I highly recommend four volumes are out vol 5 is yet to come) this exchange from page 965 come immediately to mind:

McNamara said Michigan needed no defense, that his state could handle its affairs without outside interference. “Then why does not the Senator let us do the same?” Russell asked. There was applause from the southern senators seated around him, but he had asked a question, and he was to receive an answer to it. “McNamara,” Doris Fleeson wrote, “roared in the bull voice trained in a thousand union meeting halls: ‘Because you’ve had ninety years and haven’t done it’ “

Now I’ll readily concede that given our current education system and the lack of interest in reading anything but Howard Zinn communist approved history some of these debates and arguments might not be familiar to the current Democrat Leadership like Nancy Pelosi or Democrat Mayors like Ted Wheeler or “Journalists” like Brian Stelter let alone the rank and file leftists/ Democrats posting on facebook or twitter.

But as someone who HAS read this stuff I find it incredibility interesting that the arguments of today’s Democrat left/media are the arguments of the slaveholder and the defenders of Jim Crow and are being made under the banner of Black Lives Matter.

But it makes sense after all the slaveholder and the proponents of Jim Crow also insisted that the way of life they defended was for Black American’s own good. And just as in those days, we see blacks trapped in cities controlled by democrats, beset by crime and drugs with Democrat leaders keeping those who would free them from these plagues out supposedly for their own good.

Ah the Democrats back to their segregationist roots in public once again.

All MLB had to do was play

Posted: July 22, 2020 by datechguy in Uncategorized

and they couldn’t do it.

While I’m still waiting to hear back from MLB before I make a final decision over cutting them off permanently (after all it has been known for the people running a twitter account to go off on their own) for now I’m with Don Surber:

Now MLB brags that its players are too weak to stand for the national anthem. Why play it then? I stopped caring if the Cleveland Indians or Whatevers win the world series.

I submit and suggest it’s a bad idea to alienate a portion of your customer base that has managed to get along without your product for three months a few days before you attempt to reintroduce it.

The number of vulnerabilities contained within production code is growing rapidly. As a result, organizations struggle to keep up with their patch management. This inability to patch vulnerabilities poses a significant threat to website security.

Organizations must adopt a more scalable approach to patch management in order to keep up with the growth of exploitable vulnerabilities. The use of prioritized patching and virtual patching are essential to minimize an organization’s exposure to cyber risks.

 

Vulnerability Numbers are Growing Rapidly

Software is written by human beings, and humans make mistakes. As a result, it should come as no surprise that software contains bugs. While some of these software errors are minor and have little or no impact on the software’s operations, this is not true of all of them. Some bugs are vulnerabilities that can be exploited by a malicious user to force the software to take actions not anticipated, intended, or desired by the software’s developer.

Over time, the number of these vulnerabilities that are discovered in production software are growing rapidly. In 2019 alone, 22,316 new vulnerabilities were discovered and publicly disclosed. Of these, over a third had a Common Vulnerability Scoring System (CVSS) v2 score of 7 or above, meaning that they are labeled as high severity.

Organizations Cannot Keep Up

As the number of software vulnerabilities grows, organizations can no longer keep up with their patching requirements (if they ever could). With over 22,000 new vulnerabilities discovered in 2019, over 60 new vulnerabilities are reported each day on average.

Not every newly discovered vulnerability will impact an organization since it will not be running every affected piece of software. However, determining if the organization is affected by any of the day’s 60 vulnerabilities and addressing the fraction that are relevant can create a significant burden for an organization.

For many organizations, patching a vulnerability is not as simple as allowing the update to run on every employee’s workstation. Several factors can affect the update process, including:

  • Vulnerability Location: If a vulnerability exists in production code, then addressing the issue could require a new software release. The new code must be created and fully tested before being deployed to production.
  • Patch Compatibility: Any software update may include deprecating some functionality provided by a program. If an organization’s existing software depends upon deprecated functionality, then applying a security patch may require a potentially expensive and time-consuming rewrite of the software.
  • System Stability: For organizations with high availability requirements, such as critical infrastructure, it is essential to ensure that a patch does not break any critical functionality. This requires extensive validation in a realistic test environment.

Not every vulnerability that exists within an organization’s systems or the software that it uses has these issues. However, every software update carries some overhead, no matter how small, and applying some updates requires significant time and resources. As the number of vulnerabilities to be addressed grows, organizations can quickly and easily fall behind in their patching processes.

Prioritized Patching is Essential

With the rapid growth of vulnerabilities, organizations cannot keep up and need to find a way to effectively manage their cyber risk. Patching every vulnerability is difficult or impossible, so vulnerabilities should be patched based upon the risk that they pose to the organization.

The risk associated with a vulnerability is usually quantified based upon two factors. These are the probability that the vulnerability will be exploited and the impact if an exploit occurs. The impact part of this equation is readily available for any vulnerability. The CVSS scoring system labels vulnerability severity as low, medium, or high in version 2 and low, medium, high, or critical in version 3.

The probability of exploitation can be more difficult to determine. Not all vulnerabilities are actively exploited by cybercriminals, meaning that a “critical” vulnerability on the CVSS scale may pose little or no real-world risk to an organization. Of the over 22,000 vulnerabilities disclosed in 2019, 37% of them had known exploit code or a Proof of Concept that would make it easy to develop a workable attack. Prioritizing these vulnerabilities in patching would be a good idea.

However, even more detailed information is available regarding the risk of certain vulnerabilities. In May 2020, the FBI and DHS CISA published a list of the top ten most exploited vulnerabilities over the last four years. This report indicated that cybercriminals commonly target Microsoft Office products, Apache Struts, and vulnerabilities within VPN products. Prioritizing these particular vulnerabilities – and generally any vulnerability in these types of software – enables an organization to dramatically decrease its risk of exploitation.

A Scalable Solution to Vulnerability Management

The problem with even a prioritized approach to vulnerability patching is that it is not a scalable or perfect solution to the problem. As the number of vulnerabilities in production software grows, organizations will be increasingly unable to keep up.

Virtual patching, a function offered by web application firewalls (WAFs) and runtime application self-protection (RASP), is a potential solution to this problem. Rather than applying patches to vulnerable applications, virtual patching trains the WAF or RASP solution to identify and block attempts to exploit the vulnerability. Since a virtual patching solution’s list of vulnerabilities is easier to update than the applications containing these vulnerabilities, this provides a more scalable solution to organizations’ vulnerability management problem.