Jump to content

Rumba Rue

Dearly Departed
  • Posts

    7,270
  • Joined

  • Last visited

Everything posted by Rumba Rue

  1. Thanks for introducing yourself!
  2. Having trouble sleeping.........thinking about many of the homes Boats and I have viewed to buy, but we keep coming back to one certain one.......mind boggles..... I need to get out of the house and go fishing.
  3. I usually use 4 to 6 yards for a good full skirt (I make gored skirts for a better look)- depending on how big the person is. Most of the time I use elastic for the waist bands, but sometimes put in a set waistband with lots of closures that can be made tighter or looser depending on weight gain or loss.
  4. Thank you my friend. Missed seeing you at the Channel Islands event, but the HMS Surprise wasn't there, but several crew people were.
  5. Brigs, schooners, row boats, I figure it floats, regardless of what they might actually be....never claimed to know one ship of the line from another, course it depends on what I've been drinking.....
  6. Well holy barrels of rum! Matt ye been hidin' from us ye have! Glad ye decided ta come out o' the barrel. A very belated Happy Birthday to ye!
  7. Well it certainly wasn't Dana Pt....... With a charge of $10.00 to get on to view the ships was ok, but let's face it, all there were, were food vendors, us and my friend Kathryn across from us selling her 'educational toys'. The Port Royal Privateers were down the street in a dirt lot.... There were several smaller brigs there like the Lynx, Hawaiian Chieftan, the Californian, Irving Johnson (the ship that went aground last year), the Kaisei, Seward and the Curlew, along with the Spirit of Dana Point (was orginally named the Pilgrim 2)and the Bounty, from the movie 'Mutiny on the Bounty' was there. I managed to get on board and took some pictures. Other than that, we all had a great time. We certainly were the center of attention! Lots of people sat down to look/read through the books we offered (yes there's pictures)and many complimented our goal of literacy to us and our photo wench-ranglers, Jackie, Colleen, Jamie, Monica, Sherrie, were having a great time, as were our 'cabin boys', oh and our Capt.Kent too. So many people were just thrilled to see us and Long Tom couldn't talk enough about history to people, and trying to eat in between encounters. It's a shame that this particular event doesn't happen every year, but I'm sure we got enough publicity with interviews, camera filming and such that I have no doubt we will be asked back for other events. Rumba
  8. Yup, right handsome, that red is very becoming to you...... oh the garb is good too!
  9. It's hard to pick just one, but Muppet's Treasure Island is a hoot (and great songs) as is Cutthroat Island and even funnier is Yellowbeard. Yea, I like comedy.
  10. Thank you Miz Shaughnessy, Miz Hester, and Miz Red Cat Jenny, life has certainly been an adventure. Things that have happened now that I'm a 'senior citizen': I use to be 5'4" years ago, I've now shrunk down to 5'2"! I can now get discounts for some places. Best of all, I don't look my age and still can pass for 35 - as a gentleman over the weekend said when he was trying to guess my age.
  11. Welcome to the Pub, enjoy your stay, buckle up your seatbelt, and hang on for the ride! Rumba
  12. Capt. Grey posted this at our Star Wars site and wanted to pass it on. Please all read (this has been sent to our Admins.): SAN FRANCISCO, California (AP) -- A giant vulnerability in the Internet's design is allowing criminals to silently redirect traffic to Web sites under their control. The problem is being fixed, but its extent remains unknown and many people are still at risk. The gaping security hole enables a scam that targets ordinary people typing in a legitimate Web address. It happens because hackers are now able to manipulate the machines that help computers find Web sites. If the trick is done properly, computer users are unlikely to detect whether they've landed at a legitimate site or an evil double maintained by someone bent on fraud. Security experts fear an open season for virus attacks and identity-fraud scams. "It's kind of like saying, `There's a bunch of money on the street. If you can get over there soon enough, you can get it,"' said Ken Silva, chief technology officer for VeriSign Inc., which manages the ".com" and ".net" directories of Internet addresses. "It's something the industry is taking seriously. You'd be in a bad place if you weren't doing something about it." The bug's existence was revealed nearly a month ago. Since then, criminals have pulled off at least one successful attack, directing some AT&T Inc. Internet customers in Texas to a fake Google site. The phony page was accompanied by three programs that automatically clicked on ads, with the profits for those clicks flowing back to the hackers. There are likely worse scams happening that haven't been discovered or publicly disclosed by Internet service providers. "You can bet that the (Internet providers) are going to stay tightlipped about any attacks on their networks," said HD Moore, a security researcher. The AT&T attack probably would have stayed quiet had it not affected the Internet service of Austin, Texas-based BreakingPoint Systems Inc., which makes machines for testing networking equipment and has Moore as its labs director. He disclosed the incident in hopes it would help uncover more breaches. The underlying flaw is in the Domain Name System (DNS), a network of millions of servers that translate words typed into Web browsers into numerical codes that computers can understand. Getting from one place to another on the Internet typically requires a trip through several DNS servers, including some that accept incoming data and store parts of it. That opens them up for potential attack. What this means is that a computer user in say, San Francisco, might type www.yahoo.com and head straight to the real Yahoo site, while at the same moment, a user in New York -- whose traffic is routed through different DNS servers -- might type that same Web address and end up on a phony duplicate site. Scant details have been available about how the vulnerability works. The researcher who discovered it, Dan Kaminsky of Seattle-based computer security consultant IOActive Inc., announced July 8 that he'd found a major weakness in DNS. But he kept the rest secret because he wanted to give companies that run vulnerable servers a month to apply patches -- software tweaks that cover the security hole. He coordinated with Microsoft Corp., Cisco Systems Inc., Sun Microsystems Inc. and other major vendors to simultaneously issue patches. He got two weeks before bad guys and good guys alike accurately guessed the basics of what Kaminsky discovered. It is this: By adding bad information to the packets of data zooming in and out of certain DNS servers, hackers can swap out the address of a legitimate Web site and insert the address of their malicious Web site instead. A compromised server believes it's sending people to the authentic site. And if the bogus site is designed well enough, users don't know the difference, unless the site starts behaving weirdly. Some clues might come if a page, like a banking Web site, is usually protected with Secure Sockets Layer, or SSL, which verifies a site's owner and shows a padlock icon or a green address bar inside the Web browser. The padlocks in particular, however, are not always foolproof, because scammers can spoof them. Just how widespread the attacks have been is hard to tell. The evidence of tampering can disappear before an Internet provider even learns there's a problem. The patching of DNS servers has accelerated. Kaminsky said 84 percent of the servers he tested at the beginning of the process were vulnerable. That has dropped to around 31 percent. Still, Kaminsky said some administrators of computer networks might not patch their machines until they come under attack. Others didn't patch immediately because they had to spend days or weeks testing the repairs. That was the case with AT&T, which said the breach affected just one of its servers, a machine that was scheduled to be taken off line anyway. AT&T says it has fixed the problem. More details about the vulnerability are expected to emerge Wednesday, when Kaminsky speaks at the Black Hat computer security conference in Las Vegas. The conference and its sister event, DefCon, draw researchers, government investigators and corporate executives eager to learn about new vulnerabilities and how to protect against them. "There might be one or two things that haven't leaked yet," Kaminsky said with a snicker. "No one should even think they know the subject of the talk." DNS attacks aren't new. But Kaminsky discovered a way to link together some widely known weaknesses in the system, so that an attack that would have taken hours or days can now take only seconds. "Quite frankly, all the pieces of this have been staring us in the face for decades, and none of us saw it until Dan put it all together," said Paul Vixie, president of the Internet Systems Consortium, a nonprofit that publishes the software inside most of the world's DNS servers. "This is the mother lode all right, from the point of view of Internet criminals looking for easier access to other people's money and secrets."
  13. What you want is called 'petershim ribbon', it can be found at milinary stores, probably online. The ribbon is similar to grosgrain, but of a heavier construction and defineatly period.
  14. I know this is before the Golden Age of Piracy, but I thought it was interesting reading, so I'm posting it here. LIFE IN THE 1500'S The next time you are washing your hands and complain because the water temperature isn't just how you like it, think about how things used to be. Here are some facts about the1500s: These are interesting... Most people got married in June because they took their yearly bath in May, and still smelled pretty good by June. However, they were starting to smell, so brides carried a bouquet of flowers to hide the body odor. Hence the custom today of carrying a bouquet when getting married. Baths consisted of a big tub filled with hot water. The man of the house had the privilege of the nice clean water, then all the other sons and men, then the women and finally the children. Last of all the babies. By then the water was so dirty you could actually lose someone in it. Hence the saying, Don't throw the baby out with the Bath water.. Houses had thatched roofs-thick straw-piled high, with no wood underneath. It was the only place for animals to get warm, so all the cats and other small animals (mice, bugs) lived in the roof When it rained it became slippery and sometimes the animals would slip and fall off the roof. Hence the saying . It's raining cats and dogs. There was nothing to stop things from falling into the house.. This posed a real problem in the bedroom where bugs and other droppings could mess up your nice clean bed. Hence, a bed with big posts and a sheet hung over the top afforded some protection. That's how canopy beds came into existence. The floor was dirt. Only the wealthy had something other than dirt. Hence the saying, Dirt poor. The wealthy had slate floors that would get slippery in the winter when wet, so they spread thresh (straw) on floor to help keep their footing. As the winter wore on, they added more thresh until, when you opened the door, it would all start slipping outside. A piece of wood was placed in the entranceway. Hence the saying a thresh hold. (Getting quite an education, aren't you?) In those old days, they cooked in the kitchen with a big kettle that always hung over the fire. Every day they lit the fire and added things to the pot. They ate mostly vegetables and did not get much meat. They would eat the stew for dinner, leaving leftovers in the pot to get cold overnight and then start over the next day. Sometimes stew had food in it that had been there for quite a while. Hence the rhyme, Peas porridge hot, peas porridge cold, peas porridge in the pot nine days old.. Sometimes they could obtain pork, which made them feel quite special. When visitors came over, they would hang up their bacon to show off. It was a sign of wealth that a man could, bring home the bacon. They would cut off a little to share with guests and would all sit around and chew the fat.. Those with money had plates made of pewter. Food with high acid content caused some of the lead to leach onto the food, causing lead poisoning death. This happened most often with tomatoes, so for the next 400 years or so, tomatoes were considered poisonous. Bread was divided according to status. Workers got the burnt bottom of the loaf, the family got the middle, and guests got the top, or the upper crust. Lead cups were used to drink ale or whiskey. The combination would sometimes knock the imbibers out for a couple of days. Someone walking along the road would take them for dead and prepare them for burial. They were laid out on the kitchen table for a couple of days and the family would gather around and eat and drink and wait and see if they would wake up. Hence the custom of holding a wake. England is old and small and the local folks started running out of places to bury people. So they would dig up coffins and would take the bones to a bone-house, and reuse the grave. When reopening these coffins, 1 out of 25 coffins were found to have scratch marks on the inside and they realized they had been burying people alive. So they would tie a string on the wrist of the corpse, lead it through the coffin and up through the ground and tie it to a bell. Someone would have to sit out in the graveyard all night (the graveyard shift.) to listen for the bell; thus, someone could be, saved by the bell or was considered a ..dead ringer..
  15. This is what the Admin. Booty says: Last time this happened, the users notifying us had picked up malware somwhere else and it was inserting infective URLS into their browsing streams. I've passed this info to Buckets to look into, since that's backend-type stuff. I haven't heard anything else yet. I strongly suggest that you make sure all your security stuff is updated EVERY DAY! Also, you might want to switch your browser to MOZILLA FIREFOX, as the security on that program is terrific and the browser is just better.
  16. LOL! I like the first one so well, I'm stealing it for my sig.
  17. So tell me, is your last name Todd? The demon sailor of the Erie? Welcome to the Pub, I'll be happy to hold your booty for you....permantely.
  18. I'll be up late on Friday night as Boats and I have an evening wedding to go to.
  19. Belated or not, I kindly thank you all! A big hug to everyone!
×
×
  • Create New...
&ev=PageView&noscript=1"/>