Fairfield NJ Public Library Hosts ‘Where Light Falls’ Photo Exhibit

Fairfield, NJ - For the month of April, visitors to the Fairfield Free Public Library can enjoy impressive black and white photography from throughout the region. The library will host a new exhibition from fine art photographer Christopher Lotito, featuring picturesque scenes of nature and history which may be familiar to some. Born and raised in New Jersey, Lotito’s photos often draw upon his background in historic preservation, as President of the Lincoln Park Historical Society, and upon his many years spent hiking the states forests and exploring backroads.

The exhibit, “Where Light Falls: The Transcendent Beauty of Everyday Places,” includes images of Clinton’s Red Mill, the historic Pompton Plains Railroad Station, and several elements of the old Morris Canal, among others. Speaking of his photography, Lotito says, “My art focuses heavily on documenting the ethereal interplay of light, shadow, and transient weather patterns through black and white photography,” adding, “The pr…

The Secret Manual: A List of Unadvertised Features for Nearly Any Product


Manual Keyhole on Remote Control Car - Do you have a car whose doors open solely by remote control? On most models there is a secret, manual keyhole located to the rear end of the front door handle. You have to pop off a small piece of plastic, which should come off easily, to use it.

Jeep Grand Cherokee (2012)

Hidden USB Port - Hidden in the rear of the center console compartment.


Hidden Cigarette Lighter Port - Many Rav4s have an additional cigarette lighter port inside the car near the rear gate, which makes it easier to run a cooler or DVD player at your next tailgate event.

Hidden Audio-Port - Rav4s have an audio-input port hidden inside of the center console on the rear front wall.

Hidden Compartment - Not really a secret, but Rav4s have a large compartment beneath the rear floormat just inside the rear gate.

Hidden Compartment - On Rav4s, a sunglasses compartment, which can also be used to store your garage remote, pops out of the front, center of the ceiling when a …

How to Block Every App on Facebook at Once

Facebook logo (Photo credit: Wikipedia) This article will tell you how to block every app on Facebook at once by disabling Facebook's apps platform.  By doing this, you will no longer have to worry about any website stealing your Friends List, emails, birthdays, photos, or anything else.  No more Bubble Witch, Farmville, or Candy Crush invites, no matter how many new versions of the games are released.  No more TimeHop or so many other diversions taking up valuable space on your Newsfeed.

On the downside, you will no longer be able to use your Facebook login to log into other websites (this is better for security anyway).  You also will no longer be able to post photos automatically from your camera.
You will still be able to post Facebook ads for your business.  You also, as of this writing, will not lose any old photos or posts from apps that were made previously (though Facebook claims that you will in their warning message).

Virus Infected Medical Diagnostic Machines Help Leak Patient Data

With the advent of computerization, even the most basic medical devices often boast computing power several times the standard computers of the 1990's.  X-Ray, MRI, and other monitoring devices have gone digital, with the ability to save and store copies of patient scans.  Typically isolated from the outside world on secure corporate  networks, security is not always the first thought when design image storage for an MRI machine.  Unfortunately, a recent report from security consultancy TrapX has revealed that these digital storage spaces can be misappropriated  by viruses which have made their way into corporate networks.  After viruses, malware, and other softwares installed by criminals and hackers have been eradicated from office computers and tablets at a medical facility, reinfection may still occur as a result of these hidden copies of the virus, lurking among patient data.

How to Secure Hospital Technology - HCCI-215 Session 6

We've previously discussed how some healthcare organizations are putting private files on search engines, unaware that they are doing so, how others are leaving private information in public press releases and photos, how hackers can steal or reconstruct a corporate email database, and more.  This entire work has been, not a 10,000 foot view, but in-depth review for the average computer user of the endless ways that healthcare organizations can mistakenly arm the criminals and competitors looking for security holes to take advantage of.  Now, we'll pull all that knowledge together into a timeline for a potential hack.  Though the following scenario may strongly resemble actual hospital data breach cases, the details are mere speculation, intended to demonstrate how these techniques are used to bypass hospital technology security measures.

What Breaking Bad Can Teach Us About Business Ethics

Are financial criminals like drug dealers?  Do MBA students, mailroom clerks, IT professionals, Directors of Finance, and a host of other professionals carry some "Seed of Evil" within them?  Vanity Fair and FBI profiler, Candice Delong, examined Walter White's precipitous descent from educator to drug kingpin.  Their findings suggest that strong parallels can be found between that Hollywood drama and the true-lives of many business professionals turned criminal.  As we'll discuss, white-collar criminals nearly always find justification for their actions in their own minds and are seldom motivated by money alone.

How to Turn an Email Server Rogue - HCCI-214 Session 5

Can your email server be programmed for evil?  Chances are it's already happened!

It may sound like a pulp 60's spy novel, but the truth is your technology can be turned against you at any time.  Whatever benefit any automated system provides to your organization, there are those who would like to subvert its automatic behavior to their own nefarious uses.  Having laid the groundwork in previous sessions for the potential methods that a competitor might use to gain access to confidential strategic data at your organization, we will now begin to pull resources together into what a real life attack might look like.