The AI-generated cat pictures thread
Tour de Franzia
iTrader: (6)
Join Date: Jun 2006
Location: Republic of Dallas
Posts: 29,085
Total Cats: 375
AWESOME cover of Prince - Alphabet Street
original:
prince "alphabet street" (music video) on Vimeo
Blue States cover:
original:
prince "alphabet street" (music video) on Vimeo
Blue States cover:
Boost Pope
iTrader: (8)
Join Date: Sep 2005
Location: Chicago. (The less-murder part.)
Posts: 33,022
Total Cats: 6,590
The trade press has already gotten on-board. From this afternoon's Radio World Newsbytes:
Stations Urged to Protect Their EAS
EAS experts are cautioning broadcasters to change the password of their Emergency Alert System because of three known hacking incidents.
The first occurred in Montana; today, we learn of two others in Michigan.
The SBE National EAS committee urges station personnel to make sure the password of their Web interface for their Common Alerting Protocol EAS encoders/decoders is different from the factory default to thwart more potential hacking incidents.
Several broadcasting Listservs are reporting attempts to hack into EAS encoders/decoders with the apparent intent of transmitting bogus alerts.
The first station says a bogus alert aired yesterday. KRTV(TV), Great Falls, Mont., says hackers breached their EAS and announced that there was an emergency in several Montana counties. “This message did not originate from KRTV and there is no emergency,” said the station on its website, which added that its engineers were looking into what happened and if other stations were affected as well.
The fake alert warned about “dead bodies rising from the grave, and attacking the living,” according to the Great Falls Tribune, which added that the fake alert was also on the station’s website and Facebook page before being removed.
One engineer in Salt Lake City said on the SBE EAS Listserv he headed off such an attack: “There was no record of anything received on the box (CAP or legacy) but there was a transmission about bodies rising from the grave under a CEM header. I headed it off before any of our main channel stations aired it but it did auto-forward to our HD2 channels, as such an ‘emergency’ should have.”
The Mining Journal in Marquette, Mich. reports the “zombie” bogus alerts aired on two television stations in the Upper Peninsula as well: WNMU(TV) and WBUP(TV).
WNMU GM Eric Smith told the Journal this morning authorities found the source of the hacking overseas and the loophole in his station’s system has been closed.
The FCC and FBI were reportedly involved in investigating the incidents, along with local and state authorities, according to the account. RW is trying to confirm that information.
Engineers stress that stations should ensure their IP network for any piece of gear is firewall-protected and has a strong password.Radio World: Stations Urged to Protect Their EAS
Personally, I think it's hilarious. Years ago, we used to hack each other's EBS systems simply by driving up to your competitor's tower, pointing a portable transmitter at their receive antenna, and generating a bogus alert from the back of the van. Stuff like giving blizzard warnings in the middle of August in Florida, or tidal-wave warnings in Phoenix. (It wasn't such a big deal back then, as the system wasn't totally automated like it is now.)
Major props for issuing what, to the best of my knowledge, is the first EAS Zombie alert.
Stations Urged to Protect Their EAS
EAS experts are cautioning broadcasters to change the password of their Emergency Alert System because of three known hacking incidents.
The first occurred in Montana; today, we learn of two others in Michigan.
The SBE National EAS committee urges station personnel to make sure the password of their Web interface for their Common Alerting Protocol EAS encoders/decoders is different from the factory default to thwart more potential hacking incidents.
Several broadcasting Listservs are reporting attempts to hack into EAS encoders/decoders with the apparent intent of transmitting bogus alerts.
The first station says a bogus alert aired yesterday. KRTV(TV), Great Falls, Mont., says hackers breached their EAS and announced that there was an emergency in several Montana counties. “This message did not originate from KRTV and there is no emergency,” said the station on its website, which added that its engineers were looking into what happened and if other stations were affected as well.
The fake alert warned about “dead bodies rising from the grave, and attacking the living,” according to the Great Falls Tribune, which added that the fake alert was also on the station’s website and Facebook page before being removed.
One engineer in Salt Lake City said on the SBE EAS Listserv he headed off such an attack: “There was no record of anything received on the box (CAP or legacy) but there was a transmission about bodies rising from the grave under a CEM header. I headed it off before any of our main channel stations aired it but it did auto-forward to our HD2 channels, as such an ‘emergency’ should have.”
The Mining Journal in Marquette, Mich. reports the “zombie” bogus alerts aired on two television stations in the Upper Peninsula as well: WNMU(TV) and WBUP(TV).
WNMU GM Eric Smith told the Journal this morning authorities found the source of the hacking overseas and the loophole in his station’s system has been closed.
The FCC and FBI were reportedly involved in investigating the incidents, along with local and state authorities, according to the account. RW is trying to confirm that information.
Engineers stress that stations should ensure their IP network for any piece of gear is firewall-protected and has a strong password.
Personally, I think it's hilarious. Years ago, we used to hack each other's EBS systems simply by driving up to your competitor's tower, pointing a portable transmitter at their receive antenna, and generating a bogus alert from the back of the van. Stuff like giving blizzard warnings in the middle of August in Florida, or tidal-wave warnings in Phoenix. (It wasn't such a big deal back then, as the system wasn't totally automated like it is now.)
Major props for issuing what, to the best of my knowledge, is the first EAS Zombie alert.
Elite Member
iTrader: (2)
Join Date: Sep 2008
Location: Central Florida
Posts: 2,799
Total Cats: 179
Just a seal eating a shark (that it killed). No big whoop.
Shark-eating seal among rare and stunning scenes documented off South Africa
Of the former event, revealing the raw dynamics of the food chain, Chris Fallows said: "There were eight guests aboard our vessel, many of them seasoned wildlife enthusiasts. None had ever seen anything like this as sharks of this size are certainly not usually considered food for seals.
"In more than 2,000 expeditions working with sharks over the last 21 years, this is the only time I have ever seen a seal kill several sharks and I can find no record of such an event happening elsewhere."
The seal consumed the stomach and livers of the first two sharks, before killing three others.
"In more than 2,000 expeditions working with sharks over the last 21 years, this is the only time I have ever seen a seal kill several sharks and I can find no record of such an event happening elsewhere."
The seal consumed the stomach and livers of the first two sharks, before killing three others.