Monday, April 29, 2013

The school im going to next year is UMASS Lowell. 


ULowell is apublic university in LowellMassachusettsUnited States, and part of the University of Massachusetts system. With more than 1100 faculty members and more than 16,000 students, it is the largest university in the Merrimack Valley, the second-largest state institution behind UMass Amherst.
The university offers more than 120 degree choices, internships, bachelor’s to master’s programs and doctoral studies in the colleges of Fine Arts, Humanities and Social Sciences, Sciences, Engineering and Manning School of Business, the School of Health and Environment and the Graduate School of Education.

Im going to major in music education. Supposedly their music program is really good. Im going to be living in one of the dorms.

Monday, April 1, 2013

Fan Fiction

Fan Fiction is a broadly-defined fan labor term for stories about characters or settings written by fans of the original work, rather than by the original creator. Works of fan fiction are rarely commissioned or authorized by the original work's owner, creator, or publisher; also, they are almost never professionally published. Because of this, many stories often contain a disclaimer stating that the creator of the work owns none of the characters. Fan fiction, therefore, is defined by being both related to its subject's canonical fictional universeand simultaneously existing outside the canon of that universe.[1] Most fan fiction writers assume that their work is read primarily by other fans, and therefore tend to presume that their readers have knowledge of the canon universe (created by a professional writer) in which their works are based.

I love to read fanfiction because it takes all the fictional books that i have read and people can make their own versions of it

The most common site for this is fanfiction.net

Friday, March 22, 2013


  1. Tron
  2. The social Network
  3. Iron Man 1/2
  4. Minority Report
  5. War Games
  6. Transformers
  7. Star Trek

Thursday, March 21, 2013

So for my senior service i was a little late. I blame the MBTA because they are always late in everything that they do. When i got to the site, I was greeted warmly, but I couldn't find the person I was going to be working with for the duration of my service. When i found her, it was almost time for recess. There was a lot of snow out side from the day before so we were going to have indoor recess. I completely took over the basketball section. I lowered the adjustable hoops to a height of 8 feet. With the hoop that low i was able to dunk like Lebron James and Dwight Howard.

The kids were so excited. They wanted to throw me the alley. I performed a reverse alley-oop for them. With the 5th graders, I played a 3 on 3 game. I broke a kid's ankles and drove to the basket, dunking the ball like Blake Griffin. After having 4 recesses in a row, i was really tired so I took a break to get my energy back. Then they dismissed me at 2 o'clock.

Monday, March 4, 2013

Project Greek Island: True or False

In the 1950’s, the United States government allegedly set into plans to create a secret emergency relocation complex to protect the members of Congress in the event of a nuclear attack or detrimental contamination. The location is allegedly located at The Greenbrier hotel in West Virginia, just a short tripfrom Washington DC. The construction of the bunker was performed simultaneously with the renovation of one of the wings of the hotel to keep it secret.

Outside of Hotel
Project Greek Island

Hotel Blueprint with Bunker


I believe that this secret bunker rumor is true. There is a growing threat of a nuclear war coming, and there could be a need of these bunkers. Shouldn't the government add more bunkers for the people as well?



Tuesday, January 29, 2013

Yale ITS poster warning about email phishing schemes.
Phishing is a very serious crime. It involves attempting to acquire  information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by pretending to be a trusting entity.
It was reportedly first used in 1995. There are several different phishing techniques that can be used. 
  1. ^ "What is spear phishing?"Microsoft Security At Home. Retrieved June 11, 2011.
  1. ^ "Fake subpoenas harpoon 2,100 corporate fat cats". The Register. April 17, 2008. Archived from the original on 2011-01-31.



Phishing
Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.
Spear Phishing
Phishing attempts directed at specific individuals or companies have been termed spearphishing. Attackers may gather personal information about their target to increase their probability of success.
Clone Phishing
A type of phishing attack whereby a legitimate, and previously delivered, email containing an attachment or link has had its content and recipient address(es) taken and used to create an almost identical or cloned email. The attachment or Link within the email is replaced with a malicious version and then sent from an email address spoofed to appear to come from the original sender. It may claim to be a re-send of the original or an updated version to the original.
This technique could be used to pivot (indirectly) from a previously infected machine and gain a foothold on another machine, by exploiting the social trust associated with the inferred connection due to both parties receiving the original email.
Whaling
Several recent phishing attacks have been directed specifically at senior executives and other high profile targets within businesses, and the term whaling has been coined for these kinds of attacks.