Saturday, February 17, 2018

Netiquette IQ Blog Of 2/17/18 - Weird Words Do You Know Their Meaning?





Updated February 16, 2018 via thoughtco.com
Word lovers and Scrabble players alike often seek out and celebrate weird and interesting words, challenging themselves to include these unusual terms in their everyday speech. We've amassed 11 of those weird words here; challenge yourself to use some of them in your conversations this week and see how your friends and teachers react.
01
of 11

adjective  bam·boo·zled  \ bam-ˈbü-zəld \
Definition: thrown into a state of confusion or bewilderment especially by being deliberately fooled or misled.
History: A word, a Spike Lee movie, a game show that Joey from “Friends” auditions for, and it’s even an app game... this word has made the rounds. It seems that most everyone agrees on the definition of this word, even Urban Dictionary, which defines it as, to be tricked or cheated. According to Merriam-Webster, bamboozle (verb) first appeared in 1703, derived from the 17th-century word “bam” which means to trick or con. More »
02
of 11

adjective kat-ee-wom-puh s
Definition: askew; awry; positioned diagonally.
History: Cattywampus comes from catawampus, which, according to Dictonary.com, likely came about between 1830 and 1840. It is derived from the prefix cata, meaning diagonally and likely wampus, which the site says is akin to the word wampish, meaning to flop about.  More »
03
of 11

verb dis-kuh m-bob-yuh-leyt  
Definition: To confuse, upset, frustrate.
History: An American word first used in 1825-1835, according to Dictionary.com, it’s a fanciful alteration of discompose or discomfort. More »
04
of 11

verb flab-er-gast
Definition: To overcome with surprise and bewilderment; astound.
History: There’s not much known about the origins of this word, though Dictionary.com says it’s from 1765-1775. More »
05
of 11

adjective  fop·pish  \ ˈfä-pish \
Definition: foolish, silly, obsolete.
History: This funky little word is derived from the word fop, which is used to redescribe a man who is excessively vain and worried about his dress and appearance; it also can mean a foolish or silly person. The adjective of foppish is similarly used to mean that something is obsolete, foolish or silly. It has been rolling off tongues for centuries now, first appearing in the late 1500s. More »
06
of 11

noun ja·lopy  \ jə-ˈlä-pē \
Definition: an old, decrepit, or unpretentious automobile.
History: An oldie but goodie, jalopy seems to be getting some love from “New York Post.” This word, an American word, dating back to 1925-1930, is often used when referencing items other than vehicles despite its specific meaning. According to Dictionary.com, a “Post” article recently revived the word once again, this time in an article about people updating their phones rather than buying new ones. The use of jalopy in this article spurred a more than 3,000% increase in searches for the word online. More »
07
of 11

noun loh-THAIR-ee-oh
Definition: a man whose chief interest is seducing women.
History: There’s something about this word that seems slick and seductive, so it’s no wonder that it literally means "a man who seduces women." The word made its debut in Nicholas Rowe’s “The Fair Penitent” in the early 1700s. The lead character, Lothario, was a notorious seducer; an attractive man with a charming exterior, he was really a haughty scoundrel whose main interest was in seducing women. More »
08
of 11

noun  \ ˈmēm \
Definition: an idea, behavior, style, or usage that spreads from person to person within a culture.
History: Believe it or not, the word meme was first used in 1976, as an abbreviation of the word mimeme in Richard Dawkins' book "The Selfish Gene" in which he discussed how ideas and styles spread within a culture over time. Today, the word has become synonymous with amusing captioned pictures and videos online. Think, Grumpy Cat or Salt Bae. More »
09
of 11

adjective  scru·pu·lous  \ ˈskrü-pyə-ləs \.
Definition: having moral integrity; acting in strict regard for what is considered right or proper; punctiliously exact, painstaking.
History: Scrupulous means that you are proper and have moral integrity and on the flip side, unscrupulous means, well, you aren’t. An unscrupulous person lacks morals, principles, and a conscience. The word is derived from scruple, which means a weight of a mere 20 grains, which was a meticulous measurement for apothecaries. More »
10
of 11

verb [tur-ji-ver-seyt]
Definition: to change repeatedly one's attitude or opinions with respect to a cause, subject, etc.
History: This unique word holds an honor that very few words can claim: it was named the 2011 Word of the Year by Dictionary.com. Why? According to the website, this weird word rose to fame “because it described so much of the world around us. Editors at Dictionary.com saw the stock market, political groups, and public opinion go through a roller coaster of change throughout 2011.”  More »
11
of 11

noun zen-uh-foh-bee-uh
Definition: fear or hatred of foreigners, people from different cultures, or strangers; fear or dislike of the customs, dress, etc., of people who are culturally different from oneself.
History: Another Dictionary.com Word of the Year, this time for 2016, Xenophobia has a special claim to fame. Meaning, fear of the other, the folks at Dictionary.com asked readers to reflect on its meaning rather than celebrate
+++++++++++++++++++++++++++++++
   Good Netiquette And A Green Internet To All!  =====================================================================
Tabula Rosa Systems - Tabula Rosa Systems (TRS) is dedicated to providing Best of Breed Technology and Best of Class Professional Services to our Clients. We have a portfolio of products which we have selected for their capabilities, viability and value. TRS provides product, design, implementation and support services on all products that we represent. Additionally, TRS provides expertise in Network Analysis, eBusiness Application Profiling, ePolicy and eBusiness Troubleshooting. We can be contacted at:
sales@tabularosa.net  or 609 818 1802.
 ===============================================================
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:


Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County

Thursday, February 15, 2018

Tabula Rosa Systems Blog Of 2/15/18 - Proper Use Of The cc: Field and World Hippo Day





World Hippo Day, Hurray.

 Donate here: 
http://go.saveanimalsfacingextinction.org/page/s/save-hippos?source=MS_EM_PET_2017.12.26_B2_Hippos_X__F1_S1_C1__all_RS&email=paulb@verizon.net&firstname=Paul&lastname=Babicki&zip=08560

 
 =====================


The Cc:  field

         All of the Netiquette outlined in the previous section applies to the Cc: field.  Care must be given for insuring that protection of privacy is absolutely provided for in this field which is visible to all recipients.  Those who are included here, as a rule, should be parties who have a direct interest in the subject.  These people should not be addressed in the salutation or body of text as their roles are passive and are not expected to reply or take action unless explicitly asked to do so.  If multiple responses are initiated more addressees should not be added unless it is clear that the previous information is appropriate to those added.  If this is not the case, the thread should be removed.  Those who are included in the Cc: field generally should not be active in responding to the message without good reasons.

         Many add bosses, supervisors or persons of higher rank in a Cc:  Most of the time, this is for good reason.  However, to include such persons to override an option, seek to impress or have motives outside the issue at hand, should  be seriously considered because of the risk of changing the tone, range or spirit of the communication.

         Conversely, there are circumstances in email threads for dropping someone from a To:, Cc: or Bcc: field. Since threads can last for a number of messages, what began as a courtesy for some might become a nuisance to those receiving them.   If there is diminishing or no further real significance for their involvement, Netiquette considerations should be given to determine if addressees should be dropped.  Also, beginning a new mail thread might be the most useful way to disengage from longer threads. 

         Besides maintaining appropriate form, content and consideration, good “Netiquette” goes beyond these disciplines.  Do not Cc: groups if your email is to your supervisor(s) or persons of authority.  This can be interpreted in a very negative way and can prove to be a significant embarrassment.

++++++++++++++++++++++++++++++++

   Good Netiquette And A Green Internet To All!  =====================================================================
Tabula Rosa Systems - Tabula Rosa Systems (TRS) is dedicated to providing Best of Breed Technology and Best of Class Professional Services to our Clients. We have a portfolio of products which we have selected for their capabilities, viability and value. TRS provides product, design, implementation and support services on all products that we represent. Additionally, TRS provides expertise in Network Analysis, eBusiness Application Profiling, ePolicy and eBusiness Troubleshooting. We can be contacted at:
sales@tabularosa.net  or 609 818 1802.
 ===============================================================
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:


Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County.

Wednesday, February 14, 2018

Buffer Overflow from whatis.com Buffer overflow is an attack vector that can be exploited by sending more data to a fixed length block of memory (buffer) than the fixed length block of memory is allocated to hold. When there is excess data, it gets written to an adjacent buffer and will overwrite whatever data is being held there. Buffers are vulnerable to attack when applications fail to validate input from the client or other processes and flag or discard data when too much is sent to a memory buffer. Buffer overflow always ranks high in the Common Weakness Enumeration/SANS Top 25 Most Dangerous Software Errors and is specified as CWE-120 under the Common Weakness Enumeration dictionary of weakness types. Despite being well understood, buffer overflows continue to plague software from vendors both large and small. Vendors issue patches and updates for their software to fix buffer overflow vulnerabilities that have been discovered, but there is still a period of risk between the vulnerability being discovered and the patch being created and deployed. Techniques to exploit buffer overflow vulnerabilities vary based on the operating system and programming language, but the goal is always to manipulate a computer's memory to subvert or control program execution. Buffer overflows are categorized according to the location of the buffer in the process memory, the two main types being stack-based overflow and heap-based overflow. ====================== Good Netiquette And A Green Internet To All! ===================================================================== Tabula Rosa Systems - Tabula Rosa Systems (TRS) is dedicated to providing Best of Breed Technology and Best of Class Professional Services to our Clients. We have a portfolio of products which we have selected for their capabilities, viability and value. TRS provides product, design, implementation and support services on all products that we represent. Additionally, TRS provides expertise in Network Analysis, eBusiness Application Profiling, ePolicy and eBusiness Troubleshooting. We can be contacted at: sales@tabularosa.net or 609 818 1802. =============================================================== In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at: www.amazon.com/author/paulbabicki Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com. In addition to this blog, I maintain a radio show on BlogtalkRadio and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and Yahoo. I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and PSG of Mercer County.





        
Buffer Overflow from whatis.com
Buffer overflow is an attack vector that can be exploited by sending more data to a fixed length block of memory (buffer) than the fixed length block of memory is allocated to hold. When there is excess data, it gets written to an adjacent buffer and will overwrite whatever data is being held there. Buffers are vulnerable to attack when applications fail to validate input from the client or other processes and flag or discard data when too much is sent to a memory buffer.
Buffer overflow always ranks high in the Common Weakness Enumeration/SANS Top 25 Most Dangerous Software Errors and is specified as CWE-120 under the Common Weakness Enumeration dictionary of weakness types. Despite being well understood, buffer overflows continue to plague software from vendors both large and small. Vendors issue patches and updates for their software to fix buffer overflow vulnerabilities that have been discovered, but there is still a period of risk between the vulnerability being discovered and the patch being created and deployed.
 
Techniques to exploit buffer overflow vulnerabilities vary based on the operating system and programming language, but the goal is always to manipulate a computer's memory to subvert or control program execution. Buffer overflows are categorized according to the location of the buffer in the process memory, the two main types being stack-based overflow and heap-based overflow.
   ======================
   Good Netiquette And A Green Internet To All!  =====================================================================
Tabula Rosa Systems - Tabula Rosa Systems (TRS) is dedicated to providing Best of Breed Technology and Best of Class Professional Services to our Clients. We have a portfolio of products which we have selected for their capabilities, viability and value. TRS provides product, design, implementation and support services on all products that we represent. Additionally, TRS provides expertise in Network Analysis, eBusiness Application Profiling, ePolicy and eBusiness Troubleshooting. We can be contacted at:
sales@tabularosa.net  or 609 818 1802.
 ===============================================================
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:


Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County.