Метка: data and network security

  • Home owner’s insurance claim cash settlements

    Home owner’s insurance claim cash settlements

    When filing a homeowner’s insurance claim, most people want to be sure they get a fair settlement. By preparing in advance and following your insurance company’s claims process correctly, the majority of homeowners should be adequately compensated for losses arising from insurable perils. There are, however, some things you need to be aware of which affect the outcome of your claim settlement. The key factors in determining any homeowner’s insurance claim for cash settlement are the type of policy and limits of coverage purchased. One of the most common causes of homeowner dissatisfaction with claims settlements tend to be misunderstanding the policy correctly and having the right coverage in place before the need to make a claim occurs.

    In the event your property is broken over and above repair, the majority of typical homeowner’s plans protect replacement, up to the actual money control chosen. Provided that one’s policy’s boundaries are usually increased along with inflation to keep up along with relevant regional constructing expenses, any damage resulting from insurable challenges need to create a claim settlement which is satisfactory to improve the house.

    lawsuit financing
    cash settlements

    Know whether ones insurance plan protects replacement price or maybe cash price: 

    Replacing Cost Insurance policy – replaces an item with a including object from the exact same quality.

    Cash Value Insurance policy – replaces an item without depreciation.

    Lengthy Replacing Cost Insurance policy – makes sense up to and including chosen fraction (usually 20 to twenty-five percent) over the control to improve the house, safeguarding you next to unexpected rises throughout structure expenses, which will often occur after having a substantial size organic tragedy, although does not allow for more costly resources as compared to actually employed.

    Portable House, Reported Amount – cell properties may be guaranteed with a expressed amount insurance plan, that means the maximum amount is usually consented to once the insurance plan is usually released, therefore be sure you revise it every year if you would like it to pay all of the replacement price.

    Make sure your property pertaining to 100% from the Replacing Cost – in case you produce important advancements to your home, disclose this for your insurance company and also focus on how to assure most of these could be coated.

    In case you don’t agree along with just how your own assert is being taken care of, get in touch with your own insurance carrier. Remain in communication with all your promises man or woman genuinely as well as freely. For anyone who is not receiving the information you sense you deserve, consult in order to get in touch with any inspector or even boss go over your own assert. Do not forget that substantiating your own damage is the best obligation; documenting as well as copying your own assert with the suitable results may help. Should you not agree with the arrangement amounts, politely although tightly obtain the crooks to clarify the numbers in detail as well as indicate any blunders or even mistakes you sense your own certification can handle. In case you nonetheless not agree with the assert arrangement, you can go up to a good value determination practice to claim cash settlements, despite the fact that you might incur charges.

  • NSA Backdoors in Cisco Routers

    NSA Backdoors in Cisco Routers

    The more I read about this NSA scandal (and yes, I do consider it a scandal) the less I trust US-based hardware and software companies.  There is no reason for anyone to doubt that all Cisco hardware comes with a backdoor.  Since such backdoors most likely exist it is a matter of time before hackers discover and exploit them.  This has already happened to Microsoft a number of times and there is no reason it could not happen to Cisco.  We no longer trust any of our Cisco hardware and have already started researching network alternatives.
    Gen Keith Alexander
    This is no longer a crackpot conspiracy theory, it is reality.
    In all liklihood we may use a series of firewalls to further insulate our network from intrusion.  To keep costs down we may keep our existing Cisco hardware in this topology, but we will not replace it with Cisco hardware when it fails or needs to be upgraded.  I am doing the same with my home network.

    Edward Snowden

    Over the past few months we have already moved all of our email to secure overseas servers and changed all of our antivirus software from McAfee to AVG and Avast.  We are also researching Linux distros to replace Microsoft.
    If Cisco wants to protect their brand they need to either take a stand or see their market share continue to erode.  Surely there is ONE CEO at an American company that will take this stand and be a hero rather than continue to be a lap dog.
  • 12 True Tales from Gen Keith Alexander about Creepy NSA Cyberstalking

    The NSA has released some details of 12 incidents in which analysts used their access to America’s high-tech surveillance infrastructure to spy on girlfriends, boyfriends, and random people they met in social settings. It’s a fascinating look at what happens when the impulse that drives average netizens to look up long-ago ex-lovers on Facebook is mated with the power to fire up a wiretap with a few keystrokes.

    One such analyst working on foreign soil started surveillance on nine phone numbers belonging to women over five years, from 1998 to 2003. He “listened to collected phone conversations,” according to a letter from the NSA’s Inspector General to Senator Charles Grassley released today. The unnamed spy conducted “call chaining” on one of the numbers — to determine who had called, or been called from, the phone — and then started surveillance on two of those numbers as well.

    He was thwarted only after a woman he was sleeping with reported her suspicions that the analyst had been listening to her phone calls. The analyst resigned.
    In 2011, another civilian NSA employee abroad “tasked” the telephone number of her boyfriend and other foreign nationals. When she was asked about it, she claimed it was her practice to query the phone numbers of people she met socially to make sure she wasn’t talking to “shady characters.” (Because you wouldn’t want that.)
    In 2005, a military member used his first day of access to run six e-mail addresses belonging to an ex-girlfriend.
    Some of the abuses were referred to the Department of Justice, but none resulted in prosecution. The complete letter to Grassley follows.
  • How to build the BGP UPDATE packet


    bgp-update-create is a small program used to generate the payload of a BGP UPDATE message. It was written to test if routes could be injected in a BGP conversation between two routers.

    It’s usage is very simple; it takes three parameters:

    —as: Autonomous System number

    —nexthop: Host name or IP address of next hop

    —destnet: Network number/prefix to advertise

    To use it with tcphijack you just pipe its output to tcphijack, like in:

    sudo bgp-update-create —as 2 —nexthop 1.1.1.1 —destnet 2.2.2.2 | tcphijack […]

    or just send its output to a file and then use tcphijack’s -P switch to specify a payload:

    bgp-update-create —as 2 —nexthop 1.1.1.1 —destnet 2.2.2.2 > payload.dat


    sudo tcphijack […] -P payload.dat


    bgp-update-create
    is built at the same time as tcphijack (by typing «make»), the header files used by bgp-update-create.c come from the Zebra project.



    BGP Update Create download