Iced Beetroot and Gin Shots

December 6th, 2010 PhoenixCOZA Posted in My Thoughts No Comments »

The recent fitness frenzy had me considered juicing and I stumbled on another great recipe. The ideal drink for the African Festive season. The frenzy has moved on to looking at alternatives , healthy does not mean dull and skinny.

‘What’s good about this recipe is that it contains Vitamin C, and Vitamin G.’  Vitamin G being, of course, neat gin,’

Beetroot and Gin Shots

Beetroot and Gin Shots

Beetroot and Gin Shots

6 large beetroot, or 12 smaller ones

For the stock:

1 stick celery, chopped

3 stalks parsley

a large carrot, scraped and roughly chopped

1 onion, peeled and quartered

1 clove

1  bay leaf

6 peppercorns

½ tsp (2.5 ml) caraway seeds

1 tsp (5 ml) salt

1.2  litres water

beetroot trimmings [see recipe]

To serve:

white pepper

1 tsp (5 ml) Tabasco sauce

300 ml gin, or more, to taste

small spring onions, trimmed

Preheat the oven to 180°C. Trim the leafy tops off the beetroot, leaving 5 cm of stalk intact. Wipe the beetroot with a cloth, but don’t wash, peel or cut them. Wrap them in a double layer of foil and place in the oven.  Bake until completely tender when pierced with a sharp knife (how long this will take will depend on the size and age of the beetroot; for baby beetroot, an hour is enough. Very elderly beets can take up to 3 hours.)  Remove the packet from the oven and allow to cool.

Put a piece of newspaper or greaseproof paper on your kitchen counter. Trim the beetroot of stalks and roots, slip off their skins, and set all these trimmings to one side. Quarter the peeled beetroot and place in the goblet of a liquidiser.  Blitz until you have a fine purée (if the mixture is too thick for the blades to turn, add a little water).  Pour into a large bowl and refrigerate.  Now make the stock:  put the reserved beetroot trimmings into a saucepan and add the remaining stock ingredients. Bring to the boil, then turn down the heat and simmer for an hour, topping up with water every now and then if necessary, and skimming off any foam.

Strain the stock through a colander onto the chilled beetroot purée.  Add the Tabasco sauce and season with white pepper, and a little more salt, to taste. Stir well.

Now pass the soup through a fine sieve. Place in the fridge again and chill for two to three hours. An hour before serving, place the shot glasses and the gin in the freezer.  Remove the soup from the fridge and stir in the cold gin.  Put the soup into a jug with a sharp pouring nozzle and fill each glass almost to the brim.  Add a spring onion to each glass. Serve immediately.

This recipe makes 36 shots of 60 ml (4 T) each, or two litres of soup (which will serve 8 people, as a starter).

For the full article which makes for some interesting reading see.
Borscht in Small Glasses: Iced Beetroot and Gin Shots by Scrumptious South Africa

Flush DNS in Windows Vista

December 1st, 2010 PhoenixCOZA Posted in My Thoughts No Comments »

Perhaps you need to clear a corrupted DNS cache! Resetting or “Flushing” this cache is an easy fix that may resolve your problems.
In order to Flush your windows DNS cache in Vista :

  • Click the Start
  • Now click All Programs
  • Then Accessories
  • Then Command Prompt
  • Right-click on it and ‘Run As Administrator’
  • Type the following and hit Enter:
  • ipconfig /flushdns
  • After a few moment you should be able to see a confirmation window:
  • Windows IP Configuration. Successfully flushed the DNS Resolver Cache.

Should these steps fail you might need to start the DNS Client  Service using the steps in the article below.

Fix “Could not flush the DNS Resolved Cache: Function failed during execution” When Flushing DNS

PhoenixCOZA’s Posts Posted via email from PhoenixCOZA’s Posts Perhaps you need to clear a corrupted DNS cache! Resetting or “Flushing” this cache is an easy fix that may resolve your problems.In order to Flush your windows DNS cache in Vista : Click the Start Now click All ProgramsThen Accessories Then Command PromptRight-click on it and ‘Run As Administrator’ …


Runners guide to free Men’s Health, Women’s Health or Runner’s World

November 3rd, 2010 PhoenixCOZA Posted in My Thoughts No Comments »

The single most important indicator to your physical fitness and well-being is your heart rate. The urge to splash out on a heart rate monitor seems like a moment of  brilliance, once you have made that commitment to have a medical checkup and start with a basic training plan and stick to it. So if casual running with no long term commitment sound better why not get some basic data which might motivate you to continue and invest in something that measures you pants size, heart rate, abs and ego.

Your immediate goals and future interests require some basic recording such as

  • weight
  • height
  • lap time
  • distance

So lets get to the free stuff !

http://www.sportline.com is offering one years Free Digital subscrption to

  • Men’s Health
  • Women’s Health
  • Runner’s World or
  • Prevention

until December 2010.

The Sportline pedometer is simply the easiest Sportline product to use whether your running, walking or setting goal steps in your daily routine. The data collected can be entered on

The registration for mapmyrun.com is free and will record all data for 3 Months with many more features including

Mapping Application

Online Training tools and fitness calculators

Global Event Listings

Create your own Events

Iphone and Blackberry applications


MapMyRun Premium Membership!

See our next guide to setting up your pedometer

Next guide


Strong Passwords not your primary security concern

September 9th, 2010 PhoenixCOZA Posted in My Thoughts No Comments »

Creating a password which is strong is easier said than done as we use multiple networks, email accounts social platforms and webapplications. The administrator sees one network and sets requirements.

Create a strong password with alpha-numeric characters without any personal information or words in the dictionary. Do not write it down and change it every months and so not forget it.

These simple instructions are supposed to protect us. 

The three networks I use of which two large institiutions have similiar protocols, however both are infected by trojans and keyloggers. Granted both are places for future IT experts and hackers, the danger though is that many users trust these networks to do online banking for example. My personal laptop and Internet Security Softweare keeps some protection from these dangerous networks, however a condom can only protect you so many times. The risk is on the doorstep.

"

Some computer security experts are advancing the heretical thought that passwords might not need to be “strong,” or changed constantly. They say onerous requirements for passwords have given us a false sense of protection against potential attacks. In fact, they say, we aren’t paying enough attention to more potent threats.

Here’s one threat to keep you awake at night: Keylogging software, which is deposited on a PC by a virus, records all keystrokes — including the strongest passwords you can concoct — and then sends it surreptitiously to a remote location.

“Keeping a keylogger off your machine is about a trillion times more important than the strength of any one of your passwords,” says Cormac Herley, a principal researcher at Microsoft Research who specializes in security-related topics. He said anti virus software could detect and block many kinds of key loggers, but “there’s no guarantee that it gets everything.”

After investigating password requirements in a variety of settings, Mr. Herley is critical not of users but of system administrators who aren’t paying enough attention to the inconvenience of making people comply with arcane rules. “It is not users who need to be better educated on the risks of various attacks, but the security community,” he said at a meeting of security professionals, the New Security Paradigms Workshop, at Queen’s College in Oxford, England. “Security advice simply offers a bad cost-benefit tradeoff to users.”

One might guess that heavily trafficked Web sites — especially those that provide access to users’ financial information — would have requirements for strong passwords. But it turns out that password policies of many such sites are among the most relaxed. These sites don’t publicly discuss security breaches, but Mr. Herley said it “isn’t plausible” that these sites would use such policies if their users weren’t adequately protected from attacks by those who do not know the password.

Mr. Herley, working with Dinei Florêncio, also at Microsoft Research, looked at the password policies of 75 Web sites. At the Symposium on Usable Privacy and Security, held in July in Redmond, Wash., they reported that the sites that allowed relatively weak passwords were busy commercial destinations, including PayPal, Amazon.com and Fidelity Investments. The sites that insisted on very complex passwords were mostly government and university sites. What accounts for the difference? They suggest that “when the voices that advocate for usability are absent or weak, security measures become needlessly restrictive.”

Donald A. Norman, a co-founder of the Nielsen Norman Group, a design consulting firm in Fremont, Calif., makes a similar case. In “When Security Gets in the Way,” an essay published last year, he noted the password rules of Northwestern University, where he then taught. It was a daunting list of 15 requirements. He said unreasonable rules can end up rendering a system less secure: users end up writing down passwords and storing them in places that can be readily discovered.

“These requirements keep out the good guys without deterring the bad guys,” he said.

Northwestern has reduced its password requirements to eight, but they still constitute a challenging maze. For example, the password can’t have more than four sequential characters from the previous seven passwords, and a new password is required every 120 days.

By contrast, Amazon has only one requirement: that the password be at least six characters. That’s it. And hold on to it as long as you like.

A short password wouldn’t work well if an attacker could try every possible combination in quick succession. But as Mr. Herley and Mr. Florêncio note, commercial sites can block “brute-force attacks” by locking an account after a given number of failed log-in attempts. “If an account is locked for 24 hours after three unsuccessful attempts,” they write, “a six-digit PIN can withstand 100 years of sustained attack.”

Roger A. Safian, a senior data security analyst at Northwestern, says that unlike Amazon, the university is unfortunately vulnerable to brute-force attacks in that it doesn’t lock out accounts after failed log-ins. The reason, he says, is that anyone could use a lockout policy to try logging in to a victim’s account, “knowing that you won’t succeed, but also knowing that the victim won’t be able to use the account, either.” (Such thoughts may occur to a student facing an unwelcome exam, who could block a professor from preparations.)

VERY short passwords, taken directly from the dictionary, would be permitted in a password system that Mr. Herley and Stuart Schechter at Microsoft Research developed with Michael Mitzenmacher at Harvard.

At the Usenix Workshop on Hot Topics in Security conference, held last month in Washington, the three suggested that Web sites with tens or hundreds of millions of users, could let users choose any password they liked — as long as only a tiny percentage selected the same one. That would render a list of most often used passwords useless: by limiting a single password to, say, 100 users among 10 million, the odds of an attacker getting lucky on one attempt per account are astronomically long, Mr. Herley explained in a conversation last month.

Mr. Herley said the proposed system hadn’t been tested and that users might become frustrated in trying to select a password that was no longer available. But he said he believed an anything-is-permitted password system would be welcomed by users sick of being told, “Eat your broccoli; a strong password is good for security.”

"
Source :
A Strong Password Isn’t the Strongest Security By RANDALL STROSS

PhoenixCOZA’s Posts Posted via email from PhoenixCOZA’s Posts Creating a password which is strong is easier said than done as we use multiple networks, email accounts social platforms and webapplications. The administrator sees one network and sets requirements. Create a strong password with alpha-numeric characters without any personal information or words i …