Scannable Resume

Include your address. Many programs will kick your resume to the curb without a postal address. Locations may even be included as keywords in the screening process. Just make sure you don’t only include it in the header or footer, which most algorithms ignore completely.

Do not place your contact information in the header of your resume, because filtering softwares can be set to ignore headers and footers so there is a risk this information will be deleted.

Choose a conservative font such as Verdana, Arial, Tahoma, or Calibri. Gillis says that serif fonts, such as Times Roman or Cambria may be rejected by screening software. Do not use any script fonts.

The smallest font size to use for the body of your resume should be 11 point. “Any smaller and you’re probably asking for trouble.”

Use bullets rather than paragraphs to de scribe your work. Not only are bulleted lists easier for human eyes to read, but they are also easier for screeners to navigate than long paragraphs describing work history and responsibilities.

No graphics or logos. Do not format using tables. No borders. A one-inch margin top and bottom is best. Do not use any lines that cross the entire page from margin to margin, because “some filters have been created that will reject a document for nothing more than having a single line run continuously across the page,”

Submit resumes in text format rather than PDFs or MS Word. Word causes all manner of parsing errors and PDFs have caused problems in the past with application tracking systems. It’s wiser to stick with text, which has no known parsing problems with screening software.

Spell out and abbreviate any certification or title in your resume, a la “Cisco Certified Network Associate (CCNA)” or “Chief Information Officer (CIO).” This is a catch-all as you won’t know if the software is looking for CCNA or Cisco Certified Network Associate.

Don’t place dates before work experience on your resume. While this may look better, it confounds the robots. Instead, begin with the name of the employer. Move on to your professional title and the date range. Don’t forget to include all titles you held at your employer and the dates you held the titles.

Use keywords from the job description. The pair say keywords listed in a job description, for example “network engineer”, “project manager” or any specific hardware or software listed, are likely to be searched for by the software.

First, the software removes all formatting from the resume and scans for specific recognized keywords and key phrases.
Next, it sorts the content of your resume into individual categories:
Education
Contact Information
Skills
Work Experience

Hackable personal email? Yay, you probably do.

Easiest and first steps to hack a personal emai – security questions.

Yep. Remember 7 years ago when you first setup your email account? Remember the step of answering 3 personal security questions? Remember what they weren’t? No? It was probably the city you grew up in. The same hometown city posted in your social profile.

New browser tab now, login in and revisit your account. Oh, and enable 2 part verification man!

Mac OS X Freezes when Loading Internet Accounts

SOLUTION – Delete a file and kill a process
Solution to Preferences freezing when Loading Internet Accounts was found within Apple Support Communities courtesy of user bthomp2420.

https://discussions.apple.com/message/25003487#25003487

From the post:

Delete the contents of ~/Library/Caches/com.apple.iCloudHelper
Kill the com.apple.iCloudHelper process in the Activity Monitor

Tweak font on a MAC

To implement this tweak:
1. Start a new Terminal session (in Finder click Applications > Utilities > Terminal).
2. To set this to Strong, type (or copy and paste) the following command:
defaults write NSGlobalDomain AppleFontSmoothing -integer 4
To set this to Smoother, type (or copy and paste) the following command:
defaults write NSGlobalDomain AppleFontSmoothing -integer 3
To set this to Medium, type (or copy and paste) the following command:
defaults write NSGlobalDomain AppleFontSmoothing -integer 2
To set this to Minimal, type (or copy and paste) the following command:
defaults write NSGlobalDomain AppleFontSmoothing -integer 1
To set this to Disabled, type (or copy and paste) the following command:
defaults write NSGlobalDomain AppleFontSmoothing -integer 0
3. To reset this setting to the default value, type (or copy and paste) the following command:
defaults delete NSGlobalDomain AppleFontSmoothing
4. To activate this tweak please reboot the system.
Close the Terminal session by typing exit at the prompt.

Fully disable Protection and Gatekeeper.

Fully disable Protection and Gatekeeper.

Follow these steps to disable SIP:
1. Restart your Mac.
2. Before OS X starts up, hold down Command-R and keep it held down until you see an Apple icon and a progress bar. Release. This boots you into Recovery.
3. From the Utilities menu, select Terminal.
4. At the prompt type exactly the following and then press Return: csrutil disable
5. Terminal should display a message that SIP was disabled.
6. From the  menu, select Restart.
You can re-enable SIP by following the above steps, but using csrutil enable instead.
Restart your Mac, and as soon as the screen turns black hold down

COMMAND + R
csrutil disable

Gatekeeper is a great feature in OS X that prevents applications from unidentified developers from opening up, which helps keep malware off your computer. Advanced users don’t really need it though, but when you turn it off, it reenables itself after 30 days. Thankfully Terminal can solve this problem.
When you turn Gatekeeper off, it only stays off for 30 days. This can be annoying if you’re the type who knows what you’re doing in OS X. To disable this function, open up Terminal (Applications > Utilities) and type in the following command:

sudo defaults write /Library/Preferences/com.apple.security GKAutoRearm -bool NO

No-Ads PAC file.

If you’re running a web server on your computer, you should use a PAC file rather than the HOSTS file to block ads so you can change to a port that doesn’t conflict. By default, BlackHoleProxy uses port 3421 because it was designed to be used with the No-Ads PAC file.

Last but not least, don’t forget to clear your browser’s cache after setting up your ad-blocking HOSTS or PAC file, or the ads will be retrieved from your cash

no-ads.paf

Makin’ Kopies
Veronica Belmont

Stalking Veronica Belmont

Oh my Veronica Belmont! Damn you Ryan Block!

Well, thankfully, thanks to the internet, you can digitally stalk that unattainable hottie, and I did! Here are my favorite pictures of one of the hottest girls in tech – Veronica Belmont!

Enjoy!

Zero-day exploit
W32/VBMania: The most Terrifying zero-day exploit in 2010 and McAfee’s frakin awesome free tool to clean your system.

And it’s  F**ing Rad and Free!

Available from McAfee lab’s at: http://vil.nai.com/vil/stinger/

But, What it it?

McAfee Lab’s has a free  utility called Stinger and it’s pretty amazing for being free since it’s using some enterprise level features. It comes with a limited DAT (which is like a small database of known virus), but will also access our enterprise level Artemis Technology scan engine over a internet connection.

The Artemis scan engine runs separately from the general DAT that cheap and free Anti-Virus companies use.

It does a network check of the file MD5 hash and compare it to our huge database of known good and bad files! Hence, will detect variants before they haven even been detected and added to the DAT.

I guess were are slowly moving away from a DAT environment to a real-time network file verification system.

Besides that! Go get it!
Download the free scanner tool from McAfee lab’s at: http://vil.nai.com/vil/stinger/
Below are my recommended settings if you have a malware outbreak
and want MAXIMUM detection and removal.
BE SAFE, USE THE DEFAULT SETTINGS!!

More on W32/VBMania@mm:

https://kc.mcafee.com/corporate/index?page=content&id=KB69857

http://home.mcafee.com/VirusInfo/VirusProfile.aspx?key=275435
This Virus has been seen in large spam runs with the subject line: “Here you have”.
When executed, the following files are dropped:
%WINDIR%\system\Administrator CV 2010.exe
%WINDIR%\system\updates.exe
%WINDIR%\Administrator CV 2010.exe
%WINDIR%\autorun.inf
%WINDIR%\autorun2.inf
%WINDIR%\csrss.exe
%WINDIR%\vb.vbs
%DIR%\Administrator CV 2010.exe
%WINDIR%\tryme1.exe
%WINDIR%\im.exe
%WINDIR%\csrss.exe
%WINDIR%\vb.vbs
%TEMP%\~DF1DC7.tmp
%WINDIR%\ie.exe
%WINDIR%\rd.exe
%WINDIR%\re.exe
%WINDIR%\system\updates.exe
%WINDIR%\SYSTEM32\SendEmail.dll
%WINDIR%\gc.exe
%WINDIR%\hst.iq
%WINDIR%\ff.exe
%WINDIR%\op.exe
%WINDIR%\pspv.exe
%WINDIR%\re.iq
%WINDIR%\ff.dlm
%APPDATA%\addons.dat
Where %WINDIR% = \WINDOWS (Windows 9x/ME/XP/Vista/7), \WINNT (Windows NT/2000)
The following files were temporarily written to disk then later removed:

%WINDIR%\ff.iq
%WINDIR%\ie.iq
%WINDIR%\SendEmail.iq
%WINDIR%\w.iq
%WINDIR%\m.iq
%WINDIR%\gc.iq
%WINDIR%\SYSTEM32\drivers\etc\hosts
%WINDIR%\pspv.iq
%WINDIR%\w.exe
%WINDIR%\tryme.iq
%WINDIR%\im.iq
%WINDIR%\rd.iq
%TEMP%\~DFAFA.tmp
%WINDIR%\m.exe
%WINDIR%\SendEmail.dll
%WINDIR%\b.bat
%WINDIR%\op.iq
The following file was modified:

%WINDIR%\SYSTEM32\wbem\logs\wbemprox.log
The malware has been known to randomly delete certain existing executables and replaces the current host file.
Registry changes are made like the ones below to prevent certain system tools from running. This is a subset of the complete changes :
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\00hoeav.com
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\0w.com
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rpt.ExE
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safe.ExE
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safebox.ExE
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.ExE
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\6.bat
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\6fnlpetp.exe
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\6x8be16.cmd
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\a2cmd.ExE
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\a2free.ExE
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\a2service.ExE
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\a2upd.ExE
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\abk.bat
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\adobe Gamma Loader.exe
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\algsrvs.exe
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\algssl.exe
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\angry.bat
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\anti-trojan.exe
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aNtIaRP.ExE
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\antihost.exe
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aNtS.ExE
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\apu-0607g.xml
HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS SCRIPT HOST\
HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS SCRIPT HOST\SETTINGS\

The following registry element was modified:
HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\INTERNET EXPLORER\TOOLBAR\LOCKED = 1
The following registry key was added to get past the outlook security message prompt
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\12.0\Outlook\Security\ObjectModelGuard = 0x00000002
Connections to the following resources are attempted:
hxxp://members.multimania.co.uk/yahoophoto/*****
213.131.252.***:80

Submission Statistics

The Statistics Behind Digg Submissions
Analysis by Dave Naffziger

Dave over at his blog put together some graphical statistics about submissions at digg relative to its success. Pretty interesting stuff.

How long does it take for stories to get promoted?

Best Time of Day to Submit to Digg:

Best Category to Submit to:

Older Posts »