Archergirl's blog

Knitting: Thrum-Thr-Thrum-Thrum-Thrums!

Ever since I learned to knit I've wanted a pair of Thrummed Mitts, they're soft, warm and look adorable. This year I decided finally to make myself a pair (Only took 8 years...).

I started a pair using pattern from Ravelry.

Knitting Pattern: Bobble Hat

I received a set of the new Knitpicks Short tipped Interchangeable circular needles for christmas and wanted to test them out pronto!

I tried a couple patterns before deciding I'd just make my own. It's my first design I've posted on . I only used 1 circular needle in this pattern, but you can use 4 dpns or 2 circulars,as long as you join it.

I call it the Stripey Bobble Hat!

C10A: Punner? I don't even know her! [SPOILERS]

After procrastinating for a few months I finally finished reading Callahan's Lady. Lots of spoilers ahead!

I was enjoying the ruse the Professor and Sherry had going, it had me giggling a few times, imagining Sherry waddling around with a pillow under her shirt.

I had the hardest time understanding Tony Donuts dialogue, so I think I only got a vague gist of what he was trying to say in every conversation.

I really enjoyed when they were scamming Mrs. Willoughby and they both grew a conscience because they liked her so much.

Glitter Force Episode 1 : He's Mighty Mighty!

Sparkles and schoolgirl outfits, need I say more? This caught my eye on Netflix and I'm not disappointed so far.

The show starts out with the shortest origin story I've ever seen (Thank you!). Girl has dreams of becoming a magical girl, girl becomes magical girl and fights. Nice and easy!

So far I'm enjoying the animation (so much pink and glitter!!) and the fairy-tale influences.

My favourite line was when the Wolf summoned the giant house ."He's mighty mighty.' If this kind of humour continues I'll be hooked.

C9A - Tony those nuts?

This chapter gave a brief glimpse into the Professors plan, which I confess I still don't understand!

I enjoyed the introduction of Tony Donuts, although his speech was a bit difficult to understand, I had to re-read the conversations a few times.

Right now I'm kind of on Tony's side, sometimes I want to see the bad guys win.

I enjoyed the punning and the punning response of kicking the side of the bed. From now on when I or someone else puns I'm going to kick a nearby object. What could go wrong?

Internet Buzzwords Against Humanity.

icloud vs Cloud: Adding ‘i’ in front of something does not make it a new, innovative word.

The cloud is the storage and access of data and software hosted by a third party. It does not mean that your data is in some virtual space that can’t be touched; it’s still hosted on a physical data centre somewhere (just not yours!). It’s outside of your control, gives me the warm fuzzies just thinking about it.

C8A: Professor Who?

I finally willed myself to crack Callahan's Lady open again after that disturbing 'The Paranoid' story.

The first chapter was more to my liking and what I was used to from the first story in the book.

I enjoyed Sherri's explanation of her 'scene' with the Japanese businessmen, such polite rapists!

A Picture is worth a thousand vulnerabilities...

Recently I went into a business that was moving. They had various posters and brochures touting all the advantages of this move to a new building. The building was apparently brand new, still under construction and to provide customers with some insight the business posted the new buildings floor plan. It showed the new layout of the business as well as entrances, bathrooms, staff rooms, a security room, the server room, etc. My focus immediately went to the security room, server room and other secure rooms.

Security FAQ

I received some questions about cybersecurity and made up a mini-faq to answer them.

What is Phishing?

Phishing is someone posing as a legitimate company/person to gain sensitive information from a user for malicious purposes. (Think of when you fish with fake bait, the fish thinks it’s real so it bites.)

When I join a website what do they do with my personal information?

Every company is different, when on their website, look for their ‘Privacy policy’ and it will indicate exactly what they are doing with your information.

A Security Primer

Physical Security

This includes things like not having papers on desk after you leave work, visible passwords or other confidential information.

Lock your computer when you leave, even for a few minutes, especially if there is someone else in your office . Privacy screens can be helpful for this.


Subscribe to RSS - Archergirl's blog