mercredi 30 décembre 2020

owning / boarding a horse in the Adirondacks

Hello ADK Forum,

My spouse and I hope to eventually--ignoring the current real estate boom--own a place in the Adirondacks, spending increasing amounts of time there as we transition to retirement (10-15 year plan). We've been visiting regularly and researching to hone in on a locale.

Our biggest priorities are hiking and paddling. But I would also love to own a trail horse -- and house it at a boarding stable, not on our own property.

None of my Googling or exploring has turned up the sort of boarding stable I have in mind. I see fancy show stables near Lake Placid, and I see commercial barns renting horses for tourist trail rides (e.g., near Old Forge). But I don't see places where recreational riders board horses they own and take out on trails.

Does anyone have insight for me on where I'd find these types of stables--and if they exist there? (Or do the folks riding horses on the trails typically have their own horse properties?) My hypothetical dream location would be in reasonable distance of a low-key boarding stable--and paddling, and hiking.

Thanks for any insight!

Lisa


Scurry Overlook & Henrys Run Falls-Cook Forest SP

https://endlessmountains.wordpress.c...st-state-park/

A great hike on the North Country Trail to a view and the falls at a historic sawmill dam on Henrys Run. The dam is unique for its large stone blocks. The hike along the Clarion River was so beautiful and the NCT is always a pleasure to explore. The Clarion River area is so scenic.


https://www.instagram.com/p/CIcLow3D..._web_copy_link


Forest Cathedral-Cook Forest State Park

https://endlessmountains.wordpress.c...st-state-park/

Forest Cathedral is an amazing place with towering hemlocks and white pine. Some of the tallest trees in the east are located here, nearly 200 feet tall. I always enjoy hiking here.


https://www.instagram.com/p/CIja4BEj..._web_copy_link


https://www.instagram.com/p/CIZprUTj..._web_copy_link


mardi 29 décembre 2020

Oboz Men's Bridger 8in Insulated B-Dry Boots

Worn twice, includes two sets of insoles.
size 9 1/2

$110

https://obozfootwear.com/products/me...CcVjmLueiapNz0







Hillsound Trail Crampon, size large

Size large, worn once
Includes carrying bag
https://hillsound.com/products/trail-crampon

$50







lundi 28 décembre 2020

Minister Creek-Allegheny National Forest

https://endlessmountains.wordpress.c...tional-forest/

Minister Creek is one of the most scenic trails in the ANF with incredible cliffs, overhangs, rock mazes, giant boulders, and an overlook.


https://www.instagram.com/p/CIePL6bD..._web_copy_link


https://www.instagram.com/p/CIeNwXzj..._web_copy_link


Beaver Meadows-Allegheny National Forest

https://endlessmountains.wordpress.c...tional-forest/

A best kept secret in the ANF with meadows, a lake, spruce forests, wetlands, and a long boardwalk. Great for birds and wildlife. Beautiful place.


https://www.instagram.com/p/CIbHS5sj..._web_copy_link


https://www.instagram.com/p/CIbnU_wj..._web_copy_link


https://www.instagram.com/p/CIq7GlHj..._web_copy_link


Clarion Loop Trail



samedi 26 décembre 2020

RIP Pete Hornbeck

Copying this from the Hornbeck Boats Facebook page.
It is with immeasurable heartbreak we must share the news our founder, Peter Hornbeck, died today. His family is in shock. Pete enjoyed Christmas with Ann, Leigh, Josh and his grandsons Rushton and Devlin. He died of a heart attack after a walk in the woods with his family. There was no warning; Pete had a clean bill of health from the cardiologist just this month. We take solace from knowing he went quickly, in the place he loved, with the people he loved most. No services are planned for now, we will host a memorial service in the spring.
I only met Pete once, when I purchased my canoe in 2006. He took me to lunch and talked to me about backcountry canoeing and how he came to be a boat designer/builder. He was a fine man and he will be missed.


lundi 21 décembre 2020

Climbing in slush

I've hiked a bit in winter but never climbed. A few weeks ago I tried for the first time and it didn't go so well. I was down in the Catskills visiting and it had snowed a few days earlier but the temperature that day was in the low 40s. The flat part was okay but I started climbing but the footing was poor and I was nervous about coming down so I abandoned after a little bit of climbing. I didn't wear snowshoes because it didn't seem like there was enough snow (maybe that was a mistake?). I wore spikes but quickly realized that didn't help. Any insight.


vendredi 18 décembre 2020

Backpacking the Panther Run/Three Runs Loop-Quehanna WA

https://endlessmountains.wordpress.c...nna-wild-area/

A 20ish mile backpacking loop with beautiful forests, views, wild elk, meadows, streams, big rocks. Parts of it looked like Dolly Sods, I also saw a wild elk herd, which was incredible.


https://www.instagram.com/p/CHoQS3_D..._web_copy_link


https://www.instagram.com/p/CHoTqiRD..._web_copy_link


https://www.instagram.com/p/CHoUmarj..._web_copy_link


https://www.instagram.com/p/CHoWY_TD..._web_copy_link


Bear Creek Preserve-Purple and Grey Loop

https://endlessmountains.wordpress.c...and-grey-loop/

This is a beautiful preserve that has become a hiking destination. This loop is great for its diversity and takes hikers into some of the lesser traveled areas of the preserve.


https://www.instagram.com/p/CIMYHh5j..._web_copy_link


https://www.instagram.com/p/CIMZb9Vj..._web_copy_link


White Gold Superloop-SGL 57 and Ricketts Glen

https://endlessmountains.wordpress.c...en-state-park/

A beautiful, diverse 11 mile loop with views, large rocks, beautiful streams, meadows, wetlands, history, and a pristine lake.


https://www.instagram.com/p/CEzuJ0-j..._web_copy_link


https://www.instagram.com/p/CE123tKj..._web_copy_link


samedi 12 décembre 2020

Mink tracks?

Hiked Pharaoh Mtn yesterday with my son. We saw these tracks. After looking around the internet I thought they were for a mink that was loping.

https://www.inaturalist.org/observations/66433788


vendredi 11 décembre 2020

Camping 2020

The Photography thread on this website has not been very busy this year. I love looking at other people's photos. I guess I should not complain unless I share - so here it goes.

In this post I have a single photo taken from every Adirondack campsite I camped at in 2020 - there are 10 of them. In most cases I camped at the campsite for the first time, but three of them are repeat favorites. Some of the labeled locations are technically incorrect, but they are close enough. Sorry about not being clearer about the locations but I would not want to give away my favorite locations that easily.

Fulton Chain Wild Forest
Attachment 19820
Five Ponds Wilderness
Attachment 19821
West Canada Lakes Wilderness
Attachment 19822
Saranac Lakes Wild Forest #1
Attachment 19824
Pharaoh Lake Wilderness
Attachment 19825
Moose River Plains Wild Forest #1
Attachment 19826
Jessup River Wild Forest
Attachment 19827
Moose River Plains Wild Forest #2
Attachment 19828
Moose River Plains Wild Forest #3
Attachment 19829
Saranac Lakes Wild Forest #2
Attachment 19830

Attached Images
File Type: jpg IMG_0268.jpg (32.8 KB)
File Type: jpg IMG_0497.jpg (140.4 KB)
File Type: jpg IMG_0812_ed1.jpg (132.1 KB)
File Type: jpg IMG_1241.jpg (96.4 KB)
File Type: jpg IMG_2095.jpg (145.3 KB)
File Type: jpg IMG_2376.jpg (128.1 KB)
File Type: jpg IMG_2452.jpg (124.2 KB)
File Type: jpg IMG_2560.jpg (148.5 KB)
File Type: jpg IMG_2672.jpg (147.4 KB)
File Type: jpg IMG_2801.jpg (146.5 KB)


mercredi 9 décembre 2020

Ice season 20/21

Starting the annual thread for this seasons hardwater. Yesterday i drove around the Saranac lake area. Anything big like colby still open water with very little shoreline ice. Smaller bodies that are usually my go for first ice had maybe 2 inches. We have been spoiled with early ice over the last few years. Be safe and with the early ice season approaching please make sure you dont go alone and use the buddy system. Ill try to keep everyone posted.


Seymour Mountain (the other one)

Has anyone here ever made it up the non-High Peaks Seymour Mountain that is located just outside of Lake Placid to the west? I happened to notice it while driving down Averyville Road earlier this year and was intrigued. It looks like it has some exposed rock with the potential for some nice views.

OpenStreet Map shows a number of trails in the vicinity of the peak, with one up to the summit. Presumably these are actually herd paths/unofficial trails as the "official" DEC maps for the SLWF make no mention of any trails in the area. The network of paths actually appears to be fairly extensive- perhaps these are bandit mountain bike trails? Some of the paths shown cross private property- any knowledge of whether these are open to the public? Looks like longer approaches entirely across state land are also possible via the network of paths from near the Chubb River bridge on Averyville Road, or from the railroad tracks not far from the train station in Lake Placid itself.


mardi 8 décembre 2020

Panther Hill Vista-Pinchot State Forest

https://endlessmountains.wordpress.c...-state-forest/

One of the best views in the Pinchot SF with a 180 degree panorama views of over 40 miles. The fall colors were superb. And there is a waterfall on the hike up.


https://www.instagram.com/p/CGLv0iPD..._web_copy_link


Hemlock Mtn-Tiadaghton State Forest

https://endlessmountains.wordpress.c...-state-forest/

The easiest way to get to this classic view of the Pine Creek Gorge along the Black Forest Trail.


https://www.instagram.com/p/CFDcMrHD..._web_copy_link


Nanny Run Vista-Elk State Forest

https://endlessmountains.wordpress.c...-state-forest/

Rugged off trail hike to a fine view near the Quehanna Wild Area. Great for sunsets. The vast plateaus and deep canyons were beautiful.


https://www.instagram.com/p/CHDU381j..._web_copy_link


lundi 7 décembre 2020

Conglin Lake recon 12-6-20

we set off from the Hall Rd TH, checked out the Potter Homestead, then zipped down the trail to North Creek Falls. The trail is in good shape, with just one blowdown. After exploring the falls a bit, we headed towards Dexter Lake, but took a hard left just after the Mcklinney Vly bridge, and bush-whacked back to Conglin Lake. Took about 15 minutes to go from the trail to the lake, through mostly open and pretty flat woods. Came right to the campsite on Conglin, which has not been used in a very long time! Didn't have time to check out the upper ponds, as we wanted to do the loop to Watermills Pond and out before dark. Defiantly an area that needs a lot more exploration, and the lack of any info on the area is really a Godsend, as we hafta to make our own choices on what to see.

Attached Images
File Type: jpg DSCF1057-a.jpg (151.4 KB)
File Type: jpg DSCF1062-a.jpg (50.4 KB)
File Type: jpg DSCF1065-a.jpg (149.1 KB)
File Type: jpg DSCF1066-a.jpg (132.0 KB)
File Type: jpg DSCF1067-a.jpg (143.1 KB)
File Type: jpg DSCF1068-a.jpg (125.8 KB)
File Type: jpg DSCF1071-a.jpg (143.2 KB)
File Type: jpg DSCF1072-a.jpg (101.6 KB)
File Type: jpg DSCF1074-a.jpg (53.5 KB)


mercredi 2 décembre 2020

DEC developing Three Lakes Tract Conservation Easement draft RMP

The DEC is seeking input about their plans to develop a Draft Recreation Management Plan for the Three Lakes Conservation Easement. This easement is between the Ha-De-Ron-Dah Wilderness and the Independence River Wild Forest. Comments accepted until January 13, 2021.

For more detail on participating, see the DEC webpage for the Independence River Wild Forest located here (see the Planning and Management section near the end of the webpage):
https://www.dec.ny.gov/lands/58192.html#Planning

This webpage has a link to a copy of the conservation easement. I did not read it in detail but there are 4 waterbodies covered under the easement: Hitchcock Pond, Grass Pond, Moose Pond and Blue Pond. It’s not clear whether there is any public vehicular access, but there are rights for camping, fishing, hiking and paddling.

I’m always looking for new places to paddle and camp. Anybody familiar with the area?

Please consider participating in this if you can contribute!


mardi 1 décembre 2020

Mother Johnsons at the foot of Raquette Rapids

Anyone remember the old place?


lundi 30 novembre 2020

-20 Down Sleeping Bag - $275 USD

EMS minus -20 DOWN WINTER sleeping bag

$275 plus US shipping only. PayPal only.

This is serious cold weather winter sleeping bag

Measures (all measured from the outside):
— At shoulders: 28” wide x 10” tall
— At feet: 18” wide x 8” tall
— From feet to neck collar: 68”
— Thickness of down: about 3”
— Color: Orange

Clean and always stored loose.

Used for several trips but still in good shape with good loft. Definitely worth the price.

I'm not doing the winter overnight stuff in the near or distant future so it’s time to move it along.

It has plenty of life in it AND it’s about a 1/3 the cost of a comparable new bag

Very warm bag

Pictures: https://imgur.com/gallery/Qc3D7eU

Please PM with zip for calculating shipping and arranging purchase. Located near NYC, Harriman / Bear Mt SP.

Thank you—


West Mill Brook/ Dix Trail

Has anyone been there recently? I was curious about the road condition between the Northway and the gate. Passable? Blowdown or deep ruts? I walked in from Rt 9 in the spring but was hoping to shave off a couple of miles this time.


vendredi 27 novembre 2020

Meadows Lane

Earlier that usual, Meadows Lane is closed for the winter. Adds a mile to the Marcy Dam Truck Trail. Hadn't seen this noted elsewhere, so thought I'd add this detail.


jeudi 26 novembre 2020

Best Maps

I have had the Adirondack Nat Geo maps for about 12 years, since I really started getting into backpacking. Its really all I've ever known as far as maps go.

Occasionally when in high use areas like the High Peaks, I will meet people who have other maps that are perhaps less colorful and illustrated, yet seem more detailed and suited for the more experienced hiker.

My question is... what are the best maps out there in the opinion of the many experienced hikers on this forum? Are there those that are more suited for the novice versus the more experienced backpacker?

Sent from my SM-G973U using Tapatalk


lundi 23 novembre 2020

Coreys Road (Winter) Status?

Evening...

I know the gate at Coreys Road is SOMETIMES closed but other times open during the winter.

What's the determining factor? If any? Weather seems obvious but is that it? I've heard it's open / closed every other year? Any truth?

Please share your intel.

Thanks!


lundi 16 novembre 2020

Ha-De-Ron-Dah Wilderness Question

I'm wondering where the hills are that have views. Per a Jun. 11, 2020 column in Lake Placid News... "If you are interested in short bushwhacking adventures there are some nice open summits like Coal Mountain, Quarry Mountain, Cross Mountain, 6-Mile Mountain and the cliffs over Lost Lake." No map I've yet found names prominences other than Bare Mt. and Moose River Mt. How do I find Coal, Quarry, Cross and 6-mile? (Have not yet connected to the LPN columnist.) Thanks.


mercredi 11 novembre 2020

Which brand of laptop is good?

What type of laptop that good to use for information technology course's student? Currently i'm contemplating whether to choose hp or samsung or lenovo. samsung is my fav brand for elctronic but i'm not sure for the specs. As this is my first time buying a laptop so i don't know the technical terms for that.


Best Corporate Training and Placement Institute

which is the Best Corporate Training and Placement Institute?
Best Corporate Training and Placement Institute


dimanche 8 novembre 2020

MacIntyre Range Slopfest

I finally got around to hiking Algonquin, Iroquois and Wright this past weekend. This hike had been near the top of my wishlist since mid-2018 when I summited New York's other 5,000+ footer on an incredibly sublime morning. That was my last visit to the High Peaks region and I was dying to return -- preferably sometime after Columbus Day because I didn't want to deal with the same kind of crowdedness that I experienced on a short firetower hike earlier this fall.

This was my first hike originating from the Loj (I parked at the South Meadows lot when I hiked Marcy). Embarrassingly, I was unable to locate the trailhead and had to ask for directions so as not to waste any more valuable time on what was expected to be a very long day. A helpful worker inside the Loj pointed me in the right direction and I was finally on my way.

The Algonquin Peak trail was remarkably easy up to MacIntyre Falls. I thought to myself, "This is way easier than Marcy and might even be less challenging than Cascade!" Well, my impression of the hike's difficulty changed in a hurry! Slick rock slabs awaited me after the waterfalls and remained present after I hooked a left at the Algonquin/Wright trail junction. I swear to god, those massive bare rocks are my kryptonite, even in perfectly dry conditions. I react to seeing these in the same manner that someone who loathes his or her job reacts when the alarm clock goes off on weekday mornings!

Scrambling above treeline on Wright wasn't quite as unnerving as I had anticipated because the rocks were mostly dry, unlike the ones below treeline that were a lot trickier. And I was prepared for the 40-50 mph wind gusts that mountain-forecast.com had predicted.

The final push up to Algonquin's summit was manageable. There was a little bit of snow and ice, but nothing too bad compared to what awaited me on my hellish descent via the Avalanche Trail route. More on that later.

After descending the southwest side of Algonquin, I made my way to Boundary and then Iroquois via slushy herd paths. There were a couple of short rock sections that I was hesitant to attempt with my boots that are reliable for everything except traction. Putting on microspikes gave me enough confidence to get by these stumbling blocks, but nevertheless, this will be the last time I wear these boots in the Adirondacks because I don't trust them enough to give me adequate grip in these situations.

Not wanting to descend the same way I went up, I opted to go down the Avalanche Pass route that I had read so much about online. This proved to be a mistake as the entire trail was one giant waterfall from all the snow melting. Mix in occasional icy patches, slippery rocks, and stream crossings with fast-flowing water and you have a recipe for potential disaster. I exercised extreme caution with every step I took, resulting in a four hour descent to Lake Colden. The sun was setting when I reached Avalanche Lake and I still had a long ways to go from there.

Even the relatively benign homestretch from Marcy Dam to the Loj wasn't without its hiccups as I somehow lost the blue-marked trail in the area near Whales Tail Mountain. With no trail in sight, I figured I would work my way out of this jam by bushwhacking downhill in the direction of Marcy Dam & Brook. I eventually found the trail I was looking for and did a quick compass reading to be 100% sure that I was heading north where I needed to go. From there, it was a humbling walk back to the Loj where I thought about everything I could have done differently (purchase footwear with better traction prior to this hike, download offline maps beforehand, put my paper map into a waterproof case when there's a possibility of falling in a stream and not just when it's pouring outside, among other things).

On a more positive note, I had nothing but positive interactions with everyone that I met in the Lake Placid area this weekend (ADK staff, hotel receptionists, other hikers, etc.) In spite of my adventure not going flawlessly, I'm glad I went. It was a nice getaway and the natural beauty was absolutely stunning...













More photos of the summits and trails can be seen on my photoblog that's linked below...


Silver Lake Wilderness

Hi. Im looking to do a solo in this area as I've never been but have wanted to for a while. Looking for some solitude and to do a little exploring.

Any suggestions on areas to go to..stay away from? Also does anyone know which "Discover" book covers this area?

Thanks!


Sent from my SM-G973U using Tapatalk


vendredi 6 novembre 2020

Square Timber Wild Area-Elk State Forest

https://endlessmountains.wordpress.c...-state-forest/

The Square Timber is a rugged area of deep, narrow gorges and narrow ridgelines. Great isolation, scenic forests and streams, and some great views if you don't mind some off trail hiking. North Square Timber vista is particularly impressive.


https://www.instagram.com/p/CHA4Lv7D..._web_copy_link


https://www.instagram.com/p/CHDSOSgD..._web_copy_link


https://www.instagram.com/p/CHDSye_D..._web_copy_link


https://www.instagram.com/p/CHDYLjtD..._web_copy_link


mardi 3 novembre 2020

snow

How much snow in Newcomb....thanks


Kaspersky & SAMENTA: The time is now to secure Malaysian SME’s digital assets

Just when the small and medium enterprises (SMEs) in Malaysia prepared to see their businesses pick up after seeing positive development after the Recovery Movement Control Order (RMCO) announcement, Kuala Lumpur, Selangor, Labuan, Sabah and Putrajaya are currently facing another risk of business slow down with the announcement of Conditional Movement Control Order (CMCO) in October with the probability of further extension.

Malaysia’s SMEs Gross Domestic Product (GDP) experienced growth at 5.8% in 2019 and employed 7.3 million individuals . SMEs continue to play a significant role in the country’s growth as it makes up 98.5% of total registered businesses. Bank Islam Malaysia shared recently that the current economic environment and the rising unemployment rate may hinder Malaysia’s economy from growing at a positive rate. In addition, the growth of the SME segment is expected to decline by 1% this year .

According to Malaysian Employers Federation, 2020 has been very hard on employers especially in terms of managing cash flow with generally reduced revenue but having to pay salaries, operational expenses as well as taxes . The group said that employers would need to facilitate a conducive working environment for their employees who are working from home. Moreover, providing tools and guidance to safeguard confidential data from potential hacking as working from home equates to a lowered security level.

In the first half of this year, Kaspersky reported cryptomining attempts logged the highest for SMEs in Southeast Asia (SEA) at 1,726,799. According to Yeo Siang Tiong, General Manager for Southeast Asia at Kaspersky, these threats are silent, hidden inside devices and networks, slowly consuming the bandwidth, electricity, and damaging the hardware, costing the SMEs dearly in the SEA region, when the SMEs experiencing tight cash flow at the moment.

The global cybersecurity company also revealed that there were 1,602,523 phishing attempts and 504,304 ransomware detections targeted against SMEs in the region from January to June 2020.

“The Malaysia Cyber Security Strategy 2020-2024 announced recently, putting forward national cybersecurity preparedness of the country, is timely and necessary. Cybersecurity has gone beyond protecting endpoint devices, it is now about developing an ecosystem where everything connected is protected, especially at this period when the country is ready to embrace technologies such as 5G and Industry 4.0. We see these strategies will encourage more businesses like SMEs to protect their digital assets, which also means securing their business continuity,” adds Yeo.

Datin Lorela Chia, Chairman, Central Region at Small and Medium Enterprises Association Malaysia (SAMENTA) says, “Our members are paying more attention to digitalizing their businesses with more emphasis on technology adoption. Even with the CMCO 2.0 taking place at the moment, some of our members are taking the opportunities to test whether their businesses could run digitally as a whole. These involve processes such as finance, sales and purchases. For our members who are embarking on the digital journey, we encourage them to apply for the grant provided by Ministry of Finance, Bank Simpanan Nasional, SME Bank and Malaysia Digital Economy Corporation (MDEC). These grants would ease their cash flow by a bit.”

Understanding the importance of cybersecurity for SMEs, more so in the stage of preserving cashflow, Kaspersky recently introduced its new solution for SMEs in the region, Kaspersky Endpoint Detection and Response Optimum (KEDRO).

“KEDRO goes beyond endpoint protection. It delivers full visibility and empowers SMEs’ limited IT staff to conduct a root-cause investigation and to quickly and intelligently respond against complex and costly threats. We have made this solution as simple to operate as possible, acknowledging the challenge of finding internal IT experts and most importantly, budget-friendly as we are aware of the financial impact of the pandemic to businesses,” explains Yeo.

Aside from this, Kaspersky also has the following reminder for SMEs to beef up their security online:
1) Renew the corporate site security certificate – Websites that request or process user data must have an SSL certificate. The validity of the said certificate’s validity period is limited, which will need to be reissued every three, six or twelve months.
2) Update router firmware – The older the software, the more likely it is to contain vulnerabilities, so it is critical to keep all software up to date.
3) Revoke unnecessary rights – a dismissed employee can cause all possible trouble if their accounts and access to the corporate network are not closed in time. Cyberrevenge against former employers is real.
4) Back up – Backing up data helps protect it from wipers, ransomware, careless employees and other hazards. It is better to schedule an automatic backup.
5) Update antivirus licenses on servers – security software on workstations and mobile devices come with subscription renewal. It is good to check on servers too. An unprotected server can cause a range of problems, from data leakage to hosting malicious resources in the infrastructure to turning one’s office into cryptofarm.
To find out the latest promos and discounts for Kaspersky Endpoint Detection and Response Optimum, please visit https://kas.pr/56ne.


lundi 2 novembre 2020

Best Corporate Training and Placement Institute

Which is the Best Corporate Training and Placement Institute
Best Corporate Training and Placement Institute


Hutang credit card

Sape sape tau nak settle hutang credit card tak? Aku ade bayar sikit sikit tapi interest credit card tinggi laa even bayar tiap bulan pon. Mcm lama lagi nak abis byr camni.


dimanche 1 novembre 2020

Wetsuit/Drysuit ?

I recently started to, and find I’m enjoying, paddling in colder weather. I’m also beginning to think, paddling without either a wetsuit or a drysuit is akin to bicycling without a helmet. That said, I’m not really exciting about purchasing or paddling with said gear, and thought I would seek advice to make my decision optimal.

From my SCUBA days, I haven’t found wetsuits all that comfortable out of the water. Also, they don’t articulate particularly well. With paddling, my goal would be to get out of the water as quickly as possible. So my body would have little time to warm up the water captured by the suit, and once out of the water, some of that would drain. Despite the advantageous price of wetsuits, it seems a drysuit would be more comfortable in the boat, and more effective should I really need to use it. Am I missing something?

Regarding drysuits, I find pricing all over the place. I found some “Crewsaver” models and an “O’Neil” model much less than some NSR models. Is this a case of you get what you pay for is a rubber suit with cuffs just a rubber suit with cuffs?
Thanks, Mark


samedi 31 octobre 2020

Whiteface Highway

If any skiers out there are wondering about skiing the Whiteface Highway, it's not quite ready. Some have been out on skis, and some rode the snow on the grass on the shoulder all the way to the bottom, but even marginally skiable snow doesn't start until the Lake Placid Turn, 3.5 miles from the Toll House. Sunday's storm may make more of the highway skiable, but warming temperatures Wednesday through Friday will probably end any chance for skiing next weekend - at least not without a long walk or mountain bike ride.


vendredi 30 octobre 2020

Kaspersky to address global cybersecurity issues at the UN Internet Governance Forum 2020

For the first time, Kaspersky is set to participate in the Internet Governance Forum (IGF), hosted by the United Nations. This year, the 15th annual event will be run online from November 2 to November 17 , with the overarching theme of: Internet for human resilience and solidarity. As part of IGF 2020, the global cybersecurity company is organizing four major activities to increase awareness, transparency and international cooperation in the fight against cyberthreats.

2020 has seen a surge in individuals, businesses and organizations relying on the internet. Coupled with the rapid rise in online criminal activity, this trend has made cybersecurity more important than ever to ensure the internet is both safe and sustainable. As a company that is focused on building a more protected world, Kaspersky aims to spark the global conversation among different stakeholder groups, including policymakers, on broadening international cooperation to negate global digital security challenges.

At the Forum, Kaspersky’s CEO, Eugene Kaspersky, will give a keynote speech to high-level leaders on November 13, where he will address, among other topics, the importance of international cooperation for global cybersecurity policies. The company will also hold an event on stalkerware, organized with the Coalition Against Stalkerware. A workshop on assurance and transparency in information and communication technology (ICT) supply chain security will also be organized together with fellow partners. Additionally, Kaspersky's multi-stakeholder best practices will be represented at an online booth.

“Cybersecurity is an enabler for successful and sustainable digital transformation, which has become even more important amid the global pandemic. Therefore, international cooperation to ensure stable and secure development of cyberspace is all the more crucial. We have decided to take part in IGF 2020 as, first – it brings various communities, regions and leaders together to discuss pressing current issues cyberspace is facing, and, second – it inspires those with decision-making power in both the public and private sectors to take action. We’re honored to be a part of this international dialogue and to contribute to building a secure and trusted cyberspace to make sure it is safe and open for everyone,” comments Eugene Kaspersky.

IGF 2020 will feature over 200 sessions in total, organized around four main areas of focus: data, environment, inclusion and trust. The theme of ‘digital cooperation’ and the United Nations Secretary-General's roadmap for digital cooperation will also feature prominently. The Forum will also feature a dedicated roundtable for governments to discuss the notion of trust during COVID-19 times.

‘‘Despite the extraordinary challenges the COVID-19 pandemic has brought, it has undoubtedly underlined the importance of everyone having meaningful access to a safe and open internet. The IGF 2020 discussions will engage some of the most prominent leaders and experts in a dialogue on a broad spectrum of people-centered perspectives on how digital technologies and related policies help societies become more resilient,’’ says Chengetai Masango, Head of the UN IGF Secretariat.

Traditionally, the Forum welcomes over 3,000 onsite participants, on average, and a similar number of online attendees. This year, it is expected that these numbers will grow. High-level leadership from governments, international and regional organizations, civil society, academia, businesses and the technical community from all parts of the world are expected to actively participate.

Details of Kaspersky activities at IGF 2020:
● Day Zero Pre-Event - Stop stalkerware: tackling digital stalking helps victims of domestic violence will be held on November 2 at 16:15-17:15 UTC. The event will be held together with members of the Coalition Against Stalkerware as well as Europol, and aims to draw attention to the growing problem of stalkerware, the commercial spyware used in the context of domestic violence. The session will include discussions about how to raise awareness around the subject, how to help users protect themselves and how to identify new fields for multi-stakeholder activities

● A workshop on assurance and transparency in the ICT supply chain security will be held on November 12 at 9:00-10:30 UTC. The event is organized together with EastWest Institute, Ministry of Information, Communications and Technology of Kenya, and the Association of Users of Information Systems in Morocco (AUSIM). The workshop will also feature experts from Europol's European Cybercrime Centre (EC3) and CyberSecurity Malaysia - the national cybersecurity specialist agency under the purview of the Ministry of Communications and Multimedia of Malaysia (KKMM). The workshop will facilitate outcome-oriented discussions to gain insights on information and communication technology (ICT) supply chain security, with a focus on how this impacts developing countries and emerging markets.

● Eugene Kaspersky’s keynote speech will take place during a high-level leaders session, dedicated to security implications of the role of internet governance in the age of uncertainty. The event will be held on November 13 at 18:30-20:00 UTC.
The speech will cover the following aspects: priority concerns for the online environment, actions taken to combat cybersecurity threats, stakeholder cooperation for global cybersecurity policies, and how best to support vulnerable and marginalized groups.
● A Kaspersky Online Booth dedicated to increasing trust and accountability in cyberspace and multi-stakeholder best practices will be available in the virtual IGF Village throughout the Forum, starting from November 2. At the booth, online visitors will be able to learn more about Kaspersky’s pioneering international projects, including the Global Transparency Initiative (GTI), the ‘No More Ransom’ project, and the Coalition Against Stalkerware.

Live broadcasts of the high-level sessions will be available at UN Web TV webtv.un.org, the other IGF 2020 events will be streamed via the Forum’s official YouTube channel - youtube.com/user/igf/. The full schedule of this year’s IGF events is available at intgovforum.org/multilingual/igf-2020-schedule/ (access requires registration).


mercredi 28 octobre 2020

Allen Winter Climb

Is anyone here familiar with a winter climb of Allen, and if so, willing to share some words of wisdom?

I've done Allen in the summer, and it was LONG. So for the winter I'm thinking it's going to be an overnighter at least. What's the ascent like? I remember it being pretty wet when I did it, so I'm sure it'll be at least somewhat icy.

Anything I should be aware of?

Thanks!:)


Social networks are mostly used by employees but often exploited by cyber-fraudsters

There are several web services that employees of small and medium businesses most frequently access while working, according to Kaspersky. These include YouTube, Facebook, Google services and WhatsApp, with some of these applications being the most exploited by malefactors as a springboard for phishing. However, this list differs from the services that employers tend to limit for use on corporate devices. While organizations can have different priorities and permissions for what web services can be used by their employees, it is still important to make sure they stay protected from any cyber-risks.

It is important for organizations to understand relevant threats and how they can infiltrate corporate endpoints – for example, through phishing in cloud services. Once a web service becomes popular, it may turn into a more attractive target amongst scammers. For example, the TikTok app has gained enormous popularity over the past few years. It appeared to be flooded with fake accounts and scammers who are gradually improving their skills as the service rises in popularity. Protection from such scams and phishing attempts is crucial to ensure both personal user accounts and corporate data and devices remain safe.

According to anonymized statistics of events captured in a Kaspersky product, voluntarily provided by its customers , the top five web services employees access more often from their corporate devices include a video sharing platform, a social network, a mail service and a messenger: YouTube, Facebook, Google Drive, Gmail and WhatsApp - all leading services in their respective segments.

Unfortunately, these same web services are also exploited for phishing and other malicious actions. Kaspersky analysis revealed the top five applications where phishing attempts were found most often: Facebook (4.5m phishing attempts), WhatsApp (3.7m), Amazon (3.3m), Apple (3.1m) and Netflix (2.7m). Google’s offerings bundled together, including YouTube, Gmail and Google Drive, took sixth position with 1.5m phishing attempts. With the two lists sharing many of the services, these results only confirm the trend that popular applications have become valuable platforms for fraudsters’ malicious actions.

The product statistics also showed what web applications are most likely to be limited on organizations’ corporate devices. The top five most blocked applications only include social networks: Facebook, Twitter, Pinterest, Instagram and LinkedIn. These decisions can be made for a variety of reasons, such as complying with data regulations, or in line with specific organization requirements for social media use. And while it includes Facebook, which is actively exploited by scammers, it doesn’t include messengers, file sharing or mail services – probably because they are often used for working purposes as well as for personal needs.

“We can’t imagine our daily lives, and work, without different web services, including social media, messenger apps and file sharing platforms. They allow us to communicate and share thoughts, ideas, images and inspiration – and this has become even more of a reality when the entire world has spent many months online this year. However, it is important for any organization to understand where threats may come from and what technology and awareness measures are needed to prevent them. Businesses also need to provide their employees with comfortable use of services they require, so it is crucial to get the balance right. We at Kaspersky appreciate this and provide organizations with relevant protection tools and expertise,” says Tatyana Sidorina, security expert at Kaspersky.

Kaspersky suggests that businesses should follow these steps to ensure their employees use web services safely and securely:
• Show employees how to recognize fake or insecure websites and phishing messages. Encourage them to never enter their credentials before checking a website’s credibility, or open and download files from unknown senders.
• Conduct basic security awareness training for your employees. This can be done online and should cover essential practices including those that protect against phishing, such as account and password management, email security, endpoint security and web browsing. Kaspersky Automated Security Awareness Platform provides such training in an easy and effective way.
• Adopt a proven endpoint security product with web, network and mail threat protection.
• It is also important to enhance IT managers’ expertise on relevant cyberthreats and how to prevent them. Kaspersky Endpoint Security Cloud now provides Cybersecurity for IT Online training that allows them to learn new skills on how to classify malware and how to recognize malicious and suspicious behavior in software. It is available as a beta version on the product management console.


mardi 27 octobre 2020

What are the best maps to download for use with Gaia GPS app (for the Adirondacks)?

What are the best maps to download for use with Gaia GPS app (for the Adirondacks)?


dimanche 25 octobre 2020

Hunting season and hiking/backpacking

Now that hunting season has begun in the Adirondacks, I'm wondering whether it alters your hiking or backpacking adventures.

In years past, I've always kept to my normal schedule, and locations, of hiking and backpacking. I wear a blaze orange hat, fleece top, and covering for my backpack and should be easily seen from a distance. I do discontinue my off-trail
hiking as I'm concerned it might increase a chance of getting shot.

Does hunting season reduce, or end, your hiking or backpacking trips?


jeudi 22 octobre 2020

Trail Camera Use

Is putting up a trail camera on NYS State Land permitted? I tried doing a quick search on the Encon website and couldn't find anything specific.


mardi 20 octobre 2020

Tips for small enterprises on how to choose an EDR solution that suits their needs

The attacks taking place on small and medium enterprises (SME) are becoming more sophisticated, meaning that they cannot be easily prevented by traditional endpoint protection mechanisms. In such cases, timely incident detection is essential to minimizing any potential negative impact. However, this challenging task cannot be done without enhanced endpoint visibility, exploring suspicious activities and understanding attack execution processes.

From our experience, SMEs understand that they need to improve their security capabilities and they usually contact our sales representatives to enquire about our products. However, for an organization where its IT department is responsible for cybersecurity — as is typically the case for SMEs — translating this intention into practice can be hard. They simply don’t know where to start. It may seem that the ideal plan is to buy a solution that combines all the high-profile features at once.

But what can go wrong with this approach? Will the companies be able to sift through all the data and events that modern Endpoint Detection and Response (EDR) solutions provide, as well as distinguish between false alerts and real threats?

Serious functionality involves big investments – and it’s not only about money
First of all, it is a matter of price. A Kaspersky report, ‘IT security economics in 2019: How businesses are losing money and saving costs amid cyberattacks’, shows that, on average, the share of spending on information security equates to around a quarter of an entire IT budget. This is true for both small and large companies, but in absolute numbers there is a significant difference. Spending on cybersecurity in organizations with 50-999 employees is estimated at $267,000, while their counterparts with more than 1,000 employees spend $18.9 million on average. So, a solution intended for enterprise customers may not suit smaller businesses’ budgets.

Moreover, required investments are not only monetary. Enterprise-grade products may be hard to install and integrate with existing security solutions. In an enterprise with a large IT security department, some staff can simply devote their time to this task. This can be an issue for a smaller company though, as fewer employees are responsible for maintaining the whole infrastructure.

Don’t use a sledgehammer to crack a nut
Of course, all these efforts are worthwhile when a new security solution benefits the company’s level of protection. But, in practice, even if an SME manages to secure a budget and implement an enterprise-grade solution, without sufficient expertise in information security, it will be difficult to fully leverage the scope of functionality.

First, the advanced functions may simply be irrelevant to their particular requests. For example, if a previously unknown suspicious object is detected, some organizations that are not very mature in cybersecurity just need to know if it is malicious, or needs blocking. Meanwhile others just need a full picture of the object’s actions and background for a deep investigation. It is important to understand what an organization’s requirements are and what its existing team can work with. Depending on this, a company can decide whether they are ready to purchase, for instance, a sandbox designed for security researchers.

Secondly, products which were created for security analysts are not appropriate for a “set-and-forget” approach. For example, a feature-rich EDR solution requires a team of expert analysts capable of tuning the detection logic and creating new rules to continuously improve detection levels. Without such specialists, the solution’s ability to proactively search for indicators of intrusion will not be useful.

It is common in SMEs for a system administrator to manage an endpoint protection solution. But even EDR, which provides essential capabilities, requires an employee with basic cybersecurity knowledge. Of course, hiring a full team of threat hunters or advanced security analysts at once is hardly a feasible task – such professionals are highly-paid and quite rare to find. Therefore, it is worth starting with an employee who has knowledge in information security. Combined with an understanding of the IT landscape, this allows for validating alerts, eliminating threats while taking into account the risks of their actions, such as isolation of a certain workstation or server, or stopping a critical business process.

When EDR becomes a piece of shelfware, rather than an effectively-used solution, it is not just a waste of an SME’s budget. Such a failure at the very beginning can demotivate company leaders to develop cybersecurity initiatives in general: if they do not see a benefit, why should the business invest in other security products?

Therefore, an organization should first decide if it is ready to hire an employee who is responsible for information security issues. If not, the most effective option will be to ask for help from external incident detection and response professionals.

For those businesses that decide to develop this capability internally, it is essential to initially find a beneficial solution without making substantial investments in additional resources - both monetary and human. And to avoid the above pitfalls, we recommend paying attention to the following guidance:
- To provide visibility without ‘blind spots’ and centralized response features, EDR needs to be integrated with an Endpoint Protection Platform (EPP). Enhancing cybersecurity capabilities should be a step-by-step evolution. Once a company can detect a malicious object with an endpoint protection solution, it can expand existing technology with the ability to understand where it came from and search for this threat on other workstations.
- If an EDR solution can be smoothly integrated with existing endpoint security solutions in a centralized way, it cuts the time required for deployment. So, before purchasing a product, ask if it supports turnkey integration with your EPPs.
- If you have a limited number of staff responsible for security, make sure your chosen EDR solution provides good visibility and automation, but doesn’t overwhelm a specialist with irrelevant information. All the incident information should be readily available from a single console and a path of the attack spread should be visualized to simplify threat analysis. Automated search for Indicators of Compromise and incident response features will speed up the work and increase staff productivity.

by Stephan Neumeier, Managing Director for Asia Pacific at Kaspersky


lundi 19 octobre 2020

Lost:Wilcor camping/beach chair

On the portage trail to Fawn Lake near Speculator.

Would very much appreciate it if someone finds it. Small reward.


vendredi 16 octobre 2020

Black Forest Trail PA

Last week I hit the Black Forest Trail as an overnighter. The hike was much easier than the hype on how difficult the trail is. I wasn't sure if I could do it as an overnight trip with the short days but I covered 27 miles on the first day- the miles really just flew by especially on the plateau. There are lots of views and the foliage was decent. Much of the first wave of color blew off the trees with heavy winds but still plenty of color. Water was scary low. Many of the smaller streams were dry.

I have the full TR with lots of photos at my website at the link below.
http://www.tomcatsadventures.com/202...est-trail.html











River paddling in the Eastern 'Dacks

As a new paddler to the Adirondacks, I mostly done lakes in the Saranac and St. Regis lakes areas, but I am interested in exploring some of the rivers near(ish) to Elizabethtown. I've heard that the Schroon River as some good stretches, but I don't want any whitewater. Also the Boquet. Any ideas of good stretches? Don't have to be too long.


To play or not to play?

When a child plays video games, parents inevitably think about how harmful it can be. Will this game affect the child's behaviour? Will he/she start suffering from nightmares? Will there be ineradicable fears? What if the child is already addicted?

In fact, research conducted last May by global cybersecurity company Kaspersky showed that four-in-10 of parents from Southeast Asia (SEA) believe that their children are “more grumpy than usual” after a gaming session.

Titled “More Connected Than Ever Before: How We Build Our Digital Comfort Zones”, the fresh survey among 760 respondents from the region confirmed that kids are spending more time online given the current pandemic situation. A total of 63% of parents surveyed agree on this while only 20% refute this observation.

“Parents are raising kids who are digital natives, children who are born exposed to digital devices and the internet. This generation gap often leads to miscommunication as it is a common scenario when a child knows more trend and tricks online than the mom or the dad. The lockdown measures highlighted this with the increase of reliance on the internet and how parents now need to juggle work and parenting at the same time inside their homes,” says Stephan Neumeier, Managing Director for Asia Pacific at Kaspersky.

“While it is understandable for parents to have their worries about their kids’ habits online, parental fears associated with video games are sometimes quite objective and sometimes a little far-fetched. There are undeniable harms with too much of it but several researches have also discovered how playing games online can benefit kids. After all, everything is good but moderation and guidance is definitely necessary,” he adds.

To help parents navigate their kids’ gaming habits, Kaspersky today shares each of the potential problems associated with video games and suggest solutions for mom and dad’s reference.

Fear: a child will be a black sheep if games are banned

Parents who are especially afraid of video games are seriously thinking about complete gaming ban in the family. At the same time, such parents are often stopped by the fear that this will lead to the fact that the child will be a black sheep at school if everyone plays games, and he/she does not have such an opportunity.

Should you be afraid?

A ban on computer games is not a good decision: a child, whose peers play videogames, will definitely feel like an outcast. In addition, games are a new kind of art, it will be not only interesting for a child to touch it, but it can also be very useful, especially if the parents can correctly direct him/her.

Solution

As with many situations, banning is not an option. Parents should not prohibit the child's activity in video games, but effectively control it, using special software and device settings, as well as communicating with the child and explaining the rules.

Fear: harm to eyesight and posture

Many parents worry that if the child spends a lot of time playing, his eyesight may be damaged. Others worry that prolonged sitting at a computer or leaning over a smartphone can have a negative effect on a child's posture.

Should you be afraid?
Yes, especially if the child has a predisposition. Already existing vision problems are a reason to organize the gaming process more carefully. As for posture, it can also be threatened especially if the child does not play sports.

Solution
● Installing a good monitor can help alleviate the problem with eyesight. Manufacturers of modern screens are trying to find a solution that will minimize the harm caused by the monitor to the human eye.
● Remember about a comfortable position while playing and working on a computer. A good chair, a table of the right height, a comfortable posture and a good distance from the monitor will help your child's vision and posture.
● Of course, the way to take care of the vision of a child playing is to limit the time of the game. At the same time, it is important that such restrictions are made both at the program level and at the level of agreements between you and the child.

Check with your doctor if your child is seen by an ophthalmologist, how much time to spend a day with the device, or if the child is not seen by an eye doctor, set a reasonable limit based on the child's age. Software level restrictions can be set with the help of online safety programs, such as Kaspersky Safe Kids or of internal device settings, such as set-top boxes and iOS-based mobile devices.

For parents in Malaysia aiming to secure their children better, a three-month free Safe Kids subscription also available online on Kaspersky’s shop on Lazada and Shopee.

Kaspersky is also offering a three-month free trial of Kaspersky Total Security, available through this link https://bit.ly/safekids011.


Fear: Viruses on Your Computer

Some parents fear malware that their child might install with or instead of a favourite game.

Should you be afraid?

Of course, after all, the desire of a teenager to play this or that game may lead to attempts to download a pirated version.

Recent research by Kaspersky shows that the activity of hackers using the gaming theme as a lure has increased significantly since the outbreak of the coronavirus pandemic. At the same time, criminals using the gaming theme in their attacks do not use sophisticated technical methods, they rely on the gullibility and ignorance of the users.

Solution
● First of all, it is necessary to explain to the child what malware is, where you can download it, and what harm can it do.
● It is also worth taking the time to talk with your child about the bad side of piracy.
● Use an antivirus. This is useful not only if a child accidentally installs malware, but also in many other situations.

Fear: Aggressive behavior caused by violent games

Parents who are not versed in computer games, reading the postulates that “children become aggressive from computer games” give in to panic and forbid children to play video games.

Should you be afraid?

A child's aggressive behaviour is not driven by the video games they play, but by a much broader range of reasons. Do not show your child video games at all, but he/she will still compete for kung fu with friends, shoot invisible enemies with a bow, pistol, grenade launcher or blaster. Both boys and girls do this, although it is believed that playing war is the prerogative of boys.

At the same time, if you allow, say, a six-year-old kid to play horror games like Doom and the Alien series, then such scary, frightening, violent games can really adversely affect the psyche of a young child, cause nightmares and other sleep disturbances, and irrational fears. The same can be said about the effect of such games on older children who already have certain fears or tendencies.
It should be remembered that there are different games for every age and every child.

Solution
● Use an age rating. Keep in mind that the age rating even suffers small deviations, if you do not enter the 16+ segment: if you are quite sure that a 12+ rated game is good, then why not install it for your ten-year-old son?
● To prevent your child from launching games that are not suitable for their age (for example, those that you bought for yourself, or that he/she downloaded from the Internet), use software that limits the ability to launch games or any content based on age rating.
● The most important thing is to always remember that whenever you try to restrict your child's access to games, you first need to talk to your son or daughter and explain why you are doing this.

In conclusion, do not prohibit your children from playing video games, but to keep your child safe, remember that the following six points will help you better control this area of children's life:
• Communication
• Age rating
• Time limit
• Protection against malicious code
• Settings restricting in-app purchases
• Promote hobbies in the real world


jeudi 15 octobre 2020

Pelajaran jarak jauh.

Korang, saya dah buat keputusan nak sambung study. Tapi saya nak sambung online je, dah survey dan minat untuk ambik BA/BSc (Honours) Design and Innovation dari Open University. Ok tak korang rasa? Agak - agak ada biasisawa tak untuk Malaysian?


Walkie Talkie Help

I'm looking for some advice on the purchase of a pair of walkie talkies to use during deer season this year. I've never owned any, though I have used them in the field before while hunting with friends.

I'm not really sure what specs or specific things I should be looking out for as I research what model to buy. Does anyone have advice or recommendations about where to start or about what has worked best in your experience?

I realize that being in the mountains can cause problems with the actual range they will be effective, but do some models/brands seem to work better than others?

Anyone have a specific walkie talkie they would recommend? I'm not really looking for the world's best, most expensive unit with every bell and whistle imaginable, but rather a basic, well made pair that can be relied upon in the field.


Peck Natural Area- PA

https://endlessmountains.wordpress.c...a-lake-winola/

The Peck Natural Area protects a grove of old growth pine trees in Lake Winola. The height of some of these trees is impressive, maybe exceeding 150 feet. A beautiful forest that is similar to Cook Forest, but much smaller in size. Loop trail is about a mile long.


https://www.instagram.com/p/CFstkRqD..._web_copy_link


https://www.instagram.com/p/CFsuZz3j..._web_copy_link


https://www.instagram.com/p/CFvjIu9D..._web_copy_link


mardi 13 octobre 2020

Stillwater Mtn. Closed for Hunting Season



Looking for paddle suggestions

Hello everyone. I am planning a paddle trip that will most likely be 2 to 3 nights. I'm looking for something that is a relatively short paddle (around 5 miles or less) with a lean to. 2 of my friends that are going are new to paddling so I'm looking for an easy paddle. Any suggestions would be appreciated. Thanks everyone.


Pack Basket repair

I acquired a 70 or so year old pack basket that could use some minor repair work. Anyone know of someone that would do this type of work?

Thank you


Kaspersky shares best practices with SAMENTA to secure SMEs’ assets during the pandemic

Kaspersky teams up with Small and Medium Enterprises Association Malaysia (SAMENTA) in an effort to bring cyber awareness to its members and employees.

The workshop session, hosted online by Kaspersky for SAMENTA’s members and employees, focuses on understanding the monetary aspects of cyberthreats to Malaysian small and medium enterprises (SMEs), identifying the common vulnerabilities in the SMEs eco-systems, finding the right professional security solutions, and deploying integrated cybersecurity practices amidst the current pandemic situation.

Globally, COVID-19 has wreaked havoc economies, hitting hard the SMEs. To survive the unprecedented challenges the pandemic brought about, SMEs embrace digitalisation to keep their businesses afloat. The increased online transactions also open opportunities for cybercriminals.

According to Kaspersky’s latest statistics, cybercriminals targeting small and medium businesses (SMBs) in Southeast Asia (SEA) spent their months seeding phishing emails proactively. The global cybersecurity company’s anti-phishing software applications prevented 1,602,523 phishing attempts against companies with 50-250 employees, a 39% increase compared with the same period last year.

During the online session, Kaspersky team shared that, in the first half of this year, Kaspersky has foiled the most phishing attempts in the region against SMBs in Malaysia, Indonesia and Vietnam. Singapore tolled the fewest phishing emails in the region, but still witnessed an increase of 60.5% compared with the same period last year.

Speaking on the initiative for Malaysian SMEs, Yeo Siang Tiong, General Manager for Southeast Asia at Kaspersky says, “We are very much eager to align our promos and programs with the SMEs’ needs in Malaysia. This sector has been battered by COVID-19 and we have to help them as much as we can in protecting their assets. It is important for us to hear, first-hand, the challenges SMEs face in terms of cybersecurity, to allow us to figure out how we can assist them better. We are honoured to partner with SAMENTA on this initiative and we believe that with secured tools and right knowledge, SMBs can survive this pandemic,” says Yeo Siang Tiong, General Manager for Southeast Asia at Kaspersky.

Both entities joined forces to achieve their mutual goal of preparing and enhancing the skills of SAMENTA members to be able to secure their networks and systems as they drive towards further digitalisation.

Datin Lorela Chia, Chairman, Central Region at Small and Medium Enterprises Association Malaysia (SAMENTA) says, “SMEs have been pushed to accelerate digitalisation in the past few months as they shift to WFH culture and cloud-based solutions. Many have re-engineered internal processes, with some mapping out their automation blueprint ready for implementation in stages. Security policies and procedures must be implemented to reflect the shift. Many of our members are aware of the importance of cybersecurity but few are confident that they know how to analyze and address cyber risks. With our partnership with Kaspersky we hope our members can protect their businesses securely, identify attacks, assess risk levels and develop a response plan in the event of intrusion. We are happy to address the cybersecurity gap among SMEs with Kaspersky."

At the online event, the SAMENTA members learnt the various technologies and solutions from the global cybersecurity company – Kaspersky Endpoint Security for Business and Kaspersky Automated Security Awareness Platform (ASAP). Kaspersky also offers SAMENTA members and their employees special packages of Kaspersky Antivirus, Kaspersky Internet Security, and Kaspersky Total Security.

Among the tips Kaspersky shared in the session with the SMEs to avoid being lured by cybercriminals through phishing are:
● Teach employees about the basics of cybersecurity. For example, not opening or storing files from unknown emails or websites as they could be harmful to the whole company, or to not use any personal details in their passwords. In order to ensure passwords are strong, staff shouldn’t use their name, birthday, street address and other personal information.
● Regularly remind staff of how to deal with sensitive data, for example, to only store it in trusted cloud services that need to be authenticated for access and that it should not be shared with untrusted third parties.
● Enforce the use of legitimate software, downloaded from official sources.
● Make backups of essential data and regularly update IT equipment and applications to avoid unpatched vulnerabilities that could cause a breach.
● Configure Wi-Fi encryption. It is imperative to configure your network connection correctly and set your router’s log-in and password regularly.
● Use a VPN if connecting to Wi-Fi networks that don’t belong to you. When you’re connected through a VPN, all of your data will be encrypted regardless of the network settings, and outsiders will not be able to read it.
● Use corporate services for e-mail, messaging, and all other work. Stick to corporate resources when exchanging documents and other information. Those cloud drives, but configured for business, are generally far more reliable than the free user versions.
● Protect devices with an antivirus solution. It is vital that you install a reliable security solution on all devices that handle corporate data.


Best Corporate Training and Placement Institute

What is the best Best Corporate Training and Placement Institute in Pune?
Best Corporate Training and Placement Institute


lundi 12 octobre 2020

Best Corporate Training and Placement Institute

Which is the Best Corporate Training and Placement Institute?

Best Corporate Training and Placement Institute


dimanche 11 octobre 2020

Industrial espionage in action

Kaspersky researchers uncovered a series of highly targeted attacks against industrial holdings dating back to 2018—far more rare in the world of advanced persistent threat (APT) actors than campaigns against diplomats and other high-profile political actors. The toolset used—originally named MT3 by the malware authors—has been dubbed by Kaspersky as “MontysThree”. It uses a variety of techniques to evade detection, including hosting its communications with the control server on public cloud services and hiding the main malicious module using steganography.

Government entities, diplomats, and telecom operators tend to be the preferred target for APTs, since these individuals and institutions naturally possess a wealth of highly confidential and politically sensitive information. Far more rare are targeted espionage campaigns against industrial entities—but, like any other attacks against industries, they can have devastating consequences for the business. That’s why, upon noticing the activity of MontysThree, Kaspersky researchers were quick to take note.

To carry out its espionage, MontysThree deploys a malware program consisting of four modules. The first—the loader—is initially spread using RAR SFX files (self-extracted archives) containing names related to employees’ contact lists, technical documentation, and medical analysis results to trick employees into downloading the files—a common spear phishing technique. The loader is primarily in charge of ensuring the malware isn’t detected on the system; to do this, it deploys a technique known as steganography.

Steganography is used by actors to hide the fact that data is being exchanged. In the case of MontysThree, the main malicious payload is disguised as a bitmap (a format for storing digital images) file. If the right command is inputted, the loader will use a custom-made algorithm to decrypt the content from the pixel array and run the malicious payload.

The main malicious payload uses several encryption techniques of its own to evade detection, namely the use of an RSA algorithm to encrypt communications with the control server and to decrypt the main “tasks” assigned from the malware. This includes searching for documents with specific extensions and in specific company directories. MontysThree is designed to specifically target Microsoft and Adobe Acrobat documents; it can also capture screenshots and “fingerprint” (i.e. gather information about their network settings, host name, etc.) the target to see if it is of interest to the attackers.

The information collected and other communications with the control server are then hosted on public cloud services like Google, Microsoft, and Dropbox. This makes the communication traffic difficult to detect as malicious, and because no antivirus blocks these services, it ensures the control server can execute commands uninterrupted.

MontysThree also uses a simple method for gaining persistence on the infected system—a modifier for Windows Quick Launch. Users inadvertently run the initial module of the malware by themselves every time they run legitimate applications, such as browsers, when using the Quick Launch toolbar.

Kaspersky has not been able to find any similarities in the malicious code or the infrastructure with any known APTs.

“MontysThree is interesting not just because of the fact that it’s targeting industrial holdings, but because of the combination of sophisticated and somewhat “amateurish” TTPs. In general, the sophistication varies from module to module, but it can’t compare to the level used by the most advanced APTs. However, they use strong cryptographic standards and there are indeed some tech-savvy decisions made, including the custom steganography. Perhaps most importantly, it’s clear that the attackers have put significant effort into developing the MontysThree toolset, suggesting they are determined in their aims—and that this is not meant to be a short-lived campaign,” comments Denis Legezo, senior security researcher with Kaspersky’s Global Research and Analysis Team.

Learn more about MontysThree on Securelist. Detailed information on Indicators of Compromise related to this group, including file hashes, can be accessed on the Kaspersky Threat Intelligence Portal.
Register for SAS@Home to watch the presentation about MontysThree and learn more about APTs and top-level cybersecurity discoveries here: https://kas.pr/tr59

To protect your organizations from attacks like MontysThree, Kaspersky experts recommend:
• Provide your staff with basic cybersecurity hygiene training, as many targeted attacks start with phishing or other social engineering techniques. Conduct a simulated phishing attack to ensure that they know how to distinguish phishing emails.
• Provide your SOC team with access to the latest threat intelligence (TI). The Kaspersky Threat Intelligence Portal is a single point of access for the company’s TI, providing cyberattack data and insights gathered by Kaspersky over more than 20 years.
• For endpoint level detection, investigation and timely remediation of incidents, implement EDR solutions, such as Kaspersky Endpoint Detection and Response.
• In addition to adopting essential endpoint protection, implement a corporate-grade security solution that detects advanced threats at the network level at an early stage, such as Kaspersky Anti Targeted Attack Platform.
• Make sure you protect industrial endpoints as well as corporate ones. The Kaspersky Industrial CyberSecurity solution includes dedicated protection for endpoints and network monitoring to reveal any suspicious and potentially malicious activity in the industrial network.


EXTRA 5% On Any PC | Lenovo Coupon Code

EXTRA 5% On Any PC with Lenovo Coupon Code
Save an EXTRA 5% On Any PC with Free Shipping!


samedi 10 octobre 2020

Sawyer re-route?

Has there been a re-route of Sawyer Mtn trail recently? I've climbed it 4 or 5 times but not in several years. I did it to day and it just felt... different and unfamiliar in chunks so I was curious.


vendredi 9 octobre 2020

Permits Coming?

Hi All,
I've been reading recently about the DEC might start requiring permits in the High Peaks Region due to conservation efforts. Does anyone know how soon this may start or how it will be enforced? Just wondering how far in advance you will need to request a permit and how it will be regulated.


Stand Hunt 2020

Here I go deer hunting. Waiting for a nice buck to come by.

Sent from my SAMSUNG-SM-G890A using Tapatalk


mercredi 7 octobre 2020

Casting LC Wabblers

I know that this lure is designed and at its best for trolling and not casting. Nevertheless, with the limited trout season days left and fish moving in closer to shore, casting might attract a fish. How would you alter the rig for casting - smallest size, no swivels, shorter worm/streamer line, garden worm vs nightcrawler, etc?


Best Corporate Training and Placement Institute

Which is the best Corporate Training and Placement Institute in Pune?
Best Corporate Training and Placement Institute


Kaspersky expert: Targeted ransomware groups such as Maze spotted in Southeast Asia

Evolving ransomware which blackmails enterprises to get ransom highlights the need for proactive, intelligence-based security

If there is one positive consequence brought about by the COVID-19 situation in Southeast Asia (SEA), it is to prove that the region has the capability to embrace digitalisation. In fact, a 2020 research conducted by Kaspersky among 760 respondents from the region revealed that nearly 8-in-10 are currently working from home.

An additional two to five hours have been added on top of the 8-hour daily surfing average of consumers in SEA. In terms of financial matters, 47% of the surveyed individuals have shifted their payment and bank transactions online due to the lockdown restrictions and safety precautions on their respective countries.

Technology and the World Wide Web are stepping up as powerful tools which everyone can leverage to survive this period. Increased reliance on the internet, however, also open more vulnerabilities cybercriminals can exploit. With the combined digital aftermath of the pandemic and the geopolitical situation in the region, Kaspersky announces the top threats public and private organisations should watch out for.

“The year 2020 is not like any other. This year is not only the time of changes, but it changed the time itself. It changed the way we travel, the way we shop, the way we interact with each other. The computer threat model has evolved since COVID-19 started,” says Vitaly Kamluk, director for Global Research and Analysis Team (GReAT) Asia Pacific at Kaspersky.

Rise of Targeted Ransomware
Through a virtual media conference with select journalists in SEA, Kamluk revealed how cybercriminals have added blackmailing on their arsenal to ensure that their victims will pay ransomware. He also confirmed the presence of top ransomware groups in the region targeting the following industries:
• State enterprise
• Aerospace and engineering
• Manufacturing and trading steel sheet
• Beverage company
• Palm products
• Hotel and accommodation services
• IT services

Among the notorious ransomware families, and is one of the first to conduct such operation, is the Maze family. The group behind Maze ransomware has leaked the data of their victims’ who refused to pay ransom — more than once. They leaked 700MB of internal data online back in November 2019 with an additional warning that the published documents are just 10% of the data they were able to steal.

Aside from this, the group has also created a website where they revealed the identities of their victims as well as the details of the attack – date of infection, amount of data stolen, names of servers, and more.

The attack process being used by this group is simple. They will infiltrate the system, haunt for the most sensitive data, and then upload them to their cloud storage. After that, these will be encrypted with RSA. A ransom will be demanded based on the size of the company and the volume of the data stolen. This group will then publish the details on their blog and even make anonymous tips to journalists

“We are monitoring an uptick on Maze detections globally, even against a few companies in Southeast Asia, which means this trend is currently gaining momentum. While the public shaming part of the attack adds to the pressure of bowing to the demands of these cybercriminals, I strongly advise companies and organisations not to pay ransom and to involve law enforcement agencies and experts during such scenarios. Remember that it is also better to have your data backed up, your cybersecurity defenses in place, to avoid falling victims to these malicious actors,” adds Kamluk.

To remain protected against these threats, Kamluk suggests enterprises and organisations to:
• Stay ahead of your enemy: make backups, simulate attacks, prepare action plan for disaster recovery.
• Deploy sensors everywhere: monitor software activity on endpoints, record traffic, check hardware integrity.
• Never follow demands of the criminals. Do not fight alone - contact Law Enforcement, CERT, security vendors like Kaspersky.
• Train your staff while they work remotely: digital forensics, basic malware analysis, PR crisis management.
• Follow the latest trends via premium threat intelligence subscriptions, like Kaspersky APT Intelligence Service.
• Know your enemy: identify new undetected malware on premises with Kaspersky Threat Attribution Engine.


mardi 6 octobre 2020

Lean to shelfs

Coming off 6 straight nights in 6 different lean to's along with a lifetime of various lean to's being slept in, is it safe to say that the shelves in these shelters are actually the junk drawers of the Adirondacks?? A mix of books,batteries,bug spray,mouse chewed toilet paper, broken flashlights, 3/4 used jars of peanut butter, ect.ect.ect......


Murphy Lake reclaimed

FYI, I saw this sign hanging at the Pumpkin Hollow Rd trailhead for Murphy Lake in the Wilcox Lake Wild Forest.

Attached Images
File Type: jpg 10 6g TH - Copy.JPG (132.3 KB)


Group/Organized Rides

Does anyone know of rides planned for 2021, or is it too early for them to be posted?


Rocky Peak Ridge

I went in from the Route 73 trailhead via the washbowl and it was 6.5 miles round trip, with 3527’ of elevation gain, plus the 700’ on the return to the trail junction with Giant Mountain for a total of 4227. This was a huge leg day for me, plus I had company.

My friend Justin and I signed in at the trail register at 6 am under headlamp. The trail takes on a completely new perspective in this regard. The first part of this trail, up to the washbowl is sparsely marked and can be difficult to follow under headlamp, just need to pay attention to rock scraps and dirt. The switchbacks help with the 650 plus feet in elevation gain in just over half a mile. While climbing this peak, there are many spectacular views all along the way, the first being the ledge just before the washbowl. This view prominently presents the Great Range along with the northeastern side of the Dix Range.

From the washbowl up it is a steady climb with several steep sections. The trail offers a variety of obstacles to navigate, boulder fields, switchbacks, ledges, slabs, blowdown, and mud.

We arrived at the junction with the Rocky Peak ridge trail at 11 am. After a quick break, We were on our way to Rocky Peak. The trail drops around 700’ in .3 miles to the col. I probably spent more energy avoiding a fall than I did climbing up out of the col on our return. It would be nice to see a ladder in one section (about 300' below the junction) that is pretty hairy. The drop in elevation can be discouraging, but the trail from the col up to the summit of Rocky Peak is a pleasant climb gaining around 600’ in just over a half-mile.

We arrived at Rocky Peak at 1:30 pm. The summit was not what I had expected. Based on photos from other hikers. I was led to believe the summit was rocky and had a large cairn on it. While there were cairns and it was somewhat open and rocky, it just was not what I had expected. It was a pleasant surprise. The summit has a long, bare ridge, a result of a forest fire in the region in 1913.

We laid down and relaxed in the sun on the summit enjoying the views; and even came close to falling asleep. After about a half-hour, we started our trek back. The climb back up to the trail junction was easier than the climb down. I took a quick break at the junction, while Justin tagged Giant (I previously had climbed Giant before), we made our way back down to the car arriving at 7 pm.

We would have several people pass us today as we made our way up the mountain, we did not mind, we were hiking our own hike. It is nice to meet new people, especially those who enjoy and respect the great outdoors. One of those who passed us was a 78-year-old man; I believe he also mentioned this was his 104th time climbing this mountain, and he was number eight or nine on the Adirondack 46er Grid list. Respect.

7.2 miles round trip
4227’ elevation gain
Start time 6 am
End time at 7 pm

Additional photos