Thursday, November 22, 2007
A Novel at 14
For about a year and a half I've been working with a very bright young woman, now 14 years old. I am pleased and proud to announce that she has recently published her first novel, Amelie of the Mitesen. It is a coming-of-age story set in a fantasy world somewhat similar to that of the Metis.
I did none of the writing; I simply told her what I thought was well written, and where she needed to add more of a set-up to parts of the story. It is all her ideas and all her words.
Feel free to order a copy from Lulu.com - http://www.lulu.com/content/1151511
Saturday, November 17, 2007
Sunday, November 04, 2007
Hacking Mail Accounts
I heard a disturbing story today from a friend. She has a Yahoo mail account, or rather, she had one. Someone hacked into it and sent emails to everyone in her contacts list. I can't remember if she said all her files were destroyed as well; we were both rushing in different directions.
All her contacts got an email starting "Hello Dear" which her kids immediately recognized as a fraud because she never uses that kind of phrase. The email continued, telling her contacts that she was stranded in Africa, and where they could send the money she needed to get back home.
I don't want to increase anyone's paranoia, but that level of fraud is pretty scary. My friend is a smart lady, and she took action immediately, but it has caused her a lot of trouble and anxiety. I don't know what would allow that kind of security breech. Does anybody know how to avoid that kind of hacking?
All her contacts got an email starting "Hello Dear" which her kids immediately recognized as a fraud because she never uses that kind of phrase. The email continued, telling her contacts that she was stranded in Africa, and where they could send the money she needed to get back home.
I don't want to increase anyone's paranoia, but that level of fraud is pretty scary. My friend is a smart lady, and she took action immediately, but it has caused her a lot of trouble and anxiety. I don't know what would allow that kind of security breech. Does anybody know how to avoid that kind of hacking?
Subscribe to:
Posts (Atom)