-
Posts
20,350 -
Joined
-
Last visited
-
Days Won
2
Content Type
Profiles
Forums
Events
Everything posted by southsideirish71
-
Sox (17-17) @ Seattle (14-23) 9:10 PM
southsideirish71 replied to G&T's topic in 2008 Season in Review
QUOTE (YASNY @ May 10, 2008 -> 10:20 PM) You can't hit a fastball if you are looking offspeed. You may foul it off if you are looking heat and get offspeed. I understand that, however there are certain traditional counts in baseball ( 2-0, 2-1, 3-1, 3-2 ) where you expect a fastball. In those counts this year, I have seen a steady diet of changeups few to our 3-4-5. -
Sox (17-17) @ Seattle (14-23) 9:10 PM
southsideirish71 replied to G&T's topic in 2008 Season in Review
QUOTE (YASNY @ May 10, 2008 -> 10:17 PM) When a pitcher throws 96, you have be looking for heat with 2 strikes. In a hitting count, or with 3-2 count our 3-4-5 crew have been fed a steady diet of changeups. -
Sox (17-17) @ Seattle (14-23) 9:10 PM
southsideirish71 replied to G&T's topic in 2008 Season in Review
When Javy has a 6th inning meltdown, his arm angle drops down quite a bit. He was slinging the ball that inning. -
Sox (17-17) @ Seattle (14-23) 9:10 PM
southsideirish71 replied to G&T's topic in 2008 Season in Review
QUOTE (lostfan @ May 10, 2008 -> 10:52 PM) Kind of like that fly ball he was camped under just now. Most other CFs are still running when the ball gets there. His ability to read the ball off the bat is what makes him special defensively. His speed is good, his glove is good. But that first step break and ability to run to a point in the field is amazing. -
Sox (17-17) @ Seattle (14-23) 9:10 PM
southsideirish71 replied to G&T's topic in 2008 Season in Review
QUOTE (lostfan @ May 10, 2008 -> 10:47 PM) Jesus, you figure Anderson already plays shallow to begin with, and he was shaded slightly to left. Runs all the way to the warning track and misses the catch by about 2 inches. He actually got there in time, which is the amazing thing. He just paced a bit too far, and couldnt readjust the glove. Amazing D by that kid. -
QUOTE (KipWellsFan @ May 10, 2008 -> 10:39 PM) The congress is pretty big, you might want to rethink that one. He is number 1.
-
Sox (17-17) @ Seattle (14-23) 9:10 PM
southsideirish71 replied to G&T's topic in 2008 Season in Review
I like Dye in the 3 hole. Thome should move down a slot. -
Sox (17-17) @ Seattle (14-23) 9:10 PM
southsideirish71 replied to G&T's topic in 2008 Season in Review
I like the offense tonight. Its amazing, the minute this club gets into a big park they stop with the softball nonsense. -
Sox (17-17) @ Seattle (14-23) 9:10 PM
southsideirish71 replied to G&T's topic in 2008 Season in Review
QUOTE (Heads22 @ May 10, 2008 -> 06:16 PM) Cabrera, SS America's Newest Hero, LF Dye, RF Konerko, DH Swish, 1B Crede, 3B America's Newest Hero With The Golden Locks, CF Uribe, SS Pink Chin, C I love having Dye in the 3 hole. Thome should slide down to 4 and Konerko to 5 with the new realignment until Kong and Thome start ripping. -
AND THAT'S A WHITE SOX WEST COAST WINNER!!!!
southsideirish71 replied to Kalapse's topic in Pale Hose Talk
QUOTE (fathom @ May 10, 2008 -> 04:15 PM) Couldn't disagree with you more. A homer off of Jenks' fastball can do nothing but hurt his confidence in that pitch. Bobby doesnt have confidence issues. I am glad that he showed the fastball finally. -
QUOTE (farmteam @ May 10, 2008 -> 01:13 PM) I don't see how that's malicious. To me, malicious would have been more than simply accessing the information -- it would have been disseminating that information or using it to harm someone. I disagree with the second sentence in that I'm not sure how this is more or less blatant that instances where your first sentence would apply. I hope you are so understanding if someone gets your personal information. I mean if you are so forgiving on this, you should just post your social security number, your bank account number, and maybe your medical records for review. I mean we just want to look, we are not going to doing anything malicious. When you get a breach like this, and you find a person downloading someone elses personal files then we have gone beyond the story he gave on why he was there in the first place. What was the purpose of him downloading someone elses medical records. Once data has been extracted from its secured location, you cannot verify that it is secure. It could be on a thumb drive, on an X drive, or sent via IM to a friend. That personal information is unlocked. Hence why in these situations the victims usual sue the school because of their failing in their security protocols. Now they were wrong for their lack of security. But this is why companies spend large amounts of money on security infrastructure and the people who run them. I have been on both sides of this argument as a 15 year old kid, and as an adult. I see the investment, the fines, the law suits that happen over the breach of someones personal data.
-
AND THAT'S A WHITE SOX WEST COAST WINNER!!!!
southsideirish71 replied to Kalapse's topic in Pale Hose Talk
QUOTE (elrockinMT @ May 10, 2008 -> 10:00 AM) Always nice to win a game. But, I don't like the fact our ace closer gave up a run and a homer at that. Meaningless or not when you bring in the big gun you want to see him shut down the other team completely. I did not get to see that game so I don't know the situation or the pitch sele3ction all that stuff, but I never like to see the opposing team get a score off the bullpen. He was pumping in fastballs that were anywhere from 94 to 98 on the gun last night. It was an oppo shot. And a hell of a swing. Its not like he hung a pitch, or grooved a 91 mph fastball down the cock. -
QUOTE (lostfan @ May 9, 2008 -> 11:30 PM) This may sound like an ignorant n00bish sort of question but it's never a situation I've had to think about. If you have an infant/toddler/child less than 2 years old, does the baby need a ticket or can they just go in on your lap like on a plane? I've never brought a baby to the Cell, or to any baseball game for that matter. I ask because I used to work at public venues like that before and babies needed to have a ticket to be accounted like all other people for to keep up with the fire code or something like that, but I'm not sure where that applies to. If the child is shorter than 36 inches which is the turnstyle height they can get in without a ticket. At least that was the policy last year. You can give them a call at the ticket office for verification.
-
Sox (16-17) @ Mariners (14-22) 9:10 pm, CSN
southsideirish71 replied to G&T's topic in 2008 Season in Review
Konerko puts the first pitch in play for an out. Nice approach. -
QUOTE (farmteam @ May 9, 2008 -> 04:36 PM) I disagree with the majority too. Where was the malicious intent? Where was the broad dissemination? I think things like not being allowed to walk at graduation, not going to prom, and being out of school for almost an entire semester are sufficient. The line was crossed when he decided to download other students info. People hacking for fun or to prove a point usually break into the system and take a trophy. The trophy is usually something that earmarks that you were on the system. The common way I would trophy a system was to place a file on the system, or to pull down the password file. Pulling down other students information is not a trophy, its more malicious. Looks like the bozo's at New Trier got jacked by using a wireless network tied into their production network. Someone realized that an unauthorized user was in the DB, and they walked around and caught him red handed with the data on his screen.
-
Can we finally play well on the west coast?
southsideirish71 replied to gosox41's topic in Pale Hose Talk
I think they will hit better this series. When they move to a pitchers park they start to hit better because the home run is not on the attack plan. They actually try to hit the ball, instead of crush it. Our pitching has been pretty damn good, so it should play well over the next 3 series. -
QUOTE (Y2HH @ May 9, 2008 -> 08:48 AM) This is funny to me for multiple reasons. First and foremost, because now that 'computer hacking' is somewhat of a pop-culture phenomenon, and in the public spotlight, they make a big deal out of next to nothing. Also, it seems that modern "hackers" don't recognize nor realize the added security and auditing that can be done that once didn't exist, so they don't take their time to cover their tracks or seriously screw up their tracks. Things like intrusion detection system and detailed logging was something that just didn't exist back in the day. I'm 32 years old now, but not only did I hack my high-schools network (which was on of the very first networked schools in the city of Chicago), but I hacked UIC's and DeVry's, too. 1. Bogan High. I never got caught for this one. They had a multi room token ring lan based on an early version of Novell Netware. Owned. I had access to all student/teacher profiles (although the data was scant as they were JUST starting to implement), and all personal directories. Again, scant pickings since I was one of the few people in the school that knew anything about networking. We mostly used it to chat with an early non-graphical based method of text messaging across the network, so friends in different computer classes were able to talk throughout class, while constantly typing, so the teachers thought we were hard at work. 2. UIC. I *did* get caught on this one, and nearly expelled. Had to meet the dean face to face and explain myself to him and their network staff, how I did it, etc. I had full access to everything on this one, including student records, student directories, etc. It was VAX based with a live internet connection, so more or less a wierd system that most didn't understand. Keep in mind this was the early 90's, and most people had never heard of an "internet" at this time. One of the help files on the VAX system had extensive notes on how to use said system, and one of their many login examples was a superuser, which is their own fault. Instead of using their example to login as myself, I logged in as the example, and found infinite system control at my hands. They let me off for this one, and never made it public since it would have been an embarrassment since they published this account in an open forum, however, it just goes to show you...this was a major unversities network and not a thing was said/done. I do this same thing 10 years later and I guarantee my university days are over. 3. DeVry. Also Novell based in an era where Windows 95/NT was coming into it's own. This one was also easy as the holes in Novells software were gaping huge and you could exploit a malconfigured system quite easily. I used a simple brute force crack on their admin account and within minutes had access to everything. Never got caught for this one, either, but it aided my vast laziness throughout college. Rather than writing my own programs for whatever given class, I'd simply steal them from another students home directory, rewrite them and hand them in as my own. It's not suprising I didn't stay in programming, since I hardly knew how after a while. I did, however, go into network security before people thought about security, which now seems fitting. If you don't want your network hacked, secure it, patch it and actively watch over it. The only thing that should happen here, are the people in charge of this network should be fired for doing a terrible job. Maybe they should hire this kid to show them how stupid they are while their at it. A little more on my history. At the age of 12 the men in suits arrived at my house, charged me a 750$ fine for "phreaking" credit and calling cards. They figured out I was war dialing because my "randomized" sequences were too tight. Still, I didn't have to pay for much in the way of computer equipment or skateboards for a good few years there. Thank God at the time such things were harder to trace than now, or I would have probably been charged upward of 7,000$. Wardialing, for those not in the know, is a name ripped from the movie Wargames, which uses randomized sequential blocks of numbers to test for validity. Such as 555-0001, 555-0002, 555-0003, etc...there are certain tones the companies once used to verify a valid card, if the computer dectected that tone, it would keep note of it. Ordering equipment via credit card was easy, as there was almost no security back in the day, so they'd just send the equipment right on over while charging to said card. Getting the name/exp date off the card was also easy as all you had to do was call the credit card company and ask, they'd give it right up without a fuss at the time. Then you have the stuff sent UPS to the neighbors while they're at work, slap a note on the door to "leave the stuff", and when they leave it, go grab it. The neighbor has no recollection of this since they weren't around...but, you get the point. They don't have a network security guy at this high school, its probably some dolt who has been there for years that hired a consulting company to come in and put up a firewall. I bet they haven't had a security audit and wouldnt know what happened. And from what I heard this kid didn't "hack" into the system. He got his hands on a password ( much like Wargames) and got in. Today we dont have hackers, we have jackass kids who run tools they downloaded and have no clue what they do, then you have bots as well. The real hackers are the ones dropping malware on your system sending that data back to China. I also had the men in suits come to the house. That could of ruined my life.
-
QUOTE (farmteam @ May 9, 2008 -> 12:32 AM) What do you guys think of this? Personally, I think criminal charges are excessive -- suspension was enough. http://www.chicagotribune.com/news/local/c...0,2033130.story This is not an example of a brilliant child showing off his talents and how the computer system's security is lax. This is a petty competitive child who decided to see where he ranked, and then decided to download other students personal information to his computer ( transcripts, personal info, medical info ). Now think about this in our social networking context. The parents who they have interviewed who think he is some sort of brilliant kid who is just misunderstood would have a completely different tone if he was blasting their kids personal information on MySpace because he got access to it. He is very lucky and this was a good lesson for the future. If he was a few years older and he was working at a company, he would be talking federal prison time and pretty much can kiss his career path dead. And he is going to Urbana, good luck trying your cute little scams there. The only place worse in the midwest for a pseduo-hacker to go to is probably Purdue with the Cerias program. If he tries that there, there will be men in suits kicking in his door taking him away.
-
I would like to see Dye moved to the 3 hole and Thome and Konerko moved down a step.
-
We are going to play in 3 pitcher parks. You will see the usual transformation. Our offense will realize that they cannot bash it out like a softball team, and they will hit, actually hit over the next 3 series. I wish they would do this when they come back to a hitters park. Our pitching has been great this year. Hopefully it will keep up. Ozzie using the template bullpen mode at the end was impressive as well.
-
QUOTE (SoxFan562004 @ May 8, 2008 -> 03:18 PM) awesome. 2 out of 3 against the 1st place team. They're going to miss the King in Seattle since he is pitching tonight and miss Bedard too since he went yesterday. Need to take advantage of schedule breaks like that We will be playing in two large pitcher parks on the road. We hit well in pitchers parks, because the meathead lift and pull offense shuts down, and they actually hit. Its why they hit well in Detroit. If we could only take the approach in pitchers parks, and apply it to the rest of the parks our offense would be decent.
-
QUOTE (SoxFan1 @ May 8, 2008 -> 02:49 PM) People here make me sick. When Ozzie plays the match-ups and brings in Logan/Thornton, he's wrong and should have brought in his set-up man and is micro-managing. But when he brings in his set-up man, he's wrong for not bringing in the LOOGY and playing the match-ups. Give me a f***ing break. Ozzie is using the traditional template attack. This is what he should of been doing for years. The 50 changes based on what paw the pitcher has to match up with what paw the hitter has jazzes everything up. I am shcoked that he has adapted to this level of end of the bullpen management.
-
And another bouncy ball in front of the plate, and Mauer makes 3rd.
-
Mauer advances on the wild pitch.
-
Ozzie is in template mode. 8th inning Linebrink 9th Jenks
