Landmark Books

via Gizmodo: Insanely Detailed Book Sculptures...

Flooding in Thailand 2011

Residents make their way along flooded streets on the outskirts of Bangkok on Saturday. Thailand is experiencing the worst flooding in 50 years.

In addition to the cost in human lives, including displacement of hundreds of thousands, the price of goods produced in Thailand are expected to increase dramatically after this historic flooding.

Also visit Thailand Floods & Amphibious Tuk-Tuks for a snapshot of how life carries on.

So Long, Summer

I found this poem--written on the back of a napkin, which was crumpled up under a seat in the Maglev--on the way to a meeting yesterday.  The author is unknown.

So Long, Summer

Hello September, so sad,
Leaves falling like mad.

Angels blowing kisses goodbye,
To the warm waves and sky.

Shadows long and blue,
Late light, orange in hue.

Carefree days gone,
Early nights have come.

Goodnight Moon Sequels

Below a collection of children's books from parallel universes that are eerily similar to our own Goodnight Moon (or Sci-Fi parodies of said book).

Goodnight Forest Moon

A Star Wars retelling of the classic.

Source: DzignSpace :: Goodnight Forest Moon

Goodnight Dune

Would make Frank Herbert proud (maybe?).

Source:  Goodnight Dune

Goodnight Keith Moon

The Who Rock 'n' Roll version

Source: Goodnight Keith Moon

See also Classic Time Travel Book Review: Goodnight Moon

MetaWatch prototype review | This is my next...

MetaWatch prototype review at This is my next...

Chris Ziegler doesn't recommend it for everyone, but is an interesting step in the right direction for a Dick Tracy watch.

Tron Poster from Thailand

IndoTRONa :: Thai Tron

Sooper Smart Logos from Yesteryear

I used this tutorial to create the new logo.

Here is one of the original logos: Time to Retire the Old Logo

Top 10 Sooper Smart Internet Security Tips, 2011

Scientific studies show that 10 out of 10 people who use email and the internet will also receive an email for low price RX medications or somehow be affected by a computer virus, hacker, or attempted cyber crime (Note 1).  Considering the stakes, the Sooper Smart Security Inst. has decided it is time to publish their list of  the top 10 Sooper Smart Internet Security Tips.  These assume you have taken such basic steps as installing antivirus software, ensuring your personal firewall is running, and avoiding email offers of cheap Rolex watches and Nigerian fortunes.  With out further ado, for your approval, they are as follows (skip to the bottom for the Cliff's Notes summary):
1. Email Attachments

Never open an email attachment from anyone unless you are certain its contents are harmless (such as photographs from a trusted ally).  If the attachment contains a file that you have to double click to open, think twice.  First, contact the sender and double check he or she actually sent you the file (not a hacker or zombie computer).  Then consider the possibility that your contact could be lying, under duress, or an imposter.  Then ponder if the sender may wish your destruction (even if it the email is from your grandpa).  This also applies to clicking on links in email whether it is from a friend or from your bank, which leads us to phishing.

2.  Phishing

If you receive an email appearing to be from your bank or a company you've done business with but that looks suspicious, don't follow any links in it.  Go directly to their website instead.  Simply type in the company's dot com address (such as or and check for a message or alert from there.  Alternatively, call or email the company's customer support to verify they sent the message.  Following said email link could redirect you to a fraudulent website and expose you to a virus or opportunity to steal your credit card or personal information.  The breach of Epsilon (the world's largest email marketing provider) it has made it even easier to target you with Spear Phishing.  See an example below of this from a fake Skype and Adobe.

A Newsletter from Skype?
An Adobe Acrobat Upgrade?
Wrong!  A Hacked Email Bathroom Fixtures Account.
Wrong Again!  Octopus Travel:  You've Been Hacked.

3.  Secure Connections

When banking or making a purchase online, always check for the 's' after the http in the address bar (https indicates a secure connection to the company's server).  In Google's Chrome Browser, it looks like the image below entitled "https".  If you would like to ensure your email correspondence is secure and encrypted, in Gmail, you can select to always use https by enabling it in your settings.  This is especially important when using public Wi-Fi.

4.  Public Wi-Fi

If you are using public Wi-Fi at a coffee shop, bookstore, hotel, airport, or other location, be careful about where you browse, especially if you are not on an https connection.  Hackers may be able to view the data you transmit and receive.  Also, be aware of the honeypot scam whereby a nefarious person sets up a falsified wireless network (called mcdonalds or homedepot for example) at said location and monitors your data for information that could be used to hack your email or other personal information, such as passwords.

5.  Passwords

Passwords are like your keys.  You wouldn't use the same key for your home in the hills as for your condo on the beach you rent out or the same size key for your top secret lab as you would for your Squash locker.  In the same way, don't use the same password at every website.  It is recommended you use a different and secure password at each of your financial institutions.  A secure password would have uppercase and lowercase letters, numbers, be at least 10-12 characters and difficult to guess (no pet's or relative's names).  At merchant websites (such as Amazon) you should use a difficult to guess password, but it doesn't have to be as long or secure as at your banks.  You should still make each somewhat different, by changing or interspersing the numbers within them.  For low security websites (where your credit card or other private information isn't stored) a less secure password is needed.

6.  Home Wi-Fi

Home Wi-Fi should never be left "open," that is you should always have security enabled on your home wireless connection.  It's different for each router but generally under the wireless security settings, make sure you have at least WPA security enabled.  WEP is commonly used as it is older and compatible with more devices but has vulnerabilities.  Also, if you purchased your own router, make sure to change the default username and password.

7.  Social Networks

Double check your Facebook privacy settings.  They seem to have changed often over the last few years and some information which you thought was private could be more public than you would like.  This is an issue since a hacker could use the information (like when you graduated high school, your school mascot, etc.) to defeat security questions at your online banking sites.  Other social networking information could be used to discover when you are away from home and target it for theft.

8.  Hardware Theft

If you carry a smartphone (like an iPhone or Android phone) you should setup it's built in pin/password unlock.  If it were lost or stolen this would make it more difficult for a thief to access your data.  You should also consider setting up the "find my phone" feature that may be available, such as the "Find my iPhone" or "Find my Droid" which allows you to locate your phone if lost or if stolen (or if you just want to play James Bond), also wipe it's contacts remotely from a web browser.  If you carry a laptop, you may also want to consider encrypting the operating system depending on your level of paranoia.  This can be done with the Ultimate version of Windows 7 or for free using True Crypt as described at the Lifehacker article, How to Encrypt and Hide Your Entire Operating System from Prying Eyes.

9.  Rogue Security Software

Beware of phony Skype calls, fake Windows antivirus programs, or other questionable transmissions claiming you are infected with multiple viruses or trojans.  If this occurs, open the antivirus software you actually installed and run a scan.  If you cannot execute the program, it's a sign that you are infected.  Don't interact with the fake antivirus software, but instead start Windows in safe mode and run a real antivirus scan from Malwarebytes.  Alternatively, call a tech savvy relative for help.

10.  Backups

Finally, and less of a security issue and rather one of data safety issue is performing regular backups of your important files, such as family photos, home movies or documents.  If you have anything important on your computer that is not backed up (i.e. not saved in a separate, safe location), they are at risk of being lost forever: in a hard drive failure--or worse--fire, theft, or other disaster.  To begin addressing this problem, you can save your files on a portable hard drive and store it in a safe location.  To add an extra layer of protection, you could leave it with a relative who lives in a different geographical region.  Or you could use an online backup system like CrashPlan or Carbonite which simplifies the process while adding a further layer of protection.

Cliff's Notes Summary
  • Don't open email attachments, especially those you didn't request.
  • Be wary of any email or website that looks even slightly suspicious.
  • Look for the the https connection when banking or buying online.
  • Remember public Wi-Fi isn't always safe.
  • Use strong and different passwords.
  • Lockdown your wireless router.
  • Limit information you share on social networks.
  • Password protect your phone/tablet/laptop.
  • Use discernment when dealing with viruses.
  • Backup, backup, backup.
In general, be careful and have your guard up when online.  Many of the above suggestions are a tradeoff of security versus time to implement/ease of use, but a little precaution can go a long way to prevent major headaches later on.

Note 1.  Dr. Sooper Smart, et. al. Soopeer Smart Security Study 2011
Sources:  TekzillaSecurity NowUS-CERT Cyber Security Tips
Joshua Topolsky of This is my next... and formerly Engadget, I expose your ruse:  you have spent weeks claiming to use an Android Phone [the Motorola Atrix (Dissapointrix) 4G] while you secretly use your iPhone 4.  You're just trying to throw the Fanboy Police off your trail, but Dr.  Sooper Smart sees through your flimsly plan.  I don't have photos or any other evidence of this but I'm sure the story of your Apple kickbacks will be revealed soon.  Then Dr. Shenanigans and I will have the last laugh.

How's Your ISP's Netflix Performance?

... sad if you're on Clearwire or Frontier.

Visit 3 Tips for Getting the Most out of Your Netflix Subscription to be less sad.

Source: The Netflix Tech Blog

see Oceanic Airlines T-Shirt

see Duck Tales from the Crypt Poster

Sooper Smart US Flag Etiquette

I was watching the NASCAR race opening ceremonies and just realized that (in addition to the Pledge of Allegiance), one should put their hand over their heart when the national anthem is played while the flag is flying.  According to Wikipedia:

United States Code, 36 U.S.C. § 301, states that during a rendition of the national anthem, when the flag is displayed, all present except those in uniform should stand at attention facing the flag with the right hand over the heart

Source:  The Star-Spangled Banner - Wikipedia, the free encyclopedia 

So thank you NASCAR, and I'll be holding my robotic synthetic-flesh-prosthesis-right hand over my artiforg heart.

Zoltar Ready to Make You Big

Zoltar takes dollar bills now to make you "Big" and observe you while doing it on CCTV.

Mickey and Minnie Mouse Doing a Private Deal

Mouse shenanigans

Reason #19 Why I'm Sooper Smart

I use the question: could God make a rock so big he couldn't lift? to argue against God's existence.

Running Robot

ASIMO (AKA TOBOR) at Disneyville

Dr. Sooper Smart Battles Salmonella

I love salmon and ladies named Ella - smoked, chili rubbed, glazed or blackened. Oh and I also like to cook salmon.

so it's a shame that I must do battle with salmonella. Thus this pasteurization method has done me well:

Heat the eggs in a pot of water at 140 - 150 deg F for 3 to 5 minutes.

Saudi Arabian Aircraft Carrier

Looks like something you could use in an alternate Saudi Arabian universe.

source: 22 Words - A reverse aircraft carrier for use in the desert

iPhone User: Can You Hear Me Now?

Wall Street Journal States that Verizon Will Announce the iPhone on Tuesday (and All Things D suggests Steve Jobs may appear) via Engadget

One of the funniest clues that Verizon will announce the iPhone on Tuesday, January 11th is that Gizmodo wasn't invited - they're on Apple's blacklist!

See also: Engadget's summary of everything you need to know about the Verizon iPhone