This Is our Village

Sunday, December 30, 2018

UCO VOLUNTEER LUNCHEON - NOTICE TO SIGN-UP

-
ATTENTION:
                                        -                                       
ALL UCO VOLUNTEERS!  
RESERVATIONS FOR THE JANUARY 13 VOLUNTEER LUNCHEON MUST BE MADE BY JANUARY 6TH..  
SIGN-UP SHEET IS ON THE COUNTER AT THE UCO INFORMATION DESK.  
PARTY ROOM DOORS, AT THE MAIN CLUBHOUSE,  WILL OPEN AT  
 
12;30 P.M. 
 LUNCH WILL BE SERVED AT 1 P.M.   SEE YOU THERE!
-
Dave Israel
-



Thursday, December 27, 2018

Saturday, December 22, 2018

Thursday, December 20, 2018

Wednesday, December 19, 2018

Thursday, December 13, 2018

UCO OPEN MEETINGS - JANUARY 2019 - LIVE IN CYBERSPACE

-
Schedule is subject to revision
-
Dave Israel
-

Tuesday, December 11, 2018

Thursday, December 6, 2018

DECEMBER 7, 1941 - A DAY THAT WILL LIVE IN INFAMY - LET US NOT FORGET

-Image result for pearl harbor
-
Dave Israel
-


CORRECTED INSURANCE OPTION SHEETS HAVE ARRIVED -

-
Image result for option sheets
-
The corrected Insurance Premium Option Sheets have arrived.
-
We will commence distribution at 9:30am in the UCO Conference room.
-
Please send an Association Board member to get your Insurance information.
-
Dave Israel
-

Tuesday, December 4, 2018

CORRECTIONS TO INSURANCE PREMIUM OPTION SHEETS

-
-
Dave Israel
-

Thursday, November 29, 2018

MARK FRIEDMAN ESQ. CLASSES AND SEMINARS IN DECEMBER 2018 - NOT TO BE MISSED - ALL CLASSES BEGIN AT 10AM

ALL CLASSES BEGIN AT 10AM
-
ALL CLASSES BEGIN AT 10AM
-
Dave Israel
-

Wednesday, November 28, 2018

Another Good Year

https://youtu.be/BaKqwvGa6Bw
You got the shirt!
One more candle and a trip around the sun.

Thanks Elaine,
Dave

Happy Birthday Big Cat!




Happy Birthday Dave!  Meow Meow - Mr. Handsome and Smokey  

Sunday, November 18, 2018

Friday, November 16, 2018

Thursday, November 15, 2018

NOTICE OF FUNERAL - IRVING RIKON

-
Dave Israel

Monday, November 12, 2018

NOTICE OF NEWCOMERS MEETING

-
Dave Israel
-

Sunday, November 11, 2018

Horse shoes are still found after 100 years in the fighting fields around Verdun France. Testament to the absolute carnage of that event.

FIND THE COST OF FREEDOM BURIED IN THE GROUND - AND NEVER FORGET - VETERANS (ARMISTICE) DAY

-Image result for armistice day
-
November 11, 1918 - let us not forget
-
Dave Israel
-


Thursday, November 8, 2018

Monday, November 5, 2018

Thursday, November 1, 2018

NOTICE TO SET BACK YOUR CLOCKS

-
Dave Israel
-

Tuesday, October 30, 2018

OPERATIONS COMMITTEE MEETING - OCTOBER 30, 2018 - LIVE IN CYBERSPACE

-


-
Dave Israel
-

DON'T MISS LAGOONFEST - NOVEMBER 3, 2018

-
ABOUT LAGOONFEST
You’re invited to explore Lake Worth Lagoon, one of the most fascinating and beautiful waterways in The Palm Beaches. LagoonFest takes place on November 3, 2018, along Flagler Drive in downtown West Palm Beach.
-
Image result for lagoon fest nOVEMBER 2018
Lake Worth Lagoon

The Event
-
First, it’s FREE! And that’s just for starters. LagoonFest brings to life one of the most incredible urban estuaries in Florida – Lake Worth Lagoon. You’ll find the event along Flagler Drive in downtown West Palm Beach, with the actual Lagoon providing a gorgeous backdrop to the event.  Participate in a variety of activities, such as Kayak Clean-Up Tours, Paddleboard Yoga Demonstrations, Mural Painting Wall and Kid Zone. Visit more than 40 exhibitor booths, and then indulge in delicious local foods at the West Palm Beach GreenMarket.

-
Free Kayak Clean-Up Tours 
-
See the Lagoon, on the Lagoon. Our partners at Visit Palm Beach are offering free guided kayak clean-up tours of the South Cove Natural Area. Tours start at 9 a.m., 10:15 a.m. and 11:30 a.m. To participate, please pre-register.
-
Picture Time with Free Calendars 

-
See remarkable pictures selected for the official Lake Worth Lagoon calendar, and pick up a free copy of that calendar where you see the displays. It’s all happening outside on our main stage, located on the north end of LagoonFest.
-
The Location
-
LagoonFest takes place on Flagler Drive, home to many events throughout the year. It’s a long street, but you’ll find all the action between North and South Clematis Street. Look for the Clematis Street fountains and walk through the West Palm Beach GreenMarket toward the waterfront.
-
Where to Park

-
Parking is located in the City of West Palm Beach Evernia Street and Banyan Boulevard garages, both of which are close by.
Evernia Garage – Free Parking from 6 a.m. – 2 p.m. (2 p.m. – 5 a.m. Normal operation)
Banyan Garage will be a flat fee of $5.00 from 6 a.m. – 2 p.m. (2 p.m. – 5 a.m. Normal operation)
On-street parking is metered, while various other downtown parking lots have flat or hourly rates. View a map of nearby parking garages.
-
West Palm Beach GreenMarket
-
While at LagoonFest, you may notice another event happening right over your shoulder. Our friendly neighbor is the seasonal West Palm Beach GreenMarket, featuring fresh foods and local goods from more than 90 vendors. It’s the first and foremost greenmarket in The Palm Beaches, and it never disappoints.
 
 -
Regards,
 
Paulette Burdick
County Commissioner
District Two


Monday, October 29, 2018

Sunday, October 28, 2018

ACT 2 REPERTORY THEATER - ONCE UPON A TIME

-
-
Dave Israel
-

Atlantic Broadband Marketing

Thanks for the article in the current UCO reporter, missing is Internet for snow birds.
Will we have to pay for 12 months?
Thanks

Saturday, October 27, 2018

Thursday, October 18, 2018

Wednesday, October 17, 2018

HALLOWEEN DANCE TICKETS NOW ON SALE

-
Dave Israel
-

Saturday, October 13, 2018

ATLANTIC BROADBAND - TOWN HALL MEETINGS

 -
All residents - especially those who have already done so -  should attend Atlantic Broadband's "Town Hall Meetings" being held at the Clubhouse throughout October. Various telephone, internet, and bundle prices have been significantly lessened from the September figures. 

Any owner or renter can attend, and participate, 
in any meeting.

TRASH DISPOSAL: SCROLL DOWN TO VIDEO ON THE SUBJECT

This was apparently a video done for Century Village, yet there was no yellow container shown for the disposal of paper goods!

As unhelpful as this was, the man WAS right in saying that bottles should not be put in a plastic bag and the plastic bag of bottles then be put in the blue container. I know this from the brochure given Ken Graff and me when we went on a tour of the 45th Street recycling facility a few years ago. Ken took photos while I wrote an article on the subject for the Reporter.

We saw what happens to these plastic bags of bottles. A conveyor belt brings the contents of the blue recycle containers to a room high above the ground-floor dumpster disposal area where the trucks drop their loads. We could see this because we ourselves were in a similar viewing room at the same height above the floor. A man in the recycle room separates out the plastic bags of bottles from the rest of the glassware, but not by taking the bottles out of each bag. Instead, he throws the bags WITH THE BOTTLES AND GLASSWARE IN THEM through a hole in the floor, where they fall some 40 feet onto the ground floor dumpster disposal area. This is kind of fun to watch. Ba-boom go the bags, one by one.

Thus, however, all the work anyone had done in separating out bottles goes for naught if they had put the bottles in a plastic bag! In fact, you would have saved both yourself and the recycle facility time if you had just tossed the bag of bottles in the dumpster. Or not separated out the bottles in the first place! The tour guide did not explain all this—I suppose it would not have been the best advertising. But I saw it, asked the guide about it, and she confirmed what I've just described.

Interestingly, on a part of the tour we were told what the future of trash disposal held. There were prototypes in various places in the country, the tour guide explained. The trash then would NO LONGER BE DIVIDED as it is now. Everything would go into one pile, we would go back to the old way of doing things in a sense, and machinery would do the dividing. 

The best thing we can do now, of course, is to use both recycle containers and, as the man in the video explained, not put our glassware in any plastic bags.



Friday, October 12, 2018

UGLY HOLIDAY SWEATER CONTEST

-
Dave Israel
-

BLOG TWO CARTOON DISGUSTING



I find it disgusting that our blog two has gotten into politics. that is a disgusting cartoon.

Wednesday, October 10, 2018

NOTICE OF WALKWAY CLOSURE AT MAIN CLUBHOUSE

-
Dave Israel
-

AMR AMBULANCE MEETING CANCELLED

-
Dave Israel
-

Tuesday, October 9, 2018

CENTENARIAN ICE CREAM SOCIAL

-
Dave Israel
-

Monday, October 8, 2018

Saturday, October 6, 2018

Condo Checkers

Does anyone know a good condo checker when the condo owners are gone?

CV Soliciting

Is all soliciting banned in CV.  A Republican volunteer was knocking on doors giving flyers, etc. He offered to hand carry my Democratic vote to the elections office to save me postage.  Ha, HA, Ha, Ha, HA, Ha, Ha, HA!!
Should I call Security??

Friday, October 5, 2018

PET FRIENDLY AND RENTAL FRENDLY ASSOCIATIONS

-
PLEASE LET US KNOW IF WE HAVE MADE ANY ERRORS.
-
-
Dave Israel
-

Thursday, October 4, 2018

Sunday, September 30, 2018

Thursday, September 27, 2018

REMOTE DESKTOP ACCESS CAN GET YOU IN TROUBLE

-

Sep 27, 2018

Alert Number

I-092718-PSA

Questions regarding this PSA should be directed to your local FBI Field Office.
Local Field Office Locations: www.fbi.gov/contact-us/field
-
Cyber Actors Increasingly Exploit The Remote Desktop Protocol to Conduct Malicious Activity
-

BACKGROUND

-
Remote administration tools, such as Remote Desktop Protocol (RDP), as an attack vector has been on the rise since mid-late 2016 with the rise of dark markets selling RDP Access. Malicious cyber actors have developed methods of identifying and exploiting vulnerable RDP sessions over the Internet to compromise identities, steal login credentials, and ransom other sensitive information. The Federal Bureau of Investigation (FBI) and Department of Homeland Security (DHS) recommend businesses and private citizens review and understand what remote accesses their networks allow and take steps to reduce the likelihood of compromise, which may include disabling RDP if it is not needed.
-

DEFINITION

-
Remote Desktop Protocol (RDP) is a proprietary network protocol that allows an individual to control the resources and data of a computer over the Internet. This protocol provides complete control over the desktop of a remote machine by transmitting input such as mouse movements and keystrokes and sending back a graphical user interface. In order for a remote desktop connection to be established, the local and remote machines need to authenticate via a username and password. Cyber actors can infiltrate the connection between the machines and inject malware or ransomware into the remote system. Attacks using the RDP protocol do not require user input, making intrusions difficult to detect.

VULNERABILITIES

  • Weak passwords – passwords using dictionary words or do not include a mixture of uppercase/lowercase letters, numbers, and special characters – are vulnerable to brute-force attacks and dictionary attacks.
  • Outdated versions of RDP may use flawed CredSSP, the encryption mechanism, thus enabling a potential man-in-the-middle attack.
  • Allowing unrestricted access to the default RDP port (TCP 3389).
  • Allowing unlimited login attempts to a user account.

EXAMPLES OF THREATS

-
CrySiS Ransomware: CrySIS ransomware primarily targets US businesses through open RDP ports, using both brute-force and dictionary attacks to gain unauthorized remote access. CrySiS then drops its ransomware onto the device and executes it. The threat actors demand payment in Bitcoin in exchange for a decryption key.
CryptON Ransomware: CryptON ransomware utilizes brute-force attacks to gain access to RDP sessions, then allows a threat actor to manually execute malicious programs on the compromised machine. Cyber actors typically request Bitcoin in exchange for decryption directions.
Samsam Ransomware: Samsam ransomware uses a wide range of exploits, including ones attacking RDP-enabled machines, to perform brute-force attacks. In July 2018, Samsam threat actors used a brute-force attack on RDP login credentials to infiltrate a healthcare company. The ransomware was able to encrypt thousands of machines before detection.
Dark Web Exchange: Threat actors buy and sell stolen RDP login credentials on the Dark Web. The value of credentials is determined by the location of the compromised machine, software utilized in the session, and any additional attributes that increase the usability of the stolen resources.

SUGGESTIONS FOR PROTECTION

-
The use of RDP creates risk. Because RDP has the ability to remotely control a system entirely, usage should be closely regulated, monitored, and controlled. The FBI and DHS recommend implementing the following best practices to protect against RDP-based attacks:
  • Audit your network for systems using RDP for remote communication. Disable the service if unneeded or install available patches. Users may need to work with their technology vendors to confirm that patches will not affect system processes.
  • Verify all cloud-based virtual machine instances with a public IP do not have open RDP ports, specifically port 3389, unless there is a valid business reason to do so. Place any system with an open RDP port behind a firewall and require users to use a Virtual Private Network (VPN) to access it through the firewall.
  • Enable strong passwords and account lockout policies to defend against brute-force attacks.
  • Apply two-factor authentication, where possible.
  • Apply system and software updates regularly.
  • Maintain a good back-up strategy.
  • Enable logging and ensure logging mechanisms capture RDP logins. Keep logs for a minimum of 90 days and review them regularly to detect intrusion attempts.
  • When creating cloud-based virtual machines, adhere to the cloud provider's best practices for remote access.
  • Ensure third parties that require RDP access are required to follow internal policies on remote access.
  • Minimize network exposure for all control system devices. Where possible, critical devices should not have RDP enabled.
  • Regulate and limit external to internal RDP connections. When external access to internal resources is required, use secure methods, such as VPNs, recognizing VPNs are only as secure as the connected devices.
  • Dave Israel
  • -

Thursday, September 20, 2018