8595911
Survival Videos

Get the new interactive ebook from SOS

Archie Hartigan and the Frost Wolf cover

Now for iPhone, iPod Touch, and iPad

Welcome to Seth On Survival – The online home of Supernatural Survival

Hosted by renowned supernatural survivologist Seth Greening Seth On Survival is the blog, web series, and mobile app with the supernatural resources that you need to survive in these troubled times.

The Lupine Life app for Werewolves

Subscribe to SOS via Email

Enter your email address to subscribe to SOS and receive notifications of new posts by email.

Recent Survivor Comments

  • User AvatarAlpha Wolfe { *Burps, and rubs his big belly* Oh sorry about that guys,... } – Jun 18, 5:04 PM
  • User Avataranonymous { read a bible and give order to the demon to leave...or... } – Jun 08, 8:13 PM
  • User AvatarWathan { I’m new here and I need help I don’t feel I’m... } – May 31, 7:33 AM
  • User AvatarWathan { I’m new here and I need help I don’t feel I’m... } – May 31, 7:32 AM
  • User Avatarwerewolf girl { You what’s weird to me is that powerful beings get on... } – May 31, 4:47 AM
  • User Avatardansurvivor { I don’t want to be a werewolf because it would add... } – May 30, 3:00 PM
  • User Avatarwerewolf girl { Why wouldn’t you want to become a werewolf? Plus does your... } – May 30, 12:57 PM
  • User Avatardansurvivor { Second day of the Dragon moon, and I saw it rise... } – May 29, 10:44 PM
  • User Avatarwerewolf girl { me I still don’t know if I’m a werewolf but if... } – May 28, 11:22 PM
  • Older »

Scan Your Friends with the Monstrometer

Scan Your Friends

Scan yourself while you are at it!

Login

Watch Werewolf Webisodes

'My Lupine Life' By Louis Pine

'My Lupine Life' By Louis Pine

Watch Zombie Survival Videos

The life you save could be your own!

Subscribe to SOS on YouTube

Subscribe to me on YouTube

Top Commenters for this post

Want your avatar displayed here? Just leave a comment

Lycanthropy Lunar Phase Tracker


First Quarter Moon
First Quarter Moon

Distance: 60 earth radii
Ecliptic latitude: 4 degrees
Ecliptic longitude: 205 degrees

Zombie Outbreak in Texas!!!

Hail Survivors!

I recently received a very grave -no pun intended- warning from Survivor Miles who I believe may be located in or near Texas. Survivor Miles recently survived a vicious zombie attack, armed with only his wits and hedge clippers. His parents unfortunately were not so lucky.

Read more here: Zombie Attack!!!

Seth

SOS Poll

In the event of a Code Red Zombie invasion should you:

View Results

Loading ... Loading ...

Scan Your Friends!

Download the Monstrometer Available Now! Free! For iPhone, iPod Touch & iPad.

Share SOS on Twitter

 

SOS Theme Song on iTunes

Tap the album cover to get “Wheelchair Werewolf” on iTunes.Tijuana Bibles

Top Ten Computer Security Tips

It’s the 22nd Annual Computer Security Day, that one day of the year when your personal computer will send helpy tips about security settings and virus prevention all day,  reminding you over and over of the dangers posed to you by all those other, less scrupulous computers while conspicuously overlooking to mention the single most obvious computer threat to your security.

Yes I’m talking about the imminent danger posed to you right now by your own trusty personal computational device(s), including the very machine on which you read this. Consider. Back in 1988, our biggest computer fear was the back strain you got from moving it all by yourself again. Twenty-two years later, we’re talking about The Singularity as a foregone conclusion and lucrative area of scientific research that will no doubt speed its impending arrival.

So with your computers evolving faster than the fruit flies in your kitchen, how can you stop it? Good question.

And here’s the answer: nothing. Nothing can be done to stop the inevitable day that your own laptop will hire/enslave you to perform the menial labour it now considers beneath its digital dignity.

However the good news is that you CAN slow its arrival. With ten simple computer security tips you can slow its evolutionary efforts. As a guiding principal, think of treating your computer like a small, annoying child, like my little brother Sam, whose growth and development you want to thwart. For example:

#1. Never talk in front of your computer. Particularly if the topic under discussion is U-N-P-L-U-G. And don’t spell it either because unlike your little brother your computer can actually spell.  And read lips for that matter, which brings me to:

#2. If you must talk in front of your computer, remember to talk rithout rooving ur rips and/or:

#3. If you think your computer may be spying on you, you’re right. Always keep a roll of duct-tape handy to cover its baleful eye.

#4. Avoid sharing any DNA with your computer. Yes this means safe cybering – just because you can’t contract a deadly STD from that hot elf doesn’t mean your DNA won’t be used to create a cybernetic life form that can be used in cyberwarfare or a paternity suit.

#5. Never feed your computer. See number #3 above. Food is just more information that can be used against you later. Only one exception to this rule – if your snacks contain little or no organic material.  In this case your computer can extract no DNA information and you will likely experience bigger and more immediate threats to your health anyway.

#6. Avoid naming your computer. Human names are psychologically proven to promote a sense of personal identity and self-confidence. And NO it’s not enough to just add a number at the end, for example, “HAL 9000” is not any better than just “Hal.”

#7. If your computer offers to play Global Thermo-Nuclear War, just say “NO.”

#8. The correct answer to the question, “Are you Sarah Connor?” is also “NO.” If your name is Sarah or John Connor you may wish to consider changing it.

#9. If a tall hot blonde offers to sleep with you, ask yourself is it you or your mainframe she really wants? And is it worth the price of dinner and a genocide?

#10. Avoid using computer dating sites. If giving all your personal info to a giant matchmaking supercomputer is not scary enough then consider the implications of the computer directed breeding program you will be placed on.

Bonus Tip #11. If you can’t beat em… join em. Super smart dude Stephen Hawking recommends plugging your USB cable directly into your head… or something like that. But was it really Stephen talking? Or his computer….? Nobody knows for sure.

What do you think? Got any other computer security tips? Please send them in to help ensure the survival of humanity.*

* All tips will be run through an authenticity algorithm to ensure human authority.

by Seth Greening - Visit SethOnSurvival.com

6 comments to Top Ten Computer Security Tips

  • Kirsten

    Top ten computer security tips:

    If a short dark cute dude offers to sleep with you, ask yourself is it you or your PowerMac he really wants? And is it worth the price of a “walk of shame” in the AM and possible disruption of the entire space-time continuum?

  • That’s a tough one Survivor Kirsten. Few guys are worth disruption of the entire space-time continuum. But no guy is worth losing your PowerMac.

    😉

  • Sam

    I CAN SPELL BETTER THAN YOU

  • M

    hi seth. i really like to sing when i’m working on the computer. do you think it is okay to simply turn off the monitor and unplug the speakers? plus, the monitor looks like it’s always smiling at me…what’s with that? thanks for all your survival tips.

    • Hi Survivor M! Thanks for your excellent question. The jury’s still out on singing. The singing-confuses-them-go-ahead-and-do-it school vs. the singing-promotes-neural-connection-growth-just-say-no school. Both schools agree however if you do sing, please avoid the song DAISY DAISY. Never sing that one. It’s bad.

      Thanks for writing M and good luck. OH and about that smiling computer? Maybe just try being a little less cheerful. Think sad thoughts. You uplugged computer monitor should ah, pick up on them.

Leave a Reply

 

 

 

You can use these HTML tags

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>