A customer of mine has 8 kids and and least 5 of them were delivered at
their house. They hired a midwife for like $500 each time. It definitely is
a lot cheaper than hospitals around here are charging at least 8k-10k for
deliveries which I think is bull since childbirth is a naturally occurring
event in nature all the time. Some women cant have a natural birth and need
a C-section and sometimes they don't always know that until the birth is
trying to happen. Maybe have the first one in the hospital and if it can
happen without a C-section then have the other ones at home?

On Thu, May 11, 2017 at 4:41 PM, Chuck McCown <ch...@wbmfg.com> wrote:

> With a Leatherman Tool, all things are possible.
>
> *From:* Lewis Bergman
> *Sent:* Thursday, May 11, 2017 2:40 PM
> *To:* af@afmug.com
> *Subject:* Re: [AFMUG] OT: firewall maintenance
>
> Chuck...that's just gross.
>
> On Thu, May 11, 2017 at 8:28 AM Chuck McCown <ch...@wbmfg.com> wrote:
>
>> I personally delivered 5 of my 8 kids at home.
>>
>> *From:* Steve Jones
>> *Sent:* Wednesday, May 10, 2017 9:09 PM
>> *To:* af@afmug.com
>> *Subject:* Re: [AFMUG] OT: firewall maintenance
>> Im pretty sure its the mail man again, shes a pretty shady letter carrier
>> :-)
>>
>> Ive grown up in an ems family, two paramedics, two emt  B and i was an
>> emt I, two were also firefighters.
>>
>> Twice now the douchenozzle OB refused to let my paramedic sister deliver
>> for CE, note we are (were at the time)literally the most advanced ems
>> system in the US. And this hospital was the primary training facility. We
>> figure we will tell the OB doc we have this, we only need her for her
>> bloodwork and ultrasound, if they wont give my sis the legally required
>> joy, we will get a dulla or however you spell it and pop the kid in the
>> living room, mother nature trumps modern science in this regard.
>>
>>
>> There have to be a few of you who popped yer youngins outside a hospital.
>> Especially the guys who are joe smith fans. 3 times out i think we are the
>> ones in charge.
>> On May 9, 2017 3:59 PM, "Lewis Bergman" <lewis.berg...@gmail.com> wrote:
>>
>>> I hope you know the source of the infection...if not...awkward...
>>> Conrats!
>>>
>>> On Tue, May 9, 2017 at 1:41 PM Darren Shea <darr...@ecpi.com> wrote:
>>>
>>>> Even after seeing the stick, it didn’t quite register until I re-read
>>>> everything you’d typed in this thread - clever! Congratulations!
>>>>
>>>>
>>>>
>>>> *From:* Af [mailto:af-boun...@afmug.com] *On Behalf Of *Steve Jones
>>>> *Sent:* Tuesday, May 09, 2017 10:56 AM
>>>>
>>>>
>>>> *To:* af@afmug.com
>>>> *Subject:* Re: [AFMUG] OT: firewall maintenance
>>>>
>>>>
>>>>
>>>> Hers the initial diagnostic output
>>>>
>>>>
>>>>
>>>> On May 9, 2017 9:52 AM, "Steve Jones" <thatoneguyst...@gmail.com>
>>>> wrote:
>>>>
>>>> There is only one infected device. The malicious code that is
>>>> replicating is directly attached to the command and control node. I know a
>>>> lot of people would simply CleanSweep, but we just don't feel that is an
>>>> appropriate step. There may be an IOT baby monitor that gets swept up in
>>>> all this before its over in December.
>>>>
>>>> On Tue, May 9, 2017 at 7:34 AM, David Milholen <dmilho...@wletc.com>
>>>> wrote:
>>>>
>>>> As any virus running on a network it has a pattern weather it be
>>>> dormant on the network at times or not.
>>>>
>>>> Identify the pattern and where it is trying to phone home to and
>>>> isolate it from phoning home. Then Clean sweep the machines you have
>>>> control of.
>>>>
>>>> The worst part of any of this is that IOT devices IE(ip cameras,dvrs,
>>>> tempature monitors and others) are the real threat as they have weak basic
>>>> code that is open to the network.
>>>>
>>>> Isolation will be your best bet. This will prevent DDOS attacks on one
>>>> front but doesnt stop new viruses from entering.
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> On 5/8/2017 10:34 PM, Steve Jones wrote:
>>>>
>>>> an addendum to this, there are two primay variants to the payload. One
>>>> tends to be much more aggressive, a much more roughly defined code, not all
>>>> that pretty, but ultimately very versatile and robust. The other is
>>>> normally more elegant in design, but it tends to be visciously malicious,
>>>> this is the one to be most concerned of. Its underlying code has started
>>>> wars and destroyed nations
>>>>
>>>>
>>>>
>>>> On Mon, May 8, 2017 at 9:49 PM, Steve Jones <thatoneguyst...@gmail.com>
>>>> wrote:
>>>>
>>>> So this weekend I discovered a Trojan virus on my network. Sometime
>>>> around January we had opted to remove an old firewall that had met its
>>>> product life cycles end. We were still in the process of deciding whether
>>>> to continue with temporary firewalls or look toward more robust
>>>> input/output chain policies for a hardened, more permanent solution. In the
>>>> mean time, of course, we continued to do the upload/download thing. We had
>>>> some suspicion that there was something going on, we noted alot of
>>>> broadcast storms, particularly in the mornings. The network had become
>>>> particularly sluggish and there seemed to be alot of application bloat,
>>>> initially i just attributed this to poor code maintenance resulting in a
>>>> memory leak.
>>>>
>>>> We did a basic Netstat this weekend and discovered a traffic anomaly.
>>>> So we went to a professional and had them run a packet sniffer. We had
>>>> verification of foreign code, likely for as long as 6-8 weeks.
>>>>
>>>> It will be layer 3 in this case but its too early to tell whether this
>>>> codes payload will be TCP or UDP, we will be monitoring as the code
>>>> replicates. This is a pretty common virus, as a matter of fact we have all
>>>> had it at one point, probably so long ago we dont even remember. We
>>>> anticipate The fully formed packet chain to leave NAT mode and be fully
>>>> routed out to the WAN in December.
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> --
>>>>
>>>

Reply via email to