Observations Along the Road

Theatre Writeups, Musings on the News, Rants and Roadkill Along the Information Superhighway

Category Archive: 'computers'

Cyber Newses You Can Uses

Written By: cahwyguy - Sat Apr 22, 2017 @ 6:58 am PDT

This has been a busy busy week, and I haven’t had a chance to work on clearing out the news chum until now. This first collection is all computer related:

  • Going Phishing. Hopefully, you’re all cyber-aware. You know not to trust links in email you receive. You’ve been trained to look at where a URL goes before you click on it. You know not to click on links in email; you’ll copy the link and paste it into your browser bar. You know not to trust sites that aren’t the well-known version. But https://аррӏе.com is safe, right? Right? RIGHT? Actually, no. It may look like it reads “apple”, but that’s actually a bunch of Cyrillic characters: A (а), Er (р), Er (р), Palochka (ӏ), Ie (е). The security certificate is real enough, but all it confirms is that you have a secure connection to аррӏе.com – which tells you nothing about whether you’re connected to a legitimate site or not. This is what is called a homograph attack. It is something that can fool the best people, even if you hover over and check the link before browsing — unless you’re using IE or Edge or Safari. Ars Technica has even more information, but the short and skinny is: If you use Chrome, make sure you’re at Chrome 58 or later; if you use Firefox, enter “about:config” in the address bar, agree to the displayed warning, and then enter “punycode” in the search box to bring up a line that reads network.IDN_show_punycode. Next, double-click the word “false” to change it to “true.” From then on, Firefox will display the “dumb ascii” characters and not the deceptive, encoded ones.  I’ve done that, and now I see xn--80ak6aa92e.com when I hover over the link.
  • Secure Coding. I grew up programming in Fortran, PL/I, Algol 68, RSTS/E Basic, and C. Except for perhaps Fortran and C, the rest are mostly dead. Today, kids program in C++ and Java — but they aren’t necessarily writing better programs. But following good standards can help. Here’s a link to a discussion on how to do secure coding in C++.
  • iPod without iTunes. If you are like me (and fewer are), you use your iPod for all your music (and you plan on adding more this Record Store Day). But do you backup your iPod? I do — via iTunes to my M: drive, and I back that up on my X: and W: drives and on a backup iPod. But most don’t — and most abhor iTunes. Here’s how to backup your iPod without using iTunes. I’ll not that I’ve used copytrans in the past (especially before I just kept everything in iTunes), and I’d recommend it.
  • Never Too Late. As I’m typing this, iTunes is playing “Never Too Late” (to tell the Truth) from Scottsboro Boys. If you’re like me, and like to tell the truth, you’ll be happy to know that Snopes is now embeddable.  Here’s an example of an embedded article:
  • Decluttering Apps. If you’re like us, you need to declutter. The NY Times recently had a review of a number of apps that will help you do just that.
  • Pushy Microsoft. Microsoft is continuing to push people to subscribe to Office 365. The latest is restricting the ability to use Skype for Business and One-Drive if you are using a Microsoft Office Standalone Office product. You’ll see more and more products insisting on the subscription model: Adobe, Quicken, Microsoft, ….

 

Share

--- *** ---

CyberSecurity News Chum

Written By: cahwyguy - Fri Apr 14, 2017 @ 7:42 pm PDT

Continuing to clear the news chum, here are a bunch of articles all related to cybersecurity:

  • NIST Cybersecurity Framework is Changing. NIST is getting ready to release an update to their Cybersecurity Framework (and other updates are planned: eventually, the IPD of 800-53rev5 will be out for review, and then an update to 800-37). A key change in the new framework is measurement: The first, which should really be the starting point for any comprehensive cyber risk management program, is an entirely new section about measuring the performance and maturity of organizations’ cyber risk programs. It also discusses the need and complexity of correlating those metrics to business objectives and outcomes. That means measuring both how organizations are reducing risk to the business and identifying the benefits to the business resulting from good cybersecurity, such as how many new customers the organization has gained and/or how much more revenue was brought in. Another significant change in the framework is the addition of recommendations surrounding supply-chain risk management. Finally, the access-control category has changed within the framework. It was renamed to identity management and access control. The change adds more focus on making sure identities and credentials are managed from the time they are created to the time they are deactivated.
  • Minimal Cybersecurity Requirements. Although some of us have known about this for a while, the world is growing increasingly aware of NIST SP 800-171. The new mandates take effect Dec. 31 this year and apply to contractors for the Department of Defense, National Aeronautics and Space Administration (NASA) and the General Services Administration. While some manufacturers are accustomed to working with federal agencies on classified projects, these regulations are meant to safeguard sensitive information in unclassified material, particularly as the threat of cybersecurity breaches grows.  Basically, they apply to any federal contractor that handles what is called Controlled Unclassified Information.
  • Encryption and Protection. Protection is good. Just ask porn site Pornhub, home to things like thumbzilla and youporn. They’ve gone to always on encryption, meaning that although your ISP knows you’re going to pornhub, they don’t know what you’re looking at. Others are turning to VPNs, and here’s a good summary of how to use one.  Lastly, for those worried about your ISP seeing where you go, one thing you should do is not use the ISP’s DNS. I use openDNS: 208.67.222.222 and 208.67.220.220.
  • Verizon and Spyware. Note that if you use Verizon Wireless, they may be pre-installing spyware on your phone.
  • JavaScript Popups. Google is making some changes to eliminate those popup dialogs that don’t let you leave. Such popups are occasionally useful as alerts, but their fix sounds reasonable.
  • Congrats to North Hollywood High. They won a national cybersecurity competition. Disclosure: My employer helped sponsor the team, although I was not involved.
  • Printer Cartridges. Lastly, an interesting court case that could dictate how much you pay for ink. This week, oral arguments were heard in the case of Impression Products, Inc. v. Lexmark International, Inc., and according to the well-regarded SCOTUSblog, it seems that the justices are having a tough time figuring out how to view this difficult legal tangle themselves. At its most basic, the case is a dispute over Lexmark’s patent rights regarding refilling printer cartridges. Impression Products is a small business with about 25 employees. It specializes in buying used printer cartridges and re-manufacturing them. In 2012, Lexmark decided to add Impression to an already existing lawsuit against other re-manufacturers. While the other defendants eventually settled, Impressin has stuck it out and the case has made it to the highest court in the land. The question is: Does the manufacturer give up rights to something when you physically purchase it? Can Lexmark dictate what you can do with your printer cartridge? Can HP dictate you can’t open your computer and modify it? Big key questions.

 

Share

--- *** ---

The Good Old Days

Written By: cahwyguy - Fri Apr 14, 2017 @ 7:25 pm PDT

XKCD EditorsA recent XKCD on editors reminded me that I’ve been accumulating a number of articles on computer history I should clear out, because I’m a computing dinosaur.

  • With respect to the xkcd, there’s nothing new under the sun. I remember the days at UCLA when there was a pitched battle between the supporters of the Rand window editor (“e”, formally “ned”), and the vi editor (for those clueless, vim is a later reimplementation of vi, and of course, vi was the visual version of ex, which competed with the ed editor on Unix). Then there were the TECO stalwarts that came from the DEC world (I used TECO on RSTS/E), the editors such as TSO and URSA on the IBM 360/91 (later 370/3033), and the battles between emacs and vi stalwarts.
  • At the same time we were dealing with URSA and TSO, we were printing on a IBM 1403 Lineprinter. This wasn’t a dot matrix or a laser printer, kids: this used a chain of type and printed super fast. You could even play music, if you did your boldface right. IEEE Spectrum has a fascinating article on how the 1403 was able to print so fast, including the fact that it didn’t press the type against the paper — it pressed the paper (from behind) against the type.
  • Back in those days, we didn’t program in C++ or Java or even Ada. It was FORTRAN and COBOL and Algol and… Guess what? Folks are still using those languages. I had a CSSF submittal this year that was programmed in FORTRAN, and you can make a slew of money in banking if you can program in COBOL. All the old-time COBOL programmers are retiring (sometimes feet-first); and these newfangled kids don’t want to learn it. [As a PS: Dan Berry at one time had a cartoon that showed a 1950s housewife labeled COBOL, a 1950s engineer labeled FORTRAN, and a baby labeled PL/I…. and the milkman walking down the driveway labeled ALGOL. The caption: “Funny dear, he doesn’t look like me.” Does anyone have a scan of that cartoon?]
  • Jumping up to the 1980s: The news these days are filled with items on the death of support of Windows Vista and the first version of Windows 10. But there’s another milestone: Windows 3.1. Twenty years have passed, and we’re still living with many of the notions 3.1 introduced (it was the first stable and popular Windows version, cementing the fact that you should never trust even numbered Windows variants, remembering that Windows 10 is really Windows 9, but they screwed things up with 95 and 98)
  • Turning to the hardware: Chips used to be simple: instructions sets, memory mapping and such. Intel is starting to change all that, with multiple processor instruction sets on a single chip. One of Intel’s changes is a mix-and-match heterogeneous design where different types of cores can be put in a single chip package. Under the new design, it’ll be possible to mix different architectures on a single chip. Chip packages could also have cores made using different manufacturing processes. Now ask yourself: with hardware this complex, how do we know it is correctly implemented?

 

Share

--- *** ---

Building a Chain of Chum, Chum

Written By: cahwyguy - Sat Mar 04, 2017 @ 10:22 am PDT

Observation StewOver the past few weeks, I’ve accumulated quite a bit of news chum (that is, links and articles that I found interesting) that refuse to theme or create a longer post. So let’s just clear the chum, and for fun, let’s see if we can build a chain connecting one article to the other. To start the screw, so to speak, let’s begin with…

  • High Tech Condoms. I don’t know where I’m going on this, but I know what’s coming, excuse me, cumming. I mean, this brings the Internet of Things to its logical climax. I mean, it’s thrust — what it pounds into you — is that not everything needs to be connected. I’m talking, of course, about the i.Con — the First Internet Connected Condom. I’m sure that you, like me, is asking — but why? According to the article: The i.Con tracks speed, “average thrust velocity,” duration, skin temperature, girth, calories burned (no joke) and frequency of sessions. Most importantly for many, no doubt, will be how a wearer stacks up to the average and “best” performers — though a sexual partner will likely have an insight or two about that. Statistics are tracked via an i.Con app. The i.Con is also supposed to be able to sense sexually transmitted diseases [but what if the technology gets a virus?].  The ring will come with a one-year warranty and have a micro-USB charging port to provide up to eight hours of juice after a single hour of being plugged in. Supposedly “all data will be kept anonymous, but users will have the option to share their recent data with friends, or, indeed the world.”
  • Security of Medical Data. Of course, we all know our medical data is secure, right? Right? RIGHT? Well, not really. I found an interesting article this week on Medjack, a medical trojan. The problem is that the proliferation of literally insecurable medical systems running orphaned operating systems with thousands of know, unpatchable defects provides a soft target for identity thieves looked to pillage your health records. One trojan, Medjack, enters healthcare facilities by penetrating these badly secured diagnostic and administrative systems and then fans out across the network, cracking patient record systems. These records are used for tax fraud and identity theft, and to steal narcotics prescriptions that can be filled from online pharmacies and then resold on the black market.  Security firm Trapx says that “every time” they visit a healthcare facility, they find Medjack infections running rampant on the network, using exploits designed to take over Windows 2000 systems to seize control of the creaking, non-upgradeable systems that are inevitably found in these facilities.
  • Google Maps Data. Speaking of data, have you ever wondered how Google Maps gets its accurate traffic data. Of course, the answer is from you.  The Google Maps app on Android and iOS constantly send back real-time traffic data to Google. The data received from any particular smartphone is then compared to data received from other smartphones in the same area, and the higher the number of Google Maps users in an area, the more accurate the traffic prediction. Using the historical data it has compiled over the years and traffic data from mobile devices using the Google Maps app, the company is able to create models for traffic predictions for different periods. For example, the modelling techniques would be able to predict that certain roads would experience more traffic during rains than other times of the year. Google also takes traffic reports from transportation departments, road sensors, and private data providers to keep its information up to date. The accuracy of location data is unmatched only because of its users, since the billion Google Maps users on the road act as sensors for the app, which make the service as precise as possible.
  • Bus Disposal. One way to avoid traffic is to take the bus. But have you ever wondered what happens with buses when they die? Here’s an interesting article on what happens to Muni Buses in San Francisco when they are retired. Some, of course, are scrapped. Others are reincarnated as mobile showers for the homeless, airport shuttles and odd uses all across the Bay Area — even after accruing more than 400,000 miles on the road apiece. That’s due to the ingenuity of the San Francisco Municipal Transportation Agency’s 300 or so mechanics. This all occurs in Muni’s Islais Creek Yard, a bus yard in San Francisco’s south side, that serves as a staging area for buses that are set to be sold, scrapped or otherwise discarded. One of the more interesting conversions, after the bus was stripped of useful parts, was for the nonprofit Lava Mae, which converted four old Muni buses into mobile showers for San Francisco’s homeless residents.
  • A Flight of Angels. Of course, talk of buses takes us to other forms of transit such as trains. One unique train that existed in Los Angeles is coming back to life, again. It appears that Angels Flight, a tiny funicular in downtown LA, will be running again by Labor Day. A nonprofit has been in charge of the attraction for more than a decade, but a new private operator, ACS Infrastructure Development, Inc., is taking over for the next 30 years.  The funicular is over 100 years old, and has been inoperative since 2013 due to an accident.
  • Clintons on Broadway. Of course, talk of trains takes us to subways, and no where are subways more popular than in New York. However, I doubt that either Barack Obama or Hillary Clinton take the subway when they go to Broadway. Since losing the election, Hillary has been regularly attending Broadway shows, usually to a very receptive crowd. At least four times since November. At each theater appearance, Mrs. Clinton is greeted as a vanquished hero — standing ovations, selfies, shouted adulation. Mrs. Clinton has been attending Broadway shows for years, often when she has had a personal connection to an artist, a producer, or to a show’s subject matter. As for Obama, he was seen on Broadway taking his daughter, Malia, to “The Price”. The daddy-daughter duo headed backstage after the play — a new revival of the Arthur Miller classic — and met with the cast, including Mark Ruffalo, Danny DeVito, Tony Shalhoub and Jessica Hecht.  Contrast this with Trump and Pence. Since the election, only Pence has been to Broadway — to see Hamilton, and we all know what happened there.
  • Sushi. If you’re going to a show, naturally  you have dinner first? How about sushi? Here’s an interesting history of Sushi in the United States. Although there were a few restaurants experimenting with raw fish in 1963 in New York, Los Angeles was the first American home of authentic Japanese sushi. In 1966, a Japanese businessman named Noritoshi Kanai brought a sushi chef and his wife from Japan, and opened a nigiri sushi bar with them inside a Japanese restaurant known as Kawafuku in LA’s Little Tokyo. The restaurant was popular, but only with Japanese immigrants, not with American clientele. However, as more sushi spots opened in Little Tokyo, word got back to Japan that there was money to be made in America. Young chefs, tired of the rigorous and restrictive traditional culture of sushi making in Japan, struck out on their own in LA. The first sushi bar outside of the Little Tokyo neighborhood popped up in 1970, next to the 20th Century Fox studio. And then came Shōgun, … and you can predict the rest.
  • … and Beer. If you are having sushi, you are likely having beer, wine, or saki. These beverages come in bottles of colored glass, and have you wondered how glass gets its color? Here’s an infographic explaining how different chemicals result in different glass colors.
  • … on a Table. Additionally, you are likely sitting at a table to eat that sushi and drink your beverage. Speaking of tables, here’s a collection of interesting periodic tables.
  • Plus Size Fashions. To finish off the chain, if you eat too much at that table, you get fat. We know a lot about size acceptance for women, but what about men (and us CBGs — chubby bearded guys). Here’s an interesting article on plus-size fashion… for men.

 

Share

--- *** ---

Bringing Things Back

Written By: cahwyguy - Sat Jan 14, 2017 @ 6:33 am PDT

Today’s news chum post looks at a number of things from the past (some of which are being brought back):

P.S.: While working on this post, I was reading my FB Pages feed, and I discovered that Orange Empire Railway Museum (FB) is bringing back my buddy Thomas and his friends in April (April 1-2, 8-9). This was a surprise to me; upon investigation, I discovered that OERM is now your only place to see Thomas in SoCal, and that he’ll be back as usual in November as well. We can’t make it to volunteer in April as our schedule is too booked up (you’ll see why in my theatre post tomorrow), but you should if you’re into the Really Useful Engine. We’ll be there as usual in November.

Share

--- *** ---

The Impact of Technology

Written By: cahwyguy - Sat Dec 31, 2016 @ 10:36 am PDT

In another tab I’m working on my final news chum stew of the year (look for it shortly), when I realized I had a sufficient set of articles for a themed post — specifically one looking at some unexpected impacts of technology:

  • Self-Driving Cars and Organ Donation. Slashdot had an interesting piece on the impact of self-driving cars: It will significantly impact the availability of organs for donation. The basic thesis is as follows: A primary source of organs in good shape for donations is auto accidents, where the victims have indicated they are organ donors. Self-driving cars will reduce the number of auto accidents, and hence the number of healthy donors. We’ll be left with those that die in hospitals, where donors tend to be less healthy.
  • The Amazon Echo and Privacy . I recently was gifted with an Amazon Echo Dot. I’ve installed it, even though I’m not quite sure what it is good for, especially as I don’t do streaming music. But there are interesting privacy implications (independent of the insecurity of the Internet of Things): there is now a murder case out there where the question has been raised of requesting the audio captured by the Amazon Dot as evidence. So, for those that have the device, don’t talk about committing crimes where it can overhear you.
  • Streaming Media and Extras. There are those that believe the move to streaming media is good — you’ve got your music and video everywhere. That’s good, right? Right? I don’t necessarily subscribe to that, given my iPod Classic is nearing 40,000 songs, but I have streaming quality as they are all MP3s or AACs. An article from Vox looks at the problem with respect to video, and concludes TV on DVD is increasingly important. They provide significantly higher video quality than Internet transmission can support, and provide video extras (commentary, outtakes, alternate audio tracks, superior audio quality) that streaming can’t support. Plus, you own the content, as opposed to leasing it (which is why I still like my iPod Classic). That reminds me: I still need to order Lou Grant, now that it is available. Yes, there are series that are still just being re-released.
  • The Internet Kills Typography. Slashdot has another interesting discussion: this time, on how the Internet has killed the curly quote (e.g., “ and ”, in favor of the straight quotation marks). Deeper in the discussion, the larger point is made that the Internet is killing typography in general: people don’t think about the differences between inter-letter spacing (do you know the difference between “ ” (en-space), “ ” (em-space), “ ” (thin space), “‌” (zero-width non-joiner), ” ” (no-break space), “” (soft-hyphen), and ” ” (normal space)? Did you ever write “␣” for space?); often the distinction between the various hyphens are lost, and even the difference between the -, –, and — is being lost (that’s hyphen, en-dash, and em-dash). I remember the days when one got curly quotes by using “ and ”, and depended on programs like troff to fix things up. Is it better these days? I don’t know.

 

Share

--- *** ---

How To Be Smarter Than a Democrat?

Written By: cahwyguy - Mon Dec 19, 2016 @ 6:14 pm PDT

Well, sorry to say (from my point of view), but it looks like Donald Trump has won the electoral college vote. We won’t know for sure until the votes are counted by the House in January, but I’m sure that election won’t be hacked.

Yup, sure.

Unlike, say, how the election that got us Trump was hacked. We may never know whether what the Russians did was sufficient to change votes, but we know how they did it, and some of the ways the influence occured. So, let’s see if you can be smarter than a Democrat. Note that I’m not saying “Democrats” in general, but some specific Democrats in Hillary’s organization.

How did they basically do it? Social engineering. Read the New York Times account of the hack. Podesta was phished, and the starting place was a purported message from Google indicating an account had been hacked, and a password needed to be changed.  That, combined with a warning message that mistyped “illegitimate” as “legitimate”, and the damage was done.

See, what people forget is that the weakest link in the security chain is the human link. It is incredibly easy to do a social engineering attack. Our nature is such that we want to be helpful, and we fall for it. Here’s an example: During our recent security conference, one of the banquet staff found a USB drive that someone left behind, and he asked us to return it to its owner. We promptly tossed it. What would you do? Many people would put it in their computer to find the owner — and potentially be hacked. Or they would just announce it and hand it to the owner, letting them be hacked. One never knows what changes were made to that drive when it was out of your sight (this, by the way, is a good reason to use encrypted USB drives).

What about other attacks? Those ads you see on webpages? They can insert malware into your router without you knowing it. They could bring in ransomware? My malware dectector has frequently intercepted malicious ads on non-malicious sites. Sites you go to every day. These sites often don’t have control of their ad networks.

By the way, you do have regular backups, right? Not always connected to your computer? Not in the cloud? Could you survive the sudden loss of your data?

As they say, fool me once, shame on you. Fool me twice, and…. well, we’ve just seen the fool get elected. Let’s not be fooled again.

P.S.: And what should you do about the fool? The answer is not to use your computer to sign a petition or send an email. The answer is to take time and write your congresscritters and senators, and as many other congressional people as you can, a hand-written letter. Legibly. This shows that the issue is important for you to take the time. Send it to their local office, or call. Insist that Congress hold Trump to the exact same standards of ethics, no conflicts of interest, and highest quality of minimally-partisan appointments to which they held Obama. Different Presidents should not have different standards. And, just like with Obama and Bill Clinton, they should investigate the littlest impropriety or questionable action by the President or any member of his administration. All Presidents and his staff should be held to the same standards.

PS: And if you don’t hold with that position, then please explain why Trump should not be held to the same standard. Party shouldn’t make a difference in how we expect the President to behave, so you must have some other reason. Our President should be the role model for the country, someone that our children can look up to see how a leader behaves.

Share

--- *** ---

Pre-Labor Day Sale on News Chum! Get It Here! New Low Price!

Written By: cahwyguy - Sun Aug 28, 2016 @ 8:22 am PDT

Observation StewLabor Day weekend is less than a week away. Here’s some tasty news chum to get you through the week:

  • Relaxen und vatch das blinkenlights! Back in the 1960s, you knew it was a computer if it had loads and loads of blinking lights. In fact, a popular meme (mimeographed educational memo exaggerated) going around read: “ACHTUNG! Alles touristen und non-technischen looken peepers! Das machine control is nicht fur gerfinger-poken und mittengrabben. Oderwise is easy schnappen der springenwerk, blowen fuse, und poppencorken mit spitzensparken. Der machine is diggen by experten only. Is nicht fur geverken by das dummkopfen. Das rubbernecken sightseenen keepen das cotten picken hands in das pockets, so relaxen und watchen das blinkenlights.” I mention this because the Lost in Space computer prop has recently been reconstructed. What caught my eye for this article was (a) that the Lost in Space computer was later used as the Batcomputer, and (b) that the TV shows of the 1960s used surplus, 1950s-era Burroughs B205s whenever they needed something cool and blinkenlighty.
  • The Nodpod. Ever attempt to fall asleep on an airplane or vanpool? Your head droops forward and back as your neck gets sore. There’s a proposed solution. The nodpod. The NodPod, currently seeking funding on Kickstarter, claims to provide a more comfortable, upright snooze by holding your head at a 90 degree angle. The cushioned sling attaches to your headrest (without blocking the screen of the person sitting behind you) and can be adjusted to keep your noggin snug in place.
  • Lint in our Oceans. We’ve all seen lint in the lint trap, and worried about how dryers are destroying our clothes through friction. Washers have the same problem, especially for clothes made of plastic — and polyester is plastic. Microfibers wash off, go into the oceans, and harm sealife. The linked article purports to solve the problem through a magic ball that captures polyester microfibers. Potentially interesting.
  • Scary Math. Does math scare you? How about mathemagic involving the (horrors) number of the beast (not his better half, 333, or the neighbor of the beast, 667). I’m talking about Belphegor’s Prime, a supposedly sinister numeric palindrome that has a NUMBER of odd qualities. Or at least that’s what one mathematic trickster would have you believe. The number known as Belphegor’s Prime is exactly, 1,000,000,000,000,066,600,000,000,000,001. For those without the fortitude to stare directly at the infernal number, that’s a one, followed by 13 zeroes, followed by the traditional Number of the Beast, 666, followed by yet another 13 zeroes, and a trailing one. Learn all about it here.
  • Kosher Frozen Custard. If you’ve ever been to St. Louis, you likely know about Ted Drewe’s Frozen Custard — a classic on Route 66. Did you know it was Kosher? Here’s the story of how that came to be.
  • Daugs in Northridge. IHOP has been on the move in recent years: it vacated its long-time location on Reseda Blvd for the former Rosies at Tampa and Nordhoff. So what is happening with the former IHOP? It is becoming Daug House, a restaurant for craft hot dogs. Dog Haus emphasizes community engagement and support through the outreach programs which connects with organizations around the area, such as schools, churches, nonprofit organizations, and little leagues. The menu includes all beef skinless Haus dogs, hand-crafted Haus sausages, a proprietary grind of chuck and brisket Haus burgers, sliders, sides and desserts. While we’re on the valley, here is Eater LA’s list of great Valley restaurants, almost all of which are clustered around Ventura Blvd, because we all know that for the foodie crowd, there is no life in the valley north of US 101.
Share

--- *** ---