Unfiltered raw news for the reader without the bullshit censured in other places; with a lot of those “ conspiracy theories” that are being proved we are correct
Wednesday, May 29, 2013
Disappearing Illusions
Disappearing Illusions happen usually due to focus on some specific area while the surrounding colors trick the human eye into seeing something which is not there.
You may enlarge each picture to verify that what you see is really just an illusion.
DISAPPEARING YELLOW DOTS
If you stare at one yellow dot for a while, the other yellow dots disappear.DISAPPEARING GREY
Stare at the black dot in the center and in a few moments the grey area surrounding the dot will disappear.No abras ese correo: qué hacer ante un mail sospechoso
Hay correos electrónicos que pueden infectar y secuestrar tu PC. Otros intentan robar información confidencial a través del engaño. Y unos cuantos...
- Fabrizio Ferri-Benedetti |
- 06 de mayo del 2013
Y es que la tentación de abrir cualquier correo es muy alta, especialmente si parece misterioso o importante. Asociamos el correo a personas de confianza, a mensajes urgentes que no suelen ir a través de otros canales menos “serios”.
Para evitar infecciones dañinas y de consecuencias desastrosas para tu bolsillo, conviene que resistas el impulso de abrir todo lo que entre en tu buzón de correo. Sigue los consejos que enumero a continuación.
1. ¡Si no has solicitado nada, no hagas clic!
Es una regla de oro: si no has solicitado nada a una persona o una empresa, esta no tiene por qué enviarte instrucciones de ningún tipo, ni mucho menos archivos adjuntos. ¿Por qué debería hacerlo?
Empresas e instituciones usan el correo solo para informar, a menos que tú pidas algo, como una nueva clave, o hayas iniciado una gestión que contempla el envío de un correo de confirmación o una copia de alguna transacción
Cuando te llega un mensaje y no consigas reconducirlo a una conversación previacon la persona o empresa indicada en el correo, empieza a desconfiar. Hazte estas preguntas:
- ¿Qué tengo que ver yo con este mensaje?
- ¿Por qué me han enviado este correo ahora?
- ¿Tiene razón de ser lo que me están pidiendo?
Si no consigues contestar esas preguntas, no hagas clic en ningún enlace ni archivo adjunto del correo en cuestión, al menos no hasta haber recabado más información sobre el mismo. Lo que nos lleva a los siguientes puntos.
2. ¿Texto sospechoso? Búscalo en Google
Los mails con estafas o malware suelen tener siempre el mismo texto, a veces con ligeras variaciones. Sus características son fáciles de reconocer, sobre todo si las comparas con las comunicaciones de una empresa real:
- Frases incomprensibles y palabras extranjeras, debidas al uso de un traductor automático: muchos hackers operan desde países donde la ley no puede actuar
- Errores ortográficos e incoherencias en el texto, como si fuera un corta-y-pega apresurado: la mayoría de criminales informáticos tienen prisa y saben generalmente poco de diseño y ortografía
- Imágenes mal encajadas o en baja resolución: han intentado darle una pátina de oficialidad a su correo, pero han tenido que recurrir a imágenes de segunda mano
- Falta de referencias a tu persona: no se usan tus nombres y apellidos ni otros datos que solo una empresa puede conocer, lo que hace que los mensajes tengan un aspecto de plantilla sin rellenar
- Sentido de urgencia: los textos son casi siempre alarmistas y apelan a la emoción más visceral de todas, el miedo. Se hace mención a consecuencias temibles, asuntos de dinero o posibles multas
Copia y pega las frases más extrañas en un buscador y mira bien los resultados: podrás comprobar de primera mano si estás ante un correo legítimo o un posible intento de estafa.
3. ¿Hay un archivo adjunto? Ni se te ocurra hacer doble-clic
Per se, el texto de un correo nunca es peligroso (a menos que se trate de un chiste muy malo). El auténtico peligro se esconde tras los enlaces y los archivos adjuntos. Estos últimos son los responsables de casi todas las infecciones por correo.
Fíjate en la extensión del archivo adjunto. Las que deben ponerte en alerta roja son:
- Las extensiones ejecutables clásicas: EXE, COM, BAT, PIF
- Los documentos que pueden contener código: PDF, DOC, XLS, PPT
- Archivos de sistema ejecutables: DLL, CPL, MSC, CMD
- Instaladores y archivos comprimidos: MSI, ZIP, CAB, RAR
- Salvapantallas: SCR (¡son programas también!)
- Archivos con doble extensión (por ejemplo, ARCHIVO.DOC.EXE)
Los navegadores más seguros y las aplicaciones de correo más avanzadas suelen efectuar controles por ti -un ejemplo es Gmail-, pero nunca está de más pasar el archivo por un antivirus actualizado.
4. ¿Hay enlaces? Analízalos antes de hacer clic sobre ellos
Otro método que los ciber-criminales usan para atraer a los incautos hacia las trampas son los enlaces falsos o enmascarados. Si estás ante un enlace en apariencia legítimo, pasa el puntero del ratón por encima para ver cuál es la dirección real:
La dirección real se ve al pasar el puntero del ratón (imagen cortesía de Microsoft)
Los enlaces acortados son otra amenaza en potencia, puesto que impiden saber de antemano hacia dónde conducen. Normalmente, las empresas o instituciones no recurren a este tipo de enlaces en sus comunicaciones por correo electrónico.
Para desenmascarar un enlace acortado, puedes usar servicios como UnShorten, que además de desentrañar el enlace cifrado, te indica la reputación del enlace usando los datos de WOT, un conocido servicio de evaluación de sitios web.
[Avanzado] Si eres un usuario avanzado, puedes "diseccionar" el encabezado del mailpara ver cuál es su auténtico origen, pero ten en cuenta que este método, amén de complejo, no siempre conduce a respuestas concluyentes.
5. No contestes nunca ni tampoco lo reenvíes
Contestar un correo sospechoso proporciona datos valiosos al cibercriminal. Para empezar, le dice que tu dirección de correo es real y que estás a la escucha, lo que aumenta en varios puntos su valoración en el mercado negro de direcciones.
No contestes nunca un mail sospechoso
No le contestes, pues, pero tampoco lo reenvíes, puesto que vas a hacerle un favor a esos mismos piratas que te enviaron el correo al principio. Acabarías por generar unacadena de correo perniciosa.
6. En caso de duda, contacta a través de otro medio
- Si es una persona, llámala, ábrele un chat o envíale un SMS (pero no le envíes un correo)
- Si es una empresa, ve a su página web y contacta a través de su formulario oficial (o llámales)
Por supuesto, si se trata de un mail enviado por un conocido, no lo agredas: lo más probable es que no sepa de qué le estás hablando. Es posible que su buzón o dirección hayan sido suplantados o secuestrados para enviar correo fraudulento.
7. Usa un navegador seguro y lee tu correo a través del web
Los clientes de correo clásicos, como Outlook Express, son muy vulnerables ante todo tipo de ataques por correo. La única línea de defensa ante mensajes maliciosos que llegan a Outlook o Thunderbird es un buen antivirus con protección residente.
¿Nuestro consejo? Usar un cliente web (GMail, Hotmail, Yahoo! Mail, etc) en un navegador seguro (Chrome o Firefox).
Un virus detectado por Gmail, que impide bajarlo (imagen de AskDaveTaylor)
Lo primero asegura que el contenido del correo haya sido escaneado por los sistemas de seguridad usados por los proveedores de correo, mientras que lo segundo dificulta que el malware pueda llegar a tu ordenador.
¿Cuáles son tus trucos para reconocer correos sospechosos?
Monday, May 27, 2013
OPTN/UNOS: Change Policy to Allow Pediatric Transplants of Adult Lungs Based on Medical Necessity

https://www.change.org/petitions/optn-unos-change-policy-to-allow-pediatric-transplants-of-adult-lungs-based-on-medical-necessity
Lungs Based on Medical Necessity
Multiply Your Impact
Turn your signature into dozens more by sharing this petition and recruiting people you know to sign.
YOU
YOUR
FRIENDS
FRIENDS
170
avg.
THEIR
FRIENDS
FRIENDS
10,000
approx.

Ten-year-old Sarah Murnaghan has end-stage Cystic Fibrosis and has been on the lung transplant list for 18 months. Too sick to leave Children’s Hospital of Philadelphia for three months, she has only a week or two before she will lose her battle. If she were two years older, she would have a high probability of receiving lungs in time. Sarah is eligible for adult donor lungs, but because of her age, she will only receive them after all adult candidates, regardless of how sick they are, have the opportunity to accept them.
This is a policy created by the Organ Procurement and Transplantation Network (OPTN), the nation's organ procurement, donation and transplantation system and enforced through United Network for Organ Sharing (UNOS) which manages US organ transplant system under contract with the federal government.
Based on a 2000 ruling by the US Department of Health and Human Services, which mandated that organ allocation policies must be based on medical necessity rather than waiting time, OPTN implemented a new allocation system based on the severity of a patient's illness (the Lung Allocation Score, or LAS), rather than the amount of time served on the wait list in 2005. This reduced the number of deaths among patients awaiting lung transplant, ensured lungs were allocated to those with less stable diagnoses, and dramatically reduced the average wait time from over two years, and reduced the wait list by half. This new approach only applied to patients over the age of 12.
This approach was not extended to children. Despite the fact that many pediatric patients can use a partial lobar transplant from an adult donor, these young patients are only offered adult donor lungs after all adult patients, regardless of the severity of the child's illness. While Sarah has an LAS score over 60, which would normally place her as the highest priority for her blood type in region, all adults in region with her blood type will be offered the lungs first, even those with more stable diagnoses and lower LAS scores. Sarah will only be offered adult lungs if no adult candidates accept the organ.
Sarah is a top priority on the pediatric list, but the pediatric donors are far fewer than the adult donors, dramatically reducing the number of lungs Sarah is offered. So far in 2013, there were 1,133 adult deceased lung donors and only 70 under the age of 12. The result is only 4 pediatric lung donor recipients in 2013, and 291 for those over 12 years old.
This policy needs to change. The OPTN/UNOS Lung Review Board, a national group of transplant physicians and surgeons, can make an exceptional ruling for Sarah. And they can recommend new policies to OPTN. John Roberts is President of the OPTN/UNOS Board of Directors.
This is a policy created by the Organ Procurement and Transplantation Network (OPTN), the nation's organ procurement, donation and transplantation system and enforced through United Network for Organ Sharing (UNOS) which manages US organ transplant system under contract with the federal government.
Based on a 2000 ruling by the US Department of Health and Human Services, which mandated that organ allocation policies must be based on medical necessity rather than waiting time, OPTN implemented a new allocation system based on the severity of a patient's illness (the Lung Allocation Score, or LAS), rather than the amount of time served on the wait list in 2005. This reduced the number of deaths among patients awaiting lung transplant, ensured lungs were allocated to those with less stable diagnoses, and dramatically reduced the average wait time from over two years, and reduced the wait list by half. This new approach only applied to patients over the age of 12.
This approach was not extended to children. Despite the fact that many pediatric patients can use a partial lobar transplant from an adult donor, these young patients are only offered adult donor lungs after all adult patients, regardless of the severity of the child's illness. While Sarah has an LAS score over 60, which would normally place her as the highest priority for her blood type in region, all adults in region with her blood type will be offered the lungs first, even those with more stable diagnoses and lower LAS scores. Sarah will only be offered adult lungs if no adult candidates accept the organ.
Sarah is a top priority on the pediatric list, but the pediatric donors are far fewer than the adult donors, dramatically reducing the number of lungs Sarah is offered. So far in 2013, there were 1,133 adult deceased lung donors and only 70 under the age of 12. The result is only 4 pediatric lung donor recipients in 2013, and 291 for those over 12 years old.
This policy needs to change. The OPTN/UNOS Lung Review Board, a national group of transplant physicians and surgeons, can make an exceptional ruling for Sarah. And they can recommend new policies to OPTN. John Roberts is President of the OPTN/UNOS Board of Directors.
To:
John Roberts, President, Board of Directors, OPTN/UNOS
John Roberts, President, Board of Directors, OPTN/UNOS
Please reconsider the policy that excludes children under 12 from receiving adult lungs based on medical necessity. And we implore you to start by making an immediate exception for 10-year-old Sarah Murnaghan, who has been on the lung transplant waiting list for 18 months. UNOS policy requires adult lungs to be offered first to adults in less dire need than Sarah. Please treat her life as equal...
Please reconsider the policy that excludes children under 12 from receiving adult lungs based on medical necessity. And we implore you to start by making an immediate exception for 10-year-old Sarah Murnaghan, who has been on the lung transplant waiting list for 18 months. UNOS policy requires adult lungs to be offered first to adults in less dire need than Sarah. Please treat her life as equal to an adult's life. She doesn't have much more time and needs new lungs now. Please give her the chance to receive the adult lungs she needs to save her life.
Sincerely,
[Your name]
[Your name]
Recent signatures
- 0m
- 0m
- 0m
- 0m
- 0m
- 0m
- 0m
- 0m
- 1m
- 1m
Supporters
Reasons for signing
- Reyna Kosla CROWNSVILLE, MD
- 2 days ago
- Liked 23
Because my daughter had CF and a double-lung transplant. Give this little girl the life she is entitled to!REPORT THIS COMMENT: - Lorraine Husack EMMAUS, PA
- 2 days ago
- Liked 15
She has just as much right to have a transplant as any adult. She could have her whole life if given that chance and for the parents to enjoy what some waiting adults have already experienced... (ie. A daughter's sweet 16 birthday, seeing a child off to college, marrying the love of her life. Her parents may never experience the joy because of this legal policy. I'm astounded at this police and my heart and prayers go to the parents of this beautiful little girl!REPORT THIS COMMENT: - Jennifer Ketarkus MADISON, WI
- 2 days ago
- Liked 15
I know Sarah's mom, and how hard this family has fought, the decision on who gets organs should be based on acuity, not how old the child is.REPORT THIS COMMENT: - Barbara Ann Mellace NORWOOD, PA
- 2 days ago
- Liked 14
Saving the life of a child should be important to everyoneREPORT THIS COMMENT: - Nedda Dayley RICHLAND, WA
- 2 days ago
- Liked 13
For Sarah and the other 25% of CF kids who will not make it to 18. They deserve a fighting chance at new lungs too. In honor of my own 9 yr old CF warrior Hunter. <3 p="">3>REPORT THIS COMMENT:
- Chirstopher Haynes ORLANDO, FL
- less than a minute ago
- Liked 0
Every life is important!REPORT THIS COMMENT: - Gina Bosick WILMINGTON, DE
- 1 minute ago
- Liked 0
I have children and If I were faced with this horrible disease , I would want the best possible options for them and not face them dying because someone wouldnt give them an opportunity to get what they need a live..God Bless all who read this and who face this challenge each dayREPORT THIS COMMENT: - Sammie McGinnis MIDDLETOWN, DE
- 2 minutes ago
- Liked 0
because I am a Delawarean!REPORT THIS COMMENT: - Joseph Maiorano BROOMALL, PA
- 2 minutes ago
- Liked 0
No one especially a child should have to sufferREPORT THIS COMMENT: - patricia scanlon VALLEY STREAM, NY
- 2 minutes ago
- Liked 0
ARBITRARY RULES SHOULD NOT DISCRIMINATE BASED ON AGE ALONEREPORT THIS COMMENT:
News
CF sufferer fights for transplant; family learns she's under limit for lung
Cystic fibrosis sufferer, 10, fights for life-saving transplant after her family learns she is just under the age limit for adult lungsSarah Murnaghan was born with cystic fibrosis and has just weeks to live She has been on the waiting list for a lung transplant for 18 months Her family has just learned that because of her age, she does not qualify for an adult lung, which would work just as- Reached 20,000 signatures
- Reached 17,500 signatures
Girl's Family Fights National Organ Donor Rule
Girl's Family Fights National Organ Donor RuleA Newtown Square, Delaware County girl is battling a deadly disease. She is in serious need of a lung transplant. But now, a national organ rule may be standing in her way. FOX 29's Dave Kinchen sat down with this brave girl, who is fighting for her chance in the spotlight.- Reached 12,500 signatures
Family Fights for Lung Transplant for Dying Daughter
NBC 10 Philadelphia : Family Fights for Lung Transplant for Dying DaughterJanet's 10-year-old daughter Sarah was diagnosed with cystic fibrosis when she was 18-months-old. The genetic disease primarily affects the lungs and digestive tract by causing mucus to clog up the airways, making it hard for the person to breathe. It can also cause bacterial infection and make it difficult to digest food.- Reached 10,000 signatures
10 year old hopes for new lungs, despite birth date
10 year old hopes for new lung, despite birth date - CNN.com VideoA 10 year-old girl with cystic fibrosis needs a lung transplant in the next week or two. However, her age makes that difficult.- Reached 9,000 signatures
Delco girl awaiting lung transplant 18-months later
Delco girl still awaiting lung transplant 18-months laterPHILADELPHIA - May 25, 2013 (WPVI) -- A Delaware County girl, being treated at the Children's Hospital of Philadelphia, is in desperate need of a lung transplant, but a policy hurdle is standing in her way. 10-year-old Sarah Murnaghan has remained on the lung transplant list for 18 months.- Reached 5,000 signatures
Home networking-Keep your network secure
If you were concerned after reading CNET's recent report that most home routers can be easily hacked, I don't blame you. The study did sound ominous, but the good news is that your network is likely far less susceptible than the report suggests. And more importantly, there are things you can do to make sure it's secure.
Related stories:
Two things are vital to keeping your network safe: proper settings and prudence. The first step is easy; you just need to adjust the settings on your router once. The second step, however, takes more effort. Whenever you're online, you'll need to be prudent about your activities.
Here are some router and network settings tips that will help keep your home network safe.
Before I begin, note that with most routers you'll need to access the Web interface to change the settings. You can read part 5 in this series for the full details. For Apple products, you can customize the applicable settings via the AirPort Utility, which is freely downloadable and included in Mac OS 10.7 or later.
Without a Web interface, Apple's routers trade
flexibility and features for immunity to certain types of hacking. You
still want to use the AirPort Utility to create strong Wi-Fi and log-in
passwords, however.
(Credit:
Dong Ngo/CNET)
1. Encrypt your Wi-Fi network
Give your Wi-Fi network, identified by its SSID (a string of characters), a password so that (ideally) only those users you know and trust can connect to your network. This password should be hard to guess, but easy to remember and type -- even on a small smartphone keyboard. The password should be at least eight characters long and should include both numbers and letters. And if your router lets you use passwords with spaces, that's even better.
Note that depending on the router, this password will be referred to in the Web interface as either the encryption key, the pass-key, the pre-shared key, or the passphrase. The exact Settings menu where you determine your password will vary as well.
You also need to consider which industry security standards your router supports. The three current standards from strongest to weakest are WPA2, WPA, and WEP. Though WPA2 is more secure, at present WPA is compatible with more client devices.
2. Change important default settings
A router comes with many default settings. Since those are set by the vendor, they are public knowledge. Using the default settings may help make the setup process easier, but it also makes your router more susceptible to unauthorized access.
The two settings that you should change to keep your router safe are its default IP address and default log-in password. Why? Well, as mentioned in part 5, these are the two pieces of information that let you access your router's Web interface and manage all of its settings.
Making a strong router log-in password and
turning off remote management and UPnP are a few ways to keep a router
safer from intruders.
(Credit:
Dong Ngo/CNET)
First, in the Local Area Network (or LAN) setup part of the interface, set the router's IP address. You can change it to almost anything you want as long as the value of each dotted-decimal notation (the numbers separated by the dots in the IP address) is a number from 1 to 254. So for example, instead of the conventional 192.168.x.1, you can make it 10.11.12.13 or 1.2.1.2 or 20.21.22.23 and so on. Note that once you change the IP address, you'll need to use that new address to access the router's Web interface from then on. Also, avoid making the router's IP address the same as the IP assigned to your modem by your Internet service provider, called the WAN (wide-area network) IP address.
You can change the router's IP address to
almost anything you want as long as the value of each dot-separated
group is a number from 1 to 254.
(Credit:
Dong Ngo/CNET)
You can change the router's default log-in password via the Tools or Administration parts of the Web interface. Make sure that this password is hard to guess and different from the password used for the Wi-Fi network mentioned above.
3. Turn off remote access-related features
Most routers are accessible over the Internet, so even when you're not at home you can remotely manage and use FTP (specifically for routers that come with a USB port to host an external hard drive for network storage). Don't turn these features on unless you know what you're doing. And when you do, make sure to use proper restrictions. For example, use HTTPS for the remote management, or change the port to something that's not conventional (which is a subject for another time).
Also, you should turn off the UPnP feature. It lets a UPnP-compatible device change certain router settings without logging in to the Web interface, and it could be exploited by hackers.
4. Update the router's firmware
Typically, firmware updates from the manufacturer help improve a router's performance and security. Depending on the router, updating the firmware can take a few easy clicks, or you may have to first download the firmware and install it manually. Either way, though, the process should take just a few minutes. Remember, don't do anything until the upgrade process is done. Otherwise, the router might become permanently nonfunctional (aka, you might brick it.).
Note that some firmware might reset the router's settings to the factory default. That's why it's a good idea to back up the router's settings before upgrading or making any major changes.
5. Log out properly
This step may sound trivial, but it's quite important. Make sure that you log out of the router's Web interface when you're finished making changes. Some interfaces have a log-out button, but with others you'll need to close the browser, too. Keeping a log-in screen open all the time could allow an attacker to access your router settings if your computer has already been compromised.
Bonus step: Turn on power line adapters' security features
Another thing that can easily be overlooked: if you use power line adapters in your network, it's a good idea to turn on their security features. This is especially important if you live in an apartment building, as unscrupulous neighbors could tap into your network by using an adapter in their homes.
How to remove 'Yontoo' adware Trojan from your OS X system
Security company Dr. Web is reporting on a new adware Trojan attack that is targeting Mac users, where malicious Web sites will trick users into installing a plugin that will track your browsing and display ads to you.
The malware, called "Yontoo," will be first encountered as a media player, download manager, or other plug-in requirement for viewing contents on some maliciously crafted Web sites disguised as sources for file sharing and movie trailers. When the plug-in prompt is clicked, you're redirected to a site that downloads the Trojan installer and requires you to run it. The installer is for a fake program called "Twit Tube," that when installed will place a Web plug-in or extension called "Yontoo" that will run in popular browsers like Safari, Chrome, and Firefox.
When the malware is running, affected systems will be actively tracked for browsing behaviors, and legitimate Web sites will be hijacked with ad banners and other content that attempts to lure you into clicking it.
This menu option in Safari will show you the
installed plug-ins, which you can review for the presence of Yontoo or
any other unwanted plug-ins.
(Credit:
Screenshot by Topher Kessler/CNET)
If you find a trace of the Yontoo plug-in on your system, then although you can disable it in each Web browser, a more-thorough option is to go to the Macintosh HD > Library > Internet Plug-Ins folder and remove the plug-in manually. Additionally, you should check the plug-in folder for your home directory, which can be accessed by choosing Library from the Go menu in the Finder (hold the Option key to reveal the library in this menu if it is missing), and then locate the Internet Plug-Ins folder in here. When the plug-in is removed, quit and relaunch your browsers.
Since Web plug-ins are one method for malware developers to target a system, one thing you can do to help ward off attacks is to get an inventory of your Web plug-ins folders so you know exactly what is in them, and then be able to better investigate any new items placed there. Another similar approach is to set up a monitoring service in OS X that will inform you whenever new items are placed in the Internet Plugins folders on your system. I recently outlined a method for doing this to monitor Launch Agent folders on a Mac, and you can similarly apply this method to the following two directory paths in addition to the Launch Agent paths outlined in the article:
Macintosh HD > Library > Internet Plug-Ins
Macintosh HD > Users > username > Library > Internet Plug-Ins
Macintosh HD > Users > username > Library > Internet Plug-Ins
Rare 3-Planet Sight Tonight: See Jupiter, Mercury and Venus Together
By Tariq Malik | SPACE.com – 23 hrs ago
Three planets will perform a rare celestial dance in the sunset sky tonight (May 26), a cosmic show that stars Jupiter, Venus andMercury.
Weather permitting, the three planets will shine together in a triangle formation low in the western sky in a planetary meet-up known as a conjunction. But there is more to the night sky sight than meets the eye.
"Triple conjunctions of planets are fairly rare," astronomer Tony Phillips explained in a NASA observing guide. "The last time it happened was in May 2011 and it won't happen again until October 2015."
What sets tonight's planetary show apart from other conjunctions is that it includes the three brightest planets visible in the May night sky. Venus is the brightest of the trio, with Jupiter a close second and Mercury coming in third.
The three planets will appear within a 3-degree field of the night sky and should fit inside the field of view of a typical set of binoculars. For comparison, your closed fist held out at arm's length covers about 10 degrees of the sky.
The best time to look for Jupiter, Venus and Mercury together is between 30 and 60 minutes after sunset. If you have clear weather, the planets will appear low on the western horizon, so an unobstructed view is vital.
The three planets have been closing in on one another for tonight's sky show over the last week, but if you miss them tonight don't fret. The planet trio will still be visible on Memorial Day Monday (May 27) as their triangle pattern begins to separate, Phillips wrote.
On Tuesday (May 27), Venus and Jupiter will appear extremely close together, separated by just 1 degree, in what could be a "truly spectacular pair," Phillips added.
Editor's note: If you snap an amazing picture of the three planets or any other night sky view that you'd like to share for a possible story or image gallery, send photos, comments and your name and location to Managing Editor Tariq Malik at spacephotos@space.com.
Editor's note: If you snap an amazing picture of the three planets or any other night sky view that you'd like to share for a possible story or image gallery, send photos, comments and your name and location to Managing Editor Tariq Malik at spacephotos@space.com.
Subscribe to:
Posts (Atom)