Corporate directories – Livelink Directory http://livelinkdirectory.com/ Fri, 06 May 2022 01:43:44 +0000 en-US hourly 1 https://wordpress.org/?v=5.9.3 https://livelinkdirectory.com/wp-content/uploads/2021/10/icon-5-120x120.png Corporate directories – Livelink Directory http://livelinkdirectory.com/ 32 32 Focus on active directories to stay safe https://livelinkdirectory.com/focus-on-active-directories-to-stay-safe/ Tue, 03 May 2022 03:02:10 +0000 https://livelinkdirectory.com/focus-on-active-directories-to-stay-safe/ Companies are now investing record sums in cybersecurity provisions, software and services that are supposed to protect their data and technology stacks. In 2021 alone, global spending on security and risk management reached an all-time high of $150.4 billion, after growing 12.4% in just one year. But it would be a mistake for businesses to […]]]>

Companies are now investing record sums in cybersecurity provisions, software and services that are supposed to protect their data and technology stacks.

In 2021 alone, global spending on security and risk management reached an all-time high of $150.4 billion, after growing 12.4% in just one year. But it would be a mistake for businesses to think that just because they’re spending more money protecting their businesses from cyberattacks, they can rest easy.

The reality is that companies simply don’t get what they pay for – and in fact, they suffer from the same old infractions.

Common vulnerabilities often boil down to unresolved issues with Active Directory (AD), the database, and service administrators used to manage permissions and access to network resources. When looking to strengthen cyber defenses and eliminate vulnerabilities, organizations should start with their Active Directory – because cybercriminals are sure to do that too!

Groundhog Day for Business

As many penetration testers (or pen testers for short) will tell you, companies repeatedly introduce the same vulnerabilities, no matter how advanced a company’s technology stack is.

Microsoft’s Active Directory is a popular choice for organizations to perform critical business functions, but unfortunately also a popular target for hackers to gain a foothold in corporate networks, primarily because the attack surface it door is so vast. Think of the sheer number of devices and networks a typical business uses, and all the data that could be at risk from a single exploit in their Active Directory, when spotted by a single attacker.

Relying on older hardware can effectively negate much of the expense of security and risk management services, because the older the hardware or system, the more attractive and vulnerable it may seem to hackers. These malicious actors are familiar with the types of exploits offered by older systems and have had plenty of time to perfect how to break in, allowing them to use simple “point and shoot” tactics. This tactic, when executed, can grant them near-instantaneous access to system-level privileges on targeted systems.

It’s every security team’s worst nightmare come true, but another problem with outdated systems is that old systems often rely on legacy protocols, which are not compatible with authentication techniques and capabilities. modern encryption. This means that even if a company has a newly patched domain controller (DC) – the server that responds to authentication requests and verifies users on computer networks – it will still have to rely on outdated protocols and less secure to operate if there are other legacy systems present in the network.

No progress? That is why

In short, most companies simply aren’t getting the most out of their cybersecurity investments, and the problem is largely rooted in outdated operating systems.

In 2020, Deloitte released a report following a survey, which suggested that companies were spending 10.9% of their IT budget on cybersecurity alone. However, by leaving their technology stacks and operating systems untouched for many years, companies are unwittingly giving hackers a playground to roam.

Pen testers like me are also concerned about the wider implications of the lack of progress in fixing these violations, as we find ourselves running the same tests, using familiar hacking techniques from yesterday. As ethical hackers, we need to think like a cybercriminal; so naturally, when AD vulnerabilities present themselves during a penetration test, they become the primary attack vector we investigate and report on.

Yet often companies fail to learn lessons and they reoccur, resulting in no progress. In the meantime, less time and fewer resources can be allocated to experimentation with penetration testing in order to scratch below the surface and identify new ways for companies to strengthen their cyber defenses.

As a result, the industry is suffocated, focusing on attack methods as seen in the rear view mirror, distracting pen testers from spending enough time exploring the attack methods of today and tomorrow. against which companies must also protect themselves.

Unleash the ROI of cybersecurity investments

Reviewing Active Directory and updating hardware and systems doesn’t just prevent the likelihood of a damaging hacking attack in the near future; it also opens the door to laying the groundwork for a more proactive cybersecurity strategy. But AD is just the tip of the iceberg when it comes to ensuring companies get the most out of the investment they make in security and risk management.

In addition to keeping technology stacks in shape, companies also need to ensure that their people and control processes are also resilient enough to withstand a breach. In other words, they must ensure that employees are aware of the risks and trained to spot and avoid malicious emails; implement and enforce robust security processes to ensure that all attacks are contained; and learn to understand their network vulnerabilities, fixing them as soon as possible. By focusing on the three pillars of effective cyber defense – people, process and technology – they can ensure that no penny spent on security is wasted.


About the Author

Paul Cragg is an ethical hacker at Norm Cyber. Established in 2015, standard. is a company whose mission is to rid the world of the complexity of cybersecurity. We know that for most midsize businesses, managing cyber risk is a stressful, costly and time-consuming exercise that keeps them from doing what they do best. That’s why we’ve designed a service that’s easy to deploy, simple to manage, and significantly less expensive than an in-house function. All the assurance of complete visibility and control over your cyber risk, without having to manage it yourself.


]]>
Sia Partners listed as a supplier in SWIFT directories https://livelinkdirectory.com/sia-partners-listed-as-a-supplier-in-swift-directories/ Tue, 29 Mar 2022 16:54:20 +0000 https://livelinkdirectory.com/sia-partners-listed-as-a-supplier-in-swift-directories/ While the upcoming Customer Security Control Framework mandates independent assessment for all SWIFT users, Sia Partners has expertise with regards to the Customer Security Program, enabling us to best assist users in assessment of security controls. Following an upsurge in cyber-attacks targeting banks via the SWIFT system in recent years, including the cyber heist against […]]]>

While the upcoming Customer Security Control Framework mandates independent assessment for all SWIFT users, Sia Partners has expertise with regards to the Customer Security Program, enabling us to best assist users in assessment of security controls.

Following an upsurge in cyber-attacks targeting banks via the SWIFT system in recent years, including the cyber heist against the Central Bank of Bangladesh that resulted in a loss of $81 million in 2016, SWIFT has strengthened its cybersecurity measures to ensure better user protection. After the release of a mandatory software update, SWIFT announced the implementation of a Customer Security Control Framework (CSCF) from 2017, which has been progressively reinforced in order to integrate more security controls each year mandatory.

Sia Partners is available to SWIFT users to support them in their security control assessments; and this in a context of a threefold increase in cyber-attacks against financial institutions since confinement and an increased use of teleworking by banks

Evolution of SWIFT requirements and compliance risks

SWIFT’s Customer Security Program (CSP) is evolving, with the addition of a mandatory annual independent review for all SWIFT users. This assessment can be carried out by an external service provider or by a function independent of the company. However, it should be noted that due to the Covid-19 health crisis, SWIFT has announced that the assessment required for the year 2020 will be based on the 2019 benchmark. The requirements initially planned are postponed for one year. , in addition to new requirements introduced in 2021.

These requirements are of major importance for SWIFT users, as in the event of non-compliance with the new control framework, SWIFT could report misconduct to the local supervisory authority and inform users of the SWIFT network.

The expertise of Sia Partners and its global intervention capacity

Sia Partners has already worked on several assignments related to the CSP program, which provides our teams with in-depth knowledge in this area. In addition, Sia Partners has cybersecurity experts who have the most outstanding certifications and recognitions on the market (CISSP, CISM, CISA, ISO) and follow a program of continuous improvement of their skills and knowledge. In addition to this system, there is a team of 80 Data Scientists spread over 3 centers of excellence (Paris, Montreal and Amsterdam) who support all of our customers with their technological and regulatory issues.

Finally, Sia Partners is one of the few consulting firms to offer its services in Europe, North and South America, Asia-Pacific, the Middle East and Africa, and can thus meet the needs of its clients. in the whole world.

]]>
Softbank executives to resign from Paytm and Policybazaar directories https://livelinkdirectory.com/softbank-executives-to-resign-from-paytm-and-policybazaar-directories/ Wed, 16 Mar 2022 11:22:25 +0000 https://livelinkdirectory.com/softbank-executives-to-resign-from-paytm-and-policybazaar-directories/ Representing Japanese investment bank Softbank to Indian fintech firms Paytm and Policybazaar, Munish Verma is stepping down from the organisations’ sheets. Two well-informed individuals affirmed the turn of events. The choice to step down from the boards of registered organizations is critical to Softbank’s global strategy of not serving on the boards of registered organizations. […]]]>

Representing Japanese investment bank Softbank to Indian fintech firms Paytm and Policybazaar, Munish Verma is stepping down from the organisations’ sheets. Two well-informed individuals affirmed the turn of events. The choice to step down from the boards of registered organizations is critical to Softbank’s global strategy of not serving on the boards of registered organizations. Paytm did not comment on the response to the email sent by Business Standard. Policybazaar and Paytm had made no disclosures about the resignation of any board member. SoftBank claims a 17.4% stake in Paytm and a roughly 12.4% stake in Policybazaar.

Industry experts said that usually such a decision is made because the investor’s main goal is to invest, and they do so in similar businesses. “By being on the board of the company, they are aware of the information shared by the company with the board,” the source said.

“The bank communicated this aspect to the companies at the time of listing. They prefer not to be part of the boards of listed companies because their main objective is investment. In very few selective cases, Softbank has remained on board a few profitable companies,” a source with knowledge said. Softbank will, however, retain the investments it holds in these companies.

Summary of news:

  • Softbank executives to resign from Paytm and Policybazaar directories
  • Check out all the news and articles from the latest business news updates.
Disclaimer: If you need to update/edit this article, please visit our Help Center. For the latest updates, follow us on gohohgIand News
]]>
How to Copy Files and Directories in Linux Terminal https://livelinkdirectory.com/how-to-copy-files-and-directories-in-linux-terminal/ Thu, 03 Mar 2022 14:00:15 +0000 https://livelinkdirectory.com/how-to-copy-files-and-directories-in-linux-terminal/ fatmawati achmad zaenuri/Shutterstock.com Like any other operating system, you can copy and paste files and directories (folders) into a Linux distribution using the desktop interface. But you can save time by copying these files to the terminal. Here’s how. RELATED: How to Copy and Paste Text in Linux Terminal Copy files and directories in Linux […]]]>
fatmawati achmad zaenuri/Shutterstock.com

Like any other operating system, you can copy and paste files and directories (folders) into a Linux distribution using the desktop interface. But you can save time by copying these files to the terminal. Here’s how.

RELATED: How to Copy and Paste Text in Linux Terminal

Copy files and directories in Linux

cp and rsync are two of the most popular commands you can use to quickly copy files and directories in Linux. We will introduce you to both.

Using the cp command

cp stands for copy and is, you guessed it, used to copy files and directories in Linux. You can use cp to copy files to one directory, copy one directory to another, and copy multiple files to a single directory. Here are all the examples that demonstrate the use of the cp order.

Consider cpthe syntax of in its simplest form.

cp [file] [directory]

An example of its use would look like this.

cp Test1.txt copy_Test1_here/

cp command to copy a file to a directory

The above command will copy the text file Test1.txt to the copy_Test1_here/ phone book.

If you have multiple files that you need to copy to a directory, just list each file with a space in between.

cp Test1.txt Test2.txt Test3.txt Test4.txt copy_all_Tests_here/

You can also copy a file to a directory but save it under a different name. Here is the syntax for it.

cp [file] [directory]/[new filename]

This will copy the contents of the first thumbnail and save it to the directory under the new filename. A concrete example of the same would look like this.

Since there is a file Test1.txt which must be copied to the directory copy_Test1_here like Test2.txt :

cp Test1.txt copy_Test1_here/Test2.txt

copy the file to a directory with a different name

Want to keep it in the same directory? You can copy a file and rename it like this:

cp Test1.txt Test2.txt

Want to copy an entire directory? suppose that dir_1 and dir_2 are two directories in /Desktop . To copy dir_1 for dir_2 using the cp command, here is what you need to type.

cp -a dir_1 dir_2

cp copy a directory to another directory

option here -a stands for “archive” and is used to let the computer know that we are dealing with directories. The command copies the directory dir_1 for dir_2 .

If you are unsure whether the file or directory was copied to the destination location, you can also use the option -v to print the names of files or directories that have been copied (like computer program output).

For example, suppose there is a file Test_Example which should be copied to dir_1 . To view the output of the copy operation, you would use the -v option.

cp -v Test_Example.txt dir_1

The output would look like this:

'Test_Example.txt' -> 'dir_1/Test_Example.txt

cp with detailed output

RELATED: 37 Important Linux Commands You Should Know

Using the Rsync Command

the rsync The command stands for “Remote Sync” and is mainly used to transfer files and directories between computers on the same network. However, it also allows copying files and directories on the same PC. Here are some examples.

RELATED: How to use rsync to back up your data on Linux

Considering that we have two directories dir_1 , dir_2 and a file Test.txt in dir_1 . If we want to copy the file to dir_2 Here is what rsync command to do the same would look like.

rsync -v dir_1/Test.txt dir_2
rsync copy file to directory

Right here -v is short for “verbose”. This brings up the file transfer details, similar to -v possibility in the cp order. This allows you to confirm that the copy was successful. Here is what the output will be in our case:

sent 110 bytes  received 35 bytes 290.00 bytes/sec
total size is 24 speedup is 0.17

You can also copy multiple files at once from one directory to another. Suppose you are in /Desktop in which there are two directories dir_1 and dir_2 . dir_1 has four files test1 , test2 , test3 and test4 and you want to copy them into dir_2. Here is how you can do it using rsync:

rsync -v dir_1/Test1.txt dir_1/Test2.txt dir_1/Test3.txt dir_1/Test4.txt dir_2

The above command will copy the files test1 , test2 , test3 and test4 to the directory dir_2 .

To copy one directory to another, use the -a option. Here is an example of copying directories using Rsync.

rsync -av dir_1 dir_2

rsync copy directory to directory

If you are new to Linux and the commands seem difficult to follow, be sure to take your time and familiarize yourself with the basic Linux commands first. You can also learn a lot about commands using the man order.

Apart from rsync and cpthe install The command also lets you copy files in Linux.

RELATED: How to copy files using the “install” command in Linux

]]>
How to Copy Files and Directories in Linux https://livelinkdirectory.com/how-to-copy-files-and-directories-in-linux/ Mon, 28 Feb 2022 12:00:34 +0000 https://livelinkdirectory.com/how-to-copy-files-and-directories-in-linux/ Copying files and directories into the Linux terminal is really efficient and simple once you know how to do it. It is useful when we need to manage our files and directories without the need for a GUI, for example in a BASH script. We can do this whether we are at our office or […]]]>

Copying files and directories into the Linux terminal is really efficient and simple once you know how to do it. It is useful when we need to manage our files and directories without the need for a GUI, for example in a BASH script. We can do this whether we are at our office or if we are accessing a remote machine via SSH.

In this guide, we will look at the PC command that copies files and directories. We’ll look at a few arguments we can add to get the most out of this command.

]]>
City directories will be the subject of the Temecula Valley Genealogical Society – Press Enterprise https://livelinkdirectory.com/city-directories-will-be-the-subject-of-the-temecula-valley-genealogical-society-press-enterprise/ Sat, 12 Feb 2022 18:05:26 +0000 https://livelinkdirectory.com/city-directories-will-be-the-subject-of-the-temecula-valley-genealogical-society-press-enterprise/ Jean Wilcox Hibben, genealogist, author, storyteller, and national speaker, will speak on “City Directories: More Than Address Books” when the Temecula Valley Genealogical Society meets at 5:30 p.m. on Monday, February 14 in Community Hall B du Ronald H. Roberts Temecula Public Library, 30600 Pauba Road. Guests are welcome. In his presentation, Hibben will demonstrate […]]]>

Jean Wilcox Hibben, genealogist, author, storyteller, and national speaker, will speak on “City Directories: More Than Address Books” when the Temecula Valley Genealogical Society meets at 5:30 p.m. on Monday, February 14 in Community Hall B du Ronald H. Roberts Temecula Public Library, 30600 Pauba Road.

Guests are welcome.

In his presentation, Hibben will demonstrate how to use various techniques to locate ancestors in city directories. This information will also be useful for using the 1950 US Census and its enumeration districts, according to a press release. The 1950 census will be available April 1.

The Temecula Valley Genealogical Society, founded in 1998, offers a monthly meeting program and newsletter covering a variety of information related to genealogy and family history research. The society also offers specialized monthly classes on topics such as understanding and using its DNA results, genealogy research practices for beginners, and inspiration for writing family history as stories for generations. current and future.

Two upcoming events are the society’s genealogy trip to Salt Lake City and its annual high school student essay and scholarship contest. For more information on either event, contact Susan Puma, president of the Temecula Valley Genealogical Society, at swpuma@puma-appsci.com.

Membership in the Temecula Valley Genealogical Society costs $25 per year.

For more information about the company and the resources it provides, visit tvgs.net.

]]>
Use city directories to find ancestors https://livelinkdirectory.com/use-city-directories-to-find-ancestors/ Thu, 03 Feb 2022 20:40:42 +0000 https://livelinkdirectory.com/use-city-directories-to-find-ancestors/ TEMECULA – The Temecula Valley Genealogical Society has a treat for those interested in genealogy. The Monday, February 14 meeting will feature Jean Wilcox Hibben, national speaker, author, storyteller and genealogist. The subject of his presentation is “Municipal directories: more than address books”. His presentation is a methodology lecture that will show how to use […]]]>

TEMECULA – The Temecula Valley Genealogical Society has a treat for those interested in genealogy. The Monday, February 14 meeting will feature Jean Wilcox Hibben, national speaker, author, storyteller and genealogist. The subject of his presentation is “Municipal directories: more than address books”.

His presentation is a methodology lecture that will show how to use various techniques to locate ancestors in city directories. This information will also be useful in using the 1950 US Census and its enumeration districts; the 1950 census will be available on April 1.

The monthly meeting will begin at 5:30 p.m. in the community hall B of the Ronald

H. Roberts Temecula Public Library, 30600 Pauba Rd, Temecula. Guests are always welcome. For those who prefer to attend from the comfort of their own home, Zoom is available for this hybrid meeting.

In addition to a program of monthly meetings and a newsletter covering a wide variety

of information related to genealogical and genealogical research, the TVGS offers

monthly special interest classes on topics such as understanding and using your DNA results, family history research practices for beginners, and inspiration for writing family history as stories for current generations and future. For more information about TVGS and the many resources it provides, visit tvgs.net.

Submitted by the Temecula Valley Genealogical Society.

]]>
Rust vulnerability allows attackers to delete files and directories https://livelinkdirectory.com/rust-vulnerability-allows-attackers-to-delete-files-and-directories/ Mon, 24 Jan 2022 12:00:56 +0000 https://livelinkdirectory.com/rust-vulnerability-allows-attackers-to-delete-files-and-directories/ Maintainers of the Rust programming language have warned of a critical vulnerability that allows attackers to delete files and directories. In a security advisory, the Rust Security Response Working Group wrote: “The Rust Security Response WG has been made aware that the standard library function std::fs::remove_dir_all is vulnerable to a race condition allowing symbolic link […]]]>

Maintainers of the Rust programming language have warned of a critical vulnerability that allows attackers to delete files and directories.

In a security advisory, the Rust Security Response Working Group wrote:

“The Rust Security Response WG has been made aware that the standard library function std::fs::remove_dir_all is vulnerable to a race condition allowing symbolic link tracking (CWE-363).

An attacker could use this security issue to trick a privileged program into deleting files and directories that the attacker could not otherwise access or delete.

Rust 1.0.0 through Rust 1.58.0 is affected by the vulnerability. Rust 1.58.1 has been released which includes mitigations for the issue.

Officials warn macOS versions prior to 10.10 (Yosemite) and REDOX “do not have usable APIs to properly mitigate the attack, and are therefore still vulnerable even with a patched toolchain.”

Growing popularity

Rust has not yet been among the most widely used programming languages, but has grown in popularity in recent years.

In the 2021 Stack Overflow Survey, Rust retained its most popular language crown for the sixth year in a row. However, the language has yet to reach the top 10 uses, coming in at 16th place, just behind Kotlin and one place ahead of Ruby.

Last year, Rust created its own independent foundation to help promote and foster the use of Rust “as enterprise production-ready technology.” Five major companies support the Rust Foundation: Microsoft, Huawei, Google, AWS and, of course, Mozilla.

Just a few months after joining the Rust Foundation, Google announced that it was adding language support to Android in an effort to fix memory security bugs.

“The Android operating system uses Java extensively, effectively protecting large parts of the Android platform from memory bugs. Unfortunately, for the lower layers of the operating system, Java and Kotlin are not an option” , explained Google.

“Rust provides memory safety guarantees using a combination of compile-time checks to enforce object lifetime/ownership and run-time checks to ensure that memory accesses are valid .”

(Photo by Thomas Kinto on Unsplash)

Do you want to rethink your digital transformation strategy? Learn more about Digital Transformation Week taking place May 11-12, 2022 and discover key strategies to make your digital efforts a success.

Check out other upcoming TechForge enterprise technology events and webinars here.

Keywords: coding, cybersecurity, development, hacking, language, programming, rust, rust language, security, software, vulnerability

]]>
How to Change Directory in Command Prompt in Windows 11/10 2022 https://livelinkdirectory.com/how-to-change-directory-in-command-prompt-in-windows-11-10-2022/ Sat, 15 Jan 2022 23:15:49 +0000 https://livelinkdirectory.com/how-to-change-directory-in-command-prompt-in-windows-11-10-2022/ This tutorial is about changing directories in command prompt on Windows 11/10. We will do our best for you to understand this guide. I hope you will like this blog How to Change Directory in Command Prompt in Windows 11/10. If your answer is yes, please share after reading this. Check how to change directory […]]]>

This tutorial is about changing directories in command prompt on Windows 11/10. We will do our best for you to understand this guide. I hope you will like this blog How to Change Directory in Command Prompt in Windows 11/10. If your answer is yes, please share after reading this.

Check how to change directory in command prompt in Windows 11/10

The command prompt, often known as cmd.exe, is a Windows operating system command line interpreter that has been used since the DOS days of Microsoft operating systems. Available as an alternative to the Windows GUI, the Command Prompt offers much more flexibility and functionality for the common Windows user than the standard GUI. However, before you can do anything with the Command Prompt, you must first understand how to modify the folders within it. We have discussed some of the easiest ways to update your Command Prompt directory in Windows 10/11 in this article.

Change command prompt directory with cd command

The cd command, short for Change Directory, allows you to move from one directory (folder) to another transparently.

Just type ‘cd’ at the command prompt and press Go in. From there, you’ll instantly be taken to the top of your command prompt directory. As you will see on the command prompt screen, you will be redirected to the Windows root directory “VS:” to drive.

To access a particular directory, simply enter CD followed by the directory name. For example, we went to downloads directory located in the root directory of our Windows 10 here.

For multi-word directories you may need to enclose the name in quotes, e.g. cd “onenote notebook” – a tip here, you can start typing a directory name then press the button tongue and Windows will fill in the name for you. If you have multiple directories with similar names (e.g. Files 1, Files 2, Files 3, etc.), hold down the key. tongue and Windows will cycle through the possible matches.

Alternatively, instead of going directly to the root directory, you can also go back to the previous folder by adding .. after CD order. So go to your command prompt, type CD.., and hit Go in, as we did in our Windows 11.

Change drive at command prompt

If, on the contrary, you want to change the directory entirely, you will have to type the name of the drive, followed by :. So if you are in the “VS:” are driving at the moment and would like to move into your “D:” drive, just write “D:” at the command prompt and press the button Go in.

Another thing to note is that the Command Prompt is not case sensitive, which means it treats upper and lower case letters the same. So it doesn’t matter if you type “D:” or “d:”: the command prompt will interpret them as identical.

Another command that deserves special mention is the phone book order. Write it down phone book at the command prompt and you will see a list of files and folders in the main directory.

Now if you want to access a specific directory from here, just use the CD command above, along with the directory name, as we did earlier.

Change directory in CMD by dragging folder

You can also use the GUI with the command prompt here. Write CD at the command prompt, drag the folder you want to move into Terminal and press Go in.

The command prompt will switch directly to the desired folder.

Final Words: How to Change Directories in Command Prompt in Windows 11/10

Hope you understand this article How to Change Directory in Command Prompt in Windows 11/10, if your answer is no, you can ask anything via the contact forum section linked to this article. And if your answer is yes, share this article with your family and friends.

]]>
WOYM: Useful Old Town Directories for Tracking Family History in Roanoke (copy) | Z-non-digital https://livelinkdirectory.com/woym-useful-old-town-directories-for-tracking-family-history-in-roanoke-copy-z-non-digital/ Wed, 12 Jan 2022 05:00:00 +0000 https://livelinkdirectory.com/woym-useful-old-town-directories-for-tracking-family-history-in-roanoke-copy-z-non-digital/ What did they do with the old house Why did they tear it down? – Dean Webb and Mitchell Jayne The answers to these harrowing bluegrass ballad-style questions are often hard to come by. Research can be instructive even so. Q: I’m trying to locate my family’s home in Roanoke in the early 1900s. I […]]]>

What did they do with the old house

Why did they tear it down?

– Dean Webb and Mitchell Jayne

The answers to these harrowing bluegrass ballad-style questions are often hard to come by. Research can be instructive even so.

Q: I’m trying to locate my family’s home in Roanoke in the early 1900s. I have a letter dated 1914 written to my grandfather at 1326 Third Ave. NW A later address I found was 1326 Loudon Ave. NW Was there a change in street names? This Loudon Avenue address now appears to be a vacant lot. What more do we know?

A. The house at 1326 Loudon was occupied by Taylor Wilson Epling, his wife Annie Beamer Epling and their three children Irene, Etta and William from 1912 to 1919, according to municipal directories for those years. Apparently the family shared residence with LA Trout in 1916 and 1917.

People also read …

Trout was not listed at 1326 the last two years the Eplings lived there.

The Eplings were the reader’s maternal grandparents. Irène, the eldest of the three children, was his mother. Grandmother Annie died in 1916 of one of the era’s deadly scourges, tuberculosis, Loretta Manning said.

Annie Epling’s death was likely to have led to shared living conditions for the next two years. TW Epling was a conductor for the Norfolk & Western Railroad, a position not known for its particularly generous pay. Left with children aged 11, 7 and 6, supporting the family must certainly have been difficult on many levels for a widower.

Regarding questions about the discrepancy in street names, Third Avenue’s name was changed to Loudon sometime before 1911, the last year J.S. Raikes lived there before the Eplings moved in.

City directories of this era listed in their street guides the current and former street names for the thoroughfares for which the dueling lists applied.

This explains the Third Avenue address on the aforementioned 1914 correspondence to the Epling residence in Loudon. The use of old street names by long-time residents of a locality is not uncommon. For example, many Roanokers still knew First Street as Henry Street long after that name had changed.

When the Eplings moved in 1920 (the granddaughter believes the next residence was on Orange Avenue; the writing of this chapter of family history is left for another day), their successor in 1326 was Walter Lee Linkous and his wife Beatrice, who had no children.

Lorretta Manning’s personal family research shows links to the Linkous family. The Eplings and Linkous have deep roots in the New River Valley. That aside, the relationship with WL Linkous is uncertain and if it needs to be confirmed, now is not the time. Either way, Loretta Manning leaves open the possibility that 1326 changing hands started with a family connection.

Another potential connection is the railway. Linkous was listed in the 1920 yearbook as a conductor, as was TW Epling.

Evidence suggests that Walter and Beatrice Linkous experienced less than marital bliss after moving to Loudon Avenue.

On August 23, 1924, a transaction listed in detailed city deed maps 1326 was signed to W. L. Linkous (“beneficiary”) by grantor Beatrice Linkous. The property on the city’s land book for that year was listed on line 9239 and was described as having 50 feet of frontage and totaling 6,500 square feet of real estate.

The next legal proceeding we find involving the Linkous is covered by an Office of Vital Statistics and Board of Health document dated December 21, 1927, granting plaintiff Walter Linkous a divorce from Beatrice after 14 years. The split was uncontested because the defendant was a “fugitive from justice”.

The property remained with Walter Linkous until August 28, 1945, when it was granted to Henry Wiseman.

It is unclear what the ultimate lot of 1326 was. On the deed card the lot was noted 1324 with an anticipation 1326 crossed out in ink by hand. During the residence of the Eplys, the house was flanked by 1324 and 1328. The current GIS tax map of the town shows three houses beginning with 1330 Loudon at the corner of 14th Street then going east to 1328 and then 1324. The next lot east of 1324 is vacant.

This arrangement suggests a previous subdivision in which 1326 was demolished in order to enlarge 1328 or more likely 1324 or both.

That’s for another chapter waiting for a writer.

If you’re wondering about something, call “What do you think?” at 777-6476 or email whatsonyourmind@roanoke.com. Don’t forget to provide your full name (and correct spelling if over the phone) and your hometown.

]]>