Cybersecurity has definitely been in the headlines lately because both businesses and government agencies have been hacked and valuable data has been stolen about everyone from employees and politicians to consumers. But big businesses, in particular, are under a greater threat from cyber attacks, and with more people sharing a lot of information about themselves online and with the businesses that they make purchases from, companies need to do whatever they can to keep their information secure.

The Importance of Cybersecurity in the World of Business

Cybersecurity has always been an important topic for all types of businesses. This is why networks, such as an MPLS network, needs to have the right security in place. And this is why businesses make it a point to hire only the very best IT teams, such as Masergy, who know exactly how to set up and create a secure network. Without the right security products and protocols in place, hackers can more easily attack business networks and steal a lot of valuable information that can put both the business and its consumers at risk.

The New Cyber Threats That Businesses Are Facing

These days, the cyber threats seem to be more intense than ever, so businesses need to be more diligent when it comes to securing their data at all times. For example, companies of all sizes and from all industries now face threats that include machine-to-machine attacks, headless worms, the jailbreaking of cloud servers, two-faced malware, and ghostware that hackers can use to actually conceal their attacks so you don’t even see them coming.

Some of the Big Businesses That Have Been Affected

As of the early part of 2015, there were already several big businesses that had been the victims of cyber attacks. These companies were from a variety of industries, and they included Target, Michaels, Community Health Systems, JPMorgan Chase, Home Depot, Staples, Sony Pictures, Anthem, and Primera Blue Cross. When these cyber attacks happened, they made headlines because a lot of data was breached and a lot of consumers’ personal information was made vulnerable.

What You Can Do

Every business should have a cyber security strategy in place. This includes using high quality anti-virus software and educating employees on what they shouldn’t be clicking on when they use the Internet while working. Unknown links or suspicious attachments should never be clicked on and downloaded, even if they’re from someone you know. And make it a point to keep all software, operating systems, and apps up-to-date to have the latest patches and security measures.

If you own a business, you need to take steps to secure yourself from the threat of a variety of cyber attacks. The bigger you are and the more data that you have stored on your network, the more important it will be to protect yourself. Therefore, make it a point to learn not only about the threats that you have to watch out for, but also the steps that you can take to always remain in control and prevent attacks from happening in the first place.

Captain Kirk:  According to him, there’s a creature of some sort down here, a humanoid.
Mr. Spock:  Lieutenant Uhura communicated that information. I ordered re-confirmation on our sensors. They indicate no living creature on this planet. I suggest, Captain, that you’ve been lied to.
Lazarus: Captain, you yourself said there were no other explanations. Why do you give credence to this man?
Mr. Spock:   I fail to comprehend your indignation, sir. I’ve simply made the logical deduction that you are a liar.

Star Trek The Alternative Factor 1967

Just two days ago we posted on the appearance of the FreeStacy Movement in the pages and website of USA today (Alexa ranking is 316 worldwide and 70 in the US with 116,407 sites linking in.)

I daresay there might be a few people around the country who will be hearing about #freestacy and Robert Stacy McCain for the first time today. That’s what happens when one of the top 70 websites in the country writes about it.

So congratulations to Twitter, Anita Sarkeesian and company. Your new Trust and Safety council continues to get more and more national and even international fame.

48 hours later just a few hours before my plans to take DaWife to Maine resulted not in me outside of Knight’s quilt shop in a rocking chair reading the collected CS Lewis as my wife shopped but at a rest stop full of syringes on the ground outside of Chelmsford watching assorted tractor trailers and waiting for AAA to tow us home the CEO of Twitter was gracing the today show saying this

The key exchange being this:

Matt Lauer: Let me ask you point blank, does twitter censor the comments of its users, does it hide what it would consider inflammatory comments whether they be social or political?
Jack Dorsey: Absolutely not,

Given that the CEO has publicly said this on a national TV show I went back to tweetdeck to check on Robert Stacy McCain to see if his account has been restored.

jack is a liar

It has not been.

Now I suppose one can try and parse that statement claiming that as Robert Stacy McCain has been suspended he technically is no longer a user so a “user” is no longer being censored.

But given the evidence I’m with Spock the logical deduction is he is a liar and not just a liar but a liar willing to lie to a national audience with a straight face.

I’m surprised he’s not running for office.

Update: A question for Matt Lauer. Jack Dorsey lied to your face and to your audience on national TV. What will you do about it?

I’m back trying to get that elusive $61 a day for DaTipJar.

I’d like to think we do good work here If you’d like to help us keep up the pace please consider hitting DaTipJar

Olimometer 2.52

Please consider Subscribing. We are currently 116.3 subscribers at $10 a month to make our goal every day without further solicitation but the numbers are even more interesting:

If less than 1/3 of 1% of our February readers this month subscribed at $10 a month we’d have the 114.5 subscribers needed to our annual goal all year without solicitation.

If less than 2/3 of 1% did, I’d be completely out of debt and able to attend CPAC

If a full 1% of our February readers subscribed at $10 a month I could afford to travel across the country covering the presidential race this year in person for a full month.

Plus of course all subscribers get my weekly podcast emailed directly to you before it goes up anywhere else.

Choose a Subscription level

Via Elder of Ziyon let me tell you about a company called Asal technologies

“We have a window of opportunity to demonstrate our skills,” said Murad Tahboub, CEO of Asal Technologies, a Palestinian outsourcing company that works with Comply and a handful of other Israeli-based companies. “The more people know about us … the more comfortable they will be in doing business with us.” This is easier said than done. Comply’s office in Hod Hasharon is only about 20 miles (30 kilometers) from Asal Technologies in the West Bank city of Ramallah – but they are worlds apart.

and when it comes down to outsourcing code for Israeli companies there is a real advantage to going local it when not surrounded


In the past three years, however, some have turned to Palestinian engineers and programmers. They are cheaper, ambitious, work in the same time zone, and – surprisingly to many Israelis – are similar to them.

“The cultural gap is much smaller than we would think,” said Gai Anbar, chief executive of Comply, an Israeli start-up in this central Israeli town that develops software for global pharmaceutical companies like Merck and Teva.


Well of course it is, you live in the same area, generally speak the same language and have many of the same concerns. If you check out their web site and twitter feed it looks like any other tech company, but the most important page is the careers page:

Client project:A large international software company is building new products and technologies and is seeking senior and junior software engineers to join an outsourcing project at ASAL Technologies.

The details:

B.Sc. in computer science, software/computer engineering, or related disciplines.
Strong knowledge in core computer science areas.
Solid object-oriented programming skills and OO design patterns.
Strong theory/algorithms and very good understanding on how to apply advanced knowledge to solve real problems.
Hands-on experience in agile software development, mobile applications, and multiple release cycles.
Strong analytical and organizational skills.
Methodical approaches to solving technical challenges with high attention to detail and data accuracy.
Highly motivated and self-reliant individual with true willingness to learn and work as part of a team.
Strong communication skills (oral and written) with the ability to act proactively.
Extra credit: Experience with mobile application development, cloud services, web scripting languages, Android, and Microsoft platforms/technologies.
Experience with mobile personal assistants is a plus.

The kicker, these jobs are located in Ramallah/Rawabi and the West Bank

Of all the stories of the middle east I suspect this is the one which is of the greatest threat to Hamas & the PA, first of all it destroys the false narrative out there:

Do you have internet?
Yes. We do have internet and electricity. Over the past 60 years, the West Bank had not sustained any outages due to political reasons. Currently ASAL Technologies has two fiber optic cables from two different ISPs to ensure 24/7 internet connectivity. And short term plans are to move the headquarters of ASAL Technologies to Rawabi -the first Palestinian smart city- where the infrastructure of the whole city has been optimized to meet international standards.

It’s an odd question to ask a software company, if they didn’t have internet they couldn’t operate now could they?

But how can you do business amid the violence and oppression?

Does the political situation affect your work?
No. Though it is hard to visualize if one hasn’t visited Palestine, the reality is that the political situation does not affect our ability to conduct business as usual with all of our clients. And to ensure that our employees can always access their workplace, we opened up a new branch in north of Palestine, and future plans are to open up yet another branch in the south.

You mean to say the evil jooes aren’t stopping you from making your business successful? Well put me in the laundry and pre-soak me 15 minutes!

All of these shatters the careful helpless meme built up concerning Israel. That’s bad for the PA, but the real threat to them is this:

If you have a class of Palestinians unshackled from the “death to Jews” mentality and furthermore not dependent on either terror dollars from Iran or handouts from the west for a living the entire dynamic changes.

I’ve said before that there is no limits to what the Arabs can achieve if they abandon their “death to the Jews” mantra and concentrate on making a better life where they are, these guys have the  potential to prove it.

I suspect ISIS, Hamas, Hezbollah, Islamic Jihad et/al  doesn’t approve they’d rather teach kids to stab jews. and as for the BDS movement it will have them going Kryten


The only pay I get for this work comes from you. My goal for 2015 is $22,000 and to date we’re only at $4400

Given that fact I would I ask you to please consider hitting DaTipJar.

Olimometer 2.52

That gets all the bills paid. Consider Subscribing 100 Subscribers at $20 a month will get the job done and then some.

Choose a Subscription level

Additionally our subscribers get our podcast emailed directly to them before it show up anywhere else.

I know you can get the MSM for nothing, but that’s pretty much what most of them are worth.

Moriarty: I got into the Tower of London; you think I can’t worm my way into twelve hotel rooms?

Sherlock:  The Reichenbach Fall 2012

11th Doctor: The security is absolute.
Clara: It’s never about the security, it’s about the people.

Doctor Who  The Bells of St. John 2013

The plot final episode of the second season of the British series Sherlock revolves around James Moriarty’s determination to destroy Sherlock Holmes, who he refers to as “Sir Boast a Lot” in a fairy tale, however the preface to this plan involves his breaking into three of the most secure places in England, namely the Bank of England, the Tower of London and Pentonville Prison at the exact same time. This produces a subplot concerning the method he used to do so after he fails to take anything in the breakins and is furthermore acquitted in seven minutes :

Sherlock: You’ll never need to take anything ever again.
Moriarty:JIM: Very good. Because …?
Sherlock: Because nothing … nothing in the Bank of England, the Tower of London or Pentonville Prison could possibly match the value of the key that could get you into all three.
Moriarty: I can open any door anywhere with a few tiny lines of computer code. No such thing as a private bank account now – they’re all mine. No such thing as secrecy – I own secrecy. Nuclear codes – I could blow up NATO in alphabetical order. In a world with locked rooms, the man with the key is king; and honey, you should see me in a crown.
Sherlock: You were advertising all the way through the trial. You were showing the world what you can do.
Moriarty:: And you were helping. Big client list: rogue governments, intelligence communities … terrorist cells. They all want me. Suddenly, I’m Mr Sex.

This is an excellent description of how the world views Anonymous who seemingly is able to hack governments, banks, newspapers, etc etc etc. Somehow this little band of genius have the world by the throat if they want it.

An that brings us to this story:


A jury has found former Tribune Media employee and social media news maven Matthew Keys guilty of three computer fraud felonies related to a 2010 defacement of the Los Angeles Times website by a member of the Anonymous hacking group.
On its second day of deliberation, a jury in U.S. District Court in Sacramento this afternoon found Keys guilty of all three counts levied by prosecutors, who first indicted Keys in 2013. He was fired from his position as deputy social media editor at Reuters shortly after his indictment.
Keys shared logon credentials of the Tribune company’s content management system, then also used by the L.A. Times, with an Anonymous hacker, along with the instruction to “go f— some s— up!”


and the lesson it teaches about the hacking group. A lesson that even Sherlock didn’t get to the frustration of Moriarty:

Moriarty:: No, no, no, no, no, this is too easy. This is too easy. There is no key, DOOFUS! Those digits are meaningless. They’re utterly meaningless. You don’t really think a couple of lines of computer code are gonna crash the world around our ears? I’m disappointed. I’m disappointed in you, ordinary Sherlock.
Sherlock: But the rhythm …
Moriarty:: “Partita number one.” Thank you, Johann Sebastian Bach.
Sherlock: But then how did ...
Moriarty:: (speaking over him): Then how did I break into the Bank, to the Tower, to the Prison? Daylight robbery. All it takes is some willing participants. I knew you’d fall for it. That’s your weakness – you always want everything to be clever.

You see Anonymous WANTS you to think they are each Jim Moriarty with the intellect of a Steve Jobs thrown in when they don’t have to be. They’re just good at finding angry or careless idiots. All they need to hack someone are one of three things.

1. A person with a very weak password or a big mouth

2. Somebody pissed off enough to give the a login of a system

3. A system with a lazy administrator.

This puts an exclamation points on the #1 rule of security. DON’T GIVE YOUR PASSWORDS OUT OR GIVE ACCESS TO THEM OUT TO ANYONE!

Now because I don’t have my own server I’m dependent on Go Daddy to keep my logon password safe, but If I’m ever hacked it’s going to be because of some careless ass at GoDaddy or Twitter or Amazon, not because these hackers are a bunch of super villains.


The only pay I get for this work comes from you. My goal for 2015 is $22,000.

Given that fact and the discovery that the repairs needed for my car that failed inspection will run between $500-$1000 I would I ask you to please consider hitting DaTipJar.

Olimometer 2.52

That gets all the bills paid. Consider Subscribing 100 Subscribers at $20 a month will get the job done and then some.

Choose a Subscription level

Additionally our subscribers get our podcast emailed directly to them before it show up anywhere else.

I know you can get the MSM for nothing, but that’s pretty much what most of them are worth.

Sheldon: Biologically speaking, Howard is perfectly justified in seeking out the optimum mate for the propagation of his genetic line.

Howard: Thank you, Sheldon.

Sheldon: Now, whether that propagation is in the interest of humanity is, of course, an entirely different question.

The Big Bang Theory The Vengeance Formulation 2010

Looking at Twitter Friday Morning I see that it’s necessary to repeat some basic facts of the internet for the benefit of young people who may not know them. Consider this a public service to any person who uses the net.

1.  If you choose to enter the public debate, people will debate you.

It never ceases to amaze me is the expectation that one can enter public debate on the net and expect to not have to defend one’s positions against people who disagree with you.  If you are going to make a public debate on a subject being discussed be prepared to have folks intelligent or not, disagree.

2.  Whatever you say on the internet is inherently public.

Even if you aren’t debating the rule applies.  No matter what you do or say or chat.  If it is on the net on a blog, in a comment, on a forum or in a chat it is public.  Even a “private” post is only as private as the least discreet person you are dealing with.

3.  Whatever you say on the internet is forever.

It takes less than a second to screen capture something on the net.  Once you’ve said something or done something on the net one must assume that it will be there forever.

4.  The default setting of the net is “traceable”

It takes an effort to be truly anonymous, you have to not only mask your IP but if you are having conversations etc you have to mask your speech patterns, for example I use the word “Yet” a lot in writing so if I wanted to comment on something under a different name a person looking to find me could use a program to search that pattern.

5.  The only requirement for finding something “hidden” on the net, is patience.

If a person has the desire to find some information that was placed on the net and is willing to spend weeks or months doing so, they will invariably find what they are looking for if it exists.

6.  Reporters search for information for a living.

If you want to hide information the person you would fear the most is a reporter.  The job of a reporter is to find information that people want to hide and unless a reporter deliberately avoids looking for said info (read MSM concerning Liberals) they will find it.

7.  Nothing is more dangerous than a pre-internet reporter with net knowledge

There are four types of reporters two of which are dying out:

1.  Hard working reporters
2.  Lazy reporters
3.  Old pre-internet reporters who are not net savvy
4.  Old pre-internet era reporters who have become net savvy.

Of the four the most dangerous to a person hiding information is the pre-internet era reporter who is net savvy.  Such a reporter is used to doing research in the old-fashioned way, going to locations, questioning people, locating hard to find articles and books physically and then reading through them,  looking for stray documents that only exist on paper.

To that person used to the physical effort of the former,  hours or days of web searches is a walk in the park.

8.  Beware of obsessive enemies online:

There have always been crazy obsessive people out there, but in the old pre-net days their ability to cause trouble was limited to their driving range, with the net such a person is able, if they want, to make trouble to literally watch your every move for a mistake and pounce when you make one.

Now while all these rules are widely applicable to anyone they all lead to a rather specific conclusion:

9.  Don’t try to mess with or out Crazy Robert Stacy McCain.

What you have here is an obsessive, web savvy old school reporter of 30 years experience, intimately acquainted with libel law,  with a large following who knows how to search the web, recognize patterns and find things.  Furthermore because of his large following among other web savvy people if you choose to mess with him there are literally hundreds of people who will happily supply him with said info if they know it exists or point him in the right direction.

And if that wasn’t bad enough he has the patience to hold said info and release it in a snappy entertaining style that increases the likelihood that people will read it maximizing its effect.

The first amendment gives you the right to free speech, but it doesn’t protect you from the consequences of speech nor does your first amendment said right of another.

So if, for example you are Nicholas Edwin “Sarah” Nyberg and choose you make a public argument concerning say #gamergate which is a topic of current discussion and you react to biting critique from Robert Stacy McCain by say, aiding in his temporary suspension from twitter (a forum he uses to augment his readership and thus his income) it is perfectly reasonable to expect that if one said something in a chat room 10 years earlier that might be at best highly embarrassing or at worst legally actionable that Mr. McCain would not only discover it but tweet it out to his nearly 90,000 followers with screen shots and snark.

One might further expect that if you are someone on twitter like say @Auragasmic who chooses to defend Nyberg or believe his assertions that one might face creative embarrassment that will be retweeted to Mr. McCain’s followers or cause the promotion of slightly odd but devastating Youtube videos that might gather 43,000 views or more be followed up by a larger piece that says something like this:

A shocking new video released this week has brought new attention to claims of pedophilia made against a longtime critic of the #GamerGate movement. The video quotes Internet chat logs attributed to Sarah Nyberg expressing sexual interest in preteen girls

and perhaps get the attention of nationally known reporters with an international platform and

The story is currently working its way through Breitbart’s legal process. I hope to be able to share it with you all soon.

Bottom Line:  Going after Robert Stacy McCain is like poking a wolverine with a stick, you have a right to do it, but it’s unlikely to end well for you.

The only pay I get for this work comes from you. If you think this is of value I ask you to kick in and help me reach my monthly goal $1834 a month or Twenty Two grand a year.

I’d appreciate it if you would hit DaTipJar

Olimometer 2.52

That gets all the bills paid. Consider Subscribing 100 Subscribers at $20 a month will get the job done and then some.

Choose a Subscription level

Additionally our subscribers get our podcast emailed directly to them before it show up anywhere else.

I know you can get the MSM for nothing, but that’s pretty much what they’re good for.

All a woman needs if she want to cheat on her husband is to go to a bar and look at a man

Tim Imholt

At Gizmodo using data analysis discovered something that should have been obvious to any person familiar with human nature

Overall, the picture is grim indeed. Out of 5.5 million female accounts, roughly zero percent had ever shown any kind of activity at all, after the day they were created.

The men’s accounts tell a story of lively engagement with the site, with over 20 million men hopefully looking at their inboxes, and over 10 million of them initiating chats. The women’s accounts show so little activity that they might as well not be there.

The key was the data the user could not see.

Ashley Madison employees did a pretty decent job making their millions of women’s accounts look alive. They left the data in these inactive accounts visible to men, showing nicknames, pictures, sexy comments. But when it came to data that was only visible on to company admins, they got sloppy. The women’s personal email addresses and IP addresses showed marked signs of fakery. And as for the women’s user activity, the fundamental sign of life online? Ashley Madison employees didn’t even bother faking that at all.

This is something any person who has dated or tried to date knows instinctively but our TV culture tries to teach us otherwise:

An awful lot of advertising dollars are dependent on convincing men that buying a particular product or doing a particular show will get you in bed with the “hot girl.” Movie after movie is sold on the premise of a sex with a hot girl for the loser guy (Ted) the fat guy (The King of Queens) or the Nerd Guy (The Big Bang Theory) having Sex with the smoking hot girl.

Do this, watch this, act like this and you will have a lifestyle where you will be having sex with hot women.

Let me explain reality, it’s something most guys know, but deny:

Unless you are in incredible shape, have a lot of money, are famous, are powerful, or are in a position that allows you to confer money fame or power on someone odds are not going to have sex with the hot chick, you are not going to get a date with the hot chick and there is an excellent chance you will never ever be noticed by the hot chick unless the hot chick is dancing around a pole and you are sticking dollar bills in her g-string.

Now as I pointed out before the “hot girl” the 10 or the 9.99 who is on the far side of the bell curve on beauty might not be a 10 or a 9.99 on the “good wife” or “caring person” or “good companion” scale but any person on the Ashley Madison site was not looking for those things.  They were looking for sex because for whatever reason the sex they were (or were not) having in their marriage was, in their minds insufficient for their needs.

They went to Ashley Madison because they actually fell for the cultural meme that sold them on the idea that there was, despite all their personal experience , a supply of women who were looking to cheat on their husbands and needed a web site to find a man to do it with.

That they fell for such an obvious falsehood displays the truth that Samuel Clements one stated:

Of the delights of this world, man cares most for sexual intercourse. He will go to any length for it-risk fortune, character, reputation, life itself

He left out one fact.  Man will convince himself of anything if it justifies a course of action that they believe will lead to sex.


I have yet to be replaced by a Robot so the only way I can keep doing this full time is if my pay comes from you. My annual goal is Twenty Two grand which will give me a nominal living doing this.

For a Donald Trump the 22K that would cover my expenses for the and the extra $10K that would pay for the roof, car, floor kitchen and bathroom repairs that I had to put on plastic would be nothing and if my traffic was the size of a Drudge getting enough people to kick in to cover those bills would likely not be an issue.

But I have to take things as they are so if you like what you see here including my paid writers like Tim Imholt, Fausta Wertz, Pat Austin et/al and have a little extra you can spare.  I’d appreciate it if you would hit DaTipJar

Olimometer 2.52

That gets all the bills paid. If I can get to Forty Thousand I can afford to travel outside of New England and/or hire more blogger to help me get it done.

Consider Subscribing 100 Subscribers at $20 a month will get the job done and then some.

Choose a Subscription level

Additionally our subscribers get our podcast emailed directly to them before it show up anywhere else.

If you could kick in I’d really appreciate it.



Fletcher: Your Honor, I object!
Judge Stevens: And why is that, Mr. Reid?
Fletcher: Because it’s devastating to my case.

Liar Liar 1997

The Hillary Clinton campaign is not very happy with Judicial Watch: (emphasis in original)


No, because you have to remember Judicial Watch is a partisan group that has been suing Democrats, me in particular, for twenty years. Anything that they can sue over to create partisan advantage, they do. The facts are very clear here. I did turn over all work-related e-mails in an effort to help the State Department make sure that their records were complete. And those are the facts. Now that doesn’t mean I will ever convince these partisans who are, you know, trying to make all sorts of allegations. But I think the American people understand that.


Alas poor Hillary that’s her whole problem, the American people understand this scandal completely:


The American people, because have friends or family either have worked in government or know someone who has, understand there are rules about handling government and classified documents.

The American People, because they use email and smart phones on a regular basis, understand you can have more than one email account go to a phone.

The American People, because they use thumb & memory drives that can hold dozens of gigs of data and see them for sale in the checkout lines of any Walmart or Staples,   understand how easy it is to  get a thumb drive for backup

The American People, because they and their children do it themselves with camera cards and thumb drives, understand it only take seconds to give the command to copy even 50,000 emails files  from a folder to an external drive and just minutes for such a copy to complete.

The American People, because they have home printers, understand it takes hours or days to print out 50,000 pages of emails.

The American People, because they search for music, emails and pictures every day, understand the difference between searching a thumb drive vs leaving through 50,000 pages of email.

The American People, because they are not stupid, understand when you finally turn over email servers that the FBI has requested, and it turns out to be as her lawyer put it ” blank”, it’s not a coincidence.


That the rub, many political scandals involve complicated rules and laws that the American people either do not understand or have no interest in understanding that’s why a clever pol with the media behind them can usually get away with things.

This scandal however involves things that most Americans work with every day.  They don’t need it explained to them, which is why when the American people see Hillary lawyering up or try to explain away this scandal, they understand she is lying to their faces.

Democrat operatives understand this too, that’s why they are, as the Hill put it in in near panic mode:

“I’m not sure they completely understand the credibility they are losing, by the second,” said one Democratic strategist, who spoke on the condition of anonymity. “At some point this goes from being something you can rationalize away to something that becomes political cancer. And we are getting pretty close to the cancer stage, because this is starting to get ridiculous.”

That’s the problem for the Democrats, they are losing credibility because the American People understand.



Update:   The American people may not understand the intricacies of 18 USC 1924

For purposes of 18 USC 1924, that’s irrelevant; the server was put in place by Hillary Clinton, owned by her, and located in her house. If any classified material went through it, Hillary Clinton is as legally responsible for retaining it illegally as her aides would have been for transmitting it, and just the retention is a crime. But if Hillary didn’t send or receive it, who did? No wonder Huma’s lawyering up, although she might want to rethink the idea of keeping a former Clinton aide on the team.

but they understand than when you lawyer up, it’s not because things are going well.

Update 2: Something else the American People likely get:

Every security expert I know of has said it’s a virtual certainty the Chinese and Russians both gained access to her server and all her emails. From what I know about their capabilities, I’d agree.

What’s really amazing about that statement is there are people who know and understand this, yet still want her in the White House.

Update 3:  Old Friend NeoNeocon explains my last line from update 2 in answer to my post:

One of those three stated at the outset that Hillary was way too moderate for her and she was a Sanders supporter anyway. Another shrugged and said that Hillary was being framed by Republicans who were always making stuff up about her and were out to get her. I asked her what she would think, however, if the charges turned out to be true, and she answered that everybody does it and it’s no big deal. When I asked her if she worried about national security considerations, she didn’t seem to think that was any big deal or anything unusual. She then explained that she herself has two email addresses, one for work and one for personal use, and sometimes she makes an error and sends something official on her personal email. She was likening Hillary’s actions to her own—just a careless, understandable error. When I pointed out that Hillary had a much higher level of responsibility, she didn’t seem to think so, or if so it just didn’t concern her.

She talked to four people on the subject, and the final tally?

So we have one out of four who even seems to care about the emails or find them the least bit alarming. Not a great record, and I bet it’s representative.

I bet she’s right.  Many of our friends on the left do not want to oppose Hillary.  If you are looking for an excuse to dismiss something you’re going to find it.

Update 4: This is not a bug it’s a feature

By having cleaned the hard disk on which all of the important activity took place, Clinton could well have impeded the FBI’s investigation, and thereby rendered it impossible for the federal government to learn what she has been up to.


Normally I wouldn’t put it this way but right, with a car falling apart, a floor that needs to be torn up and some big debts I’m really in a bind and I’d really appreciate it if you can give me a hand getting out of it.

My goal for 2015 is Twenty Two grand which will give me a nominal living doing this.

Olimometer 2.52

That gets all the bills paid. (including my writers like Fausta)  If I can get to Forty Thousand I can afford to travel outside of New England and/or hire me a blogger to help me get it done.

Consider Subscribing 100 Subscribers at $20 a month will get the job done and then some.

Choose a Subscription level

Additionally our subscribers get our podcast emailed directly to them before it show up anywhere else.

If you could kick in I’d really appreciate it.


I remember back in the 80’s I was talking to a friend who thought I was being an alarmist when I said that the same internet connection that allows a person on the net could be used by someone else to either read or control your home machine.  Well time for me to be an alarmist again.

There is an update to the story concerning that car hack I wrote about a few days

Chrysler said Friday it was recalling roughly 1.4 million vehicles after security researchers exposed a flaw that allowed hackers to kill transmissions remotely.

The recall affects several models of Dodge, Jeep and Chrysler cars.

The company maintained it was conducting the recall “out of an abundance of caution” and not because of any reports that hackers had actually exploited the security defects.

I don’t think people realize just how bad this is and what it’s going to mean consider:

As any person who owns a computer know, systems are constantly being updated to close hacking hole that are discovered. While some are discovered by the companies internal security systems others are discovered after there are actual victims of a vulnerability.

Are manufacturers going to recall cars every time they need to install a security patch?

Furthermore as anyone who has either upgraded or had a system update there is occasion when said update crashes.  And while losing data you need might seem like a matter of life and death due to a software crash, if such said software crash takes place in a moving vehicle it may become an actual matter of life and death for those in said car and those around them.

And such hacks don’t have to come direct from the net, consider as more cars are setup to sync with various devices it’ entirely probable that malicious code on said devices could be designed to migrate to the purpose of

1. Hacking a car’s software

2. using the car’s net interface to notify said hacker of the specific vehicle is hacked.

Can you imagine a ransomeware on a car?  Pay me or pay the dealer who has to re-initialize all the software.  Or even worse.  Your son or daughter is driving and you get an email  pay or their car swerves into traffic.  You’re given a few minutes to approve what are you going to do?

There in one obvious solution.  There is absolutely no reason why an open system of convenience can not be completely independent of any critical systems.  That should be the case, that way any hack would only have the effect of inconvenience.

Personally I’d just as soon keep all of a car’s computers closed systems.

Expect to see a lot more of this.


When I’m not posting here I”m still writing at  Here are two pieces that went up recently:

The first is on Student Debt:

The cost trend is the same and the number of students with debt continues to rise, particularly since the 2008 election. suggests the income-to-debt ratio for buying a house should be no more than 28 percent of your annual income.  How long will it take college students to manage to afford their first house when the average student debt out of college is equal to 50 percent of per capita income?

That’s the iceberg that our national ship is steaming toward. But if your children have not yet reached college age, there are things that can be done.

I have three suggestions to avoid this bomb as a parent but you’ll have to click here to read them.

Meanwhile states are having trouble retaining tech workers:

“Young people always go for the money,” Sowerbutts said. “It happens in the private sector, even in the private sector they tend to stay a few years and go because the driving force is money.  Just not doable.”

There is a reason why engineering is such a good college major to choose.

And money is not the only reason why the young do not find state employment attractive. I spoke to a retired state manager who worked in Massachusetts.

He talked about systems still running Windows 2000 in the second decade of the 21st century, he mentioned patronage hires in management positions who were promoted based on family and political connections, and he mentioned there were people who have different priorities

Both however had a solution to the problem, but again to read it you’ll have to go here.




As a new year dawns and I get a year older it amazes me how much things have changed

I’ve been a gamer for over Thirty Five years  about the same length of time I’ve been a Doctor Who fan and like the time lord whose face has changed many times over that period the term “gamer”  has dramatically changed from my youth.

When I was young a gamer was somebody me or Instapundit who likely played Avalon Hill games like 1776, Diplomacy or perhaps the newly released Squad Leader that took the hobby by storm or was into one of the many Sports Simulation Games APBA or Strat-O-Matic.

As the years passed gaming included people playing role-playing games such as Dungeons & Dragons and other such role players with settings from Middle Earth, to the Old West to Space.

With the dawn of the home computer Geek Gamers were suddenly able to play things like Kingmaker & D & D Modules like Pool of Radiance.

But just as we geeks were thanks to the computer age entering Nerdvarna a funny thing happened with the explosion of the speed of the internet & PC, plus their spread to the general public suddenly gaming was redefined. It was no longer something simply for geeks like myself & my pals, suddenly not only was gaming mainstream with online games such as City of Heroes and Call of Duty playable of gaming system as well as PC’s.

And with Smartphones in the hands of everyone suddenly the majority of the people online playing games are no longer folks like me, they’re people like my wife who might be playing Pogo online or perhaps going to the apple store and buying apps like Slotomania because there is a bigger audience for slots or other electronic versions of casino games than geeks playing Munchkin.

To be sure there is still room for people like me who might sign on to stream to play Civilization 5 with the same gaming crew I once sat at a table with were we were in college and every now and then I managed to get free for a board game like Ra, Seven Wonders or some of the old Classics like 1830.

But when it comes down to it we have gone from being the main target for writers of aps.

That is until the dawn of true virtual reality games, then we’ll rule the roots again, at least for a little while until those gamemakers create a virtual reality Vegas Casino with a simulated Robert De Niro keeping us honest.

I would not be surprised to see that in my lifetime.


I’ve been joking a bit about Celebgate because compared to Rotherham it’s almost not worth talking about however it certainly gets the attention of the low information voter (think Donna Noble before her time with the 10th Doctor).

However in the Daily Mail’s latest piece included a tweet that raises some interesting questions


Now except for the fact she is alive and not made of cloth I couldn’t tell Mary Winstead from a dead muppet but if this statement is correct and her nude photos/videos/whatever on 4chan were “long deleted ” that raises some interesting possibilities

1. The penetration of the iCloud servers have been ongoing for a long time even before she deleted these file and were only revealed when these photos & videos went up. That implies a larger data breach than you think.

2. The penetration of the iCloud servers backups (which would likely contain long deleted files that a person might want back, have been compromised. That would be a colossal data breach meaning all kinds of things you thought safely deleted are in thee guys hands.

3. The engineers at iCloud have been creating some unauthorized backups of files they enjoy such as nude photo/videos/whatever of their favorite celebs like Mary Winstead. That would be fairly easy both to do & to hide and if so the amount of such nude data out there likely dwarfs what’s already been released

4. The hackers download the entire iCloud server and took the time to rebuild said nude/sex photos/videos/whatever.  That means that just about everything that has been on the cloud belongs to them

All of these except for #3  have serious implications for anyone who has ever uploaded any data on remote iCloud servers.

The assumption has been this is all about some geeks wanting to see people like Ms. Winstead, Upton et/al either naked or having sex and one should not underestimate the drive of a geek who desires such a thing.

But what if this is more about a wider data breach, and the leak of these photos was by some idiots in the gang not thinking.  That would basically mean that any data you had on the cloud at any time doesn’t belong to you anymore.

So let me repeat my warning of yesterday concerning the security of your cloud data it’s only as secure as

A  ratio of the most careless employee of the company(s) that maintains the network vs the willingness and ability of the smartest hacker trying to steal it

use it at your own risk.

Closing thought:  If these guys are able to both hack systems & recover lost data like this I see why this Administration got the FBI on the job so quick.  Can’t risk those Lois Lerner emails being found.


Was it only 30 days ago that I was complementing Kate Upton on her discretion and common sense for explaining why she doesn’t do nude shots?:

with social media and the internet and not-so-great blogs and the attention like that, I don’t think that my pictures would be received in the way that I’d want them to be received,” she continued. “That’s why I’ve stayed away from them. I really appreciate those photos and I think those women are beautiful, but I think social media and the Internet has prevented me from putting myself out there like that.

Ms. Upton’s advice on avoiding nudes shoots was spot on, alas her caution didn’t include selfies:

Kate Upton found fame from posing in sexy photos — but after being involved in a celebrity phone hack, there are new nude images the model does not want shared out there. Like Jennifer Lawrence, Upton’s phone was hacked and nude images have leaked, her attorney confirms to Us Weekly.

In fairness Ms. Upton’s error was not so much an error of discretion as it was of ignorance. She obviously doesn’t understand what “the cloud” actually is.

People talk about “the cloud” as if it was some mystical virtual space that doesn’t have a physical existence.  For those of you suffering under this delusion, let me educate you.

All “the cloud” is, is a bunch of computers/servers.  It’s called “The Cloud” because if you tried to sell someone on the idea of backing up phone and PC images to remote computers to save space on your device, questions naturally arise:
Who might have access to that data and how secure it is?

These questions might cause you to think twice about buying.

But if you tell somebody that your data is backed up to “The Cloud” you get the image of those beautiful puffy things in the sky, something that’s ephemeral. How do you hack a cloud?

It’s all marketing and Ms Upton and millions of others fall for it every day.

So for the sake of her and any others who didn’t understand it before let an old tech guy explain the facts of modern life.

#1.  Any device from a phone to a car that

a.  Acts like a computer

b.  Is linked to a network

is for all intensive purposes a computer on a network.

#2.  Any computer on a network connected to the internet is capable of being hacked

#3   The degree of security for data on any such network is governed by:

a.  How secure your password is

b.  The least careful person who you give access to your device

c.  Equipment and/or software  failure

d.  A  ratio of the most careless employee of the company(s) that maintains the network vs the willingness and ability of the smartest hacker trying to steal it

so act accordingly.

This is our modern integrated world of the internet and the cloud. You can rail against them but you ignore these truths at your own risk.

Finally let me give one final bit of non-technical advice:

The single most effective way to keep nude photos of yourself off the net is to not take nude photos of yourself.

No Charge, but hits to DaTipJar are gratefully accepted.

Update: the Lonely Conservative links and notes that this advice is too edgy for Ricky Gervais.


Olimometer 2.52

If you think the coverage and commentary we provide here is worth your support please consider hitting DaTipJar below to meet our annual expenses.

Consider the lineup you get In addition to my own work seven days a week you get John Ruberry (Marathon Pundit)  on Sunday Pat Austin (And so it goes in Shreveport)  on Monday  Tim Imholt on Tuesday,  AP Dillon (Lady Liberty1885) Thursdays, Pastor George Kelly Fridays,   Steve Eggleston on Saturdays with  Baldilocks (Tue & Sat)  and   Fausta  (Wed & Fri) of (Fausta Blog) twice a week.

If that’s not worth $20 a month I’d like to know what is?

Alas Ms. Upton didn’t include Selfies

By Michael Potter

At one stage or another we’ve all indulged in some sort of gaming, whether it be board games or video games. However, only a small portion of us would actually dub ourselves ‘gamers’. Surprisingly though, that hasn’t stopped a dramatic increase in the social gaming world. In fact, in the US alone companies can expect to generate a turnover of one million dollars just via mobile games.

Social gaming is now becoming such an intrinsic part of our lives that many are left wondering why this sudden influx in interest and demand has risen. Industries experts have a ranged viewpoint on the matter and this is reinforced by an article published by MVC which asked experts what their thoughts were on the social gaming movement.

The founder of GamesBrief, Nicholas Lovell, believes that it’s the accessibility and the ease of getting involved with social games that makes them so widely used. Furthermore, Lovell comments on how people don’t need to spend any money up front or do any hard-core research prior to playing social games, a somewhat barrier free entry into the world of gaming.

Following on from this, PopCap Senior Games Designer, David Bishop discussed how the social gaming space is a way of introducing non-gamers to the wonders of gaming. This is done in a friendly, familiar environment thanks to being able to play online with friends and family. Joining in on the debate, Head of Consumer PR at Ladbrokes, one of the leading online gaming websites, had this to say:

“The influence of women in this sphere can scarcely be over-estimated. They are engaging more in new forms of social gaming at a rapid rate and as providers of key betting and gaming products we are always on the look-out for innovative ways to appeal to the female audience. The numbers of women playing are exciting for a brand like ours and our challenge is now to develop the ways to monetise the female social gaming enthusiasm.”

The commentary on bonding and socialising, is what has made social games such as casino ones some of the most popular to get involved with and play. Reaffirming this, BusinessTech report on how casino games and virtual villages are the main contenders in the social gaming market, with thousands of players drawn to them each day. Moreover, the article continues by stating how, due to this enormous increase in demand, gaming companies and casino websites are adapting and tailoring their services to create games to fulfil gamers need.

Whatever it is we love about these games and that keeps us coming back for more, there’s no sign of it decreasing in the near future; for now we’ll remain an avid nation of social gamers

Update DTG:  IMr Potter is not a regular here but this is on a subject I’m interested in and I have a few things to add.

As a long time gamer back in the days when it was all board games the real change here is generational, with a generation that has grown up with PC’s in their home and PC games as the norm this type of gaming has really changed.

Not only do you have more women as listed before but you’ll have friends of mixed sex actually gaming together with it not seeming odd, additionally with the popularity of shows like the Big Bang Theory these type of games have  gone from “geek” to “chic” or perhaps it’s “geek chic”

While there will, in my opinion always been a primarily male component to gaming (basically as an outlet for behavior that is no longer allowed or approved) we will see the integration of these systems to expand the audience and the profitability of these companies.

As for me, well I’ll still be playing my semi weekly board games while my sons and their friends (male & female) enter 21st century gaming together.

Update 2: updated tags

Update 3: updated tags

Kazran:   Are you really a babysitter?
11th Doctor: (shows psychic paper) I think you’ll find I’m universally recognised as a mature and responsible adult.
Kazran: It’s just a lot of wavy lines.
11th Doctor (looking at the paper)  Yeah, it’s shorted out. Finally, a lie too big.

Doctor Who A Christmas Carol 2010

It was just over three years ago , Anthony Weiner, one of the upcoming stars of the Democrat party, was brought down by a twitter scandal.

There were several key moments from the CNN interview to Andrew Breitbart’s impromptu press conference that hurt him, but what really did in the husband of Hillary Clinton’s closest aide was the ability of non-political twitter uses  to understand he was lying:

Rep. Weiner is a man of national prominence, a rising star in the Democratic Party, frequently on TV, a past and likely future candidate for mayor. He knows and is known by thousands of movers, shakers, members of the press and politicians on the city, state and national levels.

Yet, as of yesterday, he was following fewer than 200 others — and, with all those famous folks to choose from, one of the few he followed was Cordova, a 21-year-old college student who lives nearly 3,000 miles away in Bellingham,Wash.

Run that though your head for a second and at the same time remember two important facts about Twitter:

1. If two people follow each other on Twitter, they can send private messages unseen by others.

2. The difference between a direct message, seen by only the recipient, and a public tweet, seen by the world, is a single character.

The biggest problem for Weiner and his defenders on the left is not bloggers from the right. It’s the details of “#weinergate” can be understood by millions of ordinary people in 140 characters or less.

You can’t have “plausible deniability” when even non-political people know your story is BS.

And as of today that’ where the IRS scandal story is.

When Lois Lerner pleaded the 5th before congress many of us assumed that it was to cover up for the administration however while this was a logical conclusion one could make the case that Ms. Lerner was only covering for herself, after all if he was violating law due to her own zeal it would be in her interest to avoid testifying.

However the IRS claims not only that her emails were lost but were not recoverable by professional change the equation.

30 years ago there were enough people who had not worked in a job that involved e-mail or in a college with an e-mail server or worked in a government job where regular backups were a fact of life, likewise recovery software was rare or nonexistent.

Today those jobs are common & recovery applications are downloadable free of charge on the net..

That means everyday ordinary people who have no interest in anything political can grasp that what the IRS is claiming is bogus even if they don’t read The Blaze’s piece by an IT pro explaining how this is simply not feasible 

Several conservative sites talk about this nonsense but that doesn’t matter, conservatives already dislike and distrust this administration, so that’s not cause for worry.  What is significant are pieces like this:

Six weeks after the scandal broke, I chastised House Republicans for cherry-picking evidence and jumping to conclusions. In the same column, I urged the president to be transparent: pave way for investigators to question witnesses under oath and subpoena the White House and his own re-election campaign for related emails and other documents.

If forced to guess, I would say that the IRS and its White House masters are guilty of gross incompetence, but not corruption. I based that only on my personal knowledge of – and respect for – Obama and his team. But I shouldn’t have to guess. More importantly, most Americans don’t have a professional relationship with Obama and his team. Many don’t respect or trust government. They deserve what Obama promised nearly six weeks ago – accountability. They need a thorough investigation conducted by somebody other than demagogic Republicans and White House allies.

Somebody like …. a special prosecutor. Those words are hard for me to type two decades after an innocent land deal I covered in Arkansas turned into the runaway Whitewater investigation.

Nothing has changed. The White House is stonewalling the IRS investigation. The most benign explanation is that Obama’s team is politically expedient and arrogant, which makes them desperate to change the subject, and convinced of their institutional innocence. That’s bad enough. But without a fiercely independent investigation, we shouldn’t assume the explanation is benign.

by Ron Fournier an MSNBC regular and this by GOP critic Doug Mataconis

The reaction strikes me as being fairly reasonable when taken in the context of the investigation. IRS officials from the Commissioner on down had previously told the committees investigating this matter that they had all of Lerner’s emails and that they would be produced as soon as they could be made available. Indeed, that’s an assurance that was made on several points over the course of the past year. A sudden announcement that some unknown portion of these communications have been mysteriously “lost” is obviously going to raise suspicion and even if those suspicions prove to be unfounded, they do raise several legitimate concerns. For example, Federal recordkeeping laws require government agencies such as the IRS to maintain copies of all communications, including electronic communications, for a certain person of time. One part of those laws prohibits official business from being conducted in a manner so as to avoid standard backup and storage systems, which would mean that Lerner should not have been communicating with outside groups about IRS business on her personal computer unless those communications were being backed up along with all other communications. Indeed, politicians at several levels of government and in both parties have gotten into trouble when it was discovered that their staff was using non-government email to communicate about government business. If that’s a common occurrence at the IRS, then it’s a problem that reaches beyond Lois Lerner because it makes it harder for Congress to conduct its necessary oversight functions.

These pieces are both on platforms read by the left and while Mataconis tries to play the incompetence card (not a hard one to play when discussing government)  neither he nor Fournier is willing to pretend the IRS’ story doesn’t smell.   It’s no surprise, there is only one way a liberal news outlet can deal with the problem of this story causing readers to conclude the IRS is lying, ignore it:

What about the missing emails?  Nary a word on the front page. Or the next page. Or the next or the next.  The editorial page has a stern piece about “The Soros Cycle of Endless Cash”—oh, wait, no, it’s not about the left-wing billionaire George Soros. My mistake. What he does with his money is his business. It’s about—can you guess?—yes! The Koch brothers, the men the Times just loves to hate. But about the missing emails in one of the most disgusting political scandals in recent times, the deployment of the IRS with its virtually unlimited powers, against political opponents of the administration? Nothing. Nada. Rien.

The NYT will wait to cover the reaction rather than the story in order to keep their tech savvy readers in the dark and prevent them from asking the obvious questions to the IRS  like these from Sharyl Attkisson:

  • Please provide all documents and emails that refer to the crash from the time that it happened through the IRS’ disclosure to Congress Friday that it had occurred.
  • Please provide the documents that show the computer crash and lost data were appropriately reported to the required entities including any contractor servicing the IRS. If the incident was not reported, please explain why.

all this not withstanding Eric Holder is still Eric Holder & Barack Obama is still Barack Obama so it is unlikely that a special prosecutor will be named, at least not until the Democrats & media decide it is too costly to not name one, but the ability of apolitical people to understand the falsehood being advanced combined with the impossible position the IRS claim puts any liberal not trying to get a show on MSNBC in if asked about this means that like Anthony Weiner while it may take time, perhaps years to finish this investigation the outcome is not in doubt.

Update: Pulled stray redundant word


Olimometer 2.52

This blog exists as a full-time endeavor thanks to your support. The only check I draw to pay for this coverage and all that is done is what you choose to provide.

For a full month I ask a fixed amount $1465.

If you think this coverage and what we do here is worth your support please consider hitting DaTipJar below and help keep the bills paid.

Naturally once our monthly goal is made these solicitations will disappear till the next month but once we get 61 more subscribers  at $20 a month the goal will be covered for a full year and this pitch will disappear until 2015.

Consider the lineup you get for this price, in addition to my own work seven days a week you get John Ruberry (Marathon Pundit)  on Sunday Pat Austin (And so it goes in Shreveport)  on Monday  Tim Imholt on Tuesday,  AP Dillon (Lady Liberty1885) Thursdays, Pastor George Kelly Fridays,   Steve Eggleston on Saturdays with  Baldilocks (Tue & Sat)  and   Fausta  (Wed & Fri) of (Fausta Blog) twice a week.

If that’s not worth $20 a month I’d like to know what is?


Today is Thanksgiving Day and for the first in a very long time is also the first day of Hanukkah  a lot of you reading this are likely spending the morning either cooking or preparing to eat a huge meal.

But later tonight a lot of you are going to be online and tomorrow even more are going to be out for Black Friday looking for deals many of you looking for computers and tablets, not only for yourselves but for older relatives.

Many people, particularly older ones are still fairly computer illiterate and many who have been using computers etc for a while know nothing about how the machines actually work.

More importantly as computes have progressed so has computer fraud.  Every year the fraudsters have become smarter and smarter finding new and ingenious ways to separate people from their personal information and ultimately their money.

I’m not in that business anymore but the folks at Bernard PC are.  The Bossman Bernie told me about a new threat that he’s been dealing with lately and was kind enough to write up this warning for DaTechGuy readers (I intermix my own comments within):

An overseas call center posing as Microsoft has been calling people at their homes, claiming to be Microsoft, and claiming to have knowledge of a virus in your computer.

These calls are a hoax.

As a general rule most spammers don’t expose themselves this way.  It’s  a clever move on their part, nobody is going to think the guy on the phone is a spammer. Bernie continues…

The caller makes it sound urgent, and tries to talk the victims into clicking through some screens that give them access to your computer.

As a person who used to do Tech Support this takes time and effort it’s exactly the type of thing a real tech support person might to.  It lulls the mark into a false sense of security.

They then proceed to open event viewers and other system logs to search for even the most minor errors and then try to convince the victim that they have a serious virus that needs to be addressed immediately.

As soon as those folks who have never seen an event viewer or system lag see those red X’s, “!” points and yellow warning triangles they’ll be convinced that they’re in more trouble than a Thanksgiving Cook who realizes at 10 AM his oven doesn’t work.

It’s at this point, Dear Reader, where they ask for those coveted credit card digits. If these folks call you, we suggest saying “not interested” or nothing at all, and hanging up on them. This is a scam that preys on the lack of knowledge and a fear they help to create in order to con you out of about $100.

What’s the best kind of scam, the type of scam when the person involved doesn’t realize their scammed.  As far as the mark is concerned that $100 to $150 charge is just payment for services rendered.

If you really have a virus, there is not a company in the world that is going to call you to tell you unless you have paid them in advance to monitor such an event. And, Microsoft is not in the antivirus business. Even companies like Symantec and McAfee aren’t going to call you to tell you that you have a virus, and antivirus is what they do.

But that’s not the worst of it. Not only do these fraudsters have your credit card info, info that they can sell or access at any time they wish, they get remote access to your system as they install their “fix” which may harvest all kinds of information from your license keys (that can be resold and mess you up when it becomes a duplicate) to contact lists (than can be used to mark new targets) and of course if you have your tax forms etc  or bank info, they’ve hit the motherload!  All of these things are things valuable commodities on the black market of internet crime.

And if they are REALLY smart then in 6 months or nine months or a year they will call you back, mention their previous call and say this is a follow up and lo and behold when they check that system, the virus were back and they’ll be happy to fix it again for you, for another $150 fee of course.

Think about it, even without selling all that other info with only two victims a day five days a week a scammer can make $75,000 a year with two weeks vacation and weekends off and if he or she has a friendly manor they might even get their victims to recommend them to their friends.  That is the Pièce de résistance.

May I be so bold as to suggest that if you find yourself getting such a call or suspect that you might have your system infected you give my friends at Bernard PC a call at 774-322-6045 and they will take care of you.

Bernard PC

But don’t do it on Thanksgiving day or Black Friday.  Bernard PC is closed both days so those days can be enjoyed.

Some might thing this isn’t a proper post for thanksgiving but if being warned against a scam before it robs you isn’t cause to give thanks, what is?


Olimometer 2.52

Thanksgiving day is here I still need those 9 tip jar hitters at $25 or twelve at $20 means to make “payroll” & mortgage.

Please consider being one of them.

We are offering sponsorships of both the Magnificent Seven & the Magnificent Panel now is an excellent time to jump on board, contact me here for more details

When last we left Tami Erin she was involved in the Hustler Halloween Party

and that involvement has to some degree had the desired effect:  She has passed 6700 twitter followers

tami progress 2

and her website has cracked the top 900,000 mark in Alexa

tami progress

Personally I’d put a twitter button on that web site to increase the number of followers (no charge) but alas the attention has started to wane.  If you do a google search for Tami Erin under news But alas there hasn’t been much in news since that last burst of activity.
tami progress 3
And the news that’s there isn’t good:

Tami Erin, now 39, starred as Pippi when she was just 14, but images from her childhood role as the red-headed character are being used on multiple websites to promote her recent porn flick.

Now, according to TMZ, Columbia Pictures—the studio behind the family-friendly movie—is ordering the images of 14-year-old Erin not be used to promote the X-rated film.

TMZ reports that lawyers for Columbia demanded sites remove the old Pippi pictures, or else the studio would sue.

That’s from Nov 5th and if you look at Ms. Erin’s twitter stream you will see the latest fan tweet is also from Nov 5th.

So already the interest is down and in fact the problem that I mentioned before remains:

Experience, intelligence and chemistry have little or no value. Her only card against other younger women is a 25 year old children’s movie remembered by fewer and fewer people as time goes by. There are already plenty of younger more voluptuous women ready and willing to carry themselves more provocatively than Ms. Erin. It won’t take long for the novelty to fade and then the stray lesbian kiss, topless shot or swing around a pole will not be enough to retain the interest

And therein lies the problem, is there a formula,  an example,  a business model for the almost 40 year old Ms. Erin to follow to establish and maintain a living in her now chosen field? 

Oddly enough there is. Continue reading “Tami Erin & the Magdalene St. Michaels Business Plan Calculated Risk Required (Content warning)”

Doctor Who: All elephants are pink, Nellie is an elephant, therefore Nellie is pink. Logical?

Davros: Perfectly.

Doctor Who: You know what a human would say to that?

Davros: What?

Tyssan: Elephants aren’t pink.

Davros: Humans do not understand logic.

Doctor Who Destiny of the Daleks pt 4 1979


Last week I referenced Earl Anthony quoting Glenn Reynolds quip about a “famous blogger” being like a champion bowler and challenged the readers to tell me to who Earl Anthony was without googling his name.

As a person who used to watch the pro bowling on ABC as a kid (even though it wasn’t candlepin although I watched that too) Earl Anthony was THE man.  The left-handed bowler was one of the most successful men in the history of the pro-bowlers tour making over a million dollars during his career.

So imagine my surprise when I googled him and saw this result in the right hand section of the search:

earl anthonyThat book caught me by surprise, for a second I figured he might have been interested in history until I clicked the link and saw the result at and the write ups therein :

This poorly edited, disorganized autobiography is an unsatisfying amalgam of significant revelations about the rise and fall of the Black Panther Party in the San Francisco Bay Area of the late 1960s and early ’70s and trivial information about the author’s troubles with women and drugs. A graduate of the University of Southern California and a one-time law student, Anthony was the first black middle-class convert to the Panthers’ cause, and was an intimate of Bobby Seale, Huey Newton and Eldridge Cleaver. Copyright 1990 Reed Business Information, Inc.

I’ve heard of sex change operations but I never heard of a race change operation.

One must conclude that either Mr. Anthony’s transformation from black nationalist radical to white champion bowler is the greatest example of the skill of the FBI’s witness protection program or that Earl Anthony the former Black Panther and Earl Anthony the Bowler are two different people.

This is why I’ll always take the Encyclopedia Britannica over a computer generated or crowd edited encyclopedia. A person can pick up things that a machine can’t.

Final thought. There is a feedback link at the bottom of that photo. I don’t remember when Google started putting those photos up but I must conclude there haven’t been a lot of Pro-Bowling fans searching for Mr. Anthony since they started, or at the very least they aren’t very curious.

The Wall Street Journal on its front page on Wednesday contained one of the most useful stories I’ve seen in a while:

“Check out these kitties! :-)” read emails featuring the photo of a Turkish Angora cat with a purple mohawk, sent to nearly two million cubicle dwellers so far. It includes an attachment or link promising more feline photos. Those who click get a surprise: stern warnings from their tech departments.

The Dr. Zaius email is a simulated cyberattack. It is among the ploys companies are using to dupe employees into committing unsafe computing as a way to train them not to be so easily fooled.

With the amount of money involved on the net and the costs of You can’t get too many warnings about hackers and thieves online and his tactics and more companies and organizations are testing their employees in this way what’s really you have companies try to sneak in ala the old movie Sneakers:

PhishMe Inc., the Chantilly, Va., company that created the Dr. Zaius emails and other fake phishing attacks that companies can use for tests, says clients have used its services to teach a lesson to 3.8 million employees.

Ryan Jones, who leads a half-dozen ethical hackers for a Chicago digital-security company, Trustwave Holdings Inc., likes to drop thumb drives and CDs in the bathrooms, driveways and nearby coffee shops of companies that hire him. Often, he will attach the company’s logo, a competitor’s logo or a label that reads “confidential.”

Almost without fail, an employee will find one of the decoys and stick it in a computer. “It starts off as curiosity,” he says. “It is kind of the same reason people watch reality TV: They want to see what else is going on in people’s lives.”

The various tactics employed by the company are fascinating and should be required reading for anyone with a PC or Mac.

Bottom line, when dealing with a PC be as suspicious as a Sicilian.

Olimometer 2.52

6 hours left 4 tip jar hitters of $20 to go for a full paycheck can it be done?

Cat: You’re the ground controller?

Ground Controller: Please State your name and clearance code?

Cat: Reality Sucks

Ground Controller: Your names reality sucks? Ha Ha Ha Ha. One second Mr. Sucks

Red Dwarf 1999

I have made the argument over and over that the only reason to be a Christian in general and a Roman Catholic in particular is because it’s true.  I’ve said if it wasn’t true then we’re just an elk’s club that meets on Sundays.

A person who lives according to beliefs not based in truth and reality is fooling him or her self.  There are words for such belief sets.

Two  are “Fantasy” if you want to be kind and “Delusion” if you don’t.

This came immediately to mind when I saw this story out of Japan.

Kozaki is one of hundreds of thousands of Japanese who have bought Love Plus, a game released on the Nintendo DS in 2009, which is intended to simulate the experience of high-school romance with one of three pre-programmed teen girl characters. For a sizable number of loyal male gamers, it has become something more: a relationship that, if not entirely like dating a real woman, comes close as a source of affection.

“I really do love her,” Kozaki explains, when he and two of his friends meet with me in a coffee shop in Akihabara, the Tokyo neighbourhood at the centre of Japan’s otaku culture. Kozaki fully expects the game to be a lifelong commitment. “If someone were to ask me to stop, I don’t think I could do it,” he says.


IN PERSON – IF INDEED PERSON IS THE RIGHT WORD – Geminoid F can appear strikingly beautiful in a way that doesn’t translate to photos or video. Her hair is smooth and glossy, and falls across her delicately translucent, pale silicone face. As she sits in the chair at Osaka University, she runs through an idling program of random motions. She blinks, fidgets and makes small, distracted movements with her lips. When she turns her head and looks at you with her plastic eyes, the effect is thrilling and unsettling. It feels as if you’re being stared at, a little too intently, by an attractive stranger.

This is cultural suicide on a grand scale. If you have people who are dealing with virtual women who are programed to be Stepford Wives and girlfriends They will have no idea of how to handle actual people with actual feelings and actual needs on their own. One can deny reality as long as you want but sooner or later reality is going to catch up.

Japan is dooming itself to demographic death and here in the US there are plenty of people also dealing with unreality that while not quite at the Japan point are going there.

The future belong to those who show up. At the rate Japan is going they won’t have to worry about being conquered by China, At this rate China will eventually just walk on into to an empty set of Islands.

“Be fruitful and multiply” is better advice they people know.

[thermometer raised=0 target=300 height =200 ]

Well I’m back home after a morning of speaking on Behalf of WQPH Catholic Radio. It’s a new week which means it’s a new thermometer.

It’s a big week in two ways. As the final week of the month getting the paycheck guarantees the Mortgage payment in full, but more importantly if we get the 15 tip jar hitters @ $20 this week it means a full month of paychecks meaning that this system HAS worked.

Can this work to support a blogger? Well we have seven days to find out.

Do to an impending change in some background accounts into I detected an e-mail glitch, one of my accounts was not properly downloading my e-mails to my PC.

Apparently this has been going on since mid November on this particular account, but because I get such a volume of e-mail from so many accounts this remained undetected until some maintenance I finally had time to do tonight brought the problem to light allowing me to repair it.

While much of the missed e-mails were simple information there were three that directly impacted people who did not get responses. Therefore I owe three apologies so let me deliver them publicly now.

To Evan Sayet comedian and author extraordinaire, I’m sorry I didn’t answer your e-mail concerning scheduling because I never saw them, I’m anxious to have you on the show ASAP and will try to schedule you either second or third week of January.

To Dr. Paul Byrne, the same. I didn’t get your response e-mail concerning the scheduling of you and tying things down. As this was the week of my mother’s death I was a tad distracted as well but if I saw the e-mails I would have answered them promptly. Like Evan Sayet I would like to schedule you the 2nd or third week of January.

Finally to Kimberly Kerekes of the Town clerk’s office in Barrington NH.

I’m very embarrassed. You apparently answered my questions from this post promptly but because of my e-mail problem I didn’t see the answers until today over seven weeks later. In addition to updating the base post I’ll also add your answers to this one.

It is grossly unfair to you and the town that said answers did not go up promptly and while this was due to the e-mail bug it’s still my responsibility. I hope this public mea culpa helps make up for it.

Dear Peter “DaTechGuy” Ingemi,

My answers are listed below:

1. Is the record of the voter rolls in Barrington available to be viewed by the public YES

2. Is there a separate record of new registrants and/or same day registrants available? NO, PER Secretary of States Office

3. Did a person come in to obtain said records? YES

4. If so was said person told it would be $300 for said records?NO, the fee would be actually be $379 which is the rate for the current MARKED CHECKLIST, which is based on our current photocopy fee per page, which is $1/page.

4a. If there is such a fee, is that set by the city or state? Is it a standard fee for records? For a marked checklist

the fee is what the Town or City charges for a copy.

5. The GROK article states that such public records are available under state law saying the following:

New Hampshire State law (91-a) allows the citizen to review, examine, or inspect, any public document that is available. They can even take pictures of it, or make their own copies or abstracts as long as the document(s) are on site and it occurs during regular business hours.

5a Is this correct and if so can said person make their own copies without charge? A person may view and takes notes on the marked checklist, but NO there will be no copies made without a charge, PER NH STATE LAW (91-a;IV)

“If a photocopying machine or other device maintained for use by a body or agency is used by the body or agency to copy the public record or document requested, the person requesting the copy may be charged the actual cost of providing the copy, which cost may be collected by the body or agency.”

6. Will said records be available electronically (in PDF format etc) and available either to the public on request or on the Barrington site eventually? An electronic copy will be available upon request after the Supervisors of the Checklist have entered and scanned the checklist and new voters into the statewide database for a fee of $26.50.

7. If I came down to see said records would they be available for viewing? YES

I have answered all your questions to the best of my ability, if you have any further questions please

feel free to contact the New Hampshire Secretary of State at 271-3242.
Kimberly Kerekes

Again my apologies to all three people above. Mea Culpa

I’m sitting at Ken’s Steak House in Framingham right now as they are about to read the verdict in the Casey Anthony Murder Trial, there are people gathered in front of the TV awaiting the jury words (that you already know by now)

However just before people gathered at the set I asked the Bartender if he had heard of this story from the Business Insider

Last year, the U.S. Navy bought 59,000 microchips for use in everything from missiles to transponders and all of them turned out to be counterfeits from China.

Wired reports the chips weren’t only low-quality fakes, they had been made with a “back-door” and could have been remotely shut down at any time.

If left undiscovered the result could have rendered useless U.S. missiles and killed the signal from aircraft that tells everyone whether it’s friend or foe.

He had not.

When the verdict was read (Guilty of lying, not guilty of Murder and Manslaughter there was surprise and disappointment I asked the Matre di how she felt about it. She was both surprised and a bit upset. I then asked her about the China Chip story and she surprised me by knowing about it and having an opinion.

It’s a good sign for the country that she knew, but I wonder how many other people who are outraged about this trial verdict are equally outraged about this issue that has national implications for the safety of our troops and their success in the field?

Perhaps this story from The Conservatory on China buying shares of facebook might shake everyone else out of their complicity…

I get, I really get the idea of subverting communism by injecting capitalistic values that will give people a taste for entrepreneuriship and creative expression. However. This is a clusterfark of an idea, and Zuckerberg’s mommy should sit at the foot of his bed and explain the facts of life to him.

…but I doubt it.

Update: This was a “scheduled” post, that’s why the verdict was unknown at the time of writing.

Got a call from Dan Riehl today while I was tied up, when I called him back he asked about the text he just received from me. That really threw me off since I hadn’t even tried to send him a text since last month when I covered the Union vs Tea Party protests in Boston.

He figured it was a problem with his coverage and I forget it, until I got ANOTHER text from the Lonely conservative telling she was looking forward to my coverage.

That’s when I recalled I got a “text failed” message that day. Apparently today my failed text of the 22nd went out to everyone.

Isn’t technology wonderful?

When my youngest was about 3 he had an annoying habit of crawling out his bedroom window and onto the roof.

We tried taping the windows, locking the windows etc. Nothing worked. Finally we had a window company come it. They brought in a window and set it up in the Kitchen, and said it was “full of wonderful safety features that children wouldn’t be able to circumvent.”

We then called Danny into the room and told him to open and get through the window. It took mere seconds for him to open and get through it. At that the salesman said: “Good luck, I can’t sell you anything.” We eventually just nailed his window shut.

I couldn’t help thinking about that when I read this story:

Last week, the D.C. Board of Elections and Ethics opened a new Internet-based voting system for a weeklong test period, inviting computer experts from all corners to prod its vulnerabilities in the spirit of “give it your best shot.” Well, the hackers gave it their best shot — and midday Friday, the trial period was suspended, with the board citing “usability issues brought to our attention.”

Challenging hackers to hack a system is asking for it. And with millions of dollars of patronage etc at stake do you really believe that people won’t be trying to hack such systems?

Fortunately there is a ready made solution!

memeorandum thread here

Update: Instalanche Thanks again Glenn, and while you are here check out the my latest examiner article, examine the “we don’t censor art” crowd and although you might have heard about Rep John Tierney’s wife pleading guilty of federal tax evasion, you might want to meet his republican opponent in ma-6 Bill Hudak who deserves your support.

Considering how nice Sissy Willis is treating me when I failed I’m frightened to think how nice she would treat me if I actually got that list imported.

Still looking for a way to do that import since the upgrade in typepad for Sissy, if anyone know a key sequence for such an import let me (or her) know ASAP

…particularly since it is my son’s birthday who had such a good experience with apple, so I absolutely love this:

Hey, you know what I like to do sometimes when I’m talking on a telephone? Hold the phone up against my ear. With my hand.

I’ve got an iPhone and it’s great. I’d definitely be interested in the new one, if it actually functioned as advertised. Apple is a great company that also sucks, which might be why it draws in so many suckers. Need somebody to buy your shiny new product that doesn’t work? There’s a sap for that!

Hey I’m a Sicilian what do you expect?

at the final shot of the two towers from this embed at Little Miss Attila’s site. I won’t give the other side the satisfaction, I’m just pissed they haven’t been rebuilt. As a computer guy I did get a real kick out of seeing the old punch cards. There was still a single card reader when I started at Raytheon in 1985.

Nor does the Anchoress links to Burke’s marvelous series (that deserves more attention) cause shock, as a regular reader and as a person who is into history I know the vast contributions that the Church has given civilization.

But this should be required watching for school students everywhere. You can find more here. I suspect it would get more respect from the tea parties than from elsewhere.

Now if they only would release Steve Allen’s Meeting of Minds….

Well not really but it’s kinda funny to see this on the Britanica blog:

Many people may not have heard of ICANN, the organization that oversees the Internet’s top-level domains (TLDs; e.g., .com, .net, .org, .edu, .us), but a decision that they reached will likely affect millions of Web surfers, making it easier for them to identify porn sites from…ummm…non-porn sites. At its conference in Brussels, ICANN’s board gave initial approval for the creation of the .xxx TLD. According to the ICM registry, which backed the bid, there are some 110,000 pre-reservations for the domain–and they expect the first sites to pop up sometime in 2011.

This is actually rather significant in one respect. I talked to a friend of mine from my old HiWired days concerning porn and virus’. He said that 19 times out of 20 the virus’ we found on people machines were caused by surfing for porn. Said virus’ were always more likely to be found on a machine that didn’t use a “reputable” porn site. It will be interesting to see if this kind of “Red Light District” for the net will make it less likely that people trolling for porn online will find a electronic venereal disease.

On a less serious note that really ages me why is it that this story being in the Britannica blog makes me think of a bunch of teens from a century ago sneaking peeks at native girls in National Geographic? Is there anyone alive using the net old enough to get the reference?

Tim Blair reminds us that everything costs something, in this case an upload costs 1.6 million:

A MAN who bragged about illegally uploading a Super Mario Bros computer game to the internet yesterday agreed to pay manufacturer Nintendo $1.6 million in a landmark anti-piracy court settlement.

James Burt, 24, agreed to pay $1.5 million in damages plus $100,000 in court costs to the gaming giant behind the hugely popular Wii game.

The Laws are on the books and companies are going to use their lawyers to make sure they are enforced. Until and unless they are changed ask yourself, is it worth it?

When you put the need to play a video game next to say Nujood and woman under Islam it really puts things in perspective doesn’t it?

And unlike Nujood, James did this to himself.

I’d hit him with a nelson but he’s going to be paying for this literally for the rest of his life, so I’ll spare him than and suggest we don’t repeat his mistake.

and our friends at Zolex PC have an important warning about the latter:

Unfortunately tragedies and catastrophes like Haiti’s current situation can give rise to golden opportunities for scammers and Flim-Flammers alike to make money off of a willing and generous public. There are plenty of Scam Sites already out there trying to do this masking themselves as helping Haiti but really just helping themselves to your generous donations.

The advice is basic but too often ignored. Remember the thieves go where the money is and the money now is online, and available via “text”…

Websites can be put up in a matter of hours and appear completely legitimate so do your research before you donate your money to a scam. Texting scams are very common. With texting you never know what else you could be signing up for. Scams come in all sorts of shapes and sizes. Be it via Text messaging, Email Scams, Websites, Facebook, or any other means. Where there is a way to take advantage and trick people through their own generosity, you can be sure there are plenty of slime and scum who will take advantage of it.

Read the whole thing as they say. Also if you decide to give online do a google or yahoo search to be sure you are getting to a real site, particularly if you are iffy on spelling. This makes it less likely to hit a “spoof” site. DON’T give via e-mail links or IM requests.

Take this advice to heart so that your hard earned money goes to those who need it not to those who are looking for a quick buck. (My advice: give through your local church if you have one).

…so has the spam.

I’ve found that my spam over the years (counting the hiwired blog) has gotten smarter and smarter, to the point where the filters will catch one but miss a nearly identical one.

The phony names, semi generic messages etc are getting better too.

I’m sure other bloggers see more of this than me, but considering how prevalent it is I’m shocked that there are some sites that still don’t moderate comments.

I popped over to Pam Geller’s site today and noticed an interesting post concerning Google search. She references this post at the next web:

When you search for the major religions of the world, the monotheistic faiths for example, Google serves up suggestions for the search “Christianity is” such as, “a lie,” or false.” Try it on a a number of faiths, and then Islam.

Notice any difference?

Google is systematically blocking, it seems, all search suggestions for Islam. Why? To remove the chance of an adherent of the faith from being offended by a perhaps severe search suggestion? Why not treat all search terms equally?

Given the complete lack of suggestions, not just terms that could be perceived as negative, it seems that Google is covering its, well, behind.

Take a look at the graphics, they are rather damning and cowardly. I tried the “is” combinations myself and got the same results as the screen shots. Remember Glenn’s oft repeated warning:

MY ADVICE TO CHRISTIANS, JEWS, HINDUS, ETC: Start blowing things up and beheading people. This will gain you enormous solicitude from the powers-that-be…

…No, I’m not serious about the advice. But they need to think about the incentive that’s being created here, or I fear that others will take the lesson. When you reward behavior, you tend to get more of it.

For the fun of it I tried the same thing with yahoo. The results for “Christianity is”, “Judaism is” are comparable with the Google results, but take a look at “Islam is”:

When you use google as your only search engine, you are behaving no differently than if you used only ABC, CBS and NBC as your only networks.

Score one for the publishers:

“Amazon realized the magnitude of the contractual problem,” Aiken said Monday morning. “Many of the author’s publishing contracts give publishers the right to publish e-books, but only without enhancing audio. A reasonable reading of those contracts shows that publishers didn’t have the authority to sell e-books for use in a Kindle device with audio enhancement.”

An Amazon spokesman denied being pushed into Friday’s decision. As for whether contractual issues played a part, the spokesman repeated what the company said Friday: “Kindle 2’s experimental text-to-speech feature is legal.”

Aiken began criticizing Amazon soon after the Kindle 2’s debut last month. He argued that the retailer was violating the author’s copyright and was cutting them out of a potentially new and lucrative market.

On Friday, Amazon announced it would reconfigure the Kindle 2’s systems to allow publishers to disable the text-to-speech function for titles of their choosing. However, the retailer made it clear in the announcement that it believed text-to-speech did not violate copyright.

Amazon may be the big fish in the pool but they don’t own the lake.