This flashback post stands up well because there is a reason why warranties are the length they are.


What a difference a year makes

When mentioning my Inspirion 1150 in the past I’ve said it never gave me any trouble. My warranty ran out three weeks ago.

On Saturday I installed a friends copy of CIV IV to see if the graphics card of my laptop could handle it and sad to say the wife will NOT be getting me it for Christmas (and as we’ve established I’m too cheap to buy a new pc just for a game).

This morning I was coming into work early to cover for a friend, booted up my laptop and rushed to do something that was going to take 10 minutes. I figured no problem, by the time I was back it would be booted and ready to log in. Instead I found a highly interesting blue screen of death.

If the problem persists I might reinstall the system files from the cd or run a sfc scannow

I restarted the system and it came up but the timing reminded me of this Day-by-Daycartoon below.

day by day 10-23-2005.gif

Eric always buys extended warranties with laptops, I didn’t. We will soon see if he is right and I am toast.

Posted by Peter at November 14, 2005 09:18 AM

************

The Chris Muir Comment on that post is worth reprinting as well:

********

Peter, as a product designer who is well-versed with production methods, I can tell you for a fact that products today are very carefully engineered for a certain amount of time and no more.

I can recall the good ol’ MaBell phones that would take a tank round before they’d break. No more, it’s all crap from China.

I thought I’d type this out quick like as the warranty on this Mac I’m using sta

Posted by: chris Muir at November 14, 2005 12:22 PM

********

ah memories

Another old Lightfrog/Hiwired post with tech advice that stands up to the test of time:


Tis the season to choose wisely

An awful lot of money is going to be spent on new computers in the next 25 days or so.

My basic advice is simple:

Figure out what you want your system to do.Figure out what hardware is necessary to do it.

Splurge on the ram since it is the thing that will extend the useful life of the computer the most.

That’s basically it. For example all my next Desktop needs to be able to do is to:

Run the office suite (every one out there does)Play DVD’s (any DVD drive will do)

Play CIV IV with more than the min specs

Thats basically all I’m looking for so other than a good video card I’ll be easy to please.

If you want more detailed advice PC WORLD and CNET both have useful buying guides.

Posted by Peter at November 29, 2005 07:40 PMT

********************

Bit of Irony,  a new laptop is on my Christmas list and while the DVD drive is not as important (I’m thinking of using this one as a dedicated iTunes machine and importing my Big Finish Dr. Who CD’s here) however one of my requirements is a machine that can pay Civilization six beyond the min requirements.

Back in 2005 when I worked for HiWired we started a tech blog that was unique at the time, providing some free tech advice to customers and non customers alike who needed it. Today I found myself looking at some old posts from the HiWired Blog and wondered how many of those posts stood the test of time. I think this one on trusting what you see on the net, particularly given the whole “fake news” debate, does, although some of the links are a tad dead.


Where are all the Moon Maidens?

For the fun of it I did a google search for “wireless network security” this is the result of the search.

You might notice that the #1 link is from a site called practically networked which is an excellent reference site, however when you read the article you will note that quite a few of the pieces of advice are contrary to things we’ve said before.

There was a time when this article would have been good advice but it’s old,that hasn’t stopped it from being #1 on the google list. If you hit the “I’m feeling lucky” button and followed the advice your system would be hackable in minutes.

If you are old enough you might remember the old Beverly Hillbillies episode where Jethro decides to go to the moon because it’s full of moon maidens. When Elly asks how he know this he says:

They wouldn’t print it in a comic book if it wasn’t true

Don’t be Jethro on the net.

Posted by Peter at August 15, 2005 04:51 PM

******************************************

I think I might repost more of these over time, I forgot just how much tech blogging I used to do when I wasn’t doing it for me.

Cybersecurity has definitely been in the headlines lately because both businesses and government agencies have been hacked and valuable data has been stolen about everyone from employees and politicians to consumers. But big businesses, in particular, are under a greater threat from cyber attacks, and with more people sharing a lot of information about themselves online and with the businesses that they make purchases from, companies need to do whatever they can to keep their information secure.

The Importance of Cybersecurity in the World of Business

Cybersecurity has always been an important topic for all types of businesses. This is why networks, such as an MPLS network, needs to have the right security in place. And this is why businesses make it a point to hire only the very best IT teams, such as Masergy, who know exactly how to set up and create a secure network. Without the right security products and protocols in place, hackers can more easily attack business networks and steal a lot of valuable information that can put both the business and its consumers at risk.

The New Cyber Threats That Businesses Are Facing

These days, the cyber threats seem to be more intense than ever, so businesses need to be more diligent when it comes to securing their data at all times. For example, companies of all sizes and from all industries now face threats that include machine-to-machine attacks, headless worms, the jailbreaking of cloud servers, two-faced malware, and ghostware that hackers can use to actually conceal their attacks so you don’t even see them coming.

Some of the Big Businesses That Have Been Affected

As of the early part of 2015, there were already several big businesses that had been the victims of cyber attacks. These companies were from a variety of industries, and they included Target, Michaels, Community Health Systems, JPMorgan Chase, Home Depot, Staples, Sony Pictures, Anthem, and Primera Blue Cross. When these cyber attacks happened, they made headlines because a lot of data was breached and a lot of consumers’ personal information was made vulnerable.

What You Can Do

Every business should have a cyber security strategy in place. This includes using high quality anti-virus software and educating employees on what they shouldn’t be clicking on when they use the Internet while working. Unknown links or suspicious attachments should never be clicked on and downloaded, even if they’re from someone you know. And make it a point to keep all software, operating systems, and apps up-to-date to have the latest patches and security measures.

If you own a business, you need to take steps to secure yourself from the threat of a variety of cyber attacks. The bigger you are and the more data that you have stored on your network, the more important it will be to protect yourself. Therefore, make it a point to learn not only about the threats that you have to watch out for, but also the steps that you can take to always remain in control and prevent attacks from happening in the first place.

Captain Kirk:  According to him, there’s a creature of some sort down here, a humanoid.
Mr. Spock:  Lieutenant Uhura communicated that information. I ordered re-confirmation on our sensors. They indicate no living creature on this planet. I suggest, Captain, that you’ve been lied to.
Lazarus: Captain, you yourself said there were no other explanations. Why do you give credence to this man?
Mr. Spock:   I fail to comprehend your indignation, sir. I’ve simply made the logical deduction that you are a liar.

Star Trek The Alternative Factor 1967

Just two days ago we posted on the appearance of the FreeStacy Movement in the pages and website of USA today (Alexa ranking is 316 worldwide and 70 in the US with 116,407 sites linking in.)

I daresay there might be a few people around the country who will be hearing about #freestacy and Robert Stacy McCain for the first time today. That’s what happens when one of the top 70 websites in the country writes about it.

So congratulations to Twitter, Anita Sarkeesian and company. Your new Trust and Safety council continues to get more and more national and even international fame.

48 hours later just a few hours before my plans to take DaWife to Maine resulted not in me outside of Knight’s quilt shop in a rocking chair reading the collected CS Lewis as my wife shopped but at a rest stop full of syringes on the ground outside of Chelmsford watching assorted tractor trailers and waiting for AAA to tow us home the CEO of Twitter was gracing the today show saying this

The key exchange being this:

Matt Lauer: Let me ask you point blank, does twitter censor the comments of its users, does it hide what it would consider inflammatory comments whether they be social or political?
Jack Dorsey: Absolutely not,

Given that the CEO has publicly said this on a national TV show I went back to tweetdeck to check on Robert Stacy McCain to see if his account has been restored.

jack is a liar

It has not been.

Now I suppose one can try and parse that statement claiming that as Robert Stacy McCain has been suspended he technically is no longer a user so a “user” is no longer being censored.

But given the evidence I’m with Spock the logical deduction is he is a liar and not just a liar but a liar willing to lie to a national audience with a straight face.

I’m surprised he’s not running for office.

Update: A question for Matt Lauer. Jack Dorsey lied to your face and to your audience on national TV. What will you do about it?
*****************************************************************

I’m back trying to get that elusive $61 a day for DaTipJar.

I’d like to think we do good work here If you’d like to help us keep up the pace please consider hitting DaTipJar




Olimometer 2.52

Please consider Subscribing. We are currently 116.3 subscribers at $10 a month to make our goal every day without further solicitation but the numbers are even more interesting:

If less than 1/3 of 1% of our February readers this month subscribed at $10 a month we’d have the 114.5 subscribers needed to our annual goal all year without solicitation.

If less than 2/3 of 1% did, I’d be completely out of debt and able to attend CPAC

If a full 1% of our February readers subscribed at $10 a month I could afford to travel across the country covering the presidential race this year in person for a full month.

Plus of course all subscribers get my weekly podcast emailed directly to you before it goes up anywhere else.


Choose a Subscription level



Via Elder of Ziyon let me tell you about a company called Asal technologies

“We have a window of opportunity to demonstrate our skills,” said Murad Tahboub, CEO of Asal Technologies, a Palestinian outsourcing company that works with Comply and a handful of other Israeli-based companies. “The more people know about us … the more comfortable they will be in doing business with us.” This is easier said than done. Comply’s office in Hod Hasharon is only about 20 miles (30 kilometers) from Asal Technologies in the West Bank city of Ramallah – but they are worlds apart.

and when it comes down to outsourcing code for Israeli companies there is a real advantage to going local it when not surrounded

 

In the past three years, however, some have turned to Palestinian engineers and programmers. They are cheaper, ambitious, work in the same time zone, and – surprisingly to many Israelis – are similar to them.

“The cultural gap is much smaller than we would think,” said Gai Anbar, chief executive of Comply, an Israeli start-up in this central Israeli town that develops software for global pharmaceutical companies like Merck and Teva.

 

Well of course it is, you live in the same area, generally speak the same language and have many of the same concerns. If you check out their web site and twitter feed it looks like any other tech company, but the most important page is the careers page:

Client project:A large international software company is building new products and technologies and is seeking senior and junior software engineers to join an outsourcing project at ASAL Technologies.

The details:

B.Sc. in computer science, software/computer engineering, or related disciplines.
Strong knowledge in core computer science areas.
Solid object-oriented programming skills and OO design patterns.
Strong theory/algorithms and very good understanding on how to apply advanced knowledge to solve real problems.
Hands-on experience in agile software development, mobile applications, and multiple release cycles.
Strong analytical and organizational skills.
Methodical approaches to solving technical challenges with high attention to detail and data accuracy.
Highly motivated and self-reliant individual with true willingness to learn and work as part of a team.
Strong communication skills (oral and written) with the ability to act proactively.
Extra credit: Experience with mobile application development, cloud services, web scripting languages, Android, and Microsoft platforms/technologies.
Experience with mobile personal assistants is a plus.

The kicker, these jobs are located in Ramallah/Rawabi and the West Bank

Of all the stories of the middle east I suspect this is the one which is of the greatest threat to Hamas & the PA, first of all it destroys the false narrative out there:

Do you have internet?
Yes. We do have internet and electricity. Over the past 60 years, the West Bank had not sustained any outages due to political reasons. Currently ASAL Technologies has two fiber optic cables from two different ISPs to ensure 24/7 internet connectivity. And short term plans are to move the headquarters of ASAL Technologies to Rawabi -the first Palestinian smart city- where the infrastructure of the whole city has been optimized to meet international standards.

It’s an odd question to ask a software company, if they didn’t have internet they couldn’t operate now could they?

But how can you do business amid the violence and oppression?

Does the political situation affect your work?
No. Though it is hard to visualize if one hasn’t visited Palestine, the reality is that the political situation does not affect our ability to conduct business as usual with all of our clients. And to ensure that our employees can always access their workplace, we opened up a new branch in north of Palestine, and future plans are to open up yet another branch in the south.

You mean to say the evil jooes aren’t stopping you from making your business successful? Well put me in the laundry and pre-soak me 15 minutes!

All of these shatters the careful helpless meme built up concerning Israel. That’s bad for the PA, but the real threat to them is this:

If you have a class of Palestinians unshackled from the “death to Jews” mentality and furthermore not dependent on either terror dollars from Iran or handouts from the west for a living the entire dynamic changes.

I’ve said before that there is no limits to what the Arabs can achieve if they abandon their “death to the Jews” mantra and concentrate on making a better life where they are, these guys have the  potential to prove it.

I suspect ISIS, Hamas, Hezbollah, Islamic Jihad et/al  doesn’t approve they’d rather teach kids to stab jews. and as for the BDS movement it will have them going Kryten

****************************************************************************

The only pay I get for this work comes from you. My goal for 2015 is $22,000 and to date we’re only at $4400

Given that fact I would I ask you to please consider hitting DaTipJar.




Olimometer 2.52

That gets all the bills paid. Consider Subscribing 100 Subscribers at $20 a month will get the job done and then some.


Choose a Subscription level



Additionally our subscribers get our podcast emailed directly to them before it show up anywhere else.

I know you can get the MSM for nothing, but that’s pretty much what most of them are worth.

Moriarty: I got into the Tower of London; you think I can’t worm my way into twelve hotel rooms?

Sherlock:  The Reichenbach Fall 2012

11th Doctor: The security is absolute.
Clara: It’s never about the security, it’s about the people.

Doctor Who  The Bells of St. John 2013

The plot final episode of the second season of the British series Sherlock revolves around James Moriarty’s determination to destroy Sherlock Holmes, who he refers to as “Sir Boast a Lot” in a fairy tale, however the preface to this plan involves his breaking into three of the most secure places in England, namely the Bank of England, the Tower of London and Pentonville Prison at the exact same time. This produces a subplot concerning the method he used to do so after he fails to take anything in the breakins and is furthermore acquitted in seven minutes :

Sherlock: You’ll never need to take anything ever again.
Moriarty:JIM: Very good. Because …?
Sherlock: Because nothing … nothing in the Bank of England, the Tower of London or Pentonville Prison could possibly match the value of the key that could get you into all three.
Moriarty: I can open any door anywhere with a few tiny lines of computer code. No such thing as a private bank account now – they’re all mine. No such thing as secrecy – I own secrecy. Nuclear codes – I could blow up NATO in alphabetical order. In a world with locked rooms, the man with the key is king; and honey, you should see me in a crown.
Sherlock: You were advertising all the way through the trial. You were showing the world what you can do.
Moriarty:: And you were helping. Big client list: rogue governments, intelligence communities … terrorist cells. They all want me. Suddenly, I’m Mr Sex.

This is an excellent description of how the world views Anonymous who seemingly is able to hack governments, banks, newspapers, etc etc etc. Somehow this little band of genius have the world by the throat if they want it.

An that brings us to this story:

 

A jury has found former Tribune Media employee and social media news maven Matthew Keys guilty of three computer fraud felonies related to a 2010 defacement of the Los Angeles Times website by a member of the Anonymous hacking group.
On its second day of deliberation, a jury in U.S. District Court in Sacramento this afternoon found Keys guilty of all three counts levied by prosecutors, who first indicted Keys in 2013. He was fired from his position as deputy social media editor at Reuters shortly after his indictment.
Keys shared logon credentials of the Tribune company’s content management system, then also used by the L.A. Times, with an Anonymous hacker, along with the instruction to “go f— some s— up!”

 

and the lesson it teaches about the hacking group. A lesson that even Sherlock didn’t get to the frustration of Moriarty:

Moriarty:: No, no, no, no, no, this is too easy. This is too easy. There is no key, DOOFUS! Those digits are meaningless. They’re utterly meaningless. You don’t really think a couple of lines of computer code are gonna crash the world around our ears? I’m disappointed. I’m disappointed in you, ordinary Sherlock.
Sherlock: But the rhythm …
Moriarty:: “Partita number one.” Thank you, Johann Sebastian Bach.
Sherlock: But then how did ...
Moriarty:: (speaking over him): Then how did I break into the Bank, to the Tower, to the Prison? Daylight robbery. All it takes is some willing participants. I knew you’d fall for it. That’s your weakness – you always want everything to be clever.

You see Anonymous WANTS you to think they are each Jim Moriarty with the intellect of a Steve Jobs thrown in when they don’t have to be. They’re just good at finding angry or careless idiots. All they need to hack someone are one of three things.

1. A person with a very weak password or a big mouth

2. Somebody pissed off enough to give the a login of a system

3. A system with a lazy administrator.

This puts an exclamation points on the #1 rule of security. DON’T GIVE YOUR PASSWORDS OUT OR GIVE ACCESS TO THEM OUT TO ANYONE!

Now because I don’t have my own server I’m dependent on Go Daddy to keep my logon password safe, but If I’m ever hacked it’s going to be because of some careless ass at GoDaddy or Twitter or Amazon, not because these hackers are a bunch of super villains.

****************************************************************************

The only pay I get for this work comes from you. My goal for 2015 is $22,000.

Given that fact and the discovery that the repairs needed for my car that failed inspection will run between $500-$1000 I would I ask you to please consider hitting DaTipJar.




Olimometer 2.52

That gets all the bills paid. Consider Subscribing 100 Subscribers at $20 a month will get the job done and then some.


Choose a Subscription level



Additionally our subscribers get our podcast emailed directly to them before it show up anywhere else.

I know you can get the MSM for nothing, but that’s pretty much what most of them are worth.

Sheldon: Biologically speaking, Howard is perfectly justified in seeking out the optimum mate for the propagation of his genetic line.

Howard: Thank you, Sheldon.

Sheldon: Now, whether that propagation is in the interest of humanity is, of course, an entirely different question.

The Big Bang Theory The Vengeance Formulation 2010

Looking at Twitter Friday Morning I see that it’s necessary to repeat some basic facts of the internet for the benefit of young people who may not know them. Consider this a public service to any person who uses the net.

1.  If you choose to enter the public debate, people will debate you.

It never ceases to amaze me is the expectation that one can enter public debate on the net and expect to not have to defend one’s positions against people who disagree with you.  If you are going to make a public debate on a subject being discussed be prepared to have folks intelligent or not, disagree.

2.  Whatever you say on the internet is inherently public.

Even if you aren’t debating the rule applies.  No matter what you do or say or chat.  If it is on the net on a blog, in a comment, on a forum or in a chat it is public.  Even a “private” post is only as private as the least discreet person you are dealing with.

3.  Whatever you say on the internet is forever.

It takes less than a second to screen capture something on the net.  Once you’ve said something or done something on the net one must assume that it will be there forever.

4.  The default setting of the net is “traceable”

It takes an effort to be truly anonymous, you have to not only mask your IP but if you are having conversations etc you have to mask your speech patterns, for example I use the word “Yet” a lot in writing so if I wanted to comment on something under a different name a person looking to find me could use a program to search that pattern.

5.  The only requirement for finding something “hidden” on the net, is patience.

If a person has the desire to find some information that was placed on the net and is willing to spend weeks or months doing so, they will invariably find what they are looking for if it exists.

6.  Reporters search for information for a living.

If you want to hide information the person you would fear the most is a reporter.  The job of a reporter is to find information that people want to hide and unless a reporter deliberately avoids looking for said info (read MSM concerning Liberals) they will find it.

7.  Nothing is more dangerous than a pre-internet reporter with net knowledge

There are four types of reporters two of which are dying out:

1.  Hard working reporters
2.  Lazy reporters
3.  Old pre-internet reporters who are not net savvy
4.  Old pre-internet era reporters who have become net savvy.

Of the four the most dangerous to a person hiding information is the pre-internet era reporter who is net savvy.  Such a reporter is used to doing research in the old-fashioned way, going to locations, questioning people, locating hard to find articles and books physically and then reading through them,  looking for stray documents that only exist on paper.

To that person used to the physical effort of the former,  hours or days of web searches is a walk in the park.

8.  Beware of obsessive enemies online:

There have always been crazy obsessive people out there, but in the old pre-net days their ability to cause trouble was limited to their driving range, with the net such a person is able, if they want, to make trouble to literally watch your every move for a mistake and pounce when you make one.

Now while all these rules are widely applicable to anyone they all lead to a rather specific conclusion:

9.  Don’t try to mess with or out Crazy Robert Stacy McCain.

What you have here is an obsessive, web savvy old school reporter of 30 years experience, intimately acquainted with libel law,  with a large following who knows how to search the web, recognize patterns and find things.  Furthermore because of his large following among other web savvy people if you choose to mess with him there are literally hundreds of people who will happily supply him with said info if they know it exists or point him in the right direction.

And if that wasn’t bad enough he has the patience to hold said info and release it in a snappy entertaining style that increases the likelihood that people will read it maximizing its effect.

The first amendment gives you the right to free speech, but it doesn’t protect you from the consequences of speech nor does your first amendment said right of another.

So if, for example you are Nicholas Edwin “Sarah” Nyberg and choose you make a public argument concerning say #gamergate which is a topic of current discussion and you react to biting critique from Robert Stacy McCain by say, aiding in his temporary suspension from twitter (a forum he uses to augment his readership and thus his income) it is perfectly reasonable to expect that if one said something in a chat room 10 years earlier that might be at best highly embarrassing or at worst legally actionable that Mr. McCain would not only discover it but tweet it out to his nearly 90,000 followers with screen shots and snark.

One might further expect that if you are someone on twitter like say @Auragasmic who chooses to defend Nyberg or believe his assertions that one might face creative embarrassment that will be retweeted to Mr. McCain’s followers or cause the promotion of slightly odd but devastating Youtube videos that might gather 43,000 views or more be followed up by a larger piece that says something like this:

A shocking new video released this week has brought new attention to claims of pedophilia made against a longtime critic of the #GamerGate movement. The video quotes Internet chat logs attributed to Sarah Nyberg expressing sexual interest in preteen girls

and perhaps get the attention of nationally known reporters with an international platform and

The story is currently working its way through Breitbart’s legal process. I hope to be able to share it with you all soon.

Bottom Line:  Going after Robert Stacy McCain is like poking a wolverine with a stick, you have a right to do it, but it’s unlikely to end well for you.

The only pay I get for this work comes from you. If you think this is of value I ask you to kick in and help me reach my monthly goal $1834 a month or Twenty Two grand a year.

I’d appreciate it if you would hit DaTipJar




Olimometer 2.52

That gets all the bills paid. Consider Subscribing 100 Subscribers at $20 a month will get the job done and then some.


Choose a Subscription level



Additionally our subscribers get our podcast emailed directly to them before it show up anywhere else.

I know you can get the MSM for nothing, but that’s pretty much what they’re good for.

All a woman needs if she want to cheat on her husband is to go to a bar and look at a man

Tim Imholt

At Gizmodo using data analysis discovered something that should have been obvious to any person familiar with human nature

Overall, the picture is grim indeed. Out of 5.5 million female accounts, roughly zero percent had ever shown any kind of activity at all, after the day they were created.

The men’s accounts tell a story of lively engagement with the site, with over 20 million men hopefully looking at their inboxes, and over 10 million of them initiating chats. The women’s accounts show so little activity that they might as well not be there.

The key was the data the user could not see.

Ashley Madison employees did a pretty decent job making their millions of women’s accounts look alive. They left the data in these inactive accounts visible to men, showing nicknames, pictures, sexy comments. But when it came to data that was only visible on to company admins, they got sloppy. The women’s personal email addresses and IP addresses showed marked signs of fakery. And as for the women’s user activity, the fundamental sign of life online? Ashley Madison employees didn’t even bother faking that at all.

This is something any person who has dated or tried to date knows instinctively but our TV culture tries to teach us otherwise:

An awful lot of advertising dollars are dependent on convincing men that buying a particular product or doing a particular show will get you in bed with the “hot girl.” Movie after movie is sold on the premise of a sex with a hot girl for the loser guy (Ted) the fat guy (The King of Queens) or the Nerd Guy (The Big Bang Theory) having Sex with the smoking hot girl.

Do this, watch this, act like this and you will have a lifestyle where you will be having sex with hot women.

Let me explain reality, it’s something most guys know, but deny:

Unless you are in incredible shape, have a lot of money, are famous, are powerful, or are in a position that allows you to confer money fame or power on someone odds are not going to have sex with the hot chick, you are not going to get a date with the hot chick and there is an excellent chance you will never ever be noticed by the hot chick unless the hot chick is dancing around a pole and you are sticking dollar bills in her g-string.

Now as I pointed out before the “hot girl” the 10 or the 9.99 who is on the far side of the bell curve on beauty might not be a 10 or a 9.99 on the “good wife” or “caring person” or “good companion” scale but any person on the Ashley Madison site was not looking for those things.  They were looking for sex because for whatever reason the sex they were (or were not) having in their marriage was, in their minds insufficient for their needs.

They went to Ashley Madison because they actually fell for the cultural meme that sold them on the idea that there was, despite all their personal experience , a supply of women who were looking to cheat on their husbands and needed a web site to find a man to do it with.

That they fell for such an obvious falsehood displays the truth that Samuel Clements one stated:

Of the delights of this world, man cares most for sexual intercourse. He will go to any length for it-risk fortune, character, reputation, life itself

He left out one fact.  Man will convince himself of anything if it justifies a course of action that they believe will lead to sex.

*********************************************************************

I have yet to be replaced by a Robot so the only way I can keep doing this full time is if my pay comes from you. My annual goal is Twenty Two grand which will give me a nominal living doing this.

For a Donald Trump the 22K that would cover my expenses for the and the extra $10K that would pay for the roof, car, floor kitchen and bathroom repairs that I had to put on plastic would be nothing and if my traffic was the size of a Drudge getting enough people to kick in to cover those bills would likely not be an issue.

But I have to take things as they are so if you like what you see here including my paid writers like Tim Imholt, Fausta Wertz, Pat Austin et/al and have a little extra you can spare.  I’d appreciate it if you would hit DaTipJar




Olimometer 2.52

That gets all the bills paid. If I can get to Forty Thousand I can afford to travel outside of New England and/or hire more blogger to help me get it done.

Consider Subscribing 100 Subscribers at $20 a month will get the job done and then some.


Choose a Subscription level



Additionally our subscribers get our podcast emailed directly to them before it show up anywhere else.

If you could kick in I’d really appreciate it.

 

 

Fletcher: Your Honor, I object!
Judge Stevens: And why is that, Mr. Reid?
Fletcher: Because it’s devastating to my case.

Liar Liar 1997

The Hillary Clinton campaign is not very happy with Judicial Watch: (emphasis in original)

 

No, because you have to remember Judicial Watch is a partisan group that has been suing Democrats, me in particular, for twenty years. Anything that they can sue over to create partisan advantage, they do. The facts are very clear here. I did turn over all work-related e-mails in an effort to help the State Department make sure that their records were complete. And those are the facts. Now that doesn’t mean I will ever convince these partisans who are, you know, trying to make all sorts of allegations. But I think the American people understand that.

 

Alas poor Hillary that’s her whole problem, the American people understand this scandal completely:

 

The American people, because have friends or family either have worked in government or know someone who has, understand there are rules about handling government and classified documents.

The American People, because they use email and smart phones on a regular basis, understand you can have more than one email account go to a phone.

The American People, because they use thumb & memory drives that can hold dozens of gigs of data and see them for sale in the checkout lines of any Walmart or Staples,   understand how easy it is to  get a thumb drive for backup

The American People, because they and their children do it themselves with camera cards and thumb drives, understand it only take seconds to give the command to copy even 50,000 emails files  from a folder to an external drive and just minutes for such a copy to complete.

The American People, because they have home printers, understand it takes hours or days to print out 50,000 pages of emails.

The American People, because they search for music, emails and pictures every day, understand the difference between searching a thumb drive vs leaving through 50,000 pages of email.

The American People, because they are not stupid, understand when you finally turn over email servers that the FBI has requested, and it turns out to be as her lawyer put it ” blank”, it’s not a coincidence.

 

That the rub, many political scandals involve complicated rules and laws that the American people either do not understand or have no interest in understanding that’s why a clever pol with the media behind them can usually get away with things.

This scandal however involves things that most Americans work with every day.  They don’t need it explained to them, which is why when the American people see Hillary lawyering up or try to explain away this scandal, they understand she is lying to their faces.

Democrat operatives understand this too, that’s why they are, as the Hill put it in in near panic mode:

“I’m not sure they completely understand the credibility they are losing, by the second,” said one Democratic strategist, who spoke on the condition of anonymity. “At some point this goes from being something you can rationalize away to something that becomes political cancer. And we are getting pretty close to the cancer stage, because this is starting to get ridiculous.”

That’s the problem for the Democrats, they are losing credibility because the American People understand.

 

 

Update:   The American people may not understand the intricacies of 18 USC 1924

For purposes of 18 USC 1924, that’s irrelevant; the server was put in place by Hillary Clinton, owned by her, and located in her house. If any classified material went through it, Hillary Clinton is as legally responsible for retaining it illegally as her aides would have been for transmitting it, and just the retention is a crime. But if Hillary didn’t send or receive it, who did? No wonder Huma’s lawyering up, although she might want to rethink the idea of keeping a former Clinton aide on the team.

but they understand than when you lawyer up, it’s not because things are going well.

Update 2: Something else the American People likely get:

Every security expert I know of has said it’s a virtual certainty the Chinese and Russians both gained access to her server and all her emails. From what I know about their capabilities, I’d agree.

What’s really amazing about that statement is there are people who know and understand this, yet still want her in the White House.

Update 3:  Old Friend NeoNeocon explains my last line from update 2 in answer to my post:

One of those three stated at the outset that Hillary was way too moderate for her and she was a Sanders supporter anyway. Another shrugged and said that Hillary was being framed by Republicans who were always making stuff up about her and were out to get her. I asked her what she would think, however, if the charges turned out to be true, and she answered that everybody does it and it’s no big deal. When I asked her if she worried about national security considerations, she didn’t seem to think that was any big deal or anything unusual. She then explained that she herself has two email addresses, one for work and one for personal use, and sometimes she makes an error and sends something official on her personal email. She was likening Hillary’s actions to her own—just a careless, understandable error. When I pointed out that Hillary had a much higher level of responsibility, she didn’t seem to think so, or if so it just didn’t concern her.

She talked to four people on the subject, and the final tally?

So we have one out of four who even seems to care about the emails or find them the least bit alarming. Not a great record, and I bet it’s representative.

I bet she’s right.  Many of our friends on the left do not want to oppose Hillary.  If you are looking for an excuse to dismiss something you’re going to find it.

Update 4: This is not a bug it’s a feature

By having cleaned the hard disk on which all of the important activity took place, Clinton could well have impeded the FBI’s investigation, and thereby rendered it impossible for the federal government to learn what she has been up to.

*********************************************************************

Normally I wouldn’t put it this way but right, with a car falling apart, a floor that needs to be torn up and some big debts I’m really in a bind and I’d really appreciate it if you can give me a hand getting out of it.




My goal for 2015 is Twenty Two grand which will give me a nominal living doing this.

Olimometer 2.52

That gets all the bills paid. (including my writers like Fausta)  If I can get to Forty Thousand I can afford to travel outside of New England and/or hire me a blogger to help me get it done.

Consider Subscribing 100 Subscribers at $20 a month will get the job done and then some.


Choose a Subscription level



Additionally our subscribers get our podcast emailed directly to them before it show up anywhere else.

If you could kick in I’d really appreciate it.