Showing posts with label issues. Show all posts
Showing posts with label issues. Show all posts

Wednesday, June 18, 2008

Bullies and Badasses: Beware of Rabid Rabbit Revolt

This is a "How To/What IF" for when you are afraid even to get out to your mailbox.

We are not paranoid; they ARE out to get us. It is simply a matter of time. The police are powerless, less than worthless. By the time they arrive the damage is done; we are dead. Therefore, reporting localized terrorism is NOT an option. We must terminate terrorism on our own. The authorities and the bad guys/girls have left us no other option.

What if all the scared rabbits fled directly at their attackers? Would the tormentors not then experience the fear of a total loss of control? Might they not fear their own demise? After all, they are all cowards who refuse to face their own fears; their preference is to terrorize others in an effort to hide their own weaknesses.

Get away and think. Observe the behavior of your nemesis. What is it hiding? While you are at it, get with those you see also under fire. Form a team of watchers; learn from each other's incidents. With this core group you can plan an action to put a stop to the Terror. Permanently.

Yes, coppers, I notice already that this seems to advocate gang violence. It does not. The street gangs of many cities are also a part of the terroristic groups which must be put down. Many of them were formed as protection such as I have described; some of them have gotten dangerously out-of-hand and pose yet another threat to society at large. What then are we to do?

Have you lived your entire life in fear of these very real monsters as have I? Did you also choose isolation and loneliness to the brutal attacks of violence both physical and emotional? Has it ruined your life too? Walking away sometimes means leaving everything behind and moving elsewhere. How many times can we accomplish this feat of heroic retreat in the face of an unrelenting enemy? Why must we continue to do so? Where this time shall we go? What place offers sanctuary to those who would live in peace? Sadly, none.

Unite and fight. The only answer: "Rabid Rabbit" is born this day.

All content © 2008 Keith E Larson




Saturday, June 14, 2008

Cyber Terrorism Rampant in Online Games

Dark Orbit bytes the big one for this. Huge multi-million dollar/mineral entities prowl the space hunting for YOU. Whether or not you work for the same company! They are out to KILL you because they can. These are mostly punk ass kids who need a vicious beat-down in RL to set them straight. School-yard, lunchroom, and cyber bullies are nothing less than terrorists in need of extermination. Period.

Unless you can hack or buy your way in to this (or Saga) don't bother. They both suck rotten weenie for entry level (newb) players. I am actually having nightmares about them because I tried to move up in the game. Repeatedly. These punks will not allow it. Player Killers (PKs) are socio-paths who singly or in packs hunt you down to murder you without cause. It is not a game; they WANT to hurt people; they laugh amongst themselves in on-line chat about their slaughters. It is an attitude I see on the street too. Every day. Run rabbit, run.

Cyber-terrorism is the reason Runescape changed its game in the wild; they eliminated PlayerKilling (PK) because of rampant abuse. Packs of players would jump one unsuspecting voyager and slaughter him/her for fun and profit. The deranged dog-packs are now relegated to an arena with ample warning that you are about to enter the bad-lands. I do NOT recommend going there unless you are into S/M, murder, or mayhem.

I'm sick of them! Everywhere I go online I find punk-asses trying to rule my world. Frauds, cheats, thieves, and terrorists are running amok on the Web. They MUST be stopped at the local level. They have to be found out and eliminated with extreme prejudice. Street Justice. Let it prevail.

It is not only the gaming world either; these little bastards (and not a few bitches) are everywhere! Forums, directories, so-called expert sites - EVERYWHERE! It is mostly teenage boys without parental supervision. They think they can get away with anything. In the US it is mostly true. Beating your insubordinate children into submission is a criminal offense. So is allowing them to run wild in the streets. Hello?! Get a grip, law-makers represent corporate money makers and and the "laundry" industry, not the people. Make a difference, next punk-ass that gets in your face - pound it into the ground, then grind it in with your heel. It won't learn but, it's buddies might.

All content © 2008 Keith E Larson




Wednesday, June 11, 2008

Hellifino

I have not made a recent post because I have found NOTHING worthy of noting. The forums to which I belong are full of children and other immature types - the former need "raised up proper", the latter put out of my misery. Really, grow up already; lose the diapers. Baby poop belongs not on the Web! I have become so disgusted even my own stuff reeks to me. This is bad. Maybe a cold beer and a slamming stereo will break this hellifino what... Cya

I tell it like it is. My rep on the forums took a dive because I exposed a FRAUD posing as a web designer. I could make a better website with WYSIWYG editing, default templates, and a few snippets of code from people who KNOW what they are doing. KMLWA losers. Yep, I'm pissed off and there is nowhere else for me to vent. You don't like it? Leave a comment; see if I don't blast you off the Web too. Or not, maybe I want the company. LOL

Listening to WIMZ, broadcasting out of Knoxville, TN. Recent: Copperhead Road and Bullet Bites the Bone. Thanks to all the Workforce Rockers for listening. Thanks to the guys and gals who make it real - the WIMZ crew! Pink Floyd now, run Rabbit run...

All content © 2008 Keith E Larson




Saturday, May 17, 2008

How To Protect Your On-Line Article Copyrights

Article marketing can be an effective "low cost" tool for presenting your literary and subject expertise. It can also result in varying degrees of copyright infringement and ownership issues. Rest assured, you become the legal copyright owner as soon as you create your article. As to whether you will retain that right and whether or not it will be honored, that is an entirely different situation.

Marketing inside your own publication "requires" merely a copyright notice on the site. Adherence to copyright law depends upon the integrity and understanding of other publishers. Submitting your article(s) for publication requires you to "give up" or transfer certain rights to the publisher. The legal holder of a copyright (or portion thereof) is not necessarily that of the originating author. Publishers will generally post their "requirements for inclusion" in a prominent location on their site. Readme files and fine print are often overlooked as standard blah-blah-blah. They are NOT! Those disclosure statements are legal documents intended for the preservation and protection of the rights and responsibilities of both the author and publisher.

OK, your intellectual work is an original, and as the author, you own the copyright in its entirety. Now you want a wider audience than you have available on your own. No longer then will all rights be reserved; some copyright provisions will have to be assigned to the publisher(s). First right to publication is yours by default; use up that right and it is not available for anyone else. That is correct, first right is consumable. You cannot publish your own work and then submit to a publisher demanding first right because it is no longer yours to offer. You have given it up to yourself. You have consumed the right. Be quite certain of the first right publisher's intended time frame for use of your article. Put your own time limit on this exclusive right if necessary. Unsavory characters could otherwise bury your intellectual work of genius forever. They might also delay it long enough to publish a similar copyrighted work of their own choosing, thus making you look like a plagiarist. Believe me - it happens.

Works of extremely high personal or professional value should be registered with the official copyright office in your country! You may also post copyright notice in the USA from most other countries. Furthermore, copyright protection laws, and the enforcement thereof, vary from country to country. Once you post to the internet you are vulnerable to literary pirates of all sorts around the globe. Be aware but, DO get published.

Reproduction, distribution, and re-distribution rights are what make article marketing work. This is what allows your intellectual property to be seen by a much wider audience than you might reach on your own. Your article may then provide much needed or desired content on another site. The restrictions/conditions for use must be clearly written and included as a part of the whole. It is a package deal - all or nothing. This helps to ensure proper citation for your work and places your own homepage URL within the body of the file. Protected and published (hopefully) as a whole unit. Everybody wins.

With proper citation, which includes a live link back to the source, part of your article might wind up on a blog post without your knowledge. There is an assumption of implied consent on your part to be "reported as news worthy". This could provide you with yet additional exposure. It might then bring further desirable, even controversial, traffic back to your site. The latter likely resulting in a threaded (you must have this feature installed/enabled)) commentary right on your homepage - returning visitors!

The right to resell, or not to resell a copyrighted work is a very specific legal right which is generally incorporated into the general copyright notice. For the purpose of Article Marketing the keyword is NOT; no one should be selling your work directly for a profit unless specifically authorized. There is also a giveaway provision which might be included but, this is usually for more complex works such as ebooks. Copyleft and derivative works are beyond the scope of this post; however, their definitions and intentions are readily available at Wikipedia.

All content © 2008 Keith E Larson



Friday, May 9, 2008

Reviewers at W-T seeking sex!

The following conversation with the folks at Webmaster-Talk Forums has run its course:

"This is a farce! The respondents are replying to sexy avatar pics rather than honest requests for a review. As a professional reviewer I look for the lessor marked and go for them first to give the "little guy/gal" a shot at infamy. The two top reviews at this time both have a girls pic as the avatar, one of them is a guy who is deliberately using sex as a marketing tool on this forum. My site is honest and so is this duplicate request for review. This is a test of the viewer mentality, moderator judgment, and value of continued service at this forum. I do NOT have time to waste on disingenuous sites. V.O.I.D."

I thought I had found a good place to get noticed while providing a valuable free service to webmasters which might give me a boost as well. Maybe I could find some friends there? Maybe. I have not given up hope, though I have a different opinion since my recent discovery. Just look at the response numbers as I do, then check the low #s versus the high. Its obvious. Sex sells.

This quote is taken from a PM from a moderator at W-T: "I'm not certain I understand what you're so irate about in your rant in the blog reviews section. Would you mind explaining what the problem is ? I read your blog entry too, I'm still not sure what is wrong.

Is it just some member's avatars that you are finding fault with ?? If so, who are they ? We do have fairly strict rules here about adult-oriented stuff - we do not allow it.

Thanks."

I thought I was being quite clear. At the time of this alleged rant the two top posts both had human female avatars quite obviously oriented to attract attention not to the blog but, to the image. This avatar from sizzler_chetan was painfully obvious. This is a MALE poster presenting a sexy female image to the world which at first appears to be the poster "herself". This is blatant use of sexual connotation and is also misleading advertising. What about this is difficult to understand? Where is your morality? What about simple honesty? Why should I continue to review here with such an obvious bias toward sex? There were multiple blogs listed yet, the only two with major responses were attached to female avatars. Perhaps you do understand, and are denying accountability. Adult oriented? Get real. This is all about how YOUR VIEWERS look at the posts. It is ALL ABOUT SEX because that is what it is.

"I would hardly go so far as to call it false advertising.. the guy's not advertising.. it's just an AVATAR in a forum."

In the USA this is DEFINITELY advertising, as such it would fall under the preview of misleading. All avatars are expected to be a reflection of the poster in some way. I do appreciate your contact and continued discussion of this matter. Since I need to participate in a global format, and my views can be somewhat rigid at times, your assistance in this matter is very gratifying/enlightening. Thank you.

"What would that say about me if I used a photo of my cats ?? It would say nothing more than 'I like cats'."

And when you use a pic of a sexy girl it says two things; I like sexy girls, and I'm using this one to sell my blog. That's close to prostitution, it's technically legal but, not very honest. He withdrew the avatar? Hmm, wonder why. Not. You want to sell your blog with *****cats make em furry and four legged; there's way more than enough reference to sex on the web. We do NOT need it here at W-T.

Haha! Got censored when I meant the literal psycats! Thanks for the continuing epic.

LadynRed, there is a certain expectation from your avatar, followed by your demeanor and attitude. When what is found behind the avatar is FALSE it is a LIE. Period. Yours seems to suit your position as a Mod and a commentator in general. Does this help you find my objection?

Liars, cheats, and thieves are intolerable. Where is the proper forum for the discussion of misuse of sexual innuendo? I am not alone in the recognition of this blatant disregard for appropriate use of avatars. This is avatar abuse at the level of misrepresentation leading to an inappropriate expectation of service which will be denied at first contact. Sex sells. Abusive innuendo hurts all of us.


All content © 2008 Keith E Larson


Tuesday, May 6, 2008

Social Bookmark Maintenance

Maintenance work on my Blinklist account is, as always, on-going. Much had fallen behind during the redevelopment of V.O.I.D and its supporting cast of characters. The tag list is much closer to my intended purpose, with fewer tag redundancies and greater cross-indexing. In theory, a tag search for photo editing software should now be found under photo, editing, and software; however it will NOT be found under the three word phrase, "photo editing software", nor shall you locate it under "photo editors". There is no hierarchy structure, as yet, to Blinklist which might support multiple sub-categories under a single "root" tag. Maybe the 2.0 release will provide a folder/file format; such an improvement would; however, cause many days of re-organization...

One feature of Blinklist which I use quite a bit is the QuickBlink button. This allows for a speedy and private post while maintaining my focus on the project at hand. Without it, I would become hopelessly mired in the sticky web strings so enticingly place before my path. Some links I will follow in pursuit of the research; other links will be "placed on hold" for development.

The last few days I have returned to the QuickBlink tag list in an effort to categorize those findings for both Research and Development, and my social network. One hundred thirty three posts had to be upgraded from a simple bookmark to a useful and locatable instrument of productivity: a valuable tool. Information not properly labeled, nor logically placed, is merely raw data of very little use to the end-user. Except in this case, my re-discovery of these "lost" bookmarks was very rewarding in and of itself! Some were savored, de rest deleted.

Finally, the most important step in this process must be completed; backing up all this work is essential. Blinklist provides multiple export options which allow for a variety of solutions. The simplest method is a "backup to browser" function. It has an intermediate step which saves a standard bookmark file to the hard drive. The file is good there for rebuilding, right? Sure. What happens to my social network contacts when the primary bookmark manager is off-line? They can't pull a link off my browser but, I want them to find my posts. Therefore, IMPORT. Many people do this already, as indicated by the preponderance of "imported" tags found on social bookmark sites.

The recommended import tag is not necessary for my purposes since Blinklist and Del.icio.us are one unit; bound together by my browsers and my backups. One of them does have a serious spam problem in its public search list which will be addressed in the next release. The other was only recently integrated into my network so I have yet to fully assess this area. These two represent a small fraction of the social search opportunities available to the astute researcher.
Certainly you can think of a few more?

All content © 2008 Keith E Larson


Monday, April 21, 2008

Disclosure and Disclaimer Policies

badge-large.jpg

This policy is valid from 21 April 2008


This is a personal blog written and edited in its entirety by the author. For questions or comments about this policy, please see the current contact information on my profile page.

This blog accepts forms of cash advertising, sponsorship, or other forms of compensation. However, I will continue to post regularly about that which I find inspiring and refuse to be manipulated by potential sponsors. They will either accept my blog and I for who and what we are, or they will not be welcome here.

It is my reputation as a Blogger and a Maven that is on the line; This I will not jeopardize.

This blog does not contain any content which might present a conflict of interest. I am free (as in freedom) to choose that about which I blog. Refusal to publish advertising for any reason is at my own discretion.

Keith E Larson
Author and Publisher

To get your own policy, go to http://www.disclosurepolicy.org


Disclaimer Policy

All information provided on this site, particularly any information relating to specific hardware, software, products, or services is presented for general informational purposes only. It should not be considered complete or exhaustive, nor does it cover all aspects and issues or their suitability for use under all circumstances.

While the author and publisher makes a reasonable effort to include accurate and up-to-date information on this site, the information you access through this site is provided "AS IS" and without warranty, express or implied. V.O.I.D Scribe makes no warranty as to the reliability, accuracy, timeliness, usefulness or completeness of any information accessed through this site. Keith E Larson assumes no liability or responsibility for any errors or omissions in the content of this site. To the fullest extent permissible pursuant to applicable law, Keith E Larson disclaims all express or implied warranties related to this site, included but not limited to implied warranties for merchantability and fitness for a particular purpose.

By using the V.O.I.D Scribe site, you agree not to rely solely on any of the information contained herein. Under no circumstances shall V.O.I.D Scribe or Keith E Larson be liable for your reliance on any such information, nor shall it/I be liable for any direct, incidental, special, consequential, indirect, or punitive damages that result from the use of, or the inability to use, the materials in this site or the materials in any site linked to the V.O.I.D. Scribe web log.
Your use of this web log (Blog) site is at your own risk.

Friday, April 18, 2008

Vista and McAfee Woes

Talked about forever, rumors and promises mixed together, and finally SP1 came out as a regular update. I took a deep breath and held it; the anxious tension making my heart race and my palms sweat. What have I to fear? My reasoning self-assurance was of no comfort. Then I clicked the update button. Not long after I discovered the need to breath; this was going to take quite some time. I waited, watched, and dutifully did what I was told. Trust? Not really but, I do have faith in Restore Point. That was a good idea well implemented.

At first glance, everything seemed to be alright, which is suspicious in itself. This is Windows Vista: temperamental at best; a nightmare more often than not. Why must they insist upon reseting all of my desired settings to their own ludicrous defaults? Only I know what is best for me and my PC, not Microsoft! Even my Hotmail account was dysfunctional for several days, and I didn't know about it until all of the backlogged messages burst through at once. What has that to do with SP1? Who knows, maybe it's just a coincidence. Why are there no "lemon laws" for software, particularly operating systems? Ironically, I went to msconfig to lock out all future updates; now I won't be tempted to allow the tyrant "one last chance".

Realize that all of my security applications were disabled for the install, as recommended of course. So, the first discoveries occurred immediately following restart. As I attempted to re-secure my system. My replacement choice for the resource hungry McAfee Security Suite included ClamWin AV which would no longer load due to some esoteric error which I did not think to record. With no suitable alternative at the ready, I was forced to re-install McAffee. Now, which of the remaining security applications must remain disabled to avoid internal bickering? Ah yes, the Comodo firewall I had been training for weeks. And naturally, the on-access scanner added due to the lack thereof within ClamWin.

Due to a previous issue with the McAfee "Quick Clean" which required a re-install, I knew that SpyBot would be reported as incompatible and "...must be un-installed prior to..." This is simply NOT TRUE! They can be taught to play nice with each other and make a very nice team; each one senses and reports a little differently in accordance with their parameters. Sometimes they report together but, generally one or the other finds something amiss. Therefore, I left SpyBot and TeaTimer unloaded while I got McAfee back on-line. Next was Comodo Anti-Malware which would have reported and stopped the install but, works wonderfully in the background otherwise.

Somewhere along the line KeyScrambler got knocked out; MetaCrawler flawlessly pulled up the necessary page for a quick and painless re-install. What I did not know was whether there would be issues with CCleaner and Total Privacy 5 as they were added to the mix without McAfee's presence. Proper set-up with each cleaner is essential to both proper operation and clean start-ups and shut-downs. CCleaner is set to run at start-up as soon as it is loaded, then shut down; this works out fine because McAfee loads first and keeps control until it is finished. TP5 is set to load to the system tray in anticipation of an eventual shut-down; Vista recognizes and waits for TP5 to finish prior to actual shut-down. SpyBot has a delayed run option which is wonderful as this application takes even longer to load and run than CCleaner. The two of them fight over resources when started together which makes boot-up even slower than waiting three minutes for everything else to finish.

As a final tweak I have disabled every available splash screen except SpyBot. All of the others will appear in the system tray should I be wondering about progress. The final indicator of imminent start-up is the three minute SpyBot timer; this will take several minutes to update and run then, I'm good to go once again. Everything is now updated, cleaned, and standing at the ready...



"In the true Literary Man there is thus ever, acknowledged or not by the world, a sacredness: he is the light of the world; the world's Priest; guiding it, like a sacred Pillar of Fire, in its dark pilgrimage through the waste of Time."



-Thomas Carlyle

Tuesday, April 1, 2008

Total Privacy 5 - Software Review

Pleasant surprises are always welcome on my world; today's GOTD offering is right up there with discovering a new friend.

Background from the download site:


"Total Privacy provides the most advanced information removal solution for protection against today’s malicious online and offline threats. Total Privacy 5 makes use of the most advanced washing and shredding methods available today to make sure that your own private business and computer use remains exactly that - private.

Securely clean Internet tracks, system activities and program history information stored on your computer with this safe and easy-to-use Windows privacy protection tool. Also Wipes the free space to make sure that previously delete files cannot be recovered. Supports all major browsers in addition to over 450 popular third-party applications.

My initial summary for the GOTD site:

Get this program installed NOW! I am a supporter of multiple security
products and Total Privacy 5 just hit the top of today’s list of MUST
HAVE security applications. All issues are clearly explained in a
separate description box on mouse-over so you know exactly what it
intends to clear. I strongly encourage, no I insist, that you do NOT
check any box you don’t understand! Has several “exclude” functions
such as the cookies list. Take the time to set this one up properly. My
PC runs CCleaner on start-up; the only thing I’ve run is Flock >
GOTD > TP5. This is the summary from my test run; Total Items: 43;
Custom Items: 14; Total Recovered: 3MB disk space, 29 Files, 7 Registry
Entries. Be careful with index.dat and registry streams - these
erasures WILL affect certain performance and display properties. The
full report will be available shortly on my blog, “V-O-I-D: What’s
REALLY out there?”.

The Full Report:

All of the following items were listed after CCleaner and the download; some files are there because of the TP5 download, others were not listed at all by CCleaner. I use my cleaner at least once a day on start-up, mostly to clear the useless files and registry entries that accumulate throughout my workday. As an Internet Investigator of many genres, there are also instances wherein I encounter files which I do not want in my possession, nor bugging my machine. Set-up of Total Privacy will take a little time, especially when preserving certain settings such as cookies.

In the case of cookies and dat files it is best to make a written note of those for which you are uncertain prior to erasing them. When next you encounter an item from this list you will recognize it as being from either: a friendly program with a funny named cookie, or an executable you got AGAIN from an unknown source. The latter case goes beyond the scope of this post to explain.

This is what Total Privacy 5 found and erased:

Document History 1 file; Start Menu Clicks 5 files; index.dat 3 categories/files 39 items and 96KB; Favorites Order History 1 item; Downloaded Components (DO NOT check box unless you want to eliminate your plug-ins!) 8 items and 4MB; Messaging detected ALL installed IM clients and offered 3 items for clean-up on each; Custom Plug-in Cleaners, checked "show only detected programs" and found 16 (Again, read what each does as you may want to keep certain items - my quarantine list from SpyBot being one of them.); Warning: Windows Direct Input will erase all user generated data files; Windows Temp 3 files and 270KB; Sys Temp 4 files and 3MB; DO NOT CHECK Registry Streams or Registry Streams MRU as this will adversely affect the PC you have set up as you want it! It also detects MS Office .doc files accessed even when opened with OpenOffice.org

Read the description box for everything you ever wanted to know about what you are about to obliterate. Most people can safely use one of the 3-pass options, mine took less time than a single intake of breath! It also has start-up and security management tools. Altogether, I am impressed enough to give this one a 10/10 rating for PC cleaners and highly recommend you get to the GOTD site and get this one installed while it's free.

A quick trip back to GOTD revealed this post direct from the application provider:

Regarding the question about how Total Privacy affects the registry, many privacy items are stored inside the registry (MRUs, Registry streams, history information for many programs, IE AutoComplete data and much more) and so, if you select to clean any of those items, Total Privacy will obviously have to access the registry to remove selected values.

Accessing the registry to remove any of those items is completely safe and Total Privacy is smart enough to only remove items that do exist (as opposed to some other similar applications we encountered before that just try to remove anything and everything without any safely checks first).

Total Privacy was tested on Windows Vista, XP, 2003 and 2000 and so it targets the correct registry locations depending on the operating system you are running.

I hope I was able to shed some more light regarding this question. If anyone have any questions or comments (good or bad) that wish to discuss with us feel free to contact us directly at http://www.pointstone.com/support/support.asp

Another positive reinforcement from the GOTD comments section:

Mr Martin

I just downloaded the program and started reading the comments, as they sometimes influence my decision to install the program. This is the first time I have seen anyone associated with the program present and fixing problems as they occur — not to say it has never happened — it is just a first for me.

Don’t know about anyone else but this REALLY impressed me. Want you to know Mr Martin that because of your interest in helping us with bugs and gliches, even though you will show no profit from our download, that I will be buying the product directly from the site as opposed to taking it free. It is rare and refreshing in todays product market to see integrity in ones work and creation. It gives me the impression that questions and problems would be addressed by your software support system quickly and efficiently.

Thanks GAODT for the numerous free and useful products and games you have given me.

Comment by MamaBunny — April 1st, 2008 at 9:04 am


Wednesday, March 19, 2008

Frustrated Efforts Lead to Sneezure

Browsing with Flock I attempted to add my Blinklist tag cloud to Blogger. The preview works as expected, with the cloud displayed just to my liking. Tap the View Blog button or go direct to the URL and all I see is a box with the Header and Footer - NO CLOUD! Trying to locate solutions from either Blinklist or Blogger resulted in nothing but an even more aggravating (and temporarily debilitating) fit of sneezes; what I have termed a "Sneezure". My right sinus still itches/tickles thereby promising yet another episode should I return to the bigger issue: The question I have is not listed and I have no idea where to post it. Furthermore, once posted, and without without an email notification pointing back to the thread, I have no idea where to return for a potential answer.

To further add to this complexity, I have considered adding a forum directly to this blog. I also have both a chat client and IM which I may include at a later time. First; however, I shall have to do some social surfing through a "friends" network to attempt the generation of at least a couple of more-or-less regular contacts. Not one of my contacts in the "real world" has any interest what-so-ever in the true Global Society. Pity. I once saw a "sticker" on a social site which read, "I love my computer. All my friends live there." Want to be one? Check my contacts panel.

Configuration (Security) Complications

It figures, my own browser security prevented me from seeing that which most of the freeWeb could view quite readily. A cookie cutter problem really, blogspot was not specifically "allowed" and the normal A/V indicators offered no assistance; therefore, due to the need to protect myself from the cyber-terrorists of the world I suffered a sneezurious breakdown. (See http://www.addictionary.org/ for my definition of "sneezure", and this one from another contributer: "stoptional" (adjective) the condition where a stop sign is posted at an intersection but drivers seem to think that coming to a complete stop is their choice; not required or mandatory.)

All is well that ends with cool fresh water IN the well...
(Grandma had a mineral rich Artesian well out at her place.)


Community Commentary (powered by DisQus)

"There's no reason to treat software any differently from other products. Today Firestone can produce a tire with a single systemic flaw and they're liable, but Microsoft can produce an operating system with multiple systemic flaws discovered per week and not be liable. This makes no sense, and it's the primary reason security is so bad today."
Bruce Schneier, Cryptogram, 16/04/2002

Creative writing demands better word selection; interactive word mapping expands your choices.

"In studying the history of the human mind one is impressed again and again by the fact that the growth of the mind is the widening of the range of consciousness, and that each step forward has been a most painful and laborious achievement. One could almost say that nothing is more hateful to man than to give up even a particle of his unconsciousness. Ask those who have tried to introduce a new idea!"
Carl Jung
Swiss psychologist (1875 - 1961)

Would you like the tremendous advantages of mature writing skills plus an expressive style?

ABOUT: The conception and birth of V.O.I.D.

My photo
V.O.I.D. evolved in my sleep; becoming a waking dream which was then compounded by intuitive leaps. Formerly known as "w2w_Webfly's World" this site became the centerpiece of my socio-economic network. As such, the webfly persona no longer served as an iconoclastic representation of what I do here in CyberVille. I am still w2w_Webfly on many sites and will stay such for a while; perhaps gradually shifting screen names to w2wScribe. An attempt to establish an AIM profile registered the name but, not the profile. Ready, fire AIM.
"If computers get too powerful, we can organize them into a committee -- that will do them in."
Bradley's Bromide
"The purpose of life is to live it, to taste experience to the utmost, to reach out eagerly and without fear for newer and richer experience."
Eleanor Roosevelt
US diplomat & reformer (1884 - 1962)

RuneScape Multi-Player Game