2009-12-31

odd characters moving mac files to pc

12.20: mis.addn/mac/odd characters show up moving to pc:
. used editor to fix bad apostrophe's for entire 2009 log *.txt
by replacing [large O with ~ over-head] with "(') .
. looking at the results, it appears that
[large O with ^ over-head] is sometimes paired with
[large O with ~ over-head], as if they're in the habit of using a right-side quote
in place of an apostrophe .
. I never noticed these on the mac, apparently because mac was
graphing them correctly, or translating to something non-std (atleast for pc world) .

pc antivirus with avg

12.4: proj.addn/xpw/security/avg:
. look at avg free antivirus:
has download time cutoff issues;
... but softpedia.com points out that's just ms`ie: try firefox
[later I'd learn that you download a downloader]

web.addn/xpw/security.ware:

Avira AntiVir Personal - Free Antivirus 9.0.0.415
A file change monitor. Used with BlackICE Defender.
can monitor a given file for changes.
Monitoring can detect file size changes or simply file writes,
both with minimal impact on system resources (no polling is performed).
The primary use of this utility is for monitoring
changes in the log file of a personal firewall program
and being able to spawn a separate application
when changes are detected,
but the tool can be applied to any number of other uses.

12.17: mis.addn/xpw/busy overnight with script:
. xpw is very busy with fan blaring
after seamonkey has found a script that won't quit?
and yesterday it kept thrashing?
re-login to flush things .

mis.addn/xpw/thrashing:
. get more fields in view that might be related to thrashing,
and give some idea if some app has a mem leak .

12.18: mis.xpw/Exploit Rogue scanner attacker:
. agv complains accessed file is infected:
antivirusguard22.com/1/img/listfile.js
threat name:Exploit Rogue scanner (type 961),
. it wouldn't let me close the popup alert,
I used the close button, but after I did that it started scanning
until I closed the parent window .
. anyway,
there's the reason I don't have my password.file on this!
you have to be smarter than foggy headded about
whether all your browsers on every system have noscript
and whatever else ... .
. don't I have noscript on seamonkey?
maybe that was just mac, do it now .
. seamonkey did not record where it was coming
from with that rogue page .
[... not sure how I lost it; found history page later]


12.19: mis.addn/xpw/low v.mem with much page faulting:
. why is mem furiously page flipping right now?
I must have a virus;
see what is doing mem io and kill it: file explore? close;
seamonkey? kill process tree .
41: restart,
on the way out it said my v'mem was low,
so maybe things were just flipping because of a leak,
and the wild disk activity was gc
which it might do when it sees I have done much in a while
(mostly staring at the editor ) .

mis.addn/xpw.seamonkey/confused about history:

12.20:
. I did find history
and the link was found with the bad redirect:

How complexity rules our lives - CultureLab - New Scientist
http://www.newscientist.com/blogs/culturelab/2009/12/how-complexity-rules-our-lives.php
go.php
http://new-count.cn/go.php?id=2006-51&key=0522c7066&d=1
computer security
http://antivirusguard22.com/1/?sess=%3DGG39jDwMS01MSZpcD03Mi4yMDAuMTI3LjE0NCZ0aW1lPTEyNjYxMgkMMQkN
. trying the newscientist.com site again,
http://www.newscientist.com/blogs/culturelab/2009/12/how-complexity-rules-our-lives.php
and this time the redirect was to
http://fast-scan37.com/1/?sess=%3DGGz9jDwMS01MSZpcD03Mi4yMDAuMTI3LjE0NCZ0aW1lPTEyNjYzMcgMMQkM
I again got another avg alert, again for
Threat name: Exploit Rogue scanner (type 992),
and it said threat was blocked .

. so then I searched the site for the original page:
http://www.newscientist.com/blogs/culturelab/2009/12/
how-complexity-rules-our-lives.php
seems to have something to do with
new-count.cn counting how many times you been there?
going to it again didn't result in a new redirect .

12.21:
. can't find any mention of the site;
whois claims it's available .
. might be some trick in the spelling of the name
or in some other way affects the say browser records the link ?

cell texting spam costs

11.16: proj.gear/cell/how to control text msg's?:

Here are some ways to block mobile phone spam,
also known as SMS spam or m-spam.
They're not perfect, but they might hold you over until
spam-blocking technology catches up with mobile phones.
# Dispute your cell phone bill. If spammers continue to get through,
you may be able to convince the carrier to
drop the charges associated with those messages.
You have a better chance at this if you call as soon as your receive the spam.[3]

to block text messages from up to ten telephone numbers or email addresses; you can also change preferences on your handset
(VirginXL or VirginXtras > Messaging > Messaging Management).

* Registering your phone on the National Do Not Call Registry
only prevents phone calls, not text messages.
* Do not respond to text message spam,
because usually the first time is random numbers being tested for responses.
If you do respond to a spam message,
you may inadvertently sign yourself up for additional spam messages
as many times spammers can
and will sell your digits to other spammers.
Don't take their bait.
Report problems. File a complaint with the FCC by filling out online form 1088.

you can also register your cell number
to block telemarketers from sending communications of any type to your cell account.

Step Two: Make Sure Your Information is Correct
Please check your phone number(s) and email address below. If they are correct, click Register to continue. To make a correction, click Change.
Your email address MUST be correct to process your registration.

THREE: OPEN YOUR EMAIL AND CLICK ON LINK
You have submitted your phone number(s) for registration in the National Do Not Call Registry. You will receive an email from Register@donotcall.gov. To complete your registration, you must open the email and click on the link provided.
Important: If you do not click on the link in the email within 72 hours, your phone number will not be registered.
Troubleshooting: If you don't get a "Registration Complete" message after clicking on the link, or the link does not work, use your "copy" and "paste" functions to insert the entire link in the email into the "Address" line on your Web browser. Copy and paste the entire link - it's long. Do not re-type it.
This browser window does not need to remain open to complete the registration process.
Register@donotcall.gov/National Do Not Call Registry - OPEN AND CLICK on Link to Complete Your Registration:
Click on the link to complete your request to register your phone number with the last four digits 5159 on the National Do Not Call Registry.
Important: You must respond to this email by clicking the link within 72 hours for your registration to be successful.
Important: After you click on the link, print the web page and keep it for your records.
Troubleshooting: If you don't get a "Registration Complete" message after clicking on the link, or the link does not work, use your "copy" and "paste" functions to insert the entire link in the email into the "Address" line on your Web browser. Copy and paste the entire link - it's long. Do not re-type it.
You have registered the following telephone number in the National Do Not Call Registry:
(520) 982-5159
Please print a copy of this page for your records.

1. You may file a complaint if you received an unwanted call
after your number was on the National Registry for 31 days.
2. You may also file a complaint if you received a call that used
a recorded message instead of a live person
(whether or not your number was on the Registry).
*Reminder: Even if your number is registered,
companies with which you do business may continue to call you.
So may charities, political organizations, and telephone surveyors.
for more information about the companies
that may continue to call the numbers on the Registry.
Click on Privacy and Security to learn how the information you provide is used.


I recently received about 5 spam text messages in the span of a couple of days
and do not have a text plan.
I had registered my cell number on the Do Not Call list
and could not find any info at the Do Not Call website
about the law applying to text messages, so I called the FTC.
being registered applied to spam texts? no.
I hope that more people call the FTC and complain about spam texts
and with any luck the law will change to include them.
As other people have mentioned, spam email and phone calls, to land lines,
don't cost anything, but text messages do.
The practice of sending spam texts to cell phones
is costing people money and the law should protect us from it.
If you are receiving unwanted text messages ("spam"),
contact the source and unsubscribe or remove your mobile phone number from the service.
You will not be charged for Virgin Mobile service alerts.
You have the ability to block text messages
from up to ten telephone numbers or email addresses
by visiting the Messaging Settings page on the Virgin Mobile website
(www.virginmobileusa.com). You may edit your preferences at any time.
Unsolicited Messages
If you intentionally send spam from your Virgin Mobile phone,
we may terminate your service without further notice.

co.phone/vmobile/wrong plan!: 2min: cell: non-contract phone oh!

figuring out I have the No Annual Contract:
1-888-322-1122

. they did disable my ability to accept (or give) text msg's?
woo hoo! I've always been a big fan of vm,
and I'll really be rededicating those efforts -- that was great!
. ok thank for [...] because we are giving good advice .... to you .

. I can get on the site after it's been upgraded,
in any case they did recognize my number and pass by phone;
. amazed they were able to disable txt msg'ing:
that was eerily easy ... wouldn't have expected that .


hand warmer for keyboarding in the cold

11.17: proj.gear/hand.warmer for fast fingers:

. keyboard house needs a wire frame made from one wire for stiffness
that comes in 2 parts for adjustable its like 2 tables with on upside down
and legs of them are bound at a distance of your choosing .
. the top table slanted on either side .
. the joists are twist-arounds,
and they hold up the heat pad which is covered by the reflectix .

. to control height add loops end of table legs
to connect them by string so that the string can keep the endpoints
at a fixed distance without having to rely on the frictional force
created by binding the legs together with a winding .

11.21: gear/hand.warmer/redesign for boundary problem:
. the box for kybd has a boundary problem:
sometimes the hands like to travel straight from home keys
over to control keys
and that means the sides have to be clear of any box struts
atleast up to the delete key on the right side .
. instead of the peak sloping to the sides,
it would be more heat and space efficient to slope front and back;
the slope allows the heat pad on the roof to cover more of the arms .
. this also allows a bar from side to side
at both the rear and front
that help stability a bit .
the rear bar is part of the bottom table,
the front bar is part of the top table;
except the table model needs adjusting
because the top`struct has to overhang forward,
while the bottom`struct has to recede .
. one simple wire design is
start from front corner;
mov back horz'ly until past the kybd's delete key;
rise for height of roof`slope`bottom;
mov horz'ly to rear of tray
mov horz'ly to center of kybd;
do same for other side (in reverse order
and so wire is all one piece) .
. the front-back horz gives the top an anchor for
a top that is a horz rectangle
with 2 other rectangles for back and front sides of roof .
the roof hangs with peak over knuckles when fingertips are
numbers row (makes a tight fit for little-used function row) .

11.28: gear/hand.warmer/composite cardboard with metal joints:
. to save on wire, just use it for the joints
bound to scrap wood (or rolled cardboard) .


12.1: proj.gear/kybd.box/heatpad frame:
. make a c-shape when viewed from side
so that to change height,
have chg in depth of c
. then when feels right add reinforce as needed .

12.2: proj.gear/messed wire can be reused:
. mess wire ? can reuse as staples:

proj.gear/kybd.box:
measure:
. 11*2 wide, 8deep at bottom
7" high center for 2" high over peak,
7+3 on to make the c-shape for the back .
wire version:
. final design was an extruded-Y shape with the bottom of y bent L-shaped
to form the let, and the top of the Y acted as joists to lay heatpad across .
extruding means the top of left fork of one Y connected with left fork of other,
and likewise for right forks .
y`bot: 8in,
y`top: 7in .
(2*8+2*7+11+13)*2 = 9.0ft of wire
. after building;
seems ok for heat pad,
but what about sleeping bag? way too heavy .
. the whole lid needs to slide into a box;
then can nix the heat pad .
. found during log that the fingers need a lot of space for shift-combo's
as the main fingers lift as part of landing the pinky on the shift key .
. the mac needs to be higher than the kybd with the box around it .

proj.gear/kybd.box/cardboard version:
. to make the box,
find one of any length that is right in the other dimensions,
and then add the extrusion with sealing tape .
construction:
. needed to be a bit wider than kybd`platform,
this was exactly the width of a box I found,
but a minor distraction was the grey-board quality of that cardboard:
the tape didn't stick well .

Shlomo Sand on Zionism


. Mixing respected scholarship with dubious theories,
the author, Shlomo Sand, a professor at Tel Aviv University,
frames the narrative as a startling exposure of suppressed historical facts.
The translated version of his polemic has sparked a new wave of coverage in Britain
and has provoked spirited debates online and in seminar rooms.
Professor Sand, a scholar of modern France, not Jewish history,
candidly states his aim is to undercut the Jews' claims to the land of Israel
by demonstrating that they do not constitute
"(a people), with a shared racial or biological past.
Consider, for instance, Professor Sand's assertion that
Palestinian Arab villagers are descended from the original Jewish farmers.

Since Professor Sand's mission is to discredit Jews'
historical claims to the territory,
he is keen to show that their ancestry lines
do not lead back to ancient Palestine.
He resurrects a theory first raised by 19th-century historians,
that the Jews of Central and Eastern Europe,
to whom 90 percent of American Jews trace their roots,
are descended from the Khazars,
a Turkic people who apparently converted to Judaism
and created an empire in the Caucasus in the eighth century.

Professor Sand accuses Zionist historians from the 19th century onward
-- the very same scholars on whose work he bases his case --
of hiding the truth and creating a myth of shared roots
to strengthen their nationalist agenda.
He explains that he has uncovered no new information,
but has organized the knowledge in a clarifying way .


any low-crime societies?

11.24: web.pol/any low crime societies?:


. very cool site with rich set of views:
click a country to see all the variables per country .

yun, ilhong, American Society of Criminology, 2009-10-26
Confucianism serves as the origin of reintegrative shaming
as well as low crime rates in East Asia, including Japan.
It also shows how Confucianism relates to
communitarianism, interdependence, and social dynamics that affect crime rates.
Finally, it suggests a strong moral education, both formal and informal,
as a potential way to decrease high crime rates in the United States.

lessons from usa-brit independence revolution

11.10: pol/lessons from usa-brit independence revolution:
. I noticed how anti-communism is rooted in
the independence revolution .
. if your subjects could run away,
would they?
during the dawn of America,
britain should have pushed only for
what it really needed:
. the important thing in the european wars
over control of the new world
was that one superpower should not be able to
use america's vast wealth as a weapon against
another superpower .
. they could have achieved that
not by enslaving the colonists
but instead by insuring that no other euro'power
could enslave them either .
. the war on communism could be seen as having this stance:
[11.14:
. dictatorship is slavery,
and communism is the most alien dictatorship,
if we can root out the slavery of dictatorship,
forces of democracy will at least choose to
sacrifice themselves in a fight against
anything that is alien to our own democratic values . ]

communism and capitalism can complement each other

11.10: pol/communism and capitalism can complement each other:
. use plug-in architectures to both insure separation of power
-- a great american value --
and find the most efficient place for capitalists
within a communistic framework;
eg, finding and motivating employees
is always a cutting edge technology;
so make employment agencies a capitalistic module,
but make them open-book servants to
the separate branches of
directorship and quality assurance .
[11.14:
. the way this would differ critically from the current system
is that corporations have privacy rights like people do;
and under a communistic system,
there would be outsiders who both documented
who initiated the fresh productive ideas,
and also watched for
the rot that occurs in dark places . ]