2009-12-31

wifi is fragile on fujitsu lifebook or my clumsy security

12.2: addn/xpw`wifi [laptop(walkable) with xp]

[12.13: summary:
. the router's underside has the name of website to reach router controls;
if you forgot your password, then use the router's reset button .
. mac(acct#user).firefox`bookmarks provided a pass .
. the first section -- basic -- is how it connects to your isp .
. the 2nd one sets the lan security parameters:
the ssid is case sensitive,
wasn't sure if xp/dos was needing all-cap's,
so that's why the name is all-cap's .
ADDNET -- not addnet -- ssid
. some security modes are easier to use than others from xp;
here's one that allowed an ad-hoc password:
WPA-PSK [TKIP] -- wpa personal ... key
]

12.2: mis.addn/xpw`wifi:
. xp wifi is broken again? I am disabled with grief .

12.4: proj.addn/xpw`wifi/not good:
. annoyed xp wifi down? try restore, and then don't open vmware .

12.5:
proj.addn/xpw`wifi/lost comm depite restore,

proj.addn/xpw`wifi/reconfirm pass with change:

. working from mac, re-study how to get into router, ...
router wants to update self? ok .

. update xpw by ethernet:
wireless settings/
( ssid ADDNET
-- case sensitive (this was the problem; it was capitalized on xp,
and since xp might prefer cap's, make that the way for all)
, sec option: WPA-PSK [TKIP]
) .
insanity:
. change the pass for net before applying change via net interface?
sit perplexed for a minute .
. I didn't forget old pass; just get wifi back with old pass,
then make new pass effective .

proj.addn/mac`wifi/comm illusive:
. liftoff:xp has addnet as (ADDNET) ?

12.5: Troubleshooter report...
Report date: Saturday, December 05, 2009
Name: Driver installation test
Description: This test is to check the radio driver installation.
The radio's registry keys are OK.
Nic name. . . . . . . . . : Atheros AR5006X Wireless Network Adapter
Driver name . . . . . . . : Atheros AR5006X Wireless Network Adapter (Microsoft's Packet Scheduler)
Driver path . . . . . . . : C:\WINDOWS\system32\DRIVERS\ar5211.sys
Driver version. . . . . . : 4.1.2.38
Active Profile Name . . : Default
Test Done: The radio driver has been installed.
Name: Card insertion test
Description: This test is to check the radio insertion.
Test Done: The radio has been inserted.
Name: Card enable test
Description: This test is to check if the radio/driver is enabled.
Test Done: The radio has been enabled.
Name: Radio test
Description: This test is to check if the radio is turned on.
Test Done: Your radio is turned on.
Name: Association test
Description: This test is to check your client adapter's association to an access point.
Link Status . . . . . . . : Associated
AP Name . . . . . . . . . : unavailable
AP IP Address . . . . . . : unavailable
Test Done: Test passed
Name: Authentication test
Description: This test is to check authentication.
Test bypassed: Authentication test bypassed, because authentication is not in use.
Name: Network test
Description: This test is to check your network settings.
Your IP address: 0.0.0.0.
Test Failure: You have not configured your computer to use the client adapter.
Solution: Your IP address: 0.0.0.0. Try to renew the IP address.
Test completed.



12.6: proj.addn/xpw`wifi/comm loss: xpw off, repower wifi wo mac .

proj.addn/xpw`wifi/comm loss/hardware utility:
. try the Atheros wifi card client utility;
instead of xp still not getting through,
try fujitsu click me to get hope from fujitsu updates .

proj.addn/xpw`wifi/comm loss/always-on mode:
. re do so the user acct will stop auto'offing,
-- again being close to the wifi router helped,
and either the screensaver mode or moving away from router
was what put it back into no wifi .
. says the connection is good, but maybe there's a sw schiz'ia .

proj.addn/xpw`wifi/comm loss only far from router:
. unplugging ethercable network
connections added a section
internet gateway that helped wireless keep on going
to take over for ethernet loss .

12.7: web.addn/xpw`wifi/usb wifi adapter:
. the first idea I had was something like a wireless repeater
[without knowing that term at the time]
but the main finds were all usb wifi cards .

todo.web.addn/xpw`wifi/usb wifi adapter: [done]
. look at how external wifi cards work
for adding large dishes to what connects to etherport
and has optional antenae selection,
maybe does usb .

12.8: web.addn/xpw`wifi/replacement options:
12.9: summary:
. xp seems naturally connected to ethernet,
so the modular thing to do is get an ethernet-to-wifi box
(aka: Wireless Ethernet Bridge, AP client mode);
but, there were few of these, and the reviews were spotty,
leading me to research ethernet vs usb .
. usb is the only way to expand my notebook pc;
I also tried to find usb enclosures that would hold expansion cards;
but not easy to find if there are any .
. there are many powerful antennae options;
but the problem with wifi is getting a smart unit
that knows what to do with the jumble of signals from reflections .
. there were so many horror stories about big name brands (linksys/cisco, netgear)
having terrible loopholes in their spec's and support .
. there were many reports of quality variation requiring returns
which lead me to check the offerings of a local provider (bestbuy.com) .
. finally, found one unit with consistent reviews (Belkin`Wireless-N+ USB 2.0 Adapter#F5D8055),
and then found the same response from another site's reviews (newegg.com) .

So far, unlike previous USB adaptors I've tried,
this one doesn't seem to run too hot.
. this is the one .
ominous shadow over ethernet bridges:

"(most ethernet bridges generally are expensive
as there aren't a whole lot on the market.)
AirborneDirect Wireless Ethernet Bridge (Ethernet to 802.11b)
enables plug-and-play wireless LAN connectivity
for any device equipped with a standard Ethernet port.
-- very few reviews, and nothing in stock .

. great when it does work .

. the wifi->ether bridge mode is called AP client mode . (what I want)
. repeater = wifi-wifi .
. access point means AP server: get ether and provide wifi .
WPS (Wi-Fi Protected Setup) is intended to simplify the process of securing a wireless network. All Wi-Fi certified equipment should be WPS enabled. If the two devices have WPS push buttons, then it would just be a case of pushing the buttons and the network would be secured. If the device to be connected via WPS did not have a WPS push button, then the access point can also utilise the WPS PIN method, in which a PIN would be entered on both the access point's config pages, and the other device's config page too.
. can make a wired Ethernet-enabled device a part of your wireless network.
It's optimized for streaming video to almost eliminate dropped frames.
It's ideal for wirelessly sharing music, photos, movies, and other files around the home.
Wireless Compatibility
Since the Bridge is based on dual-band Wireless-N,
it works with any device supporting Wi-Fi standards,
and is compatible with Wireless-G, -A, and -B.
Connect digital video recorders, set-top boxes or computers to your Wireless-N network.
Gamers
The WET610N is a replacement for the WGA600N
and works with most game consoles (XBox, PS2) that have an available Ethernet port.
Windows, Mac and Linux
The Wireless-N Ethernet Bridge works on any platform
and under any operating system.
Since there's no drivers to load, setup is a snap
configure the network settings through your PC's web browser,
then plug it into your device and go.
Simple Setup
To protect your data and privacy,
all wireless transmissions can be encrypted with industrial-strength
Wi-Fi Protected Access (WPA) security.
Wi-Fi Protected Setup(tm) helps make secure connections pushbutton simple.
Linksys by Cisco Certified Refurbished Product
Refurbished product are mostly customer returns that meet original factory specifications.
These products have been fully tested, upgraded to latest firmware,
and certified by Cisco-Linksys technicians via Linksys ISO certification procedures.
other offerings that fell through:

it can only act as a bridge or repeater
in conjunction with another WG602v2 or a WG302 (and you still can't do WPA).
Also, the product ships with a bright yellow note saying it's incompatible with the MA101.
I've used several other Netgear products.
If you're looking for something attractive, simple, and built well, Netgear's great.
But if you actually know a thing or two about wireless networking
you might be disappointed in Netgear due to
limited configurability, expandability, compatibility, interoperability, and performance.
Cisco WET200 Wireless-G Business Ethernet Bridge
Linksys WRE54G Wireless-G Range Expander

. what's wrong with ethernet? is it going out of fashion?
better go with usb and cord .

. movable yagi ant' may be just what you need to catch faint wifi,
but too often the problem is about the drivers not being smart .

. gets hot .


terminology:

. SSID (service set identifier) .

A repeater must receive and retransmit each frame on the same RF channel,
which effectively doubles the number of frames that are sent.

. converts a wired Ethernet device for use on a wireless computer network.
. True network bridge devices like the WET54G (Linksys WET54G Wireless Ethernet Bridge)
do not require device driver software installation .
Instead, network settings for the WET54G can be made through
a browser-based administrative interface.

PoE (Power over Ethernet):
. Like USB adapters, wireless Ethernet bridges can draw their power from
the main cable connected to the host device.
. Ethernet bridges require a specialized Power over Ethernet (PoE) converter
to make this work, however,
whereas this functionality is automatic with USB.
Without a PoE add-on,
wireless Ethernet bridges need a separate power cord.

MESH-mini is designed to work as anaccess point or as a repeater
and is perfect for building andextending wireless local area networks.
It is compatible with alldevices working on 802.11a or 802.11 b/g modes.
The dual radio architecture separates Mesh Set traffic (also called Service Set)
from the edge access traffic (also called uplink and downlink),
increasing capacity compared to single radio mesh architectures.
The first wireless network interface (operating on 5 GHz frequency)
is dedicated for mesh backbone connectivity
while theother wireless interface (operating on 2.4 GHZ frequency)
forms a single radio 802.11 access point for wireless access service provisioning.
MESH-mini is driven by WILI-MESH, which is a secure, QoS capable, portable
Linux based OSI layer 2 wireless mesh networking software platform,
which targets enterprise, campus, as well as WISP networks,
covering significant areas with wireless internet access.
It has all the latest features including the ability to form self-healing
and self-configuring mesh architecture,
as well as the ability to interface with independent
monitoring and configuration software systems.
12.9: aq.gear/newegg.com/order:
BELKIN F5D8055 USB 2.0 Wireless N+ USB Adapter (Black) - Retail /70
-- Item #: N82E16833314040


12.11: bk"wifi,
check for driver updates,
registered:
Wireless N+ USB Adapter Model: F5D8055 Version: v2000

12.12: proj.addn/xpw`wifi/connection made with no pass
. trouble? try reset:
didn't help? use mac to chg no pass:
. how am I changing the netgear pass?
mac`acct#addn.firefox has the pass to netgear,
notice logon then has the model#WGT624v4
got connect,
but not only did I change wifi to simple no-pass mode,
but also connected router by ethernet .
. like with internal wifi card, it works for a while but not later,
so next test is to see if a connection persists when in back room .

proj.addn/xpw`wifi/connection made while far from router:
. got it working in my room, so then it's not a reflection complexity,
nor is being buzzed by any other gear .
. checking belkin.com site for troubleshooting tips,
they suggest doing things through ms`xp's network connection utilities,
including a detailed recipe for turning on zero config .
. now for the restart test,
this fails in user acct .
.. however, going back into admin acct,
things are auto'ly connecting -- using just belkin`utility .
. then once the connection is made from going into admn acct,
then switching to user.acct, it was still connected .

proj.addn/xpw`wifi/connection with pass made far from router:
. chg pass,
used mac#addn.firefox to chg wifi pass,
. redo the connection parameters in xpw#admn.belkin`utility,
logout and then login again,
connection is made!
summary:
. set utility in admn.acct,
logout, login, switch to user.acct .



12.14: mis.addn/xpw`wifi/down again:
. I haven't used xpw in a while;
why is it in the admn.acct?
I think the last thing I was doing was
trying to reformat a drive with disk tools,
and it said it was having trouble letting me into admn
while I still logged into user.acct .
. the wifi stopped working ?
try reconnecting: no?
restart both wifi and xpw: no?
delete connection and reenter: no?
go into belkin wifi utility and set
[let xp wifi utility handle it]: ok .

odd characters moving mac files to pc

12.20: mis.addn/mac/odd characters show up moving to pc:
. used editor to fix bad apostrophe's for entire 2009 log *.txt
by replacing [large O with ~ over-head] with "(') .
. looking at the results, it appears that
[large O with ^ over-head] is sometimes paired with
[large O with ~ over-head], as if they're in the habit of using a right-side quote
in place of an apostrophe .
. I never noticed these on the mac, apparently because mac was
graphing them correctly, or translating to something non-std (atleast for pc world) .

pc antivirus with avg

12.4: proj.addn/xpw/security/avg:
. look at avg free antivirus:
has download time cutoff issues;
... but softpedia.com points out that's just ms`ie: try firefox
[later I'd learn that you download a downloader]

web.addn/xpw/security.ware:

Avira AntiVir Personal - Free Antivirus 9.0.0.415
A file change monitor. Used with BlackICE Defender.
can monitor a given file for changes.
Monitoring can detect file size changes or simply file writes,
both with minimal impact on system resources (no polling is performed).
The primary use of this utility is for monitoring
changes in the log file of a personal firewall program
and being able to spawn a separate application
when changes are detected,
but the tool can be applied to any number of other uses.

12.17: mis.addn/xpw/busy overnight with script:
. xpw is very busy with fan blaring
after seamonkey has found a script that won't quit?
and yesterday it kept thrashing?
re-login to flush things .

mis.addn/xpw/thrashing:
. get more fields in view that might be related to thrashing,
and give some idea if some app has a mem leak .

12.18: mis.xpw/Exploit Rogue scanner attacker:
. agv complains accessed file is infected:
antivirusguard22.com/1/img/listfile.js
threat name:Exploit Rogue scanner (type 961),
. it wouldn't let me close the popup alert,
I used the close button, but after I did that it started scanning
until I closed the parent window .
. anyway,
there's the reason I don't have my password.file on this!
you have to be smarter than foggy headded about
whether all your browsers on every system have noscript
and whatever else ... .
. don't I have noscript on seamonkey?
maybe that was just mac, do it now .
. seamonkey did not record where it was coming
from with that rogue page .
[... not sure how I lost it; found history page later]


12.19: mis.addn/xpw/low v.mem with much page faulting:
. why is mem furiously page flipping right now?
I must have a virus;
see what is doing mem io and kill it: file explore? close;
seamonkey? kill process tree .
41: restart,
on the way out it said my v'mem was low,
so maybe things were just flipping because of a leak,
and the wild disk activity was gc
which it might do when it sees I have done much in a while
(mostly staring at the editor ) .

mis.addn/xpw.seamonkey/confused about history:

12.20:
. I did find history
and the link was found with the bad redirect:

How complexity rules our lives - CultureLab - New Scientist
http://www.newscientist.com/blogs/culturelab/2009/12/how-complexity-rules-our-lives.php
go.php
http://new-count.cn/go.php?id=2006-51&key=0522c7066&d=1
computer security
http://antivirusguard22.com/1/?sess=%3DGG39jDwMS01MSZpcD03Mi4yMDAuMTI3LjE0NCZ0aW1lPTEyNjYxMgkMMQkN
. trying the newscientist.com site again,
http://www.newscientist.com/blogs/culturelab/2009/12/how-complexity-rules-our-lives.php
and this time the redirect was to
http://fast-scan37.com/1/?sess=%3DGGz9jDwMS01MSZpcD03Mi4yMDAuMTI3LjE0NCZ0aW1lPTEyNjYzMcgMMQkM
I again got another avg alert, again for
Threat name: Exploit Rogue scanner (type 992),
and it said threat was blocked .

. so then I searched the site for the original page:
http://www.newscientist.com/blogs/culturelab/2009/12/
how-complexity-rules-our-lives.php
seems to have something to do with
new-count.cn counting how many times you been there?
going to it again didn't result in a new redirect .

12.21:
. can't find any mention of the site;
whois claims it's available .
. might be some trick in the spelling of the name
or in some other way affects the say browser records the link ?

cell texting spam costs

11.16: proj.gear/cell/how to control text msg's?:

Here are some ways to block mobile phone spam,
also known as SMS spam or m-spam.
They're not perfect, but they might hold you over until
spam-blocking technology catches up with mobile phones.
# Dispute your cell phone bill. If spammers continue to get through,
you may be able to convince the carrier to
drop the charges associated with those messages.
You have a better chance at this if you call as soon as your receive the spam.[3]

to block text messages from up to ten telephone numbers or email addresses; you can also change preferences on your handset
(VirginXL or VirginXtras > Messaging > Messaging Management).

* Registering your phone on the National Do Not Call Registry
only prevents phone calls, not text messages.
* Do not respond to text message spam,
because usually the first time is random numbers being tested for responses.
If you do respond to a spam message,
you may inadvertently sign yourself up for additional spam messages
as many times spammers can
and will sell your digits to other spammers.
Don't take their bait.
Report problems. File a complaint with the FCC by filling out online form 1088.

you can also register your cell number
to block telemarketers from sending communications of any type to your cell account.

Step Two: Make Sure Your Information is Correct
Please check your phone number(s) and email address below. If they are correct, click Register to continue. To make a correction, click Change.
Your email address MUST be correct to process your registration.

THREE: OPEN YOUR EMAIL AND CLICK ON LINK
You have submitted your phone number(s) for registration in the National Do Not Call Registry. You will receive an email from Register@donotcall.gov. To complete your registration, you must open the email and click on the link provided.
Important: If you do not click on the link in the email within 72 hours, your phone number will not be registered.
Troubleshooting: If you don't get a "Registration Complete" message after clicking on the link, or the link does not work, use your "copy" and "paste" functions to insert the entire link in the email into the "Address" line on your Web browser. Copy and paste the entire link - it's long. Do not re-type it.
This browser window does not need to remain open to complete the registration process.
Register@donotcall.gov/National Do Not Call Registry - OPEN AND CLICK on Link to Complete Your Registration:
Click on the link to complete your request to register your phone number with the last four digits 5159 on the National Do Not Call Registry.
Important: You must respond to this email by clicking the link within 72 hours for your registration to be successful.
Important: After you click on the link, print the web page and keep it for your records.
Troubleshooting: If you don't get a "Registration Complete" message after clicking on the link, or the link does not work, use your "copy" and "paste" functions to insert the entire link in the email into the "Address" line on your Web browser. Copy and paste the entire link - it's long. Do not re-type it.
You have registered the following telephone number in the National Do Not Call Registry:
(520) 982-5159
Please print a copy of this page for your records.

1. You may file a complaint if you received an unwanted call
after your number was on the National Registry for 31 days.
2. You may also file a complaint if you received a call that used
a recorded message instead of a live person
(whether or not your number was on the Registry).
*Reminder: Even if your number is registered,
companies with which you do business may continue to call you.
So may charities, political organizations, and telephone surveyors.
for more information about the companies
that may continue to call the numbers on the Registry.
Click on Privacy and Security to learn how the information you provide is used.


I recently received about 5 spam text messages in the span of a couple of days
and do not have a text plan.
I had registered my cell number on the Do Not Call list
and could not find any info at the Do Not Call website
about the law applying to text messages, so I called the FTC.
being registered applied to spam texts? no.
I hope that more people call the FTC and complain about spam texts
and with any luck the law will change to include them.
As other people have mentioned, spam email and phone calls, to land lines,
don't cost anything, but text messages do.
The practice of sending spam texts to cell phones
is costing people money and the law should protect us from it.
If you are receiving unwanted text messages ("spam"),
contact the source and unsubscribe or remove your mobile phone number from the service.
You will not be charged for Virgin Mobile service alerts.
You have the ability to block text messages
from up to ten telephone numbers or email addresses
by visiting the Messaging Settings page on the Virgin Mobile website
(www.virginmobileusa.com). You may edit your preferences at any time.
Unsolicited Messages
If you intentionally send spam from your Virgin Mobile phone,
we may terminate your service without further notice.

co.phone/vmobile/wrong plan!: 2min: cell: non-contract phone oh!

figuring out I have the No Annual Contract:
1-888-322-1122

. they did disable my ability to accept (or give) text msg's?
woo hoo! I've always been a big fan of vm,
and I'll really be rededicating those efforts -- that was great!
. ok thank for [...] because we are giving good advice .... to you .

. I can get on the site after it's been upgraded,
in any case they did recognize my number and pass by phone;
. amazed they were able to disable txt msg'ing:
that was eerily easy ... wouldn't have expected that .


hand warmer for keyboarding in the cold

11.17: proj.gear/hand.warmer for fast fingers:

. keyboard house needs a wire frame made from one wire for stiffness
that comes in 2 parts for adjustable its like 2 tables with on upside down
and legs of them are bound at a distance of your choosing .
. the top table slanted on either side .
. the joists are twist-arounds,
and they hold up the heat pad which is covered by the reflectix .

. to control height add loops end of table legs
to connect them by string so that the string can keep the endpoints
at a fixed distance without having to rely on the frictional force
created by binding the legs together with a winding .

11.21: gear/hand.warmer/redesign for boundary problem:
. the box for kybd has a boundary problem:
sometimes the hands like to travel straight from home keys
over to control keys
and that means the sides have to be clear of any box struts
atleast up to the delete key on the right side .
. instead of the peak sloping to the sides,
it would be more heat and space efficient to slope front and back;
the slope allows the heat pad on the roof to cover more of the arms .
. this also allows a bar from side to side
at both the rear and front
that help stability a bit .
the rear bar is part of the bottom table,
the front bar is part of the top table;
except the table model needs adjusting
because the top`struct has to overhang forward,
while the bottom`struct has to recede .
. one simple wire design is
start from front corner;
mov back horz'ly until past the kybd's delete key;
rise for height of roof`slope`bottom;
mov horz'ly to rear of tray
mov horz'ly to center of kybd;
do same for other side (in reverse order
and so wire is all one piece) .
. the front-back horz gives the top an anchor for
a top that is a horz rectangle
with 2 other rectangles for back and front sides of roof .
the roof hangs with peak over knuckles when fingertips are
numbers row (makes a tight fit for little-used function row) .

11.28: gear/hand.warmer/composite cardboard with metal joints:
. to save on wire, just use it for the joints
bound to scrap wood (or rolled cardboard) .


12.1: proj.gear/kybd.box/heatpad frame:
. make a c-shape when viewed from side
so that to change height,
have chg in depth of c
. then when feels right add reinforce as needed .

12.2: proj.gear/messed wire can be reused:
. mess wire ? can reuse as staples:

proj.gear/kybd.box:
measure:
. 11*2 wide, 8deep at bottom
7" high center for 2" high over peak,
7+3 on to make the c-shape for the back .
wire version:
. final design was an extruded-Y shape with the bottom of y bent L-shaped
to form the let, and the top of the Y acted as joists to lay heatpad across .
extruding means the top of left fork of one Y connected with left fork of other,
and likewise for right forks .
y`bot: 8in,
y`top: 7in .
(2*8+2*7+11+13)*2 = 9.0ft of wire
. after building;
seems ok for heat pad,
but what about sleeping bag? way too heavy .
. the whole lid needs to slide into a box;
then can nix the heat pad .
. found during log that the fingers need a lot of space for shift-combo's
as the main fingers lift as part of landing the pinky on the shift key .
. the mac needs to be higher than the kybd with the box around it .

proj.gear/kybd.box/cardboard version:
. to make the box,
find one of any length that is right in the other dimensions,
and then add the extrusion with sealing tape .
construction:
. needed to be a bit wider than kybd`platform,
this was exactly the width of a box I found,
but a minor distraction was the grey-board quality of that cardboard:
the tape didn't stick well .

Shlomo Sand on Zionism


. Mixing respected scholarship with dubious theories,
the author, Shlomo Sand, a professor at Tel Aviv University,
frames the narrative as a startling exposure of suppressed historical facts.
The translated version of his polemic has sparked a new wave of coverage in Britain
and has provoked spirited debates online and in seminar rooms.
Professor Sand, a scholar of modern France, not Jewish history,
candidly states his aim is to undercut the Jews' claims to the land of Israel
by demonstrating that they do not constitute
"(a people), with a shared racial or biological past.
Consider, for instance, Professor Sand's assertion that
Palestinian Arab villagers are descended from the original Jewish farmers.

Since Professor Sand's mission is to discredit Jews'
historical claims to the territory,
he is keen to show that their ancestry lines
do not lead back to ancient Palestine.
He resurrects a theory first raised by 19th-century historians,
that the Jews of Central and Eastern Europe,
to whom 90 percent of American Jews trace their roots,
are descended from the Khazars,
a Turkic people who apparently converted to Judaism
and created an empire in the Caucasus in the eighth century.

Professor Sand accuses Zionist historians from the 19th century onward
-- the very same scholars on whose work he bases his case --
of hiding the truth and creating a myth of shared roots
to strengthen their nationalist agenda.
He explains that he has uncovered no new information,
but has organized the knowledge in a clarifying way .


any low-crime societies?

11.24: web.pol/any low crime societies?:


. very cool site with rich set of views:
click a country to see all the variables per country .

yun, ilhong, American Society of Criminology, 2009-10-26
Confucianism serves as the origin of reintegrative shaming
as well as low crime rates in East Asia, including Japan.
It also shows how Confucianism relates to
communitarianism, interdependence, and social dynamics that affect crime rates.
Finally, it suggests a strong moral education, both formal and informal,
as a potential way to decrease high crime rates in the United States.

lessons from usa-brit independence revolution

11.10: pol/lessons from usa-brit independence revolution:
. I noticed how anti-communism is rooted in
the independence revolution .
. if your subjects could run away,
would they?
during the dawn of America,
britain should have pushed only for
what it really needed:
. the important thing in the european wars
over control of the new world
was that one superpower should not be able to
use america's vast wealth as a weapon against
another superpower .
. they could have achieved that
not by enslaving the colonists
but instead by insuring that no other euro'power
could enslave them either .
. the war on communism could be seen as having this stance:
[11.14:
. dictatorship is slavery,
and communism is the most alien dictatorship,
if we can root out the slavery of dictatorship,
forces of democracy will at least choose to
sacrifice themselves in a fight against
anything that is alien to our own democratic values . ]

communism and capitalism can complement each other

11.10: pol/communism and capitalism can complement each other:
. use plug-in architectures to both insure separation of power
-- a great american value --
and find the most efficient place for capitalists
within a communistic framework;
eg, finding and motivating employees
is always a cutting edge technology;
so make employment agencies a capitalistic module,
but make them open-book servants to
the separate branches of
directorship and quality assurance .
[11.14:
. the way this would differ critically from the current system
is that corporations have privacy rights like people do;
and under a communistic system,
there would be outsiders who both documented
who initiated the fresh productive ideas,
and also watched for
the rot that occurs in dark places . ]


what health plan were nearly half holding out for?

11.8: co.pol/{newspapers}/what plan were nearly half holding out for?:
. it's hopeful to see the House majority could agree on some bill;
but what were nearly half of the them holding out for?
maybe if the planners would start from first principles:
we are paying so much for religiously-mandated charity care;
how can we have gone this long without mandated health insurance ?!
. to make it affordable,
there should be right-to-die plans excluding your choice of conditions:
I do want full coverage for accident recovery;
I do not want treatments for cancer or obesity-related disorders .
. insurance providers would drool at deals like that!
. I was so grateful they compromised on deal-breaking abortion issues,
lets see some more vision like that:
sane first, and democratic only if they're sure they can pull it off .
. see Michael Moore's Sicko movie again .
. republicans make the dem's look like Death panels and Liberals;
ha! weren't they tossed after outraging seniors
by telling them that the cheap Canadian meds were unsafe?
. lets see less regulation of seniors,
and more leashes on pharmaceutical and insurance co's .

Healthcare X PRIZE

American health care system requires fundamental transformation
to meet the needs of the nation.
An Initial Prize Design for a proposed $10+ Million Healthcare X PRIZE
was announced on April 14, 2009 by the X PRIZE Foundation, WellPoint, Inc.
and the WellPoint Foundation.
This first-of-its kind competition will focus on
reinventing the health care system in a bold, measurable and scientific fashion
to catalyze dramatic improvements in health and health care value
in the United States.
The Grand Challenge for the Healthcare X PRIZE is to create
an optimal health paradigm that empowers and engages individuals and
communities in a way that dramatically improves health value.
The proposed prize is designed to improve health value by more than 50 percent
in a 10,000 person community during a three year trial.
In order to effectively compete for this prize,
teams will need to fundamentally change health financing, care delivery,
and create new incentives that will result in
achieving the required improvements in health value
for both individuals and communities.

finance regulation lessons from Islam

11.6: pol/finance regulation/lessons from islam:
. another muslim-unique rule is no money from lending .
. this could mean that all customers have to pre-pay,
or that all markets should be in stocks not bonds,
where you use your savings to buy co.ownership in a money-maker .
. a usaa fin.mgt and depression historian
pointed out how deflation works:
demand falls off massively in a fin system that borrows a lot;
it involves doing production in huge batches
or for very expensive items .
. mass production can be very cheap
but if the masses don't buy the product
then the business is scrambling to pay for the loan,
because money is rented, so time is money .
. this forces unfair sales prices just to pay off the loan .

parapsychology in the news

11.21: psy/parapsych/em waves for communication:
Sergei Mayburov at the Lebedev Institute of Physics in Moscow
suggests that optical communication
is a natural process in many cells of body,
closely related to photosynthesis.
Last year, researchers at the Rush University Medical Center in Chicago
showed that human cells in culture
could synchronize their internal chemical processes
even though they were mechanically, chemically,
and electrically isolated from one another.
The cells, it seemed, were communicating through the exchange of photons.

news.psy/parapsychology/bigger Not Necessarily Better, When It Comes to Brains:
Tiny insects could be as intelligent as much bigger animals,
despite only having a brain the size of a pinhead,
say scientists at Queen Mary, University of London.
Research repeatedly shows how insects are capable of some intelligent behaviors
scientists previously thought was unique to larger animals.
This must mean that much "advanced" thinking
can actually be done with very limited neuron numbers.
Computer modelling shows that even consciousness
can be generated with very small neural circuits,
which could in theory easily fit into an insect brain.
In fact, the models suggest that counting could be achieved
with only a few hundred nerve cells
and only a few thousand could be enough to generate consciousness.
Engineers hope that this kind of research
will lead to smarter computing
with the ability to recognize human facial expressions and emotions.

the surprising benefits and costs of urinals

11.26: gear/urinal/unisex

11.26:
. find a urinal that can double as a backup potty,
like the Passport Potty, but it's ok to spend more
on something less annoyingly small .
[12.31: Passport Potty:
$70 non-spillable toilet" passport potty toilet 1.0
(10L #6003, 2.6gal water closet, 2.6 gal sewage)
509 921 5350
wholesaler" maurice sporting goods; 4674 aircenter circle; reno, nv 89502-5949
importer" cedar key manufacturing; northbrook, illinois 60065
manufac" sanitation equipment ltd; ontario, canada, L4K 2S7
The problem with urine is that it is
the main source of some of the chemical nutrients
that have to be removed in sewage treatment plants
if they are not to wreck ecosystems downstream.
Despite making up only 1 per cent of the volume of waste water,
urine contributes about 80 per cent of the nitrogen
and 45 per cent of all the phosphate.
Peeing into the pan immediately dilutes these chemicals
with vast quantities of water,
making the removal process unnecessarily inefficient.
A lucky few, however, live or work in
one of the buildings in continental Europe
where you can find a future must-have eco-accessory:
the urine separation toilet.
These devices divert urine away from the main sewage stream,
allowing the nutrients to be recycled rather than treated as waste.
They could solve all the environmental problems associated with urine
and even turn sewage plants into
net producers of green, clean energy.
Tue Mar 04 16:41:28 GMT 2008
Is any one in the USA working on the urine separation toilet
what to do with the urine? Personal Systems?
There is a lot being done in other parts of the world,
little in the US, I work in Ecuador.
also my blog inodoroseco.blogspot.com (Spanish).



The liquid waste vessel will contain approximately 2.2 gallons of urine.
The translucent material of the container allows easy visualization of the liquid level.
review (with good pictures):
. the way it's shaped and how narrow it is,
you'd think urinating would present a back-spray problem .

This urine-diverting composting toilet – which is 100 percent PVC fee –
uses no water and keeps solids separate from liquids,
reducing odor and making it possible to reuse waste and urine
for composting and fertilizing.
The Separett Villa can be deployed where no plumbing exists,
allowing for a greater reach of the technology
www.ecovita.net Separett of Sweden Urine-Diverting Composting Toilets
Ecovita is the exclusive North American supplier
of Separett urine-diverting composting toilets. www.separett.eu/
--Separett urine-diverting composting toilets
and waterless urinals provide attractive, inexpensive,
easy-to-maintain, odor-free ecological sanitation
for waterwise comfort!
A urine diverter only to make your own system or to improve an existing pit latrine
The Separett Privy kit transforms your outdoor toilet
into a modern urine-separating toilet
As urine and solids are separated,
you are spared latrine odor and the waste is very easy to take care of.
Feces collect in the latrine or a garbage bag while urine drains via a hose
to a soakaway or tank.
The kit is easily installed under the bench of the outdoor toilet.
To ensure comfort all-year-round,
the kit includes a seat that feels warm as soon as you sit down.
Comes with plans for making a urine-diverting composting toilet
and a graywater system.

Just under the seat is something called a Separett,
a device that sends urine through one hole and feces down another.
Each lands in lidded, 5-gallon containers,
which are vented to the outside
and accessed through a small door on the side of the house.
When the receptacles fill up, they're emptied.
Nitrogen-rich urine is diluted with water
and fed to plants;
feces is left to mellow for a year,
at which point it has decomposed enough
to ameliorate health concerns
and can be used for amending soil.
. I found a Separett online and bought it for $127.
I planned to put my backup toilet in my bedroom.
The chief environmental health specialist
for the L.A. County Department of Public Health
couldn't tell me if composting toilets were even legal,
so I also wanted to make sure my system could be easily disassembled.
Following advice from the Separett manual
and a book that is something of a composting toilet bible,
"The Humanure Handbook,"
I affixed the Separett into the supporting sides of the bench,
just beneath its hinged lid. I set up the collection buckets.
. used hamsters' pine bedding for the "bulking agent" .


$1,399 BioLet 30 NE, Non-electric composting toilet (homedepot.com)
A waterless composting toilet used primarily where it is not practical or economical to install a conventional toilet. It is an on-site, self-contained, biological toilet that uses aerobic decomposition and evaporation to reduce human waste to a nutrient rich, hygienically safe humus. The BioLets reduce the volume of waste entering the toilet by approximately 90%, leaving only 10% of the original volume for disposal. This can be recycled back to nature in a safe way w/out polluting the environment.

* Most Advanced Composting Toilet In The World!
* Requires no water, septic, or chemicals and produces no odors!
comment:

hormonics in pregnancy

. in the United States, One in eight babies is born prematurely,
defined as before 37 weeks of gestation,
a rate that is twice that in most European countries.
Spontaneous labor accounts for 50 percent of preterm births,
30 percent occur after the spontaneous rupture of the membranes,
and 20 percent involve medically induced deliveries
to protect the health of the mother or the infant.
The hormone progesterone has been shown to help prevent premature labor and delivery, ...
--[notice that need for progesterone
may be implicated with estrogen dominance ]--
[12.31:
. but why would usa women have more problems with estrogen dominance
than european women, when they both have industrial diets?
]

whey selection

11.12: web.aq.cook/iherb.com/lef`whey ok? yes:

The whey protein isolate is made using a process known as
Cross Flow Microfiltration,
which produces an isolate that is 87% protein,
99% of it in the bioavailable undenatured from,
and retains all important subfractions in their natural ratios.
This protein contains low amounts of sodium, and added BioFerrin
which is a 95% pure bioactive form of lactoferrin.
The Enhanced Life Extension Protein has up to 300% more lactoferrin
than other whey protein supplements on the market.

With the array of more recent processing techniques used to make WPI's
- or pull out various subfractions - such as Cross Flow Micro filtration (CFM¨)
CFM¨ is a trade mark process of Glanbia Nutritionals,
a large dairy company out of Ireland with offices in the US.
ultra filtration (UF), micro filtration (MF), reverse osmosis (RO),
dynamic membrane filtration (DMF), ion exchange chromatography, (IEC),
electro-ultrafiltration (EU), radial flow chromatography (RFC)
and nano filtration (NF),
manufacturers can now make some very high grade and unique whey proteins.
Perhaps the most familiar micro filtered isolate to readers, would be CFM¨*.
Although the term "cross flow micro filtered" is something of a generic term
for several similar ways of processing whey,
The CFM¨ processing method uses a low temperature micro filtration techniques
that allows for the production of very high protein contents (>90%),
the retention of important subfractions, extremely low fat and lactose contents,
with virtually no undenatured proteins.
CFM¨ is a natural non-chemical process which employs high tech ceramic filters,
unlike ion exchange,
which involves the use of chemical regents
such as hydrochloric acid and sodium hydroxide.


inflammation syndrome and colon cancer

11.16: health/colon cancer

summary:
. inflammation syndrome seems to be a key;
foods tend affect risk in proportion to their inflammation index:
grain-fed meats, high-glycemic fruits
are inflammatory,
while wild fish and low-glycemic veg's
are anti-inflammatory
. aspirin too reduces both risk and inflammation,
though the dose that might be useful
might also be kidney problems .


inflammation syndrome
. conditions that contributes to inflammation of the colon can lead to cancer.
Diabetes Can Lead to Colon Cancer
According to WebMD, people with diabetes have a 30-40%
increased risk of colon cancer.
So it's important to maintain a normal weight
and to lose weight if an individual is obese.

risk-factors-colorectal-cancer
. a person who already has had colorectal cancer
may develop the disease a second time.
. those who have chronic inflammatory conditions of the colon,
such as ulcerative colitis or Crohn's disease,
also are at higher risk of developing colorectal cancer.
# Diet. A diet high in fat and calories and low in fiber
may be linked to a greater risk of developing colorectal cancer.
# Lifestyle factors.
You may be at increased risk for developing colorectal cancer if you
drink alcohol, smoke, don't get enough exercise,
and if you are overweight.
# Diabetes.
People with diabetes have a 30-40% increased risk
of developing colon cancer.
2006, vol. 15, no12, pp. 2391-2397
Obesity and diabetes are established risk factors
for colorectal cancer but have mainly been assessed independently.
There are few data about whether the metabolic syndrome,
which refers to a clustering of cardiovascular disease risk factors
thought to be related to insulin resistance,
including obesity, type 2 diabetes, hyperlipidemia, and hypertension,
is associated with colorectal cancer risk.
Out of the markers of the metabolic syndrome assessed,
overweight and diabetes are risk factors for colorectal cancer,
whereas, in contrast to their role in cardiovascular disease,
elevated blood pressure and hypercholesterolemia are not.
Smoking:
It has been shown that smokers have a 30-40% greater chance
of acquiring colon cancer than non- smokers.
http://www.aicr.org.uk/ColonCancerFAQs.stm
Obesity can increase the risk of cancer of the colon by up to one third.
High alcohol intake is also known to increase the risk of colon cancer.
However, some common drugs, such as aspirin-like painkillers
and hormone replacement therapy,
are known to reduce the risk of bowel cancer.
Low fat, high fibre diets appear to carry a lower risk.
Greater consumption of vegetables and fruit has also been shown to reduce the risk.
Increased consumption of red meat and processed meat
has been linked to a higher risk.
By comparison, eating fish does not appear to be a risk factor.
Some evidence suggests that certain dietary supplements,
such as calcium, selenium and, possibly, folic acid
can reduce the risk.
obesity from eating for stress may be another link
More Evidence Stress and Cancer are Linked Posted by: Dr. Mercola
Cancer Research November 1, 2006; 66(21): 10357-10364
Science Daily November 3, 2006
Stress

Norepinephrine, a hormone produced during periods of stress, may increase the growth rate of cancer.

The norepinephrine can stimulate tumor cells to produce two compounds (matrix metalloproteinases called MMP-2 and MMP-9) that break down the tissue around the tumor cells and allow the cells to more easily move into the bloodstream.

Once there, they can travel to other organs and tissues and form additional tumors, a process called metastasis.

Norepinephrine may also stimulate the tumor cells to release a chemical (vascular endothelial growth factor, or VEGF) that can aid in the growth of the blood vessels that feed cancer cells. This can increase the growth and spread of the cancer.
Researchers traced the harmful effect of norepinephrine after applying it to cancer cell lines used to study nasopharyngeal carcinoma (NPC), an incurable head and neck cancer associated most frequently with those of Chinese descent.

2009-12-30

some beans feature complete protein?!!!

11.12:
. a list of beans classed by
protein completeness
and listed in order of amounts per 100 calories
of protein and fermentable fibers (grams)
*** complete protein (prot, fibr) ***
kdn kidney red (8.5, 7.3)
wsm white small (6.3, 7.5)
grt great northern (7.2, 5.7)
blk black bean (6.6, 6.6)
*** incomplete protein ***
nvy navy (5.8, 7.4)
pnt pinto (6.1, 6.1)
mng mung (6.6, 7.1)
adz adzuki (5.8, 5.8)
. below is a table that lists
certain nutritional values
(and the abbreviation used in the table);
proQ (protein`quality) -- (100+) is complete
pr (protein'mass, per 100 cal),
fib (fiber`mass, per 100 cal),
ai (anti-inflammatory, negative means mix with greens or fisho-oil).
        pnt mng wsm nvy kdn grt blk adz   
proQ:   89  83  104 91  103 104 103 79
pr/100  6.1 6.6 6.3 5.8 8.5 7.2 6.6 5.8
fib/100 6.1 7.1 7.5 7.4 7.3 5.7 6.6 5.8
ai:     -40 -25 -54 -48 -48 -53 -45 -90
2017.2.17:
-- this lists the inflammation index of beans
but doesn't give a ref;
could it be that the source I gave for protein completeness
http://www.nutritiondata.com/
did once also have the inflammation factors as well?
there is a book about that (inflammationfactor.com).

abrogation

11.12: news.relig/islam/abrogation:
. abrogation refers to having
early koranic positions superceded by later positions .
. a view used esp'ly by militant factions .
[12.30:
. why should it be specific to militants?

Naskh, usually translated as "abrogation";
Over the last century, there have come to be
serious objections to the very idea of Naskh
within the Muslim community;
returning to a dissenting attitude from early Muslim history
(e.g., Abu Muslim Al-Asfahani 948-1038 C.E),
many modern scholars now reject it outright.

Many verses counsel patience in the face of
the mockery of the unbelievers,
while other verses incite to warfare
against the unbelievers.
The former are linked to the Meccan phase
when the Muslims were too few
the latter are linked to Medina
where the Prophet had the strength
The discrepancy between the two sets of verses
indicates that different situations
call for different regulations.
[Burton, Naskh, Encyclopaedia of Islam (EI)²]

]


youtube.com

11.28: co.net/youtube.com/11.17 apt`wildlife chickens:
category:pets & animals
free range chicken.AVI -- free range chicken
star free ranger.AVI -- free range chicken with star feathering

co.net/twitter.com/11.17 apt`wildlife chickens:


health note to community.nytimes.com


. the wealthy are known to get less cancers
and that is because their occupational hazards are less
and their diet is better:
more on seafood -- a sure source of selenium-cysteine compounds --
less glycemic load, and less emotional stress
-- hormone modulators that have a huge impact on cancer risk .

co.net/twitter.com/real preventives are found in real lifestyle changes:
#hormonics comment on "Medicines to Deter Some Cancers Are Not Taken" [was]http://bit.ly/DPKCg

review Life Extension: A Practical Scientific Approach

11.4: co.net/amazon.com/

take your cheap selenium supplement (2stars)
(tags: selenium, selenite, selenate, glutathione peroxidase, cysteine, egg, yolk)

. although much of this research is out-dated,
the one advice they gave that still stands is:
. if you do nothing else,
take a cheap selenium supplement (sodium selenite)
[11.6: (but use selenate not selenite)]
and don't be afraid of egg yolks .
. later they commented in an interview
that the most out-dated thing about the book
was its heavy reliance on anti-oxidant theory,
whereas glycemic load plays a much greater role in current research .

review Kochan`Programming Objective C 2.0

co.net/amazon.com/Programming-Objective-C-2-0-Stephen-Kochan/dp/0321566157:
(review of Programming in Objective-C 2.0 (2nd Edition))
-- review not accepted by amazon.com
[programming is: fun!] (5stars)
(tags: iphone, beginners, objective-c, mac programming)

stepwise.com flushed book's downloads

11.1: co.net/scott anguish/bk"Vermont Recipes resources flushed:

. explore stepwise.com being shut down,
view owner scott anguish at twitter/sanguish

co.net/amazon/Cocoa Recipes for Mac OS X: the vermont recipes:
interesting history (1 star)
(tags: cocoa, advanced)
. the book gives a bad link to the source code download;
as of Halloween 2009, Scott Anguish has emptied that site
leaving nothing but a link to the site of the newest cocoa book:
and another link to his twitter account
where he describes himself as depressed, disgruntled employee .
. I did find another source for both the source code
and a beta version of the book itself in pdf format;
but he does sound intent on finding such sources and removing them .
(that site also had the errata sheet, which I copied from google's cache) .

. I gave this book one star simply to
bring that little surprise to much attention;
otherwise, I still think it's a good deal,
since Apple's SDK and my other textbooks give plenty of source code;
while this book warns you to study obj'c coding elsewhere
and then talks you through the many cocoa idioms .

. my intended route for using this book
will be (in this order):
and, finally,

. interestingly,
Scott Anguish (who dumped the sample code site)
coauthored [Cocoa Programming] with Erik Buck
and it is Buck's [Cocoa Design Patterns]
that will have convinced many of us to 2nd-rate Anguish's [Cocoa Programming]
-- an otherwise legendary book .

[12.30: I had used Google's cache of
http://www.stepwise.com/Articles/VermontRecipes/errata.html
but have since found this site works: vermontrecipes.com/errata.html
as do these links for various downloads:

11.1: Cocoa Recipes old downloads:


security door

11.29: gear/security.room
. security door on wheels doesn't need conventional hinges
can tab&groove for a much stronger approach .
. the walls are reinforced from the inside as in spokane closet;
but add metal siding too before installing the shells .

tank treads for pot.holes

11.25: gear/tank-based pothole negotiation:
. for pot holes use an attachment that is like tank treads:
like a ski foot used by a snowmobile for steering
except it's an inline skate (a series of skate wheels)
with a tread belt around them;
so when the skate catches the edge of a pothole,
that edge doesn't get lodged between wheels .
. the skate is mounted on the front wheels
in either of 2 positions:
. if there is snow, sand, etc to steer on,
then it's being pressed flat on the ground
to steer the way ski-mobile does .
. if there is pavement or rocks,
then its lifted and angled,
so as to act like the tank's treads .

solar roof

5.2: gear/solar/wind stored as wind:
. good use of wind uses windmills to compress air,
so then during low wind the compressed air can drive electric generators,
and during wind that is too high for e-gen's,
the power can be usefully diverted to compressing air .
. the current system is to heat water,
even if that's not needed .
. it could also solve the complaint that
wind supply is not always matching human consumption .
. another way is to put energy mostly into
driving processes that generate portable fuel
like methanol .
. it was noticed days ago however
that this is not a green way for the planet;
because there is literally not eno' platinum in the world
to make all the fuel cells
to meet all the needs of billions of people .

11.1: gear/hvac/solar/roof:
. it works like water heater but moves air instead of water:
under black tin it gets hot;
it can be 2-way valved either outside or inside the walls
and under the floor where it can also serve as
part of the radon removal system .
. fan powered by cheap mech-to-mech wind mills
(new efficient ones look like box kites) .
. on top of black 2nd roof
is clear roof for housing greens,
makes oxygen that can move without venting,
but may need that anyway
for humidity control to prevent mold .

flossmanuals.net

11.30: sci.addn/net.flossmanuals.net:

blogger.com

mis.addn/net.g'blogger.com/html mode is not straight:
11.28:
. when I would use <...> in the text,
it would give it a special meaning,
so then I used an html editor to make the string
& l t ; ... & g t ;
and used blogger's html mode to insert it:
this resulted in yet another monstrosity !
. I then used the mac symbol picker to choose some unicode <> pairs
that were not ascii, but the same shape only in a bold font .
. so I pasted that html code using html mode,
and it's html mode was adding br.tags after every newline;
which of course was causing double spacing everywhere .
. so then I had to bring the code into a temp edit page,
and replace all the br.tags with blanks .
finally!
tech:
. interestingly I must have came across the same problem
without even crying about it -- or remembering it .
. my reaction that time was to replace the <...> with italics .
11.29:
. ironic, I forgot running into this problem,
and my first encounter was smarter than my 2nd!:
6.23/mis.addn/net.g'blog/importing html:
. the copy from seamonkey code to blog messed up, adding newlines,
try saving the page and then opening with firefox,
then copying the page normally (not by view-copying code)
and see if it saves the links and other html .
12.15: mis.addn/{net.g'blog, mac}/strange mac char's:
. when having trouble with brackets in g'blogger's editor:
http://amerdreamduh.blogspot.com/2009/11/getting-organized.html
I replaced them with a unicode that didn't turn out well later
atleast when viewed from a pc -- using either {chrome, seamonkey }.
. worse, I saved the page as the html I posted,
so, my local copy looks like a mess too! .
. I edited both by replacing the brackets with italics font,
or if they were something like <...> or <> then I used [/]x .

12.22: news.addn/net.google/The meaning of open:
Posted: 21 Dec 2009 03:17 PM PST
The Official Google Blog
date Tue, Dec 22, 2009 at 10:08 AM
subject Official Google Blog
...
That's why we have a team
— the Data Liberation Front (dataliberation.org) —
whose job it is to make "checking out" easy.
Recent examples of their work include Blogger
(people who choose to leave Blogger for another service
can easily take their content with them) .


12.28: web.addn/net.blogger.com/display angle brackets:
. yea! my problem at blogger.com has a solution I can find!
superuser.com/...how-to-display-angle-brackets-in-a-pre-in-wordpress
has this solution:
http://wordpress.org/extend/plugins/wp-syntax/other_notes/:
Example 4: If your code already has html entities escaped,
use escaped="true" as an option;
. surround your code with this:
<pre lang="xml" escaped="true">
</pre>
and replace left angle brackets with the usual html code & l t ;, etc .

WOT bookmarklet for Safari and Opera

11.3: news.addn/mac.safari/security/WOT bookmarklet for Safari and Opera:
. If you are using Safari or Opera, you can add the WOT bookmarklet
to your browser simply by dragging this link to your bookmarks.
Using the bookmarklet is simple:
click the bookmark and it will display a WOT popup on the page,
showing ratings for the current site. Another click will hide the popup.
This gives you an easy access to WOT reputation data,
although you won't be able to give your own ratings.


why is mac firewall off by default?

11.3: web.addn/mac/why mac firewall off by default?:
. wonder why the firewire was off?
the next article reminds me that I used to know
my router has a hardware-based firewall built-in,
and if there is any problems with the likes of skype,
just turn off the computer's firewall and leave that job to your router .
For even better security,
particularly at home on a broadband connection such as cable or DSL internet,
get a combo NAT gateway for yourself. Next to a VCR,
these little "black boxes" are the technology bargain of the decade.
Installing one between your home computer or network
and your broadband modem will give you a two-tiered level of firewalling.
We suggest that you select the Enable Stealth Mode check box.
It doesn't have many side-effects,
unless you want people to be able to perform stealth scans of your Mac.


arm vs atom

11.30: web.addn/dev/arm vs atom:
Make no mistake: Atom is an important new architecture,
and it is likely to be a big success in many markets.
Atom can run PC games; ARM can't.
Just don't expect it to dethrone ARM
in the mobile market segment any time soon.
In most scenarios, Atom burns more power.

2009-12-29

gateway syndrome

10.2: psy/gateway syndrome:
. when culture allows drug use,
then it could entail a sort of Peter principle
"(Employees Tends to be Promoted to their Level of Incompetence)
which in the case of drug experimentation
would be the situations where the drugs caused
something both negative and irreversable,
such as when accidents cause brain damage, depression ...
[10.4: or various autistic syndromes .]

the trees of genesis

10.28: relig/bible/genesis/trees of trees:
. the tree of knowledge story
may have caused double meaning of
{know it, aware of it, cause it} .
. what's the story's original meaning ?
there are 2 big trees in the picture:
knowledge (we got that)
and eternal life (we got the snakes at heels instead) .

11.21: relig/bible/genesis/lesson#1: safety in numbers:
. the trees of knowledge is esp'ly
awareness of one's own genitals?
. and they are tossed from garden;
esp'ly the tree of eternal life ?
. trying to control genitals (for population reduction)
could cost the culture its naturally eternal life,
as that life can often depend on
overbreeding being the cause of branching out
so that one catastrophe doesn't affect the whole group .

Islam's message

10.3: co.apt/relig/islam/the message:
. G*D's main message to islam was:
don't use infanticide to deal with the problem of
there being too many women;
use multi-marriages to absorb all the widows
-- and there will be a lot more widows,
because we are going to be hard at war
enculturating the environs .

10.9: relig/Islam Scientific:
. the way a humanist should be Islamic
is to admit that the christians are too subtle
and their call of christ as god
too easily confused with idolatry or polytheism .
. admit Muhammed was a prophet of G*D
but also combine that with monotheism:
all of the supernatural -- good and evil -- is G*D .
. being human actually means
being a mouthpiece to both;
science is about finding ways to sort out
the good from the evil:
G*D is the good future,
devil is the wicked past .
. let science determine what words were good's will
vs devil's will .

evolutionary advantage of overpopulating

10.14: pol/overpopulation/evolutionary advantage for the poor:
. not only are the poor losing more children to sickness,
they may also need to compensate for losses from
implied survival tactics of the culture .
. often the only way to spread genes of the poor
is to send out pioneers to invade areas already populated;
and, because this style of invasion is so dangerous,
it can only succeed when large numbers are involved .

term limits

10.3: co.apt/pol/term limits:
. the idea of term limits reminds of the impotence behind drug war:
what really needs to be controlled
is youth, and parenting .
. the right to privacy is what makes so many of our laws impotent;
if the public office had no privacy,
the issue of term limits would be moot .

real free speech

10.2: pol/real free speech:
. our idea of free speech has been perverted into
violating our right to a trial by peers:
. when speech is abusive,
then it's actually an unconstitutional judgment and punishment
without a trial by jury:
. conversely,
true free speech guards our ability to accuse another of a crime
without having that accusation be considered abuse or blasphemy .
[10.3:
. however, smart free speech (esp'ly in dictatorial regimes),
will use a proxy to accuse:
reminding the people of lessons from history,
ie, how the seeming peace and justice was a mere blindness,
and how our own culture actually promotes these problems . ]