Friday, December 31, 2004

Prayers






As the New Year Begins
May our Prayers and Generousity Be
With Those In Deepest Need.

Posted by Hello

Albert Pike

With the year winding down and the tragedies in Asia, this short thing from Albert Pike, seems appropriate.

“But knowing that we shall live forever and that the Infinite God loves us all, we can look on all the evils of the world and see that it is only the hour before sunrise and that the dawn is coming; and so, we also, even we, may light a little taper to illuminate the darkness while it lasts and wait until the day spring come.

Eternal morning follows the night and a rainbow scarves the shoulder of every cloud that weeps its rain away to be flowers on land and pearls at sea. Life rises out of the grave and the soul cannot be held by quivering flesh. No dawn is hopeless and disaster is only the threshold of delight."

Submitted by Milt Sadusky

Search Term

This was a search used today to find
our website, really cool !!!
It was from ...
Canarias, Santa Cruz De Tenerife, Spain,

Click Here

Wednesday, December 29, 2004

U.S. Warning HTML


Click here for live weather main page

This is a kewl link to bookmark.

The Bull




With this symbolic circle ends the story of the bull.


The bull is gone. The world is gone. The music is gone.
There is neither Self nor not-Self. There is only infinite Reality symbolized by the circle of endless time.

This is Tao, Nirvana, and the final state of the superior man. The illusion of the world and the illusion of the Self in the world both came to an end. Only infinite Reality remains. The conquest of the bull results in the conquest of the world. When the world is conquered, it fades away. Only Truth remains, Truth nameless, formless, limitless, Truth to be discovered only by inward experience and meditation upon the mystery of the symbols. Epilogue, the mystic cannot put the experience into language, and now you know why.


We’re going to save you the agony of any more bull, because the year will run out before the story ends. For those rare souls in LVH who might want to see the middle of this story, Milt’s name and phone is in your directory.


Submitted by Milt Sadusky
Posted by Hello

Tuesday, December 28, 2004

W32.Protoride.B

W32.Protoride.B

New Worm Out

Full Info Here

Scan Your Hard Drive For These Two Files

internat.exe

comands.exe

Sumatra Quake Update

Great Earthquake Update
80,000 Killed
Quake Disturbs Earth's Rotation






Due To The High Volume Of Hits To This Site In Search Of Information In Reference To The Earthquake.
Information and Photo Journal Links Will Be Provided At:
http://oregon.4mg.com/quake.html
Beginning at 7:00PM PST 12-27-2004


Some Energy From This Quake Has Leaked Into
The Pacific Basin and Will Cause A Tide Rise
Information Click Here


Monday, December 27, 2004

George Carlin



George Carlin enters rehab

Entertainer George Carlin said Monday he is going into rehab because he has an alcohol and drug problem.
In a statement, Carlin, 67, said, "I'm going into rehab because I use too much wine and Vicodin. No one told me I needed this; I recognized the problem and took the step myself.

Full Story Here

Posted by Hello

Site Stats

This Sites Web Statistics Are Available at:

http://my.statcounter.com/project/standard/stats.php?project_id=481265&guest=1

1,000 hits in 17 days !!!



Sunday, December 26, 2004

Great Earthquake

GREAT EARTHQUAKE

27 earthquakes monitored since 6:23PM Saturday.

MAG DATE UTC-TIME LAT LON DEPTH region
y/m/d h:m:s deg deg km

6.5 2004/12/26 09:20:01 8.867 92.382 10.0 NICOBAR ISLANDS, INDIA REGION
5.8 2004/12/26 07:38:25 13.119 93.052 10.0 ANDAMAN ISLANDS, INDIA REGION
5.7 2004/12/26 07:07:10 10.336 93.756 10.0 ANDAMAN ISLANDS, INDIA REGION
5.7 2004/12/26 06:21:58 10.623 92.323 10.0 ANDAMAN ISLANDS, INDIA REGION
7.3 2004/12/26 04:21:26 6.901 92.952 10.0 NICOBAR ISLANDS, INDIA REGION
6.1 2004/12/26 03:08:42 13.808 92.975 10.0 ANDAMAN ISLANDS, INDIA REGION
5.9 2004/12/26 02:59:12 3.177 94.259 10.0 OFF THE WEST COAST OF NORTHERN SUMATRA
6.0 2004/12/26 02:51:59 12.511 92.593 10.0 ANDAMAN ISLANDS, INDIA REGION
5.8 2004/12/26 02:36:06 12.139 93.010 10.0 ANDAMAN ISLANDS, INDIA REGION
5.8 2004/12/26 02:34:50 4.104 94.184 10.0 OFF THE WEST COAST OF NORTHERN SUMATRA
6.0 2004/12/26 02:22:02 8.860 92.500 10.0 NICOBAR ISLANDS, INDIA REGION
5.8 2004/12/26 02:15:58 12.375 92.509 10.0 ANDAMAN ISLANDS, INDIA REGION
5.9 2004/12/26 01:48:47 5.393 94.423 10.0 NORTHERN SUMATRA, INDONESIA
9.0 2004/12/26 00:58:51 3.298 95.779 10.0 OFF THE WEST COAST OF NORTHERN SUMATRA

Magnitude 9.0 - OFF THE WEST COAST OF NORTHERN SUMATRA

2004 December 26 00:58:50 UTC

Preliminary Earthquake ReportU.S. Geological Survey, National Earthquake Information CenterWorld Data Center for Seismology, Denver
A great earthquake occurred at 00:58:50 (UTC) on Sunday, December 26, 2004. The magnitude 9.0 event has been located OFF THE WEST COAST OF NORTHERN SUMATRA. (This event has been reviewed by a seismologist.)


Magnitude
9.0
Date-Time
Sunday, December 26, 2004 at 00:58:50 (UTC)= Coordinated Universal Time Sunday, December 26, 2004 at 6:58:50 AM = local time at epicenter Time of Earthquake in other Time Zones
Location
3.298°N, 95.779°E
Depth
10 km (6.2 miles) set by location program
Region
OFF THE WEST COAST OF NORTHERN SUMATRA
Distances
250 km (155 miles) SSE of Banda Aceh, Sumatra, Indonesia320 km (200 miles) W of Medan, Sumatra, Indonesia1260 km (780 miles) SSW of BANGKOK, Thailand1605 km (1000 miles) NW of JAKARTA, Java, Indonesia
Location Uncertainty
horizontal +/- 9.2 km (5.7 miles); depth fixed by location program
Parameters
Nst=157, Nph=157, Dmin=>999 km, Rmss=1.35 sec, Gp= 29°,M-type=moment magnitude (Mw), Version=9
Source
USGS NEIC (WDCS-D)
Event ID
usslav
Felt Reports
At least 9 people killed, buildings collapsed and telephone service disrupted at Banda Aceh. Many people killed by tsunamis in Sri Lanka and Thailand. Tsunamis also observed on the coasts of Maldives, Cocos Island and Sumatra. Felt widely in northern Sumatra. Also felt in Bangladesh, India, Malaysia, Myanmar, Singapore and Thailand. This is the fifth largest earthquake in the world since 1900 and is the largest since the 1964 Prince William Sound, Alaska earthquake.

WEPA43 PAAQ 260240
TIBWCA
TO - TSUNAMI WARNING SYSTEM PARTICIPANTS IN
ALASKA/BRITISH COLUMBIA/WASHINGTON/OREGON/CALIFORNIA
FROM - WEST COAST AND ALASKA TSUNAMI WARNING CENTER/NOAA/NWS
SUBJECT - TSUNAMI INFORMATION BULLETIN

BULLETIN NUMBER 2
ISSUED 12/26/2004 AT 0209 UTC
...THIS TSUNAMI INFORMATION BULLETIN IS FOR ALASKA - BRITISH
COLUMBIA - WASHINGTON - OREGON AND CALIFORNIA ONLY...
NO - REPEAT NO - WATCH OR WARNING IS IN EFFECT.
Revised magnitude based on analysis of mantle waves. This earthquake
is located outside of the Pacific. No destructive tsunami threat exsits
for the Pacific basin based on historical earthquake and tsunami data.
EARTHQUAKE DATA


PRELIMINARY MAGNITUDE - 8.9

LOCATION - 3.4N 95.7E - OFF W COAST OF NORTHERN SUMATERA
TIME - 1559 AST 12/25/2004
1659 PST 12/25/2004
0059 UTC 12/26/2004
EVALUATION
BASED ON LOCATION AND MAGNITUDE THE EARTHQUAKE WAS NOT
SUFFICIENT TO GENERATE A TSUNAMI DAMAGING TO CALIFORNIA -
OREGON - WASHINGTON - BRITISH COLUMBIA OR ALASKA. SOME AREAS MAY
EXPERIENCE SMALL SEA LEVEL CHANGES. IN AREAS OF INTENSE
SHAKING LOCALLY GENERATED TSUNAMIS CAN BE TRIGGERED BY SLUMPING.
THE PACIFIC TSUNAMI WARNING CENTER WILL ISSUE TSUNAMI BULLETINS
FOR HAWAII AND OTHER AREAS OF THE PACIFIC.
THIS WILL BE THE ONLY BULLETIN ISSUED FOR THIS EVENT BY THE
WEST COAST AND ALASKA TSUNAMI WARNING CENTER UNLESS CONDITIONS
WARRANT. REFER TO THE INTERNET SITE HTTP://WCATWC.ARH.NOAA.GOV
FOR MORE INFORMATION.





10-degree map showing recent earthquakes




Saturday, December 25, 2004

Happy Holidays





Interstate Road Conditions

URBI ET ORBI MESSAGE




URBI ET ORBI MESSAGE
OF HIS HOLINESS POPE JOHN PAUL II

CHRISTMAS 2004

1. Christus natus est nobis, venite, adoremus!
Christ is born for us: come, let us adore him!
On this solemn day we come to you,
tender Babe of Bethlehem.
By your birth you have hidden your divinity
in order to share our frail human nature.
In the light of faith, we acknowledge you
as true God, made man out of love for us.
You alone are the Redeemer of mankind!

2. Before the crib where you lie helpless,
let there be an end to the spread of violence in its many forms,
the source of untold suffering;
let there be an end to the numerous situations of unrest
which risk degenerating into open conflict;
let there arise a firm will to seek peaceful solutions,
respectful of the legitimate aspirations of individuals and peoples.

3. Babe of Bethlehem, Prophet of peace,
encourage attempts to promote dialogue and reconciliation,
sustain the efforts to build peace,
which hesitantly, yet not without hope, are being made
to bring about a more tranquil present and future
for so many of our brothers and sisters in the world.
I think of Africa, of the tragedy of Darfur in Sudan,
of Côte d’Ivoire and of the Great Lakes Region.
With great apprehension I follow the situation in Iraq.
And how can I fail to look with anxious concern,
but also invincible confidence,
towards that Land of which you are a son?

4. Everywhere peace is needed!
You, Prince of true peace,
help us to understand that the only way to build peace
is to flee in horror from evil,
and to pursue goodness with courage and perseverance.
Men and women of good will, of every people on the earth,
come with trust to the crib of the Saviour!
"He who bestows the Kingdom of heaven
does not take away human kingdoms" (cf. Hymn for Vespers of Epiphany).
Hasten to meet him;
he comes to teach us
the way of truth, peace and love.

Friday, December 24, 2004

New rules

New rules aim for more efficient do-not-call registry


People who register to be left alone by telemarketers can expect that to start happening sooner under new rules announced Thursday.

Starting Jan. 1, telemarketers will have to match their contact lists against the national do-no-call registry every 31 days instead of every three months, the Federal Communications Commission said.

The registry, which was established in October 2003, has more than 69 million telephone numbers, and is administered by both the FCC and Federal Trade Commission.

The ban on unwanted phone solicitations is the government's attempt to safeguard personal privacy and reduce telemarketing abuse.

Under a 2003 law, businesses face fines of up to $11,000 if they call people who sign up for the registry -- unless they have recently done business with them. Charities, pollsters and callers on behalf of politicians, however, are exempt.

People can register their phone numbers or file complaints at www.donotcall.gov or by calling 1-888-382-1222.

Thursday, December 23, 2004

China’s Natal Demon, Pic #3

China’s Natal Demon, Pic #3



The bull is now docile and willingly follows the cowherd. The head of the bull has turned white, thus representing the perfection of the intellect. The mind is the highest part of the personality, therefore it is most easily convinced of the significance of philosophical attainment. In Asia the bull is a beast of burden. The personality is the servant of the self. The ignorant man is sometimes represented by a pilgrim carrying a bull on his back. The pilgrim meets a holy man who explains to him that he should put the bull down and ride the animal instead of carrying it. By this is meant that the body and the personality of the human being should carry or support the spiritual nature. But ignorant persons permit their spiritual lives to be burdened by their personalities.
emailed in by Milt Sadusky

Wednesday, December 22, 2004

The Real Enemy

Fighting the real enemy

The war on terror hangs in the balance.

And yet, in a time when moral clarity is so desperately needed from reporters on the front lines of that war, Americans are fed editorials attacking the liberators and language glamorizing terrorist thugs.

But more on language and labels in a minute.

First, it's time we face up to the ugly truth about the mainstream media outlets covering this war.

The fact is that newsrooms across America and Europe are filled with reporters and editors who loathe George Bush that they would rather see him lose in Iraq than see America win.

This animosity runs so deep news outlets affix the label of “occupier” to US liberators while using the term “insurgent” to describe Islamic fascists who would rather kill every man, woman, and child in Iraq than see them free.

The Michael Moore faction in the Democratic Party claims US troops are not liberators, but rather empire builders. Then again, Moore also compared the terrorists who carved off American hostages' heads to our founding fathers.

While most Democrats and leftist reporters would never make such a public admission, many do believe that spreading freedom to Iraq and Afghanistan is an imperialist scheme to spread American hegemony across the globe.

Since when did promoting Jeffersonian democracy equate to the spread of American hegemony?

Since George Bush launched this war instead of, say, Bill Clinton.

Isn't it remarkable that we never heard terms like “American imperialism” or “US hegemony” or “unilateral war” when former President Bill Clinton launched military strikes against Haiti, Somalia, Bosnia, Kosovo, Sudan, or Iraq?

Can you remember 'The New York Times' or CBS News or any other mainstream media outlet taking President Clinton to task for his wars in the Balkans?

Of course not.

In fact, most wrote editorials praising America's entrance into a 500 year civil war and printed screaming headlines exaggerating incidents of mass graves and ethnic cleansing.

Never mind the fact that the Serbs' conduct in Kosovo never came close to reaching the level of barbarism and butchery that Islamic fascists have exhibited in Iraq and across the world.

In Kosovo, an act of aggression by the Serbs was always seized upon by press to justify America's involvement there.

In Iraq, the more horrendous the terror attack, the sharper the rebuke against Bush for launching his liberation efforts.

What makes the media's moral blindness so damning is the fact that the leader of the terror network responsible for most of the Iraqi killings wrote out his war plans months ago for all the world to see.

This is not morally ambiguous stuff.

Jordanian terror king al-Zarqawi warned his followers in a memo produced earlier this year that the Americans were not going to be driven out of Iraq by terror tactics.

Therefore, the only way to stop free elections and a democratically elected government was to kill as many Shiites as possible.

After slaughtering enough innocent Shia, civil war would break out and cause the streets of Iraq to flood with the blood of the unbelievers. Then, and only then, Iraq would be a safe haven for Islamic terrorists.

Zarqawi concluded by warning his terror network that if America had its way, a representative government would be elected and then their cause would be lost.

So yesterday, scores of innocent Shia were incinerated in two of Iraq's holyist cities for simply worshipping their God as they chose.

Imagine the outrage if Christian Serb leaders had written a memo defining their chief political goal as the killing of Muslims.

'The Times' would have gone apolectic. Dan Rather would have grimly spoken of a Balkan holocaust. And Hollywood types would have been standing in line at the White House asking Bill Clinton how they could support his efforts overseas.

But with the stakes so much higher in this war, the mainstream media is churning out the bad news daily, always implying that these murderous rampages in Iraq are really the fault of their one true enemy, George W. Bush.

And what about the Shia?

The cocktail party circuit in Manhattan and Hollywood have concluded they are too stupid to live under a democratic system anyway.

But for a group of idiots, Iraq's Shiite leaders sure seem smart to me.

This summer they turned the screws on one of their own-al Sadr-and told him his attacks against the US forces would not be tolerated.

Last month, the Shia's most powerful leader delivered a religious edict ordering his people to vote in next month's elections.

And most impressively, the general population is not biting at Zarqawi's bait. They know that their family members are being slaughtered in the streets of Iraq not because of US imperialism, but because Zarqawi desperately needs to draw them into a civil war.

But unlike America's mainstream press, the Shia are smart enough to read the enemy's war memos and plan accordingly.

Imagine for a moment that we lived in a world without George Bush, John Kerry, Michael Moore, Fox News, James Carville, Vietnam, the New York Times, and the all the forces that have created faultlines throughout contemporary American political life.

In such a world, does anyone seriously doubt that all of America would be united behind this war?

Imagine a world where editorial page writers were less concerned about proving George Bush wrong than bringing freedom and hope to the epicenter of Islamic terrorism.

Imagine a country where political leaders were less concerned about what party took credit for winning a war than both parties working together toward the common goal of actually winning that war.

Imagine a world where CBS News and the New York Times editorial page dared to call those slaughtering innocents in Iraq “terrorists” instead of labeling them insurgents, as if they were throwing off the yoke of a colonial power set on ruling their land for hundreds of years.

Imagine a world where journalism schools produced reporters and editors who were not afraid to call evil by its name.

Now imagine living in a world where we are fighting for the very future of our civilization-and most of the world's press remains neutral (or worse) because they don't like the man leading that epic battle.

This war on terror has seen its epicenter move from New York to Kabul to Baghdad in the past few years. It is as clearly a war of good against evil as any America has fought since World War II.

But American and European reporters are so blinded by their cynicism— and their hatred of George W. Bush— that like Hitler's Albert Speer, they do not recognize evil when its hand is on their shoulder.

Or on the front page of their newspapers.

They refuse to tie together the 9/11 murders with the Bali bombing, or the Madrid murders, or the school house slaughter in Russia, or the assassination of election workers in Iraq.

They refuse to connect the dots because George W. Bush and Tony Blair drew a line between them first, while the rest of the world was sleeping.

Maybe that's why I am staring at a picture of a man being gunned down like a dog on the front page of the New York Times. The terrorists executing the man and his two fellow election workers conducted the murders in broad daylight for all the world to see.

And what did the New York Times call these beasts?

Insurgents.

Insurgents?

Insurgents against what?!?

These “insurgents” were not gunning down US soldiers. They were not murdering police officers who were trying to put down an oppressed people.

These “insurgents” had one goal in mind yesterday: destroying those who would dare to believe that Iraq could live in freedom and peace.

Should you and I be shocked that the media is expressing little to no outrage at this unspeakable act?

Should we contemplate why so many media outlets, who would have spoken out against this atrocity had it happened in Kosovo, Israel, or scores of other countries, are sitting quietly by while Islamic terrorists continue killing election workers, doctors, and all others who are trying to bring aid to a desperate people?

Of course not.

The media hates this war because it hates this president. It doesn't matter how noble the goal. It doesn't matter how high the stakes.

In this perverse new media reality, George Bush is evil, U.S. troops are occupiers, and terrorists who gun down defenders of democracy are “insurgents.”

Any questions?


Tuesday, December 21, 2004

Hoaxes

Remember This Link?
A button there that lists ALL internet and email hoaxes

Know Your Limits


As we enter the holiday season, I think it's important for everyone to step back and remember that we can all have fun without getting dangerous. I've attached a rather graphic picture of an overdose victim, not for its shock value, but in the hope that everyone remains aware of his or her limits.

When you look at this picture, remember that this did not have to happen.

Happy Holidays!

emailed in from Julie Music

Posted by Hello

Microsoft Issues 5 New Warnings

Microsoft on Tuesday released five Security Bulletins, warning of several vulnerabilities that put computers running Windows at risk of attack.

Click Here Full Story


Monday, December 20, 2004

Google Search Tool Flawed

Google desktop search flawed

A Rice University computer scientist and two of his students discovered a potentially serious security flaw in the desktop search tool recently distributed by Google, a newspaper report said Monday.
The glitch, which could permit an attacker to secretly search the contents of a personal computer via the Internet, is what computer scientists call a composition flaw, the New York Times said.

Google has begun distributing a new version of the desktop search engine that repairs the potential security hole.
New Version Here.


Friday, December 17, 2004

People and Their Pets

People and Their Pets














Rules Wizard

There are two ways to put the Rules Wizard to work. If you're in the Microsoft Outlook Viewer, choose Tools | Rules Wizard. If you're working with an open message and want to build rules from information in that message, choose Actions | Create Rule (Outlook 98 or 2000) Tools | Create Rule (Outlook 97).

The Rules Wizard consists of several screens where you enter information about the type of rule you want to create (incoming or outgoing messages), what you want to look for, what you want to happen to messages that fit the rule and what types of messages should be handled as exceptions to the rule.

At the top of each screen, check the boxes that you want to apply to the current rule. Then in the bottom half of the screen, click any underlined text to set the value for that part of the rule. For example, if you see with specific words in the subject or body, click on that text to set the specific words to search for.

After you go through all the screens in this fashion, you can click the Finish button to save the rule.

To make a rule apply to all incoming or outgoing messages, just enter no conditions for the rule. You'll get a popup message informing you that the rule will apply to all messages and asking whether that's OK.

The order in which rules are processed can be important, since if you move a message from the Inbox to another folder, other rules won't process it. To change the order and enable/disable rules temporarily, choose Tools | Rules Wizard from the main Microsoft Outlook menu. In many cases, you will want to add a Stop Processing action to your rules, so that once that rule is applied, no subsequent rules will act on the item.

Also see:

  • Custom actions in rules
  • OL2000 (CW): How to Use the Out of Office Assistant
  • OL2002 How to Use the Out of Office Assistant
  • OL2000 (IMO): How to Emulate the Out of Office Assistant
  • Managing Email With Outlook Rules-- tutorial
  • OL2002 How to Create a Script for the Rules Wizard
  • Automatic Out-of-Office Assistant Switching Script
  • Forcing a Rule to Operate only on Certain Items
  • Customizing the Envelope System Tray IconRules Wizard
  • Leading the bull

    Leading the bull

    In China’s version of the natal demon, the cowherd has succeeded in putting a halter on the bull and is leading the reluctant creature. The enlightened Self has succeeded in controlling the grosser parts of his animal organism. The emotions and senses are being held and led; their direction is being changed. The bull is being caused to turn around. The beginning of discipline is the control of the physical life. The disciple recognizes that all material things must be subordinated to spiritual purpose if the work of regeneration is to be accomplished. Right action is a physical expression of energy dominated by a philosophical purpose. This is the burden of picture #2.

    Emailed in by Milt Sadusky




    Thursday, December 16, 2004

    More Smileys

    Make your own smiley click the "Link" button below and follow the instructions...enjoy.





    Wednesday, December 15, 2004

    Understanding ISPs

    Understanding ISPs
    ISPs offer services like email and internet access. Compare factors like security, services, and cost so that you find an ISP that supports all of your needs.
    What is an ISP?
    An ISP, or internet service provider, is a company that provides its customers access to the internet and other web services. In addition to maintaining a direct line to the internet, the company usually maintains web servers. By supplying necessary software, a password-protected user account, and a phone number to dial into the internet connection, ISPs offer their customers the capability to browse the web and exchange email with other people. Some ISPs also offer additional services.
    ISPs can vary in size—some are operated by one individual, while others are large corporations. They may also vary in scope—some only support users in a particular city, while others have regional or national capabilities.
    What services do ISPs provide?
    Almost all ISPs offer email and web browsing capabilities. They also offer varying degrees of user support, usually in the form of an email address or customer support hotline. Most ISPs also offer web hosting capabilities, allowing users to create and maintain personal web pages; and some may even offer the service of developing the pages for you. Many ISPs offer the option of high-speed access through DSL or cable modems, while others may just rely on dial-up connections.
    As part of normal operation, most ISPs perform backups of email and web files. If the ability to recover email and web files is important to you, check with your ISP to see if they back up the data; it might not be advertised as a service. Additionally, some ISPs may implement firewalls to block some incoming traffic, although you should consider this a supplement to your own security precautions, not a replacement.
    How do you choose an ISP?
    There are thousands of ISPs, and it's often difficult to decide which one best suits your needs. Some factors to consider include
    security - Do you feel that the ISP is concerned about security? Does it use encryption and SSL (see
    Protecting Your Privacy for more information) to protect any information you submit (e.g., user name, password)?
    privacy - Does the ISP have a published privacy policy? Are you comfortable with who has access to your information and how it is being handled and used?
    services - Does your ISP offer the services you want? Do they meet your requirements? Is there adequate support for the services?
    cost - Are the ISP's costs affordable? Are they reasonable for the number of services you receive, as well as the level of those services? Are you sacrificing quality and security to get the lowest price?
    reliability - Are the services your ISP provides reliable, or are they frequently unavailable due to maintenance, security problems, a high volume of users, or other reasons? If the ISP knows that services will be unavailable for a particular reason, does it adequately communicate that information?
    user support - Are there published methods for contacting customer support? Do you receive prompt and friendly service? Do their hours of availability accommodate your needs? Do the consultants have the appropriate level of knowledge?
    speed - How fast is your ISP's connection? Is it sufficient for accessing your email or navigating the internet?
    recommendations - Have you heard or seen positive reviews about the ISP? Were they from trusted sources? Does the ISP serve your geographic area? If you've uncovered negative points, are they factors you are concerned about?

    E-mail 'worm'

    Zafi Email Worm
    Tooting My Own Horn
    You Heard it here first 19 Hours Before
    CNN Reported
    Click "Link" To Read Their Story...

    Tuesday, December 14, 2004

    Way To Go Ron

    Ron - after rewriting and republishing my last 5 articles cause I thought the "center" align was tweeked in one of the posts - and nothing changed........wellllllll....

    I looked at the template and Geeezzzzz - "pix selected from the internet"

    I fixed it....LOL


    Phishing Web Sites Grew by 33 Percent in November

    Phishing Web Sites Grew by 33 Percent in November

    The number of phishing Web sites associated with online identity theft scams grew by 33 percent in November, after dropping off in September and early October, according to data compiled by the Anti-Phishing Working Group (APWG).The group received reports of 1,518 active phishing sites during November, up from 1,142 in October. Reports of phishing Web sites have grown by an average rate of 28 percent monthly since July, as scam artists broadened their efforts to lure customers of companies that do business online, according to Peter Cassidy, secretary general of the APWG. The APWG is an industry group of representatives from law enforcement and private sector companies, including leading Internet service providers, banks and technology vendors.Phishing scams are online crimes that use spam to direct Internet users to Web sites that are controlled by thieves, but designed to look like legitimate e-commerce sites. Users are asked to provide sensitive information such as a password, bank account information or a credit card number, often under the guise of updating an account.Customers of 51 online brands were targeted by phishing scams in November, compared with 44 brands in October, Cassidy said. However, just six companies drew more than 80 percent of all phishing scams, he said.The APWG no longer identifies the organizations that were the most popular targets of phishing scams, citing resistance from the group's industry members, he said. However, eBay and Citibank were phishers' top targets in past months, according to previous APWG reports.The creation of phishing Web sites in October and November resumed the torrid pace it reached in mid-August, after dropping off for much of September.Phishing attacks have emerged as a potent threat in 2004. More than 18 million e-mail messages linked to the attacks have been stopped this year by e-mail security provider MessageLabs.Industry groups, including the APWG, responded by calling attention to new attacks and working to shut down Web sites used in the scams to harvest personal information from unsuspecting Internet users.Recently, leading companies and law enforcement agencies unveiled a new antiphishing initiative. Digital PhishNet brings together companies such as Microsoft, America Online, and VeriSign with the U.S. Federal Bureau of Investigation, U.S. Secret Service and U.S. Postal Inspection Service to improve coordination when identifying and shutting down phishing sites.As in past months, the U.S. was again the most frequent host of fraudulent Web pages used in the attacks, Cassidy said.While phishing attacks may spike during November and December, which are busy shopping months in the European Union and the U.S., the increasing number of antiphishing tools and initiatives will hopefully bring the number of attacks down in 2005, according to Neil Creighton, chief executive officer of GeoTrust, a provider of online digital certificates.Like other companies, including Internet service provider Earthlink and eBay, GeoTrust distributes a free Web browser plugin that warns users when they visit phishing Web sites. Such utilities, coupled with the efforts of groups like the APWG and Digital PhishNet, will make life harder for online scam artists, and prompt consumers and merchants to become more aware about online identity verification, Creighton said.

    Report Phishing** The Anti-Phishing Working Group is a volunteer organization. Due to the significant increase in phishing volumes and reports, there may be some delay in processing your phishing reports and membership requests. **We are building a repository of phishing scam emails and websites to help people identify and avoid being scammed in the future. If you have received a phishing email and would like to submit it to Anti-Phishing Working Group, please send it to reportphishing@antiphishing.org. We will review the message and any websites to which it links, and post it to the Phishing Archive on this site.Instructions for Submitting Phishing EmailAssuming you use Outlook or Netscape:
    1. Create a new mail to
    reportphishing@antiphishing.org.
    2. Drag and drop the phishing email from your inbox onto this new
    email message. In Netscape drop it on the 'attachment' area.
    3. Do not use "forward" if you can help it, as this approach loses information and requires more manual processing. The exception is when you use the Web interface to outlook: in that case forward is the only solution.

    Zafi variant hides behind Christmas cheer

    Zafi variant hides behind Christmas cheer
    Worm arrives in e-mail titled Merry Christmas
    By Paul Roberts, IDG News ServiceDecember 14, 2004
    A new version of the Zafi e-mail worm is spreading Christmas wishes along with its malicious code, according to antivirus software companies.

    Zafi.D is a mass-mailing worm that arrives in a ZIP file attached to e-mail messages with the subject "Merry Christmas." Instead of a gift, however, the e-mail package delivers worm code that infects Microsoft Windows systems on which it is opened. Leading antivirus companies, including McAfee (
    Profile, Products, Articles), Sophos (Profile, Products, Articles) and Computer Associates (Profile, Products, Articles) International (CA) issued warnings about the new worm and updated antivirus signatures to stop the new threat. In addition to the Christmas well wishes in the subject line, Zafi-generated e-mails contain the message "Happy Hollydays" and are signed "Jaime." CA researchers collected almost 100 samples of Zafi.D since spotting the new worm variant early Tuesday, said Stefana Ribaudo, manager of the company's eTrust Security Management division. At McAfee Inc., around 50 samples of the worm were collected, mostly from Europe, said Vincent Gullotto, vice president of McAfee's Anti-Virus Emergency Response Team. Both companies rated Zafi.D a "medium" threat, indicating that a number of samples have been spotted, and that the worm has a destructive payload. Like most other mass-mailing e-mail worms, Zafi.D modifies the configuration of Windows machines, shutting down other security software and harvesting e-mail addresses from files on the infected computer. After it harvests e-mail addresses, Zafi uses a built-in SMTP (Simple Mail Transfer Protocol) to send e-mail to those addresses with copies of the worm code, antivirus companies said. The worm has had more luck spreading than earlier Zafi variants, possibly because of its well-timed and appealing subject line and message, which are good examples of what antivirus researchers call "social engineering" -- subtle tricks used to gain victims' confidence, Ribaudo said. However, the increase in reports could be due to an initial spam distribution of the worm. The similarity of Zafi.D to its predecessors -- and to other mass mailing worms -- means that it's likely that few examples of the new worm are actually getting through to e-mail inboxes, Gullotto said. Antivirus experts advised e-mail users to update their antivirus software to obtain the latest virus definitions for Zafi.D and to use extreme caution when handling unexpected e-mail attachments.

    An Easy way to Deal with Email Viruses and Worms

    An Easy way to Deal with Email Viruses and Worms without Anti-virus Software

    New Article Click Here

    Add a still or animated picture to an Outlook Email

    Pictures say a thousand words, so why not save yourself a lot of typing by adding them to your e-mail? Using HTML as your message format in Outlook 2000, you can add still or animated pictures from your local drive, from a network, or from the Internet. And you can add a border around the picture and specify the picture's position within the message body.

    Add a picture to an HTML message
    1. With the HTML message open, position the insertion point within the message body.
    2. On the Insert menu, click Picture.
    3. In the Picture source box, type the path to an image on your hard drive, type a URL (address) to an image on the Internet, or click Browse if you need to locate an image. You can use pictures in a variety of formats, including GIF and JPEG.
    Specify any other options you want. For Help on an option, click the question mark, and then click the option.
    You can change the settings after closing the dialog box. Just click the picture to select it, and then on the Insert menu, click Picture. Or, right-click the picture, and then click Properties on the shortcut menu. Change the settings as necessary.

    Sending pictures stored on the Internet vs. locally


    Depending on where the original picture is stored, Outlook can send a copy of the picture as part of the message or it can include a pointer to the picture. If you enter a path to a picture that's located on your hard disk or on a network, Outlook will automatically store a copy of the picture with the message. That's because the recipients most likely won't have access to these locations, so a pointer wouldn't work for them. However, if you specify a path to a picture that's located on the Internet, Outlook automatically includes a pointer to the picture. That's because your recipients could have access to the Internet and because sending a pointer keeps the message size down. Sending a picture with the message can increase the size of the message significantly and, therefore, slow down the time it takes to send and receive the message.

    If your recipients don't have access to the Internet location that the message points to, they'll either see a red X in place of the picture or the alternate text— if you specified any— in the Picture dialog box. If you want, you can send a copy of Internet pictures with the message instead of sending a pointer.

    Send a picture stored on the Internet with a message

    On the Tools menu, click Options, and then click the Mail Format tab.
    Do one of the following:

    If you're using Outlook in the Corporate or Workgroup configuration, select the Send pictures from the Internet check box.
    If you're using Outlook in the Internet Only configuration, click Settings, and then select the Send pictures from the Internet with messages check box.
    Besides adding pictures, the HTML message format also lets you enhance messages using special designs, formatted text, or a structured layout. For more information, read Create stylish and decorative e-mail in Outlook using HTML.

    Note While many popular e-mail programs besides Outlook 2000— such as Outlook 98, Outlook Express 4.0, Eudora 4.0, and Netscape Messenger 4.0— understand HTML messages, some do not. For more information about sending HTML messages, read Choose the best Outlook message format for a recipient.

    Lesson 21 How To Resize Your Desktop

    Lesson 21:How To Resize Your Desktop is now online at the LVH Schoolhouse

    The Pastor and His Cat

    The Cat

    Dwight Nelson recently told a true story about the pastor of his church.

    He had a kitten that climbed up a tree in his backyard and then was afraid to come down. The pastor coaxed, offered warm milk, etc. The kitty would not come down. The tree was not sturdy enough to climb, so the pastor decided that if he tied a rope to his car and drove away so that the tree bent down, he could then reach up and get the kitten. He did all this, checking his progress in the car frequently, then figured if he went just a little bit further, the tree would be bent sufficiently for him to reach the kitten. But as he moved a little further forward, the rope broke. The tree went "boing!" and the kitten instantly sailed through the air - out of sight.

    The pastor felt terrible. He walked all over the neighborhood asking people if they'd seen a little kitten. No. Nobody had seen a stray kitten. So he prayed, "Lord, I just commit this kitten to your keeping," and went on about his business. A few days later he was at the grocery store and met one of his church members. He happened to look into her shopping cart and was amazed to see cat food. Now this woman was a cat hater and everyone knew it, so he asked her, "Why are you buying cat food when you hate cats so much?" She replied, "You won't believe this," and told him how her little girl had been begging her for a cat, but she kept refusing. Then a few days before, the child had begged again, so the Mom finally told her little girl, "Well if God gives you a cat, I'll let you keep it?" (Can you see where this is heading?)

    She told the pastor, "I watched my child go out in the yard, get on her knees, and ask God for a cat. And really, Pastor, you won't believe this, but I saw it with my own eyes. A kitten suddenly came flying out of the blue sky, with its paws outspread, and landed right in front of her." Never underestimate the Power of God and what may appear to be breaking on one end, is answering prayer on another.

    Monday, December 13, 2004

    THE REALM OF THE LASERWANDS

    THE REALM OF THE LASERWANDS




    Healing stones and crystals: Clear Diamantina Laserwand
    Clear Diamantina Laserwand

    Laserwands are recognized by their long, slim shape.
    The facets are narrow and the long edges run almost perpendiculary to the tip.
    Towards the base, these crystals are often somewhat wider.
    Laser rods usually consist of clear or milky quartz.
    Smoke quartz or citrine are very rare laser crystals.

    Laserwands are very strong and dynamic crystals.
    The easily felt energy flow of these healing stones has a tremendous speed
    and is in the form of a spiral.
    This intensise light beam, in form of a spiral, can be useful in many ways.

    The longer the laser crystal, the higher the energy.
    With the tip of small lasers, meridians can be marked and acupuncture
    points activated. Large laserwands should never be pointed toward humans.
    Instead, hold the base of the laser rod over concerned area.
    The base of the crystal should be either crystallized or completely heald.

    As a meditation stone the laser is an absolute healing crystal;
    it is able to activated the chakras and in particular to open the crown chakra,
    with its dynamic light beam.
    These crystals are true bearer of light, if one has ajusted to them,
    and can lead to higher energetic levels.

    In the higher healing-art of crystal healing, these mighty tools are used
    in aural surgery.
    Old patterns and disturbing structures can be eliminated by this "nonviolent" surgery.
    Remember, one operate always with the base of these healing tools.
    All burden can be sucked off this way from soul, spirit and body.
    On the physical level even disharmonic molecules
    and cells can be transformed.

    Cursor Thief

    Cursor Thief


    Lesson 20 Monitor Resolutions

    Lesson 20 Monitor Resolutions


    Now Online at The LVH Schoolhouse

    That Explains It

    What do you call the @ symbol used in e-mail addresses?
    What do you call the @ symbol used in e-mail addresses?

    That little "a" with a circle curling around it that is found in email addresses is most commonly referred to as the "at" symbol.

    Surprisingly though, there is no official, universal name for this sign. There are dozens of strange terms to describe the @ symbol.

    Several languages use words that associate the shape of the symbol with some type of animal.

    For instance, some quirky names for the @ symbol include:
      apenstaartje - Dutch for "monkey's tail"
      snabel - Danish for "elephant's trunk"
      kissanhnta - Finnish for "cat's tail"
      klammeraffe - German for "hanging monkey"
      papaki - Greek for "little duck"
      kukac - Hungarian for "worm"
      dalphaengi - Korean for "snail"
      grisehale - Norwegian for "pig's tail"
      sobachka - Russian for "little dog"

    Before it became the standard symbol for electronic mail, the @ symbol was used to represent the cost or weight of something. For instance, if you purchased 6 apples, you might write it as 6 apples @ $1.10 each.

    With the introduction of e-mail came the popularity of the @ symbol. The @ symbol or the "at sign" separates a person's online user name from his mail server address. For instance, joe@uselessknowledge.com. Its widespread use on the Internet made it necessary to put this symbol on keyboards in other countries that have never seen or used the symbol before. As a result, there is really no official name for this symbol.

    The actual origin of the @ symbol remains an enigma.

    History tells us that the @ symbol stemmed from the tired hands of the medieval monks. During the Middle Ages before the invention of printing presses, every letter of a word had to be painstakingly transcribed by hand for each copy of a published book. The monks that performed these long, tedious copying duties looked for ways to reduce the number of individual strokes per word for common words. Although the word "at" is quite short to begin with, it was a common enough word in texts and documents that medieval monks thought it would be quicker and easier to shorten the word "at" even more. As a result, the monks looped the "t" around the "a" and created it into a circle-eliminating two strokes of the pen.

    Another story tells the @ symbol was used as an abbreviation for the word amphora. Amphora was the unit of measurement that determined the amount held by the large terra cotta jars that were used to ship grain, spices and wine. Giorgio Stabile, an Italian scholar, discovered the @ symbol in a letter written in 1536 by a Florentine trader named Francesco Lapi. It seems likely that some industrious trader saw the @ symbol in a book transcribed by monks using the symbol and appropriated it for use as the amphora abbreviation. This would also explain why it became common to use the symbol in relation to quantities of something.

    CyberCalc

    Calculator and Measurement Unit Converter

    This FREE utility is much more than a calculator. It automatically converts values expressed in one unit of measure (of area, length, weight, volume, temperature, time, speed, pressure and energy) to equivalent values in another. CyberCalc also supports "Active Skins" for a completely customized look. Several skin themes are included (Metal, Aqua, Military, Techno and others), or click here for additional skins.

    Not a trial or demo - this is fully operational freeware from your friends at CyberMetrics... Enjoy!

    Download CyberCalc

    1-800-PSYCH

    1-800-PSYCH

    Hello, Welcome to the Psychiatric Hotline.

    If you are obsessive-compulsive, please press 1 repeatedly.
    If you are co-dependent, please ask someone to press 2.
    If you have multiple personalities, please press 3, 4, 5 and 6.
    If you are paranoid-delusional, we know who you are and what you want. Just stay on the line so we can trace the call.
    If you are schizophrenic, listen carefully and a little voice will tell you which number to press.
    If you are delusional, press 7 and your call will be transferred to the mother ship.
    If you have a nervous disorder, please fidget with the # key until a representative comes on the line.
    If you are dyslexic, press 696969696969.
    If you have amnesia, press 8 and state your name, address, phone, date of birth, social security number and your mother's maiden name.
    If you have post-traumatic stress disorder, slowly and carefully press 000.
    If you have short-term memory loss, press 9. If you have short-term memory loss, press 9. If you have short-term memory loss, press 9. If you have short-term memory loss, press 9.
    If you are menopausal, hang up, turn on the fan, lie down & cry. You won't be crazy forever.
    If you have a masochistic complex, please press "0" for the operator. There are 200 calls ahead of you.
    If you are depressed, it doesn't matter which number you press. No one will answer.

    Florida Election Recount

    Walnut Brandy Balls

    Walnut Brandy Balls

    1/2 cup butter, softened
    1/2 powdered sugar, sifted
    1/8 teaspoon salt
    1 tablespoon brandy
    1/2 teaspoon vanilla
    1 cup flour, sifted
    1/2 cup finely chopped walnuts
    additional powdered sugar


    Preheat oven to 325 F. Cream together butter, sugar and salt until fluffy. Stir in brandy and vanilla; add flour and nuts, mixing well. Shape into 3/4-inch balls. Bake on un greased cookie sheet for 20 minutes or until lightly rowned. Roll in additional powdered sugar when cool.



    Who's Who

    Who's Who AT The North Pole

    Santa employs thousands of elves around the world. But right here at ground zero of Operation Merry Christmas, there are a few elves we feel you need to know about -- especially if you will be reading the Updates here on our blog. After all, Santa is not the only person who is working hard for a Merry Christmas!

    There are elves who wrap, elves that track the weather, and elves who pack the sleigh. There are mailroom elves, food elves, decorating elves -- even singing elves. There are so many elves we can't begin to explain them all. So here are some of the biggest names of the little guys who help The Big Guy make it all so merry:

    Click Name For Biography


    Public Relations
    Elf Ernest
    He gets almost as much mail as Santa -- and he's just the guy for the job! If there's anything you want to know about Christmas, Santa, the North Pole, reindeer, Operation Merry Christmas or anything having to do with the season, Ernest is your man.

    Columnist for The North Pole Gazette and Infamous Christmas Curmudgeon
    Elf Ed Zachary
    Probably the most plain-spoken elf you'd ever want to meet, Elf Ed Zachary writes for adults and others dubious of Santa Claus and his cause. Beware, dear reader. Elf Ed is a straight shooter -- and he doesn't mince his words.

    Postmaster General, North Pole Post Office
    Elf Hugo
    Santa's got mail -- tons of it! All year long Elf Hugo Slavia takes in letters, emails, and packages at the North Pole Post Office.

    Serving Santa's Stables
    Elf Victor
    Santa doesn't just employ eight tiny reindeer -- he's got thousands! And the huge facility called Santa's Stables here at the North Pole is run by Elf Victor. Not only does he care for the reindeer, but he organizes the annual reindeer games -- and with Santa he hand selects the chosen few honored to serve Santa each year.

    Santa's Workshop
    Elf Bernard
    Santa's workshop is a place just about any kid would want to visit. It is run by Elf Bernard -- a very old, wise and plain spoken elf who understands the pressure of the season like no other person in the world. Charged with producing Operation Merry Christmas, Elf Bernard has been known to use any resource at his disposal -- including Tooth Fairies -- to make it happen.

    The Wrapping Department
    Elf Wally
    The wrapping department has a complex assignment -- take every Santa surprise and make it look merry. And it's a job every elf in the wrapping department takes very seriously. This merry bunch is lead by Elf Wally -- a frenzied, high-energy and worried sort who always finds a way to get the job done before Santa takes flight.

    Commissioner of Traditions
    Elf Gloria
    She may be the oldest elf at the North Pole -- some say, she may be almost as old as Santa himself. She may move slow and be a little hard of hearing, but she has a heart of pure gold. She is a Christmas purist -- and nothing happens at the North Pole in any department without her say-so. She makes sure the colors are right, that the bells ring true and that the spirit of the traditions of Christmas are preserved.

    Let it Snow, Let it Snow, Let it Snow!
    Elf Billy
    Elf Billy and his team of elf-geeks sit around their computers and watch the weather around the world. They are responsible for tracking Santa on Christmas Eve and for helping to make his flight plans each year. They have a huge, impossible job that constantly changes.

    Turn Your Head and Cough!
    Elf Lionel
    Elf Dr. Lionel P. Spock has one mission every year: keep everyone well and free from the dreaded Bah-Hum Bug Bug -- an ugly virus known to sap holiday cheer. He's the medical expert here -- and he's saved the day many, many times.


    MERRY
    CHRISTMAS

    Sunday, December 12, 2004

    Longview School House Lesson 19

    Longview Schoolhouse Lesson 19: Resolution Briefing Some Terms

    Now Posted

    Chinese approach to the Natal Demon

    Chinese approach to the Natal Demon
    Attracting the Attention Of the Bull

    Picture #1 of 10


    The Self attempts to exercise the powers of right thought and right action. It is confronted with the difficulty of attracting the attention of the personality from the objects of external desire. The bull is roving about the field, that is, the appetites and instincts are giving free expression to material inclination. The self holds out a green branch, a symbol of life and hope, but the bull pays little attention. The promise of abstract spiritual attainment is not sufficient to entice the bull from its sphere of irresponsible action. The dark clouds cover the sun; the light of reason is obscured. The bull is black to represent ignorance and negation. This picture summarizes the Oriental belief that the instincts and appetites will not come under voluntary control, but must be captured or held by the practice of the philosophic disciplines.


    emailed in by Milt & Carol Sadusky

    Rubbing It In

    Just Rubbing It In Ron

    Ron Click Here
    The Next School House Lesson.....

    In the next lesson we will try to get our computers set to a resolution that will display the very best for our individual tastes and to help our viewing experience.

    Those with vision problems should be helped with this lesson. Some of you will be able to enhance the colors on your display and set your computer for higher levels of encryption needed for computer shopping.

    These lessons also familiarize you with computer speak language and since we have a new geek on board (Jim Dodds) maybe he will put in some stuff on the lessons too.

    Our hope is to bring us all upto a level that will allow us to use the freedom and help the computer offers the older generation.

    Ouch !!!

    O U C H !!





    Try baking soda and water, mix as paste, apply...

    Saturday, December 11, 2004

    Visitors

    Visitors


    Last night I installed a tracking service on the Blog, it does not collect any personal information, rather it collects information about where our visitors live, what screen resolution they use, what operating system they run and the page that refered them to the Blog.

    I welcome and wish a Merry Christmas to our visitors from:

    Canada
    Chile
    Republic Of Korea
    Ireland

    Seattle, Bronx, Kent, Brooklyn, Woodbridge, Eugene, Dulles, Medford, Pensacola, Los Altos, Fort Worth, Saint Louis...

    and Newport.



    Hold On There Men

    Hold On There Men !!


    Thursday, December 09, 2004

    ARTICLE ABOUT LONGVIEW HILLS

    MONDAY – It Rained
    TUESDAY – It Rained Again
    WEDNESDAY - Yep Still Raining!
    THURSDAY - YOU GUESSED IT RAIN STILL!

    winds What was the highest wind on Tuesday?

    Rain How many inches this last 4 days?

    Trash Cans How many cans were lost?

    Shingles I kept all mine how about you?

    Down Spouts and Gutters Any lost or maybe found?

    Anything else going on? Lets hear it!!!!


    Wednesday, December 08, 2004

    Internet Explorer Alert

    Internet Explorer Alert

    The U.S. government's Computer Emergency Readiness Team (US-CERT) is warning Web surfers to stop using Microsoft's Internet Explorer (IE) browser.

    On the heels of last week's sophisticated malware attack that targeted a known IE flaw, US-CERT updated an earlier advisory to recommend the use of alternative browsers because of "significant vulnerabilities" in technologies embedded in IE.


    Full Alert Text Click Here or On The Left US-CERT Alert

    Williams Peace Plan






    Robin Williams Plan for Peace
    Leave it to Robin Williams to come up with the perfect plan... what we need now is for our UN Ambassador to stand up and repeat this message.
    Robin Williams' plan... (Hard to argue with this logic!)
    "I see a lot of people yelling for peace but I have not heard of a plan for peace.
    So, here's one plan:

    1. The US will apologize to the world for our "interference" in their affairs, past & present. You know, Hitler, Mussolini, Tojo, Noriega, Milosovich and the rest of those 'good ole boys.' We will never "interfere" again.

    2. We will withdraw our troops from all over the world, starting with Germany, South Korea and the Philippines. They don't want us there.We would station our troops at all US borders. No more will anyone sneak through holes in the fence.

    3. All illegal aliens have 90 days to get their affairs together and leave. We'll give them a free trip home. After 90 days the remainder will be gathered up and deported to France immediately, regardless of who or where they are. France should welcome them.

    4. All future visitors will be thoroughly checked and limited to 90 days unless given a special permit. No one from a terrorist nation would be allowed in. If you don't like it there, change it yourself and don't hide here. Asylum would never be available to anyone. We don't need any more cab drivers or 7-11 cashiers who won't speak English.

    5. No "students" over age 21. The older ones are the bombers. If they don't attend classes, or they get a "D" and it's back home baby!.Never to Return.

    6. The US will make a strong effort to become self-sufficient energy wise.This will include developing non-polluting sources of energy but will require a temporary drilling of oil in the Alaskan wilderness. The caribou will have to cope for a while.

    7. Offer Saudi Arabia and other oil producing countries $10 a barrel for their oil. If they don't like it, we go some place else. They can go somewhere else to sell their production. (About a week of the wells filling up their storage sites would be enough.)

    8. If there is a famine or other natural catastrophe in the world, we will not "interfere." They can pray to Allah or whomever, for seeds, rain, cement or whatever they need. Besides most of what we give them is stolen or given to the army. The people who need it most get very little, if anything.

    9. Ship the UN Headquarters to an isolated island some place.! We don't need the spies and fair weather friends here. Besides, the building would make a good homeless shelter or lockup for illegal aliens.

    10. All Americans must go to charm and beauty school. That way, no one can call us "Ugly Americans" any longer.
    Now, ain't that a winner of a plan."The Statue of Liberty is no longer saying 'Give me your poor, your tired, your huddled masses

    ' She's got a baseball bat and she's yelling, 'You want a piece of me?"


    I ran across this over a year ago and it still seems fitting today, what do you think ?

    IBM Sells Out U.S. Jobs

    Well It's Official

    IBM sells PC business for $1.25B.
    China's Lenovo to become world's No. 3 manufacturer;
    Big Blue Sells Out American Jobs.

    I wonder if there is anything we will be able to buy that says
    "Made In America"

    There goes another 2,300 "American" jobs !!!

    Email IBM Click Here


    Tuesday, December 07, 2004

    December 7



    President Roosevelt calling December 7, "a date which will live in infamy..."

    Job cut plans accelerate

    Job cut plans accelerate



    Hit by rising health care and energy costs, employers announced more than 100,000 job cuts in November, capping the first three-month stretch above that level since early 2002, an outplacement firm said Tuesday. Challenger, Gray & Christmas Inc. said companies announced 104,530 job cuts in November, up 5.1 percent from a year earlier and 2.6 percent from October.

    The September through November totals mark the first time that announced job cuts have topped 100,000 for three or more straight months since January to April of 2002, the firm said. U.S. employers have announced 930,690 job cuts this year.

    But if December cuts reach 69,310, it will mark the fourth straight year with 1 million cuts announced by U. S. employers, Challenger added. Challenger said the economy's biggest worry is that a "large number of lower-middle class and middle-class Americans struggling to make it paycheck-to-paycheck will be short of discretionary income during the holiday shopping season." In addition to job cuts, the pace of job creation has been sluggish during the current expansion. The number of jobs created since the last recession ended in November 2001 has been the slowest of any economic recovery in the United States since World War II.

    "We've fallen far short of prior economic expansions," said JPMorgan Fleming's Chan. "We're about 5-1/2 million (jobs) short of where would be today if this were a typical expansion."


    IBM To Sell Out To China

    IBM plans to exit PC business

    International Business Machines Corp. has put its personal computing business up for sale in a deal that could be worth as much as $2 billion. Lenovo Group Ltd., China's top PC manufacturer, and at least one other company are said to be in talks with IBM. In its first disclosure that a deal may be imminent, Lenovo said it was in acquisition talks with a major technology company, without identifying the firm. The move to dispose of its PC business, which IBM started two and a half decades ago, is part of a long-standing effort by IBM to reduce its exposure to the market. It already relies on contract manufacturing partners, including a joint venture with China's Great Wall Technology, to produce all of its PCs. The deal would propel Lenovo from eighth place among PC manufacturers to the No. 3 position, combining its own 2.2 percent share with the 5.5 percent held by IBM. IBM's PC business employs roughly 10,000 people, including about 2,300 in the United States -- mostly product designers, marketers and sales specialists -- and some 7,700 overseas, a company spokesman said.

    The latter includes more than 4,000 manufacturing workers in China employed by IBM's joint venture with Great Wall Technology in the southern Chinese city of Shenzhen. Most IBM ThinkPads are built through this joint venture.


    Well I guess that would mean all 10,000 jobs are lost to China !!
    First WalMArt now IBM
    Merry Christmas
    To The Already 7,700 lost jobs.


    Email IBM Click Here

    Sunday, December 05, 2004

    Blog Has No Borders

    From France to Canada this blog is spanning the world. If you don't think "Life On The Hill" finds interested people from around the globe visiting us, ask Ron or myself....

    If you have a thought or poem...
    Blog it.

    Your favorite dinner dish or dessert...
    Blog it.

    Start writing a book and Blog it.

    Put your photos here for share with the world...

    Blog it...

    Saturday, December 04, 2004

    House To House Search

    Trying To Imagine Urban Warfare

    I watch and read the news everyday on the fighting in Fallujah, not realizing the true extent of what our troops are up against until I ran across this ariel map of Fallujah taken last November. Dialup users beware this is a 12Mb file but very well worth a close look at the true meaning of house to house search. After seeing this map indeed a few extra prayers will be said tonight for our troops stationed there.

    Click Here To View The Map






    Mouse Lesson 1

    Mouse Lesson No. 1

    Thursday, December 02, 2004




    Cute Picture ??

    Not if it just suddenly appears on your computer !!

    New worm out click here to read about Mugly.

    Firewall Safety

    Firewall Safety

    Off to the right I posted a new article, Understanding Your Firewall, a firewall is a piece of hardware or software that stops would-be idiots from hijacking your computer, special note for cable and satallite users,the DNS range is more widely know than for dialup accounts. I have Charter Cable so I expect a few more idiots to scan for open ports over a dialup account as cable companies use a specific DNS range (DNS=your computer's address and location). Windows XP has a built-in firewall so make sure it is turned on. Other operating systems need to have a firewall added in. If you don't think you need a firewall and that nobody is interested in you, think again, these jerks scan entire ranges of DNS's looking for an open door. I posted the article and am doing so here to let you know how important it is. To show my point I was going to add my BlackIce (Firewall software) log here but realized it is three pages long just for the last 24 hours. A total of 186 idiots out there just scanning the internet for somebody to have the door open. Just when you thought email was the only way to get hacked...those 186 idiots may have found your door open !

    If you need help turning on your firewall or need one, give me a buzz.