Youtube comments of Perhaps (@NoEgg4u).
-
2600
-
2000
-
1000
-
804
-
610
-
483
-
481
-
Hawaii always votes Democrat. Every executive office (mayors, governor) is held by Democrats. Hawaii also voted for Biden in the last election.
The last time that Hawaii voted Republican was for Ronald Reagan.
Although it breaks my heart for the thousands that lost their lives, lost their loved ones, and lost their livelihoods, it is hard to listen to them complaining about who they voted for, especially since virtually all of them will vote for those same Democrats, again.
When things spiral out of control, sometimes Democrats recognize the chaos.
But Democrats are politically inept, because they go back and repeat. This will not be the last time that Democrat run cities / states grossly mismanage a crisis, and are grossly unprepared for a crisis. In fact, if another fire were to break out 6 months from now, the same gross mismanagement would ensue.
Watch the next election. They will vote for Biden.
I am surprised that they did not blame this disaster on President Trump taking orders from Putin.
471
-
For anyone who feels that they are immune from censorship, consider the following:
-- Have you ever hesitated to post a civil comment, because you might get a strike?
-- Have you ever avoided certain words, knowing that the platform's bots will identify your comments and censor?
When speech is truly free, you would speak your mind, without worrying about your comment being challenged by the service. As long as your comment did not break the law, and your comment is not spam, no harm should come to you from the service. But that is not the case.
youtube routinely tosses comments. How many of you ever go back to check if your comment is still there?
When you post your comment, your browser shows it to you. It really looks like it got posted. But check later, and it might be gone.
In fact, this comment might not survive, because bots do not want people to know that comments often are tossed. If this comment survives, it is just luck.
Rob, your points were all correct. Excellent job. Thank you.
284
-
284
-
282
-
276
-
243
-
It is nearly impossible to remain anonymous, using any of today's communication devices / platforms. To be successful, you have to be an expert, and never make a single slip-up.
I use privacy related tools, but not with the expectation of remaining anonymous from 3-letter government agencies. Rather, for conducting business where I do not want to have a company in my face for the rest of my life.
For example, when I was car shopping/researching, I used privacy apps. None of my shopping found its way onto any social media platforms, and no car companies / services have been hounding me, except for the expected barrage from them hitting my temporary made-up profile that I used strictly for the car shopping.
Used in a limited way, for non-critical purposes, privacy tools have benefits. But never have the expectation that those tools are 100% private.
Rob, you spelled out exactly what needed to be understood. The worst things can happen to people that only think that they are insulated from spying, end us getting themselves in trouble because they did not understand what you covered in this video. For those people, if they used only in-the-clear apps, at least they would have not expected privacy.
Cheers!
228
-
199
-
183
-
Her name is Brittney Cooper.
@Officer Tatum: Why did you not say her name, or list her name in your video, or in your title, etc?
For some inexplicable reason, conservatives inadvertently provide anonymity to radical leftists.
If she was white, and said those things about blacks, her name would be plastered everywhere, by every leftist channel, on every platform.
But since she is is a radical leftist, conservative hosts give her cover, by way of keeping her name out of their reporting.
Her name does appear for 2½ seconds @1:47 in this video, and I suspect that was just happenstance.
It would also be helpful to provide the names, titles, and photos of the executives at Rutgers that allow her to remain employed at that college.
You can bet that if a conservative at that school said the same things about blacks, every last person that has authority over them would be named and questioned.
It is good that this channel exposes these degenerates. But please always identify them, and try to also identify those in authority that have the power to suspend or fire them.
137
-
119
-
115
-
114
-
113
-
110
-
105
-
102
-
100
-
97
-
97
-
96
-
92
-
87
-
87
-
86
-
80
-
That CEO lives in a bubble, where his employees "yes" him about everything, including his politics.
That CEO surrounds himself with other radical leftists, and is clueless about real life.
That CEO expected positive feedback from his e-mail to his customers, because that CEO really thought that they, too, hated Republicans, and he really thought that his customers also thought that Republicans are racists.
And the irony of this is that it is the CEO that is a racist.
Who would send out an e-mail message to their customers, calling countless people racists, other than a racist?
The Democrat party always has been, and still is, the party of racists, and this CEO belongs to that party.
80
-
77
-
76
-
70
-
65
-
64
-
Driving, on a public road, is not a right. It is a privilege, and one for which you must be licensed to do.
A doctor does not have the right to conceal his/her license to practice. He/she must present it on demand (which is why he/she keeps it on display).
A restaurant does not have the right to conceal their food service license. They must present it on demand (which is why they keep it on display).
So if you are driving, on a public road, a police officer is authorized to check that you are licensed to drive on that public road.
The police officer is not required explain why he/she wants to see your license (more on that, below).
The police officer should, after checking your license, explain why they pulled you over.
1)
The police officer does not have to play "Let's make a deal", in order to have a driver hand over their license.
2)
The police officer has no idea of the mental state of the person they are pulling over.
One test is to see if the driver will cooperate, or be combative.
The driver's response to handing the officer their driver's license speaks volumes about the mental state of the driver.
3)
Again, the police officer has no idea who is behind the wheel. It could be a friendly, law abiding person, or it could be a psycho, with numerous outstanding warrants.
The police officer can check on the status of the driver via the driver's license.
Note that even if the police officer told the driver the reason for being pulled over (he did not signal, went through a stop sign, speeding, or whatever), a combative driver will likely just argue the point, and say that since he disagrees, he does not need to show his license.
Lastly, the officer might have a different reason for not wanting to explain to the driver the reason for being pulled over.
For example, what if the car was reported stolen? Or, the car was used in a homicide? Or, the car is suspected of being used for smuggling. Or, a kidnapping was reported, and that car fits the description. Etc.
If you get pulled over, you must show your license to the police, on demand, and without introducing any conditions.
62
-
62
-
@7:41 "You may also want to double up and use a virtual private network (VPN) that carries your traffic end-to-the end."
No. No. No.
Do not do that.
Brilliant minds created TOR network to keep you anonymous. You are not going to improve on it. In fact, adding a VPN into the mix will expose you (your VPN service will see everything).
Never use a VPN with TOR. In fact, never use a VPN unless you have something specific where a VPN service is your only solution.
When you use a VPN service, they will see 100% of what you are doing. No matter what claims they make about privacy, you cannot verify any of their claims. If a court orders them to keep logs and rat on you (or rat on anyone visiting some site), they will.
If you want to visit the dark web with the highest level of safety, then use one of the following operating systems:
-- TAILS
-- Parrot OS (with its "AnonSurf" feature enabled)
-- Qubes OS (via its whonix virtual machine option)
You can access the dark web via Windows, via installing TOR browser. That is the least safe.
If you download that browser, there is only one place to obtain it (well, to safely obtain it). If you download it from anywhere else, you are asking for trouble.
Whichever option you choose, disable java-script, because it allows web sites to run code on your computer. That will break the functionality of countless web sites, but will keep you safe.
60
-
60
-
@1:33
"You take on the intelligence community, they have six ways from Sunday at getting back at ya"
Schumer is saying that we should all cower to the intelligence community.
Schumer is saying that even their boss, the President of the United States of America, should behave subservient to unelected bureaucrats.
Schumer is saying that they are accountable to no one, because they are all-powerful, without boundaries. There are no checks and balances on them. They are supreme and answer to no one.
Folks, Schumer is saying this because of 1 of 2 reasons (possibly a bit of both):
1) He is a coward, and unlike Trump, Schumer lacks a spine.
2) He is indirectly threatening Trump
More on #2:
Schumer knows that the chiefs at the intelligence agencies broke numerous laws and abused their power and ignored their oath to uphold our constitution.
Schumer knows that Trump knows this, and Schumer knows that Trump is going to bring them to justice.
Schumer knows that when those corrupt officials start getting prosecuted, and they start talking, that more and more Democrat corruption will be revealed.
Schumer knows that his party will be exposed like never before. He knows that even the corrupt media will not be able to hide Schumer's party's unbridled and unprecedented level of crime.
So Schumer is trying to make Trump think twice about going after the corrupt heads of those agencies. Schumer is trying to instill fear in Trump.
But Trump has no fear. It is Schumer that is sweating.
54
-
54
-
53
-
52
-
1) Whatever that 4-year old's taste is today, in 14 years from now, her tastes will be 90% different.
2) That Tesla runs on batteries. No batteries last 14 years. If, in 14 years, pricing is similar to today's pricing, it will cost you approximately the price of a new Tesla to replace the batteries on your Tesla that will be 14 years old. And you will probably have to wait months, for replacement batteries to be in stock. And Tesla, and only Tesla, will have those batteries.
3) In 14 years, the tires on that Tesla will have dried up and rotted. That is $1,000+ that you will have to spend for replacement tires, at today's prices (and will probably be double, in 14 years).
4) In 14 years, no 18-year old girl will want to be driving a 14 year old car.
5) In 14 years, no 18-year old girl will want to drive a car with high mileage (as if you will really keep the car in storage for 14 years and not drive it).
6) Since, in 14 years, the batteries will be dead, and the tires will be rotted, you will have to tow your daughter's 14-year old Tesla to a Tesla service station.
There is more, such as passing inspection, and suspension parts being in an unknown state, and paying insurance for 14 years, etc.
I suspect that that couple might have been trolling us for clicks and likes, using their cute daughter as a lure.
If we are to believe their story, then we are supposed to believe that such stupid parents have that kind of money to burn. I guess it is good to have parents (the daughter's grandparents) to support their stupid children and their stupid children's 4-year old daughter.
50
-
49
-
49
-
48
-
A few items not discussed by our host:
1) Activity light:
Some models have them. Some models do not have them.
Some people prefer having the light. Some people do not want the light. Some people do not care.
The activity light helps you if a job seems to be hung. You can tell if it is still active with the drive.
The activity light tells you when the drive is idle. This is helpful if you started a long job (perhaps a backup), and your monitor's power saver mode kicked in. The activity light will let you know if the job is still running, without you having to wake-up your monitor.
It is usually hard to know (pre-purchase) whether or not a drive has an activity light, because it is virtually never noted on the box, or on the manufacturer's on-line data sheets, etc. You usually have to find a review on youtube (and they usually do not mention it), and watch for the host to demonstrate the drive and if the drive is facing the camera, you might see it blinking. Or, ask the reviewer in the comment section.
2) Mechanical drives are great for backups. But if you expect to be performing requests from more than one program that will be using the drive (simultaneously), then that mechanical drive till slow down, probably by more than 50%.
I have found that LaCie drives are remarkably good at handling multitasking. They contain Seagate drives.
3) Self powered drives are super convenient. They have only a single cable that conducts both data and power.
But note that if you are using such drives on a hub, then do not expect more than 1 self-powered drive to work. If you plug in a second one, the drives will become slow and unresponsive. This applies to mechanical drives -- not SSDs.
4) The cable that is included in the box is usually short -- perhaps 16".
If you will need a longer cable, purchase it at the same time you are purchasing the drive, to save on separate shipping costs.
Be sure that the additional cable has the correct connection types on both ends.
Be sure that the additional cable is USB 3.0 (or higher) certified. If it does not specify the version, I suggest you not purchase it.
5) Warranty.
There is more to the warranty than the coverage period. There is the expectation that the manufacturer will honor their warranty, and what that entails.
Western Digital makes it an ordeal to get an RMA (return merchandise authorization) number. It could take you a month to get the RMA number, and that is with you calling them a few times each week, and pressing this button and that button to finally be put on hold to speak to a human. And that hold can be 15+ minutes, and repeated as necessary, until you get your RMA number.
If you manage to get an RMA number, then you might have to wait another month or two before they ship you your replacement drive.
The warranty maze and hoops with Western Digital are by design. There is simply no way for that to be accidental.
Seagate, on the other hand, does everything they can to make their warranty process pain-free.
They answer their phones, without long waits, and without a press this and press that maze. You still have to press buttons when calling them. But it is minimal, and then a human answers, asks you some questions, issues you an RMA number, and you are good to go.
Also note that some (all?) of Seagate drives include free data recovery.
If they recover 3 TB of data on your 4 TB failed drive, they will send you the recovered data on a 3 TB drive, and that is in addition to them also replacing your failed 4 TB drive, resulting in you now owning both a 3 TB drive and a 4 TB drive. You get to keep them both.
6) Power switch.
External drives that come with a power brick might, or might not, have a power switch.
This might matter to you, or might not matter. If it matters, find the answer prior to purchasing the drive.
7) Power saving / Sleep mode
Some drives will sleep, after X minutes of inactivity.
For most people, this does not matter. When a request goes to the sleeping drive, it will wake up the drive.
But this takes time, because the drive has to spin up. If this is a problem, or waiting is an annoyance, then avoid such drives.
How do you know which drives sleep? Search and search for the answer. It just seems that it is not covered anywhere.
The G-Technology drives sleep after approximately 5 minutes of idle time, and there is no way to configure them to not sleep.
There are applications that will send requests to the drive to keep it busy every few minutes, preventing sleep. Or you could write your own script to send a few bytes of data to the drive every couple of minutes to keep it alive.
On the subject of G-Technology drives, note that they have strong metal casings. You can stack them to the moon. But if you do so, you should blow a fan on them (on low, for a light breeze), to keep them from cooking each other.
8) If your new, external drive vibrates strongly, send it back for a refund / replacement.
9) Samsung makes two very good external drives: T5 and T7.
The T7 will run at approximately twice the speed of the T5, until its cache runs out.
If you will never write enough data, without rest, to fill the T7's cache, then it will always run at warp speed.
If you do fill the cache, then it will run slower than USB 2.0 speed, much slower than mechanical drives.
The benchmarks you see are never run with enough data to exceed the drive's cache, and so the drive always attains very fast scores.
The T5 also has cache. But when its cache runs out, the slow-down is minimal.
So if you have large writes to the drive, then the T5 will be faster.
The cache is probably 10% of the drive's capacity. Maybe a little more.
47
-
47
-
46
-
45
-
44
-
44
-
42
-
This will reach a boiling point, when one of those agents steals cash from a police officer that is in his jurisdiction, and that police officer arrests that agent for robbery.
Or, if it involves, for example, an off duty US Customs agent, or a family member of a CIA agent, etc. They will arrest the agent that stole their cash.
Sooner or later one of those agents, doing the stealing, will steal from the wrong person, will get arrested, and it will make agents think twice about stealing. They will continue stealing, due to the financial gain. But after one of them gets arrested, if a court finds them guilty, that will set a precedent for their illegal practices.
It has to be illegal. Civil Asset Forfeiture is not a law giving unfettered authority for agents to steal from anyone and everyone at the airport or elsewhere.
This similar stealing goes on in Mexico, where either you pay up, or you stay in jail -- when you committed no crime. That this goes on in the USA, where those who swore an oath to protect and serve, and to uphold our Constitution, flies in the face of law and order.
42
-
41
-
41
-
41
-
40
-
40
-
40
-
@0:33 -- Hysteria?
Concerned people are not hysterical people.
@1:12 "...it brought out the Microsoft haters, in droves."
It brought out far more people that love Windows, but are concerned about privacy. People that do not throw caution to the wind are not haters. They are proactively taking measures to not carelessly abandon proper privacy practices.
@1:39 "Recall only works on Co-Pilot Plus PCs."
That is how a slippery slope begins.
When millions, or perhaps billions, of people, world-wide, purchase a new PC, are they supposed to comprehend "Recall", and know its relationship to Co-Pilot, and the rest? Will they know that having Recall enabled exposes 100% of their activities to anyone that gains control of their PC? They hear "AI", and they salivate. If they know anything, it is only the wonderful side of Recall. The average person (we are talking billions of people) has no clue about the intricacies of Recall.
@2:13 "You have nothing to worry about (if you do not have a Recall qualified PC)."
For the folks that do have Co-Pilot Plus / Recall qualified PCs, they do have what to worry about?
@4:19 "This means that other users cannot access these keys..."
When someone deceptively clones your drive, or gains access to your login, etc, they will not be "other users". They will be "you", as far as Windows is concerned. Now the attacker will have a clear, detailed view of everything that has appeared on your screen, and will probably include keystrokes and mouse clicks (why not, when it is simple to implement).
That encryption software you run, to guard your password manager, and your Vera Crypt keys, and any other encryption that you use... well, now anyone with access to your PC has, with Microsoft's blessing, bypassed 100% of your security.
@5:32 "There's nothing Microsoft can do in recall..."
There is a difference between what Microsoft can do vs what Microsoft is actually doing.
I can stare at my neighbor, and creep her out. That is what I can do. But it is not the same as me actually doing it.
@6:08 "...doesn't really add much more exposure to the mix."
The "Frog in boiling water effect". Microsoft's executives are aware of humans having that same nature.
If this were 1998, and we were all using Windows 95 or Windows 98, and then Microsoft rolled out "Recall", people would be up in arms. But when privacy invasive tools are commonplace, then that is the time to roll out Recall, because "Heck, who cares anymore about privacy?"
Folks, if you have a burglary, and your PC gets stolen, then your Windows login account's password can be changed. Now the criminal can login as you, and see it all.
The same thing for any and every policing agency on the planet. Your private, encrypted data is there for them to see, via the Recall screen-shots, and Recall providing your passwords.
And can you imagine incompetent government bureaucrats not securing their PCs or servers -- and also in financial institutions and countless other large companies that have sensitive information, and some unscrupulous tech savvy employee or consultant, etc, gains access to those Recall enabled systems... they would see everything. Can you imagine the data breaches?
Data breaches happen all of the time. Now add Recall to the attacker's tool-kit.
Sure, for the average Joe with his computer, he will have no issues. But this is not about any individual user.
39
-
38
-
38
-
37
-
37
-
37
-
37
-
@0:44 -- "There is... there is no such person again...", regarding President* Biden's microphone being cut off.
1) This will continue happening, and will eventually show Blinken to be a liar.
2) A follow-up question should have been:
"The only way you could possibly know that no one has the means to cut the President's microphone is if you actually checked"
"Why did you check?"
"With whom did you check"
3) "Why did the President's microphone get cut off?"
"Who checked on the cause?"
"If no one checked, then why did no one check?"
"And if no one checked, then how did you arrive at your answer that no one cut off the President's microphone?"
It seems as though when Republicans start, by asking the right question, they are rarely prepared for the lie that is given in response to their question.
It seems as though the Republicans always think that they are going to stump the liar, from asking their initial question.
Why are the Republicans nearly never prepared with focused follow-up questions, to prove that the person lied?
These congressional office holders blab for a living. And yet, when it comes to corning these liars, they fall apart. What gives?
36
-
35
-
34
-
34
-
Rob, the Brazil government could see who is sending traffic to a VPN (without knowing, yet, that it is a VPN), by seeing that, aside from an initial DNS lookup by the user (for the client to connect to the VPN), no other DNS lookups have been requested by the user. And yet, lots of data passing between the user and the ISP. Or am I mistaken?
I do not know the laws in Brazil. But when they outlaw X, and they have no freedom of speech, then I would imagine that the Brazil police might be ordered to round up anyone using a VPN service, or to break in to people's homes who are suspected of using a VPN service. Thus, if my first paragraph is correct, the citizens of Brazil might get their doors kicked in if they have only 1 DNS lookup, followed by streams and streams of encrypted data, 100% of which is going to a single IP address in a foreign country.
And it is only a matter of time before the Brazil authorities identify who owns the target IP address.
-----
Logs:
Courts can order a VPN service provider to keep logs, and also issue a gag order, not allowing the VPN service provider to reveal the court order for them to keep logs.
-----
I see VPN services as glorified proxy servers, that are highly attractive to governments.
There are legitimate uses for VPN services. But I would never trust one where my freedom would be at stake, and be at the whim of an anonymous VPN employee handing over my data to the authorities.
34
-
33
-
33
-
32
-
32
-
32
-
30
-
30
-
30
-
@1:53 "There couldn't be anything more fair, than informing property owners of what is going to happen, giving them time to act, and then letting them make an informed choice."
1) He said that there couldn't be anything more fair. He said it, so it has to be true.
2) He tells someone that this is the unconstitutional act that we (the government) intend to execute. Since we told you, that means that the Constitution does not apply to the government's unconstitutional action.
As long as we tell you about our abhorrent actions, you can now suck an egg.
3) "...giving them time to act..."
How courteous of him to let them act, and let them make an informed choice. I guess we should thank him for allowing us those actions, instead of just showing up, unannounced, and dragging us out of our homes.
Folks, you just got a glimpse of a tyrant speaking in a courtroom.
@2:48 -- Kenson J. Siver is also a tyrant, and likely corrupt.
There are evil people out there. They dress like everyone else. Some of them hold government jobs. We just got a look at two of them.
29
-
28
-
Linda Yaccarino is what inspired on-line "BS Generators" to be created.
She talks and talks, and says nothing, while sounding impressive.
Thomson Reuters has had multiple executive management turnovers, and each one was worse than the previous one.
The "busy" work that came from those people was highly detrimental to the moral of the staff, on all levels.
Think about dealing with a government bureaucracy, where every step of the way, when you try to be productive, they put another obstacle in your way.
Well, that goes on in large companies, too.
You have loads of work to get done, and for example, they mandate that you take ITIL (Information Technology Infrastructure Library) training, which takes weeks of studying, passing dozens of quizzes, and 90% of the subject matter has zero to do with your function within the company. And you still have to get all of your work done.
You have loads of work to get done, and they mandate you to take more on-line courses, that rarely helps your area of responsibility, and for which no human is available to assist with a question during the on-line, computer based training (CBT). You were not able to make out what was said during the training, and you played it back, over and over, and still can't make out what was said? Well, too bad.
From what I have seen of Linda Yaccarino, she fits the above mold.
I hope that Elon keeps tabs on when she rolls out any of the above, or similar.
I hope that Elon, himself, takes the on-line training and on-line classes and even training with live instructors (but does not reveal himself), to see how counter productive and demoralizing it is.
If Elon finds the above to be unbearable (and he will), then he will put a stop to Linda Yaccarino's wasteful policies.
At a minimum, Elon should require that Linda Yaccarino take every course that she will be imposing on the employees. And she must do so with no one else present. At her level, she can easily have someone there to take the quizzes for her.
So listen to Linda Yaccarino give speeches, and answer questions. Does she speak plainly, like Trump, where you get human answers?
Or do her speeches and her answers make your brain hurt?
Go to an on-line BS generator, and you will see the same verbiage that you hear from Linda Yaccarino.
28
-
28
-
@0:05 "...wrongly deported to El Salvador".
That is a lie.
He was an illegal alien. He had two court hearings. Both upheld his deportation order.
@0:11 "...despite court orders, calling for his return".
That is a lie.
There are no court orders, calling for his return.
@0:18 "Maryland Senator, Chris Van Hollen, went to El Salvador, yesterday..."
Senator Chris Van Hollen is in violation of the Logan Act. He should expect to be arrested upon his return to the United States of America.
@0:38 -- Repeating the lie.
@1:02 "...and was never charged with a crime".
That is a lie.
He was charged with breaking immigration law. That is why he was issued a deportation order.
Also, his wife, twice, had restraining orders issued against him, for domestic violence.
Thumb's down click earned, for the fake news / propaganda report.
27
-
That father thinks that it is a negotiation -- "I answered your questions. Now you answer mine."
That father was under no obligation to answer any questions.
He claimed to know the law (which he just made up).
That father claimed that he has a right to face his accusers. Well, not on the street. That right is for a courtroom, when he is on trial.
The police are allowed to lie. In fact, if they can calm the suspect down, by lying to him, they are encouraged to do so.
So there was probably only one person that saw the gun. But the police said several people saw the gun. That was probably a lie, to help calm down the suspect.
That father is a racist, because he accused the officer of being racist: "I know I'm brown, and you like shooting us."
Degenerate dirt bags will often, and repeatedly, try to change the subject.
That father knew the police officer wanted to find the gun. So that father kept complaining about other issues (as if that police officer is the only police officer on duty). And of course the police have talked to that other person that supposedly cut off that father. That other person called in the gun report.
Can you imagine how that father is raising his child? Everything is racist.
Can you imagine having an issue with that father, in a store, at the customer service counter, on a train, or any situation where normal people would have a meeting of the minds, whereas that father would go off the rails.
It makes sense that he carries a gun. He has probably been having confrontations with people for quite some time, and some people will not tolerate his BS. That is when he flashes his gun, and thinks that makes him right.
That father was being combative with the police.
Can you imagine how combative he is when the police are not involved?
That father is a cancer on society.
27
-
27
-
I agree 100% with everything our host said. There are a couple of more items to consider.
1) Backup programs offer encryption (probably all of them). If you use it, you will need to provide a password to have access to the data that you backed up. Should the time come where you need to restore those data, then you will need your password. If you forget your password, then forget your data. No password = no data.
If you do not use encryption, then if someone gets a copy of your backup (for example, they have access to your external drive that has the backup), then they will have complete access to everything that was backed up.
2) On-line backup services.
Know that when you use one of those services that they have 100% unfettered access to all of the data that you store on their servers. Not every employee. But the ones that control the environment will have access.
That does not mean that someone is looking at your data. But the company can have programs that examine your data and builds a profile on you.
If you are a celebrity or a high ranking government official, the service could make copies of your data for the company's executives to peruse.
If you were the CEO of Google, would you be able to resist seeing what Hillary Clinton is backing up, or what LeBron James is backing up, or what (pick your celebrity) is backing up?
Are you planning to one-day run for public office? Do you know if your backup service keeps yet another copy of your personal data, that they can use to influence you if you become successful?
How about your company's trade secrets?
Are you going to let complete strangers have copies of that? When you upload your files to the "cloud", those computers are owned by other people that you do not know. They are strangers.
If a government official wants to see what you have on your computer, they will need a search warrant.
If a government official asks a "cloud" service to keep unencrypted copies of your uploads, will the service do so and hand over "the" data (note that I used the determiner "the", rather than the pronoun "your", because whatever you upload to the cloud service is no longer owned by you).
The most secure way to protect your data is to do a local backup that is encrypted. As a safety net, you can upload that encrypted backup to the "cloud" service. They will not be able to profile you on its contents, because it is encrypted and they cannot access its contents.
Cheers!
26
-
Although VPNs offer excellent solutions for securely connecting to remote networks, VPNs also introduce a risk:
At the office, the IT personnel are responsible for computer security.
They can enforce group policies, ensure that everyone is running company approved anti-virus software, etc.
At home, the company often has zero control over the computer being used to establish a VPN connection. That home computer could be compromised with a key-logger, etc.
For such a connection, the company should be purchasing the home system, and should be enforcing the same conditions on that computer, as though that computer was in the office.
When the employee parts ways with the company, then that home computer, which is company property, goes back to the company.
26
-
26
-
25
-
25
-
Louis, the kid that hooked up the speakers knows nothing about phase. In fact, I will wager that not a single employee in the store knows about phase.
I own Vandersteen speakers. The store's owner + one worker showed up to install, placement, and tune my stereo. And they got my right speaker out of phase. The owner was very embarrassed that he did not catch his employee's mistake, especially since the owner sat down for a listen, and his trained ear did not hear the phase issue.
One other item:
Sandwiching the speakers together, as Best Buy has done, is not good for sound quality. The drivers and cabinets absorb sound from each other. They need space to breathe.
When a customer wants to hear a pair of speakers, Best Buy's personnel should set aside the other speakers. But when they do not even know how to correctly wire up the speakers, we can't expect them to know that lining up the speakers harms the sound quality (imaging / sound-staging, etc).
25
-
25
-
@0:00 "Protests in Atlanta, Georgia..."
Those were not protests.
-- Protests are legal.
-- Protests are protected by our Constitution / Bill Of Rights.
-- Protesting is a cherished freedom.
Calling the illegal, violent actions "Protests" is absurd, and part of the radical left's attack on language.
By stating that those violent actions were born from protests, it implies justification, as it was part of a legal action (protesting).
Call those criminals what they are. Call them criminals. Call them vandals. Call them murderers.
A protest cannot, by definition, turn violent, any more than a puppy turn violent.
Actions that are violent have no relationship to protesting.
When someone is committing violence, then they are not protesting.
When someone is protesting, then they are not committing violence.
Do not water down violence by implying that it is an outgrowth of protesting.
24
-
Yahoo Finance using a "Bash Trump" headline, as though Yahoo Finance does not understand President Trump's efforts to get the House Of Representatives to provide relief, without them adding 100% unrelated, power grabbing BS into the package.
This goes on all of the time.
They give a package a catchy name, and then they load it up with encyclopedias worth of special interest, money under the table, crap.
So President Trump walked away from that negotiation. There was no way that he would sign such a reckless bill into law. And then President Trump announced what he wants to have passed into law.
This is not rocket science. And Yahoo Finance intentionally labels their video to make President Trump look bad. Why?
Just like people hear "Stimulus Package", and assume it is all good (without reading what is in the package, Yahoo Finance creates a video that does the same thing. They count on people seeing their title, getting annoyed with President Trump, without digging any deeper to really find out what is happening.
And the stock market is not trying to make sense of President Trump's tweets. They understand exactly what is happening.
24
-
24
-
Folks, Hunter Biden is not an artist. He never created any art. None.
No one has ever seen him create anything.
He gets his art from an anonymous person, and sells it as his own. Technically, it is his own, after he pays the true artist (same as if you purchase art, then you own it).
So although it is hunter's art, that is not the same as Hunter being the artist.
The media never asked Hunter from where he gets his art supplies, or how he chooses his art supplies, what type of canvas he chooses (and why), what type of paints (and why), how he chose his easel, how he chose his lighting, does he paint in the morning or at night, how much time he spends creating art, etc.
Hunter's art is 100% a criminal enterprise for others to pay for top level access to the White House.
Someone wants a permit, or law passed, or any other criminal, crony government action, then they pay $¼million to Hunter. But how can Hunter explain the payoff? Well, he hands them someone else's painting.
Hunter never created any art. He just recycles it for criminal access to his father.
23
-
23
-
23
-
23
-
The people that broke the McCloskey's gate are not protesters.
The people that trespassed on the McCloskey's property are not protesters.
They are a mob.
They are rioters.
They are criminals.
Protesting is legal, and is protected by our constitution / Bill Of Rights.
Vandalizing, looting, and rioting are not rights.
Vandalizing, looting, and rioting are not legal.
If 1 person broke the McCloskey's gate, that would be illegal, and that person would get arrested.
If 2 people broke the McCloskey's gate, that would be illegal, and those people would get arrested.
If 100 people broke the McCloskey's gate, it remains illegal, and those people should get arrested.
Criminal acts do not become legal when X number of them form a mob.
Every time someone calls the above "protesting", they are giving the criminals a hint of justification.
Every time a video gets posted where they call these criminals "protesters", either in the title of the video, or in the content of the video, or in the text of a comment, etc, please correct the narrative.
We must be vigilant in correcting every misuse of of the verb "protesting".
Cheers!
23
-
22
-
22
-
21
-
20
-
20
-
19
-
19
-
19
-
@3:47 -- Editing a text file.
"nano" is very popular, and is great for beginners, or for folks used to using Windows "notepad".
But if you do a lot of text editing, then familiarize yourself with "vi" (or "vim").
"vi" stands for "visual".
"vim" takes on a clever "improved" meaning, as in vi improved.
When you become proficient with "vi" or "vim", you will blast though your editing sessions. You will not need your mouse.
"vi" has been around since before computers used monitors (everything was outputted to a paper feed). So any Linux or UNIX OS will have "vi". And any somewhat recent Linux or UNIX OS will very likely all have "vim", too.
If you are editing your own files, there is no need to use "sudo".
@7:38 -- exFAT is fine. But you can also use NTFS on nearly any modern Linux distro. That was not the case some years ago. But today, NTFS is supported.
NTFS will be much slower than ext4, on a Linux system, because NTFS will run in the much slower "user" space, whereas ext4 runs in the "kernel" space.
For a few megabytes, you probably will not notice any difference between ext4, exFAT, and NTFS. But for large files, or countless small files, NTFS will be noticeably slower than ext4.
So if your SD card, or USB drive, etc, is already formatted with NTFS, you should be fine.
18
-
Yes, some of those slogans are in poor taste, and I would be uncomfortable if children were with me. But there is no chance in hell that I would make them illegal. Why?
Who is to say, who is to dictate, what is offensive to a legal standard?
What starts off as well intentioned always (and I mean always) gets abused. For example:
The party in political power will manage to have a reason, no matter how ridiculous, to ban slogans that are against them, and to ban slogans that support their opponents.
And it will not end with slogans on vans.
It will morph into newspaper ads, and on-line commentary, and television ads, and stand-up comedy routines, and on and on.
The powerful will find anything and everything that hinders their further ascension, or threatens their monopolies, as offensive and, therefore, illegal.
It is far, far better to have some offensive language on vans, than the alternative of giving the unaccountable government bureaucrats the power to silence you.
18
-
@1:18
It is my understanding that all of those arrests were due to mistakes made by the criminals, that revealed themselves; that their arrests were not related to a weakness in Tor.
@5:10
-- decryption on the exit node.
Not for .onion sites (please let me know if I am mistaken).
@6:01
-- server e-mail traffic is not encrypted by Tor.
This is news to me. I do not understand the reason why server e-mail data would be in the clear when passed through Tor.
The Linux "Tails" distribution has an e-mail client. Is that e-mail traveling through Tor unencrypted?
@6:16
-- When on Tor, always go to encrypted web sites.
I am not sure what the benefit of an encrypted web site is, if the data got to the exit node and cannot be traced back to the guard node.
Sure, if you send personal information to a non encrypted site, then it defeats the purpose of using Tor. But if you are just clicking around and not providing any personal or identifiable information, then how could you be identified?
For example, if you use Tor to visit amazon.com (and for my example, amazon.com uses no encryption), and you poke around looking at reviews and prices, etc, it is my understanding that that cannot be traced back to you via Tor. I use Tor when I do not want to get ads based on my clicks, and I have never gotten ads that way.
Please let me know if anything I wrote is incorrect.
Excellent video!
18
-
18
-
18
-
18
-
18
-
18
-
18
-
17
-
What Senator Cruz did not ask, and what National Transportation Safety Board Chair did not provide, is the names of the specific people that she reached out to that has refused to cooperate.
We need to stop with blaming Boeing, and start blaming [First Name] [Last Name], [Title], at Boeing.
The same goes for the contracting companies.
And if photos of those people are available, she should hold them up and say: "This is [First Name] [Last Name], [Title] and he (or she) is in defiance of federal law."
Then, subpoena those people, and officially ask the justice department to arrest them for defying federal law by impeding the investigation.
Stop playing their game. They love to see congressional representatives and National Transportation Safety Board members publicly sharing their frustration at getting nowhere.
When they see this video, they are giving each other high-fives.
Get them into handcuffs, for their criminal liability, and the high-fives will stop, and everyone else, in any other similar investigation, will suddenly be very forthcoming.
17
-
17
-
17
-
Yes, there is always a reason for change. That should not be construed that the change is always beneficial.
I used to work for a Fortune 500 company, and one day a business unit's senior executive decided that mandating that everyone be ITIL (Information Technology Infrastructure Library) certified. Naturally, he did not study for and get himself ITIL certified. That certification took months of CBT (computer based training), where 90% of the content had nothing to do with your role, and if you did not understand something, there was no one to ask. And you still had to complete all of your job's responsibilities while taking the on-line ITIL training for months.
Was there a reason that the senior business unit's executive implemented the ITIL mandate? Yes. Was it a good reason? It sent the personnel's morale down the toilet, and produced reports that did not reflect the reasons for the drop in productivity. Personnel worked towards not showing up on the reports, rather than being productive. Any modifications to the work flow had to now be approved by committees of people that had no understanding of your team's functions. Huge amounts of time was wasted.
How about a car that you used to love. A new year passes, and they screw up what was so appealing to the vehicle. But they had a reason. Several years ago, the Honda Accord removed volume knobs from the radio, in favor of pressing and holding a button. Someone at Honda had a reason for that crazy change. Honda got so many complaints, that they put the knobs back.
Budweiser had taken on a new face for their brand. That was a change. Budweiser's executives had a reason. It was a terrible reason that tanked the company. But they had a reason.
Often, a new executive gets hired, and that executive wants the CEO to see their value. So the new executive makes changes. It happened multiple times at my former Fortune 500 company. It was like ping-pong, going back and forth with each senior or executive management change. Was ping-pong, senior management changes good, accompanied by the confusion of their changes?
Often, changes are made to make a statement. Such people that do that should be fired. Change should be done only when it is beneficial. If things are running smoothly, and profits are meeting goals, then that should not be changed.
Accept change that is beneficial. Never accept change, blindly.
17
-
16
-
16
-
16
-
@3:17 -- Microsoft is still doing that, for Windows 7.
"Security Intelligence Update for Windows Defender Antivirus" and "Windows Malicious Software Removal Tool" updates continue to be updated, regularly.
@5:00 -- Well, not really. There are people that have no clue on how malware gets into their computer. They see a message to update [fill in the blank], and they just go ahead and do it. They see a message that [fill in the blank] will speed up their computer, so they do so. They visit some site and see a message that claims that 14 threats have been identified, and they click, click, click.
Even with updates, those people get hit with malware. But it will be all-the-worse, when updates cease.
I still have a Windows 7 box that I often use. I never do anything risky, so all is well. But I am proficient with computers. The general public is not in the bubble that we computer enthusiasts are in, and are at risk if they use an unsupported version of Windows.
16
-
@1:04 "An activist..."
That was not an activist.
Activists conduct themselves in a legal fashion.
Activists march, hold up signs, hold rallies, make speeches, organize gatherings, etc.
The man that was killed by the police was a criminal. He was not an activist.
Please never call the actions of criminals "activists". Why?
Since being an activist is legal, and even celebrated by normal people, to then equate violent, criminal actions with being an activist will inadvertently give credence to the criminal's actions (being an activist is legal, and by extension, if activists burn down buildings, then burning down buildings will be construed as legal).
An activist and a criminal are miles apart from each other.
One is legal, and protected by our Constitution / Bill Of Rights.
The other is an attack on our freedoms and contempt for the rule of law.
16
-
16
-
No, that was not twitter's intention (to only convey that they "do not like this kind of threat on our platform").
-- The President of the United States of America said nothing wrong. He can, should, and will use all necessary force to restore law and order.
-- Is what the President of the United States of America wrote a threat? Yes. Is he expected to not uphold law and order?
-- twitter placed a public interest notice on President Trump's message in order to demean him.
-- twitter placed a public interest notice on President Trump's message in order to editorialize the President's message.
-- The American people do not need some anonymous, un-elected, answerable to no one, yahoos making a ruling on the President's message.
twitter is going to lose their immunity from liability (section 230 of the communications decency act) because they are not conducting themselves as a neutral public forum.
twitter is now in the "editor" business, and such businesses enjoy no such liability protection.
By the way, no one from twitter has spent any time in the autonomous zone.
When any of the executives spend their entire weekend there, alone, then they will have an ounce of credibility.
Cheers!
15
-
@0:19
"54 percent"
The questioner said 56 percent, and you can hear Biden having a mental moment, because he cannot remember the number.
So he struggles to talk, and realizes that he has to guess at what he cannot remember from a simple question from 10 seconds earlier, resulting in a stuttering pronunciation of 54 percent.
This is a typical Biden gaffe, when his memory cannot keep up with reality.
@0:25
"Well their memory is not very good, quite frankly"
His mind is on his own memory lapse, so he blurts out the above about other people's memory, and adds "quite frankly".
Often, when people overcompensate, and over emphasize their point, it is because they are struggling with the varsity of their own statement. In this case, Biden used "quite frankly" to try and come across as being certain, when he is actually uncertain of the question he was asked.
And watch his eyes, @0:25. He closes them and struggles to concentrate. For a second, he knows he is in "gaffe mode", and he focuses all of his thoughts on trying to appear to be lucid.
15
-
15
-
15
-
15
-
15
-
This video focused 100% on straight-line acceleration.
However, what sets the Civic Type R apart from other cars is its handling.
The Accord does handle quite well for a family sedan. But the Civic Type R is in a whole different league, when it comes to handling.
If these same cars were to race around a race track, the Civic Type R would win. It would not even be close.
The Civic Type R is closer to Ferrari level of handling than it is compared to the cars in this video. However good you think the Civic Type R can take turns at speed, you are mistaken. It is better than whatever you think it can do.
Most people love to focus on straight-line acceleration -- including me. But I also love a car that can do 1+ Gs around a turn, and that is where the Civic Type R shines.
The Civic Type R is an all-around race car, with none of the "money pit" problems associated with other sport's cars. In other words, the Civic Type R is super reliable, and a blast to drive. That is an almost impossible marriage. And it even gets good gas mileage.
If only the Civic Type R did not look like a monstrosity aimed at the children's market, I would consider purchasing one. And if Honda married it to their 10-speed automatic transmission, it would take the car to new heights.
Cheers!
15
-
15
-
15
-
14
-
14
-
Yes, support the police.
That, however, is different than blindly supporting every police officer.
The police swear an oath to uphold the Constitution of the United States of America.
When a police officer breaches his oath, then do not support that police officer, in that regard.
Police officers are held to a higher standard, because they are the ones that We The People entrust to protect and maintain our freedom. So when a police officer dishonors his oath, and sullies our Constitution, that must not go uncontested. Their oath to our Constitution has to be enforced.
Most law officers do not know anything about our Constitution. They could not tell you what our Bill Of Rights is. They swear an oath to uphold that which they know nothing (or nearly nothing) about. They raise their hand and swear to a fart in the wind, as far as their oath has any meaning to them.
All law officers should be given a quarterly quiz, where they are asked 3 questions about our Constitution (our Bill Of Rights should be the main focus). And the questions need not get into the weeds. A passing grade would be 2 out of 3 correct answers.
If they fail the test twice in a row, they are put on suspension. If they fail 3 times in a row, they are fired.
Additionally, all law officers should be required to repeat their oath to our Constitution, each time the take the quiz. That will connect the dots, making it clear as to the importance of, and the purpose of, them taking their oath.
14
-
14
-
14
-
14
-
13
-
13
-
13
-
President Trump was having seemingly daily question and answer sessions with the press.
He was constantly engaging the press, every time he traveled to and from the White House.
He stood there and took question after question after question.
President Trump also routinely had meetings with guests, and invited the press, who asked questions and President Trump answered.
President Trump also routinely had meetings with his cabinet and others, and the press was present, and they asked questions, and President Trump answered.
President Trump was constantly engaging the press.
President* Biden is constantly avoiding the press.
President Trump was constantly meeting with foreign heads of state.
President* Biden is constantly avoiding meeting with foreign heads of state.
There is no way the press can cover this up for a lengthy period of time. Yes, they are all on Biden's side. But even Houdini could not hide Biden's mental state. This is going to become headline news, globally, and within a month or two.
By the way:
Do not feel sorry for him. He is a vicious person. He cares about no one other than Biden.
He is corrupt. His family is corrupt.
Biden would feed you to the sharks (so to speak), he would ruin your life, in an instant, if he got any political capital from your sorrow.
The Democrats voted him in, and they knew his mental state.
The Media (more Democrats) voted him in, and they knew his mental state.
The big tech companies (more Democrats) barred free speech on an unprecedented scale, to help Biden, and they knew his mental state.
Hold all of them accountable for the disaster that they created.
13
-
13
-
13
-
Two questions:
1) How does Microsoft know that you are permitted to use Word, Excel, etc?
When you start one of the applications, does your computer contact a Microsoft permission server?
If yes, then what happens when you do not have internet service, but you want to edit a spreadsheet?
2) What happens to all of your documents, if you decide to not renew your subscription?
Will Word, Excel, etc refuse to run?
Will Word, Excel, etc, start, but refuse to open documents?
Will Word, Excel, etc, documents become read-only?
By the way, on my daily-driver computer, I am using Office from 2007 (purchased this i7 box in 2006).
I need nothing more than standard use of the apps that came with Office back then.
There are several other apps that come with all of the subscription services that Office 2007 does not have. Also, the apps I already have do not have many features offered in the current versions.
And none of that matters to me. And I am pretty sure that my version does not phone home with my activity.
I wouldn't mind learning Exchange, Publisher, Intune, Azure Information Protection, Editor, Clipchamp, and OneNote... for free, or for a one time charge of, perhaps, $29.99. But not for what Microsoft is charging.
For folks that will make use of those applications, then more power to them. But I do not think that most people need most of the apps in the subscription, and I don't think that most people need all of the bells and whistles that are in the most updated versions. I am not knocking those versions. They are probably slick, with power features. I just think that 99%+ of people never use more than 10% of the features (especially for Excel, which you can learn, forever).
13
-
13
-
If the tax is justified, then there is no reason for politicians to hide the tax.
Also, the amount of the tax is not the main issue.
The main issue is the existence of frivolous tax.
Yes, people will get upset if one huge tax is foisted upon them.
So our politicians spread the huge tax out into countless small, hidden, taxes, which is the same thing -- except that it is deceptive.
And that 5¢ tax never remains at 5¢, which is why we should protest the new, frivolous tax at its inception -- assuming we have any reputable news outlets that would run stories on such taxes, and show the photos and the names of every elected person that voted for and signed the new tax into law. The photos and names of those officials that voted against it should be newsworthy, too, to give them credit for their selfless public service.
@John Stossel, you do a remarkable job in shining a light on these substantive topics. You do far more than so-called news outlets.
What I would like to see is your report include the names and photos and party affiliation for every official that had anything to do (pro or con) with every frivolous tax.
That is a mountain of work. But it would tie everything together, and let the public see the actual villains and the heroes. It would reveal the swamp creatures, and make them think twice about continuing their self-serving, sleazy actions.
Cheers!
13
-
Louis, to the people that tell you that all you do is complain, well, they are complaining.
You are imparting valuable information and advice. The problem is not you. Rather, the problem is that so many heads of large businesses are tyrants.
So for the people that are complaining that Louis is shining a light on those tyrants, my question is: How many tyrants need to piss on you before you welcome the pissing?
If Louis shines a light on these miscreants, every day, the issue is not with Louis. The issue is the cancer in the business world that has spread as far as it has.
We should be thanking Louis, and people like him, for standing up to one tyrant after another.
He is risking law suits, and he is risking being shadow banned, or completely banned. He is putting his neck out there, and some of you actually complain about the valuable service that he is providing.
Louis, there are always suck-ups to the tyrants. They are a tiny, tiny, yet vocal part of your viewership. Do not yield an inch to them. Their way is the way of surrender and defeat. They are losers. They are the reason that tyrants get away with so much.
Keep up your great work!
13
-
13
-
Rob, there should be a way to have Windows present you with a maintenance window, during start-up. I believe that if you cut the power, two or three times, during set-up, you will be presented with that maintenance window.
From there, you can open a command prompt, and run regedit.
I do not remember the specific registry setting, or its associated field's value... but there is a registry entry that will tell Windows 11 to present you with the local admin account option.
Once you have the registry set, then on your next re-boot to set up your computer, you will be presented with a local account option.
Since you were using a laptop, you would have to disconnect the battery to cut the power and perform the above.
13
-
13
-
12
-
12
-
12
-
12
-
12
-
12
-
12
-
Do you remember the year 2000, Bush vs Gore election?
It was a razor thin race.
It all came down to whoever would win Florida, that person would win the election. Within hours, every federal court was inundated with lawsuits, and every Florida court, state and local, were inundated with lawsuits.
Without the Electoral College, those lawsuits would have been in every court, in every state, in every city, from sea to shining sea. That is because any one polling place could swing the election, if not for the Electoral College. It would not matter if a candidate had a 10 point lead in a state. When all that matters is the national vote, then that 10 point lead would not stop endless lawsuits in pursuit of more votes. But with the Electoral College, such lawsuits would serve little to no purpose, because it would not flip a 10 point lead.
If there was no Electoral College, then the year 2000 lawsuits would never have been decided in time to declare a winner of the election, in order to know who will be sworn in on January 20th.
And every other lawsuit being litigated would have been set aside, causing all kinds of issues where time was of the essence to resolve lawsuits that would have normally been happening.
12
-
@5:57 -- "A lot of people think they have end-to-end anonymity, and that's not true."
Our host is mistaken.
If, for example, you visit twitter, via the dark web (via TOR), then as long as you do not sign in, no one at twitter will know who you are. You can read all of the postings that you want. Twitter will know that you (not you, specifically) read those postings.
If you sign in to twitter, then it was you that gave up your anonymity. It was no fault of TOR network.
@6:17 "I have to encrypt and decrypt, encrypt and decrypt, encrypt and decrypt, and so forth."
That is not how TOR functions.
Your data gets encrypted by you own computer, and then those packets of encrypted data are encrypted, again (not yet decrypted), and then encrypted again by the net TOR node, and only when your data reaches the final TOR node (the exit node) does that final node do a triple decryption (peeling back each layer of encryption).
12
-
12
-
12
-
12
-
@1:45 "Some people complain that their comments disappear on my channel"
Thank you for pointing that out.
There have been times where my comments have disappeared, but was not sure if I was the only one, or if it was a youtube issue.
And it is not limited to this channel.
I first discovered this when, after leaving a comment (but yet not leaving the video), I noticed a type-o in my comment, and so I clicked "Edit", to fix my comment. So far, no sign of trouble.
When I tried to save my edited comment, youtube responded with "Error". The only button that worked was "Cancel".
So I figured, no problem. I will reload the page. That ended up being a problem, because my comment was not there.
So I checked my history of comments, and it was not there, either.
So I wrote my comment again, and it would not show up.
So I tested a "Test" comment, and that worked.
My conclusion is that youtube was checking for key words and disallowing my comments based on those words.
Note that I never use foul language. So youtube simply did not want me to write the truth; they denied me my Constitutional right to free speech.
12
-
12
-
11
-
11
-
11
-
11
-
11
-
All of their buzz words, and convoluted reasoning, for hiring pilots based on anything other than merit, will be come to bite them after one of their planes goes down, and hundreds of people are killed -- both in the cabin, and people on the ground where the plane crashes.
The law suits will be numerous, and the payouts will be huge.
It is sad that it will take the loss of many lives for this to make Scott Kirby culpable for his reckless actions.
I just hope that not only United Airlines gets sued, and loses, but also that Scott Kirby gets sued, personally, and loses -- enough to bankrupt him. Anything less, and he will not care one bit.
And when United Airlines; stock crashes, I hope that the stockholders sue United Airlines, and hope that the stockholders sue Scott Kirby, personally. It is the only language that mentally disturbed tyrants, like Scott Kirby, will understand.
11
-
11
-
@0:23
"...what we believe to be true"
Translation:
First understand that her use of "believe" is not defined in the dictionary.
When she says that she "believes" something, that does not mean that she believes it, because I "believe" that she is a liar.
And for the rest of the BS being spewed in the rest of the video:
It all adds up to people with Trump Derangement Syndrome, that have still not accepted that they lost in 2016, and are telling everyone that they are not accepting another win by President Trump.
This does have a silver lining:
They would not all be drumming the same "We do not believe that President Trump won, again" beat, if they thought that Biden could win.
They already know that President Trump is going to win. So they have already begun their resistance operation.
This time, however, President Trump is going to handle them more affirmatively. He will use every legal means at his disposal to drain the swamp (and, yes, the media personalities in this video are card-carrying members of the swamp -- they run the swamp).
Cheers!
11
-
11
-
11
-
11
-
11
-
11
-
11
-
11
-
11
-
11
-
If you agree to put in a device to track your driving, in the hopes of getting a better insurance rate, then be advised that if you have an accident, you can count on the insurance company checking your driving habits.
If they find that you were driving 3 MPH over the speed limit, they can claim that you are at fault (or share the fault) of an accident, and refuse a claim. They might refuse hospital costs.
And if you tend to drive 3 MPH over the speed limit, you might wind up with higher insurance rates. Even if you never drive over the speed limit, you might be flagged for excessive braking, or late braking, or excessive acceleration, or rounding turns over X MPH, and who knows what else.
In an accident, the other party's insurance company might sue you, if your device shows that you did anything that might have contributed to the accident.
As the years pass, I can see people getting tickets, fighting them in court, and losing because their car testified against them.
11
-
11
-
10
-
10
-
Windows, especially version 10, is a spyware OS, the likes the world has never imagined. It tracks every keystroke, every file access, every mouse click.
If you want to protect your privacy, and to a large degree your security, then stop using Windows. Stop using google (use duckduckgo.com). Stop using facebook. Etc.
Use an open source Linux OS. There are scores of distributions to choose from, and they are all free and all (or nearly all) are open-source.
If you want one that makes ease of use a priority, then install Linux Mint. Go to distrowatch.com for information on just about every Linux offering and where do download it from.
As to Open Office (and this also applies to Libre Office):
It is spyware free. Why?
They make their source code available for download. Meaning, people (programmers) anywhere on the planet can and do read that source code. They would love nothing more than to catch some sneaky code. So there is none.
With that source code, you can compile the installation files yourself, and install the Office suite. You can compare what you compile to the already compiled installation files that are free to download. Running "fc.exe" on the two will reveal that they are identical. Meaning, no BS for Open Office, and no BS for Libre Office.
As to Windows anti-virus:
I recommend Webroot.
Lastly, if you are unsure about installing Linux, you can install Oracle's free and open-source Virtual Box. That will allow you to create a Linux (or any other OS) machine that runs on your Windows machine. It will run much slower (because it is running virtually). But it allows you to use the Linux distro to see if you like it, and without risk.
And Linux has endless free and open-source programs to do 99.9% of everything you do on a Windows machine.
All open-source. All free. All safe.
Cheers!
10
-
10
-
10
-
10
-
@6:23 "I recommend: Pro".
If you originally had the Windows 11 Home version, then if you intend on activating your re-install, choose "Home".
If you had "Home", and then you choose "Pro", I am pretty sure that your installation will not get activated.
The "Home" version and the "Pro" version will be two different activation keys. Also, they are priced differently. If people with the Home version were able to get a free upgrade to Pro, by re-installing Windows, it would be noted by hosts on tech channels / forums.
Since I never tried the above, I cannot say with 100% certainty that going from Home to Pro will prevent activation. But I am believe I am correct, based on my explanation, above.
You can always purchase an upgrade key for the Pro version. But do so only if you will be using a feature that is unavailable in the Home version. To upgrade for the purpose of getting additional features that you do not use is a waste of money for the upgrade key.
The main four Pro features that are disabled in the Home version are:
-- Remote Desktop server.
-- BitLocker server.
-- Sandbox.
-- Group Policy editor.
There are probably other features.
Note that the client version of the above features will work on the Home version.
For example, only the Pro version (or Enterprise version) can create a BitLocker encrypted partition. But if you mount a BitLocker encrypted partition on a system running Home, you will be prompted for the password, and once entered, it will work. But the Home version cannot create the encrypted partition.
10
-
10
-
10
-
10
-
10
-
10
-
The big tech companies get away with spying, because most folks don't give a hoot that they are being tracked, and have no clue as to the extent of the tracking.
When people install Windows 10, most click through all of the set-up pages, leaving all of Microsoft's "opt in" settings left in the "opt in" position, which gives Microsoft permission to track your life.
I have asked family and friends:
"When we were in that restaurant, if you knew that our conversation was being recorded, would you have cared?"
Almost without exception, the answer is: "I don't care", and is based on that nothing too personal was discussed.
If every news channel did a story on how much information Microsoft collects, and they provided a link to a program that would disable all of the data collection, most folks would not want to be bothered, and would leave the data collection intact.
Most folks do not understand how much data www.google.com collects about them.
Even when I tell friends and family to use duckduckgo.com, they never do.
I have seen other youtube channels that had videos on installing free and open source Linux OSs, and free and open source apps, all to avoid being tracked. And in that same video, the host said "and the answer (to whatever he was discussing) is just a google search away". An entire video on privacy and security, and he says to use google.
Big tech loves the masses. They put Alexa inside their homes. They pay to have an internet connected device with a microphone and speech-to-text translation in their livingrooms.
People leave "Hey Siri" enabled on their phones, so that the phone listens to every utterance you and people around you make.
People use smart phone facial recognition to unlock their phones, so that big tech has your face-print.
People use smart phone fingerprint recognition to unlock their phones, so that big tech has your finger-prints.
Few people understand.
Fewer people care.
10
-
@0:40
"Words such as "master", "slave"..."
This is the end of the "Master Lock" company, and the end of locksmiths that have "master" keys.
And anyone with a "Masters" degree needs to be imprisoned for hurting the feelings of leftist trolls.
Better not slip on "black" ice. After you heal, you will be arrested.
@0:51
"Because we all know that the tech industry is completely male dominated".
So because women choose other livelihoods, then the men that choose the IT field are at fault?
Men and women are equal in the eyes of G-d and in the eyes of the law. We are not equal in terms of our interests, any more than short and tall people have identical interests, or old and young people have identical interest, or Chinese and Nigerian people have identical interests, etc.
Biologically, men and women are not the same.
Each excel in different areas. And when people look to find fault everywhere, then they will find it. Imagine having a boss that finds fault with everything that you do.
You can always find areas where (fill in the blank) people are not in great numbers. That does not mean anything illicit is happening. That is simply how some things pan out. You cannot force equal outcomes, short of totalitarian rules.
Stop cowering to the mob. Such weakness results in increased aggression from the mob.
These woke people are out of their minds.
"man" pages are "manual" pages.
If "woman" offers better functionality, then by all means, let's use it. But if it is there for virtue signaling, then that is sad.
At one time, we had "more". Later, we got "less". That was done for the right reasons. Let's keep doing things for the right reasons, and not for the demented fault seekers slithering around our neighborhoods.
Cheers!
10
-
10
-
10
-
In case anyone is still unsure, consider the following:
-- Symbolic links are simply pointers. They point to other files (even to other symbolic links).
However, you can delete the file to which the symbolic link points, and the symbolic link will remain. It will become a broken link.
In fact, you can create a symbol like that points to a non-existent file (which Jay did in this video, and you saw it as a red colored filename).
And, as Jay said, a symbolic link can point to any file anywhere on your computer or networked drive.
-- Hard links are similar to making a copy of a file, without actually making a copy of the file. Basically, you wind up with a file that has two file names (or three, etc, if you create even more hard links).
So if you have "some_huge_file_1.avi", and you create a hard link named "some_huge_file_2.avi", then both filenames are accessing the exact same inode (accessing the exact same file).
So if that file was 100GB in size, and you delete one of the two hard links, you will recover 0 space, because the inode still exists (the actual file and its content still exists).
You will not recover the disk space until you delete all file-names that share the same inode number.
Consider that a program (or someone) keeps deleting one of your files. Well, you could create a hard link to that file. Then when the file gets deleted (it does not really get deleted), you still have the file under its other hard-linked name.
When you run:
ls -l
...look in the column directly after the permissions. You usually see a "1". That is because most files do not have hard links associated with them.
If you see a "2", it means that that file exists under two different names.
If you see a "3", it means that that file exists under three different names.
Etc.
How do you discover what the other names are?:
The "find" command has a -samefile option, that will return results for filenames that share the same inode number.
This is handy if you want to ensure that a file really gets deleted. First see if there are any hard links associated with the file (look at the number next to the permissions).
If that number is greater than 1, then you have to find and delete the other file(s) that share the same inode number. The "find" command with the "-samefile" option will reveal the hard linked filenames.
Cheers!
10
-
10
-
@0:35 "My wife's PC died."
That is a very general description. Like:
My car died.
Well, if your battery died, you do not buy a new car.
If your alternator died, you do not buy a new car.
If the hard drive died, you do not buy a new PC (unless the old PC cannot keep up with whatever you are doing today, and a failed hard drive gave you the push to replace the old PC).
Maybe the power supply died?
Whatever part died could probably be replaced without too much fuss. A motherboard failing would be the biggest challenge.
But if such PC surgery is too challenging for a user, then they go the "new PC" route.
If, however, you can replace the failed part, it is the simplest solution and you will be good to go.
But if you must go with the new PC route (or in the case of the person writing in, they already made the new PC purchase), then be sure that you have all of your login credentials handy. Many of us have our browser auto-log us in. Well, when that PC is dead, then you will have to manually login to all of your web sites on your new PC.
Perhaps you will be able to make use of "Forgot Password" options for the web sites you use? But can you get into your e-mail account, to see the reset code that some site sends to you?
If you use a password manager, it will simplify things. You will have all of your login credentials.
Note that some sites will detect that you are attempting to login from different hardware, and will send a pin code to your phone, or will require some other form of verification, before allowing your new PC to login to their site.
Then there are all of your registration codes for any software that you purchased. Do you have that?
Those codes can be saved in your password manager, so that when you re-install your purchased software, you can enter your registration codes.
Do you have the installation programs?
If not, will you be able to find the installation programs from the site you downloaded it from? Is the same version still available on that site? Your registration code might not work on the latest version.
The person that wrote in the question has a backup. So hopefully that backup will have all of the downloaded installation files. But the registration codes might be in e-mail messages (or might not be in e-mail messages, as e-mail is insecure -- so some companies will not send registration codes via e-mail). Many registration codes are presented on-screen, and only on-screen, directly from the web site.
And then you have to deal with all of your tweaks that you made to your programs. Dark mode, font sizes, desktop icon arrangements, etc. On your new PC, you will have to manually set all of that from scratch.
Before your PC dies, you might want to take a photo of your desktop.
10
-
10
-
10
-
Microsoft, especially Windows version 10, logs every action, every file access, etc.
Upon creating a new user account in Windows 10, it defaults to "send your life back to Microsoft", and most people just click, click, click through all of the questions (and Microsoft knows this).
And you cannot turn off all of the "phone home" data collection.
There is no way, short of having Dave's programming skills, to keep Microsoft from spying on you. And now Microsoft created a subsystem for Linux.
Linux prides itself on being privacy and security focused. Nearly all distributions are open source. Linux has nothing to hide, unlike Microsoft Windows, which is closed source.
So why run Linux via the "phone home" Windows kernel? Sure it is "cool", and even has some useful aspects. But if your privacy and/or security means anything to you, then you are trusting that Microsoft is not tracking everything going on via its Linux subsystem. Based on Microsoft's track record, it stands to reason that they are tracking that, too. Why not? They track everything else.
And when your Linux code has issues, is it related to Microsoft's subsystem for Linux?
Is that infrequent kernel panic, that elusive bug, that [fill in the blank] issue... is it a Microsoft issue, or is it a Linux issue?
Do you have the time and the resources to duplicate your environment with Linux installed on bear metal, in order to test your code without the Windows foundation? Is it the exact same hardware for both the Windows box and the Linux box?
Lots to chew over, when issues surface. Yet another complicated layer of avoidable troubleshooting.
Microsoft makes some amazing software packages. That is to their credit. They are also ruthless when it comes to the competition. They take no prisoners. Does this matter?
Linux is Microsoft's biggest OS competitor. So why not gradually get the Linux world to run their code on Microsoft's platform? When enough people and businesses stop running Linux on bear metal, and instead run Linux on Microsoft's sub system for Linux, then Microsoft will command the Linux world, too. That is when they they can phase out their support and kill off their last serious OS competitor.
For security, privacy, and the last bastion of OS freedom, do not jump on the Microsoft subsystem for Linux bandwagon, unless you have a specific task where that is the best viable solution.
Would you run TAILS on a Microsoft Windows 10 box?
Please let me know if my insight is not on target.
Cheers!
9
-
@4:10 "clear" command.
Yes, ctrl-l is faster and more convenient, for interactive shell execution.
But for within a script, "clear" is what you probably use to clear your screen.
Perhaps you can issue a ctrl-l from within a script?
If someone knows how that can be done, please chime in.
@23:57 "...and just delete everything on that line" (via ctrl-u)
That is correct, as well as incorrect, depending on your cursor position.
ctrl-u does not necessarily delete everything on the line. Rather, it deletes everything to the left of the cursor. So if you cursor happens to be at the end of the line (and it usually is at the end of the line), then, yes, it will delete the entire line.
But if your cursor was not at the end of the line, then ctrl-u would not delete any characters to the right of the cursor. It would delete only the characters to the left of the cursor.
@27:03 "tail -f"
I prefer to use "less -iM filename" or simply "less filename", and from within less's output, press "shift F" (the "F" means "forever", as in tail the file forever).
Why is "less" and from there "shift F" my preference?
That "shift F" feature that is within the "less" command will do the same thing as "tail f". But the benefit of using "less" and "shift-F" is that when you are done tailing the file, you can press ctrl-q, and return to the standard "less" pager's output - scroll around within the output -- search through the output, etc).
With "tail -f", once you ctrl-c out of it, you are returned to the shell prompt. That might be better, depending on your situation. But I find the "less" command's "shift F" to be better, somewhat more often. At any rate, you have a choice between the two.
Often, when jobs run, they will duplicate their standard output (what is shown to the user) to a log file. This is often the case in a business environment, where the operators, controllers, programmers (employees) must keep a real-time eye on its progress. And there could be countless jobs running. So it is common to run "tail -f" to check on job completions and see if they succeeded or ended with errors, etc.
As such...
When you run "tail -f" on a log file of a job that is running, you could confuse the output from "tail -f" as the actual job, when it is really only a real-time view of the actual job (it is not the actual job, but simply the mirrored output of a log file that the job created).
Whereas, with "less", followed by "shift F", you will never mistake what you are viewing. You will absolutely know that you are in your "less" pager, tail'ing a file. You will never confuse viewing the tail of a file with viewing the actual, real job that is running.
If you mistakenly thought that you were doing a "tail -f", when that window happened to be the actual job, then when you run "ctrl-q" to break out of what you thought was a tail of a log, you end up performing that ctrl-q on the actual job, and you kill the job. Depending on the job, that could be a big problem.
Using "shift-F" via the "less" command avoids any and all potential mix-ups and mistakes that could happen with "tail -f".
-----
And, of course, another great video with clear and useful tips.
Cheers!
9
-
@1:54 "Downloading Windows is ethical, if and only if you have already purchased a valid product key or..."
Leo, I respectfully disagree.
Microsoft puts the installation files on their web site, making Windows 10 / 11 freely available for anyone to download. Microsoft puts no conditions on the availability of the download, or who can do the download, or anyone's reason for doing the download.
And it is not an "Oops, we did not realize what we did" by Microsoft's executives. This was their choice.
Additionally, Microsoft could include meaningful crippling code in the OS, if (for example), after a specified time period, no activation key is entered. All Microsoft did is lock the wallpaper / theme and include a watermark and a couple of other inconsequential disabled options. Microsoft does not even nag the user to purchase an activation key or enter an existing activation key.
Also, when it comes to ethics, consider the following:
You can purchase a new computer, for $103.99 on Amazon. That new computer will include a licensed Windows 11 Home key. But if you download Windows 11, and have to purchase a license key, it will cost you $139 for the license key (and only the license key). How is that ethical?
And if you purchase a renewed computer, Amazon has one with Windows 11 Pro, for $88, and is superior in just about every way to the new one for $103.99. So for $88, you can ethically and legally own a capable computer (probably includes a keyboard and mouse, too) that includes a valid Windows 11 Pro license, for less than half the price of purchasing Windows 11 Pro.
Yes, one is retail and the other is OEM. But that is Microsoft's doing. The pricing disparity is 100% at the whim of Microsoft.
So I see nothing unethical about downloading an OS, directly from Microsoft, that Microsoft's executives knowingly and intentionally make freely available on their web site, with no strings attached.
9
-
9
-
Back in the day of single core CPUs, it was common to enable hyper-threading.
That was good and bad.
-- It was good, because if you had something hogging your single core CPU cycles, it could hog only half of your CPU cycles. So you still had a responsive computer.
-- It was bad, because if you actually wanted a program to use all available CPU resources, it could not. Well, if the software was written to use multiple CPUs, then I believe that it would have used both halves of the hyper-threaded CPU. But few software tools, back then, were written to use multiple cores, because few folks had more than one CPU (or more than one core).
And the operating system needed to support multi-core CPUs. So in 1993, when I had my Gateway 2000 computer, with a 66 mHz DX2 CPU, and DOS 5.0, it did not support multi-core operations (as far as I remember). At least that computer's motherboard certainly did not. I think that Windows XP might have been the first Microsoft operating system to support multiple cores and hyper-threading.
Today, with nearly every CPU having 4+ cores (even $100 mini computers have two cores), I do not see any reason to enable hyper-threading. Is there still any reason to enable hyper-threading?
9
-
9
-
9
-
@pickyblade You busted kevin cvalciuc.
One of the disruptive practices conducted by internet trolls is to make wild claims. Then, when challenged, make an absurd excuse to not show any evidence of their claim.
Trolls win when others fall for lines like "look it up yourself", and folks waste time going on a wild goose chase, looking for nonsense.
Reputable people that make claims provide links, or some form of evidence or verification. They know that there is endless BS being posted, and want their readers to know that their comment is factual, and will therefore "show their work" and let the readers see that they are on the level.
kevin cvalciuc called you lazy, for not doing his work for him. Astonishing!
Also note that he is sick of people challenging him. So he does this type of trolling all the time.
Hey kevin cvalcuic, I am the King of France. Go look it up. If you do not see it, then keep looking. I know it is there. Based on your form of commenting, the responsibility for confirming my claim falls on your shoulders.
9
-
9
-
9
-
9
-
9
-
The police got involved, and they should not have gotten involved.
The police took an oath to uphold the Constitution of the United States of America. They have no oath to gavel before council members.
Those police officers should be retrained, if not suspended.
All law officers should be required to re-take their oath to the Constitution of the United States of America, monthly.
A record of each and every one of them should be maintained by every precinct. This goes for FBI, CIA, DEA, and the rest (excluding those in the field doing undercover work).
Every three months, every law enforcement officer should be quizzed on three questions about our Constitution / Bill of Rights, and the other Amendments to our Constitution.
If any law officer fails, twice in a row, they should be suspended.
If any law officer gets suspended three times, in two years, they should be fired.
The above will get the message across to every officer that they are to understand our rights, and they are to protect our rights.
As it stands, law enforcement take their oath when they are hired, and that is it. They go through the motions, and do not even understand the purpose of their oath, or the document to which they have sworn their oath. They might as well take an oath to uphold blah, blah, blah, as far as they understand their oath.
Getting back to the police getting involved...
If those police officers understood their oath, they would have told the city council members that this is not a police matter -- or maybe even have told the city council members that they (the council members) have no authority to stop anyone from waving the American flag or holding up our Constitution -- that no government body's "rules" usurp the Constitution of the United States of America.
9
-
If someone uses an emergency boot flash drive, then they can copy (or clone) your entire disk.
That will defeat 100% of any NTFS auditing setting.
If you need to bring your computer in for a hardware related problem, then remove your drive, before you hand it over to the shop's personnel.
If you do not know how to do that, then ask them to do that, when you drop it off. If they refuse, that is a red flag.
If they only disconnect a cable, that is meaningless, as they can reconnect it. They must hand you the drive. That is the only way for them to not have access to the drive.
The next option is to use BitLocker (not available in the Home version of Windows) or VeraCrypt to encrypt your entire drive.
That will prevent them from getting your files, even if they copy your drive. But remember that the more security you use, the more inconvenient your routine becomes.
9
-
Tips for a long lasting hard drive:
1) Make sure that you have proper cooling. Heat kills.
A light breeze should be enough.
If an internal drive is in a case with a non-working fan, that can shorten the life of your hard drive.
If an external drive is in a hot room, you should turn on a fan, and direct it at the drive. As long as a light breeze blows the drive's hot air away, you should be in good shape.
2) Never turn off the drive. If you leave it running 24/7/365, it will probably last longer. Of course, you will be paying for the electricity to keep it running 24/7/365.
Your hard drive takes the most punishment when it is turned on.
The above might be a tad difficult, because some drives go into power-saver mode, and have no option to disable it.
3) Feed your computer and hard drive (if it is external and not in the computer's case)... feed them clean power. Never connect your computer equipment directly to your wall outlet. That is dirty power. Every time anything bad happens on the power grid, your computer will be exposed to that event. Over time, even little spikes take their toll. Also, low voltages are bad.
If you ever have a black-out, unplug everything. The worst power is when a black-out ends, and the power is restored. Wait 5 or 10 minutes before plugging things back in.
If you use a UPS (uninterruptible power supply), your computer (and anything else plugged into the UPS) should last a very long time.
Not all UPS's are the same. A cheap one is basically a bucket of batteries that kicks in when there is a blackout. That is better than nothing.
The next step up is a UPS with AVR (automatic voltage regulation). Such UPS's will boost low voltage situations, and will reduce high voltage situations. Such UPS's will generally have a better joule rating (how much of a surge it can absorb and keep it from hitting your computer).
High end UPS's are referred to as "on-line". This is because they actively convert your A/C power to D/C power, and then back to A/C power (a double conversion). This means that the UPS is generating its own power. As such, whatever you have plugged in to the UPS will never see anything from the power grid. Such UPS's are expensive, and consume electricity in order to do the double conversion. This would probably be overkill for most people.
Data centers (such as a google, facebook, etc) use on-line UPS's to protect their huge server rooms (hospital operating rooms, too). Those UPS's, along with pallets and pallets of batteries, might cost more than your house.
If you are using a power strip with surge suppression, that is probably not doing much. The part that does the suppression is a metal-oxide varistor (MOV). Most power strips have cheap MOVs, and they wear out. Each little hit that they absorb takes a bite out of the MOV. As time passes, your surge suppression stops, and you will have only a power strip (and you will not know that the strip is no longer suppressing spikes and surges).
A good UPS, with AVR, will go a long way in protecting whatever you have plugged into it. And they will not break the bank.
I have been using them for 25 years, for TVs, computers, and all other electronics, and have never had any equipment (that is plugged into the UPS) fail.
8
-
8
-
8
-
8
-
8
-
If you use a torrent via TOR, then the servers that are feeding you your files will have your IP address. The data stream initiated by your computer will include your IP address, when using a torrent.
No one sniffing the hops will know your IP address or what you are doing. But when your request reaches the intended servers, then those servers will have your IP address, if you are transferring a file via a torrent.
Not covered in this video is that TOR can be used for all manner of internet activity (not just web browsing).
But web browsing is probably the most heavily used part of internet activity, including over TOR.
So take note that your web browser can give away your identity.
If you do not take steps to keep yourself anonymous, your web browser will send along a load of information about your computer, which the server on the other end will see.
Also:
To remain anonymous, you must disable javascript when you use your web browser.
But doing so will break the functionality of countless web sites. You will find that they do not load properly. Some sites will know that you disabled javascript, and will tell you that their site requires javascript to be enabled for it to work properly. But if you enable javascript, you will almost certainty give up your identity.
Lastly, due to bad actors, abusing the fact that TOR keeps them anonymous, countless web sites will not accept connections from TOR exit nodes (those nodes are publicly known).
So if you use TOR to go to some web site, it might time-out, or you might get a connection refused message, or something similar.
And then there is Windows, that monitors everything that you do, and phones home.
If you use TOR on a Windows computer, you really do not know what is being logged on your computer, or being sent to Microsoft.
For the safest TOR experience, use the Linux TAILS operating system.
If will be a bit of a struggle to surf the web, via TAILS. But that is due to TAILS protecting you from yourself. The roadblocks that TAILS puts up are to keep you from revealing your identity, when you did not realize that you were about to reveal your identity.
8
-
@0:05
"Today the United States surpassed Italy as the country with the most deaths" (note the emphasis on "the")
Folks, this is an example of fake news. Or at best, intentionally misleading.
-- The United States has 5½ times the population of Italy. So of course the United States will have more deaths than Italy.
But CBS Evening News makes it sound like the United States is worse than Italy, which is a lie.
-- The United States, depending on the hospital, is recording countless deaths as Coronavirus being the cause.
What CBS Evening News knows, and does not tell you, is that huge number of those deaths are people that were dying from other illnesses, and Coronavirus was just added to their problems.
-- China has the most deaths by far. Yes, by very far.
CBS Evening News knows that China has lied about everything related to their culpability in this worldwide calamity. And yet CBS Evening News reports that the United States has the most deaths? This is absolutely disgraceful.
CBS Evening News is taking the lying, Communist's word, all the while knowing that China is lying about their death numbers. CBS Evening News is siding with the government that caused this worldwide calamity, and spewing the propaganda from the governement that caused this worldwide calamity.
CBS Evening News is lying to America. Not inadvertently. They are lying and doing so intentionally.
CBS Evening News is disgraceful. Such a disgusting organization, to do this at a time like this.
8
-
8
-
8
-
8
-
8
-
The Dominion Voting Systems' computer code (the source code) that was compiled to run the voting machines needs to be made public.
No company, no government, no entity, no individual, should be allowed to create a program that tallies public votes, and uses code that is secret.
And once the source code is obtained, it should be compiled and then that compiled code should be checked, byte by byte, against the already compiled code that is on the voting machines.
It is simple to see if the compiled code is identical to the voting machine's code.
If the code is identical, then the source code must be read, line by line, to check its veracity.
If the code is not identical, then that is a big red flag, and no votes should be accepted until Dominion Voting Systems provides source code that exactly matches the compiled code that is on the voting machines.
If Dominion Voting Systems refuses to release the source code, then it is because they are hiding their voting scam.
No source code should = no valid votes.
Without examining the source code, there is no way to know what those voting machines are programmed to do, which could be anything.
Cheers!
8
-
8
-
8
-
8
-
8
-
8
-
8
-
@dadautube All, what dadautube wrote is nonsense.
For example, if you use the TOR network via the TAILS operating system, and you do not do anything stupid, your internet activity will remain anonymous.
There is no shortage of internet trolls that enjoy spreading BS, stirring things up, getting a woody after a few gullible people give his comment a thumb's up, etc.
Remaining anonymous is not a "trick". It is a skill.
Via the right TOR network behavior, your internet activity will not be tracked by anyone, or any agency. At most, there will be a detection of you using the TOR network, and that is where the trail ends.
I will give datautube credit for referencing bank accounts. But no one believes that bank accounts are private. Court orders are issued every day, compelling banks to hand over the info. In fact, the banks mail you your statements, optionally on paper. So no $h!t that they can reveal your banking information. This, however, has nothing to do with remaining anonymous on-line.
As to "master keys"...
There might be master keys for closed source encryption. There is no way to know, because the code is closed source.
So never use closed source encryption for anything that you want to be sure will remain private.
The whole point of open source software is that nothing is hidden. Nothing can be hidden -- it is open for anyone on the planet to read -- and that's a lot of programmers.
If a back door or master key was found, it would make headlines all over social media's tech channels. People would love to take credit for finding such a breach.
None exists. The fact that every programmer on the planet has 100% access to 100% of the code is the way that keeps the code strong and honest.
datautube threw out raw meat for those that might go for it. Do not.
Everything he mentioned is a generality, and nothing to back up anything he wrote.
He is either clueless, which makes his comments both irresponsible and reckless, or he is knowingly spreading BS, or a bit of both.
datatube started his comment with:
"the point is:
Folks, the point is to ignore him.
8
-
@1:45 "What's a strong password?"
Rather than trying to remember some complicated, cryptic master password, you can simplify the process by using 4 or more words, with a twist.
There is a video (I would provide the link, but youtube tends to toss comments with links) that uses the following example of a strong passphrase:
correct horse battery staple
1) It has 28 characters, making it too long for a standard brute force attack.
2) A dictionary attack might work, but would likely take months, using a room of state-of-the-art computers.
3) It is easy to remember.
To shore up the weakness in #2, you simply add a weird character somewhere, such as:
correct horse battery st%aple
The above example is virtually impossible to crack, even by a huge computer room full of advanced computers.
If Google, Facebook, Twitter, and all 3-letter government agencies combined forces to crack "correct horse battery st%aple", it would probably take years.
So use 4 or more words, and make at least one of the words an uncommon word (such as "osculate" or "abrogate")
By the way, if you use proper password management software, and also use a proper pass phrase, then it makes zero difference whether or not the company had a data breach.
Consider the following:
If a data breach actually mattered, then that means that the employees at the company were always able to access your data.
The goal of proper password management software is that you should not have to care, and not have to worry, about anyone (employees, attackers, etc) gaining access. If the software is proper, and your passphrase is proper, then your vault is impenetrable.
8
-
8
-
8
-
8
-
We have already been to other star systems: Romulus, Klingon, Moclus, Xelaya, Ocampa, Vulcan, etc.
Have we not seen the footage from Star Trek, The Orville, Star Wars, etc?
We have warp drive, quantum slip stream, and know about the Caretaker's coherent tetryon beam, and the Sikarians folding space technology.
8
-
Leo, is your new, local account a standard user account, or does it have administrator privileges?
If it is the latter, that should be changed to a local user account (unless the user has a legitimate reason for always using her computer with higher privileges).
I also suggest that two local accounts be created.
-- One local, standard user account, for routine, day-to-day use.
-- One local, administrator account, for unfettered access, as occasionally needed. This administrator account should be the first one created, and it should be used to create the standard user account.
8
-
8
-
8
-
8
-
8
-
8
-
8
-
Three items:
1) Opening a zip file is safe, even if it contains malware.
If you open the zip file, and run the enclosed malware, then you are in trouble.
If, for example, a zip file contains a photo (a jpg file). If you never click on that jpg file to open it (to view it); if you just let that jpg file sit there, then it is basically a dormant file that will never see the light of day.
The same is true of an exe file that is malware. You can have it on your computer. As long as you do not double-click it to run it, it will sit there for all eternity, doing nothing. Of course, that is risky, because one day someone might be curious and double-click it. So it is best to not have it. But if you ignore it, it will sit there doing nothing, just like any other files that you have that you never touch.
Opening a zip file only extracts the contents of that zip file.
You can upload the exe file (or any file) to virustotal. That will give you a good idea on whether or not the file contains malware. It is not 100% reliable. But if virustotal lights up with dozens of warnings, then that is a warning that you should heed. If virustotal deems it safe, it probably is, but the key word is "probably".
2) If something went amiss with any of the files within the zip file, you will know when you try to unzip (extract) the file(s).
When unzipping a zip file, the unzipping program checks the veracity of any file that you extract from the zip file. If a single byte is missing or has changed, you will see an error while trying to unzip it. So if someone wants to e-mail you a file where you must be 100% sure that nothing happened to it between the sender and you, then have them zip that file. If you unzip it, with no warnings, then you are good to go.
3) Zipping files does add compression by default. But compression is optional. You can zip files with zero compression, light compression, heavy compression, or medium compression. The benefit of zero compression is if the files you are going to zip are already highly compressed, then the zipping program will not waste time trying to compress files that it can't compress any further. But you must tell your zipping program to not use compression.
For example, flac files (music files) are already compressed. You might be able to compress them a bit more. But the space you will save will be almost meaningless, and it will take much longer to complete the zipping job if you try to compress those already compressed files.
This really only matters when you are zipping gigabytes of data with any modern computer.
If you are zipping a few megabytes, it will be so fast that the compression time will fly by.
Note that the compression is lossless.
When you unzip the files (when you extract the files from the zip file), they will return to exactly what they were.
8
-
8
-
8
-
8
-
7
-
7
-
7
-
7
-
7
-
7
-
7
-
7
-
To all of the talking heads that assert that there is no evidence of fraud:
1) The absence of evidence is not evidence of absence.
https://www.youtube.com/watch?v=rriD74r4l1s
2) It is utter nonsense to think that in such volatile, partisan, political times, that mail-in voting would not be compromised. That in a nation of 330,000,000 people, no one is going to find the cracks in the system, and no one is going to pay anyone off, and no one is going to lose ballots, etc.
Fraud exists in every walk of life.
Wherever there is money or power at stake, then there is 100% guaranteed under-the-table actions that will take place.
The difference between in-person voting and mail-in voting is that the former, albeit not perfect, is impossible to exploit at scale. Whereas the latter (mail-in) can be exploited on a large scale basis. And with such an attractive target, with such an attractive pay-off, there will be people that will exploit mail-in voting.
7
-
Microsoft has included numerous programs over the years, that used to be available only from 3rd party vendors -- everything from graphical disk management tools, to antivirus / firewall tools.
But Microsoft never really embraced a meaningful backup solution.
It would be simplistic for Microsoft to include some basic backup functionality. In fact, they could make it profitable, by offering to enable additional features (automation, encryption, compression, password protection, file exclusion, drive cloning, etc) for a reasonable cost.
Countless people would probably jump at the chance to backup their computers using native tools that were included with Windows.
Anyone know why Microsoft has never made a concerted effort to include a robust backup solution with Windows (other than a token Windows 7 backup tool)?
7
-
@1:26 "Let 'em speak."
Did you catch that disgusting action by that school board member?
Here is what she did:
She finds the speaker's words to be distasteful, but she has to let him speak. But when the audience cheers him on, she is boiling inside. She can't stand him being applauded. So she interrupts him, and tries to stop the applause.
And what is so deceitful is her choice of words.
It is like someone interrupting you by saying "I'm not interrupting you", when you try to speak.
She says "Let 'em speak", to stop the applause that infuriates her, and she tries to take the wind out of his sails; tries to make him lose his tempo.
She tried early on, @0:23, with "Address the board" interruption.
He was addressing the board. She knew where he was going (we all knew where he was going). None of us would have interrupted him with "Address the board". She knew he was laying down the foundation for his admonishment of the school board members. So she tries to interrupt him, implying that he was not addressing the school board members.
Of course he was addressing the school board members. Everything he said pertained to his country, his family, and how those school board members are trying to usurp his role as a father and the role of our constitutional republic. Everything he said was for the ears of the school board members (and she interrupts him with "Address the board").
Radical leftists do this all the time. They see you on a roll, and so they interrupt you, seemingly innocently. But there is nothing innocent about it. They do so to break your stride.
That school board member (that repeatedly tried to interrupt that father) is a radical leftist degenerate.
That father knew the score. He ignored her. He kept his pace. He drove home his points. That he ignored her, likely angered her all the more.
7
-
7
-
7
-
Yes, Windows will probably deal with whatever changes it encounters. So as our host said, you should be okay.
However, replacing your hardware and crossing your fingers that Windows will survive the change with no issues should be plan "B".
This is my recommendation for plan "A":
For every program that you install, save a copy of that installation file to some other drive.
Also keep a file containing every registration code.
Then, when you change your motherboard, you could install a clean copy of Windows. That will always be your best bet for a bug-free, stable computing experience.
Once you install Windows, and perform Windows Update, then you grab copies of your installation files, and install your programs, along with your registration codes.
You should also have a full backup of your old computer, so that you can copy your saved documents to your new installation.
The above is more time consuming. But getting things to work at their best will always take more effort.
There is a down-side to plan "A".
All of your customization will be gone. All of the tweaking to your desktop and your wallpaper and your settings for your programs will be gone. If your browser was set to automatically log you in to some sites, that will be gone. You will have to set them again. The plan "B" approach will maintain your settings, but at the potential cost of having other issues.
Cheers!
7
-
I recommend that Windows users stick with Windows Defender, and do not use any 3rd party packages. Why?
1) Read the terms of service (end user license agreement, etc), and read it thoroughly. Read any and all links contained therein. Read it all.
It is a boring read, and the 3rd party packages are counting on you not reading it.
You are agreeing to allow the 3rd party vendor to have complete, unfettered access to your computer.
You are agreeing to allow them to do anything they want to do, with the files on your computer. They are unlikely to harm any of your files. But they will sell your information to who knows who.
They will refer to the companies, with whom they will "share" your data, as part of their family of vendors (or some such wording). It all adds up to you giving complete strangers a transparent window into everything on your computer, and everything you do with your computer.
They claim it is for them to better protect you, and they claim that they only collect metrics, blah blah blah. Yet, you are agreeing to allow them to do anything they want with your computer.
Yes, for their software to be effective, they must be able to scan your files and your activities, to identify threats and protect you. So you have to allow it, if you use their software.
2) Windows Defender will probably do a better job than any 3rd party package.
A couple of decades ago, Microsoft did not really care about security. They left that up to the end user to protect themselves with 3rd party software.
Microsoft took a good deal of heat, and today they take security seriously, and they have the resources to handle it. They also have the most information on how Windows works and its vulnerabilities. Defender is bundled with Windows, and costs nothing for you to use.
3) If you decide to use a 3rd party vendor, and then one day decide to switch to some other 3rd party vendor (or switch to Microsoft Defender), you will find it next to impossible to divorce yourself from your current 3rd party vendor. You will never delete all traces, and you might end up with a conflict between competing packages.
Cheers!
7
-
7
-
7
-
@1:29 "...and got the school to scrap the whole thing"
That is only patching the problem.
-- What is the name of the teacher(s) that were foisting this radical left, brainwashing agenda on children?
-- What are the names of the school board members that approved this radical left, brainwashing agenda on children?
-- What is the address of the school?
-- What is the name of the Principal of the school?
-- Where are the photos of all of the villains in this radical left brainwashing plot?
All of the above people are either on the public payroll, or are being paid by the public (the parents).
None of the culprits should be given anonymity.
No one should be permitted to harm children, and get a free pass, as long as they stop their current harmful actions.
These same disturbed people are still in the school, still indoctrinating children, still harming children.
When a conservative does anything wrong, the media plasters their names, titles, and photos all over the digital landscape.
They do so even when the conservative is in the right.
So why do channels, such as this one, and nearly all other channels, that mean well, always fall short of identifying the actual people that are to blame?
The public needs to know who they are, so that The People can get them fired or voted out.
7
-
7
-
7
-
@4:23 "The entire box was an image".
That way, the human recipient can read it, but the spam filter sees no text to evaluate it. Yes, the spam filter can see and evaluate the text in the message's header. But to the spam filter, the body of the message had no text to evaluate.
I avoid getting scammed, because when an e-mail message suddenly entices me; when it gives me a knee-jerk reaction to click on something, well... I trained myself to pause, as those are social engineering tactics that scammers use to have people fall for their scams.
When good news falls out of the sky, even something as simple as being granted access to feature or document, etc, I let the pinch of dopamine subside and wait for my self-preservation senses to regain control of my actions.
7
-
7
-
Absent from this video are the names of the specific people that run the museum.
What are their names, and what are their titles.
Photos of them would also be welcome.
When any conservative is in the news on NBC, CBS, ABC, CNN, or on facebook or any other leftist platform, they name the conservative person, list the conservative person's title, and they show photos or video of the conservative person.
But when normal people are reporting on radical leftists that are destroying society, we give cover to those radical leftists. We leave them to be anonymous.
We hear about the harm they are causing, without knowing who they are. And then we complain to each other in the comment section.
Let's have some accountability. Shine a light on those people. Do not allow them to operate with anonymity. They never do so with conservatives.
No physical harm should befall them. But they should be held accountable in the news and in the world of social media. They should be shamed.
7
-
7
-
Run the command again, but escape the asterisk. For example:
$ find /home/Mason -name \*.txt
To understand why you ran into your issue, run this:
$ ls -l *.txt
You will see more than one match. Due to having multiple matches, those matches are applied to your "find" command line.
To test what you originally ran (which gave you the error), then run it again, with the echo command:
$ echo find /home/Mason -name *txt
You will see that the shell replaces the *txt with all matches, and that is what screwed up the find command.
Jay did not run into this problem, because he never had any matches to
*.txt
in his working directory. So the shell kept the asterisk intact and sent it to the find command.
For example, if you were to run:
$ echo find /home/Mason -name *somefile-that-is-not-here-blah-blah-blah
then the above will leave the asterisk there, because the shell will not match it to any files (which is how Jay avoided getting tripped up with his examples).
Note that if you have a single file that matches the *.txt criteria, then if you do not escape the asterisk, you will end up searching for only that one file.
Always escape the "*" when using the find command (and lots of other commands, too).
Escape the ? character, too.
Cheers!
7
-
7
-
If, for example, they are using a Microsoft Exchange server, to provide e-mail services to their staff, then no one (other than the individuals that have logins to that Exchange server) can run Revo Uninstaller on that Exchange server -- and 100% of all incoming and outgoing e-mail messages will traverse that Exchange server.
And depending on the the snooping software that they might have installed on your PC that they own, you will not be able to uninstall anything that they disallow you to uninstall.
They can deny anyone such access to remove their software from your machine (that they own). That can be done via the Group Policy Editor, which you will not be able to run.
When you are on their time, using their hardware, and using their software, then you have little control over their hardware, and their software.
7
-
7
-
7
-
7
-
7
-
7
-
A few years ago, Comcast sent out an e-mail message (similar to the topic here), threatening customers that they will delete e-mail accounts with no activity (I believe it was 1 year of no activity).
That is outrageous. Why?
Unlike Google, your Comcast e-mail accounts (six are included with your subscription) are not free. You are paying for them.
It would be like renting a storage unit, and not visiting it for X years. You keep making payments, but the company gave the unit to someone else, because you did not visit it. All of your stuff? Gone.
I do not know if Comcast followed though with their threat. They never sent out an update. I imagine that someone would have filed a legal challenge, based on paying for their dormant e-mail accounts. Are they really abandoned, if you are paying for them? The answer is "No." But Comcast sent out e-mail stating that your inactive e-mail accounts (which you are paying for), will get deleted for inactivity. (they left out the part that you are paying for them, when they sent out their threat of e-mail account deletion)
My community has only one internet service provider: Comcast.
I would leave them in an instant, if they did not have a monopoly.
7
-
7
-
7
-
7
-
7
-
The admin capable account should not be used, unless you have a specific (and probably rare) use case (I provided an example, below).
The admin capable account has access to all files on your computer. That is a risk.
If you are using the admin capable account, and you are poking around at files in some obscure folder, or some other user's files, you can mistakenly delete those files, or move them, etc. That would not happen with a standard user's account, as you would not have permission to even go into a different user's directory, etc.
If you are using the admin capable account, and you get infected with malware, then that malware can go into you system32 folder (or any user's folder) and create chaos. There will be no User Account Control prompt. It would be like having a command prompt with admin capable rights to encrypt files all over the place. No UAC prompt will be triggered.
If you are a standard user, and you get malware, then that malware will not have access to other user's files, and will not have more than "read" access to system32 files (or other such directories).
If you never make mistakes, and you never get malware, then enjoy the convenience of using an admin capable account. I will not roll the dice. I use a standard user account.
A rare case where I used the admin capable account is when I wanted to put a batch script into the "windows" directory". A standard user cannot do that.
If it became commonplace for me to use numerous scripts, I would create a new directory, and add that new directory to the PATH variable. But I had a one-off case, and it was simpler to use the Windows directory (which is already in the PATH variable).
My cousin used to use his admin capable account. He was not a careful user. He clicked on anything that caught his attention. He went to sketchy sites, and downloaded who knows what, without a care in the world. That is, until he called me because his computer was running slowly. I got tired of providing him with remote help, to clean out background processes that he unwittingly installed.
I then told him to create a new account, as a standard user. He did, and sometime later, he called me with the slow-down issue. This time, I told him to create yet another standard user account, and use only his newly created, standard user, account. As soon as he used that new standard user account, all was well. He never called me again for slow-down issues. He just keeps creating new standard user accounts. I speak to him often. He told me that he has created over 10 new accounts. In a way, it is absurdly funny. But he is not going to change his ways. He is somewhat absent-minded.
He is still living dangerously. I told him so. But at least the "who knows what" stuff he runs is contained within his local, standard user, account, and only runs when he uses that account. When he uses a new standard user account, it is clean. It is not a perfect solution. But it saves me from having to deal with it. And he is happy with it, too. But if he was using an admin capable account, then all kinds of other background processes could be involved, where a new user account would not be too helpful.
I do not know how common his situation is. But people routinely complain that their computer slows down. So a new standard user account might be an easy fix for them. And they can briefly use an admin capable account to copy or move their documents from their old, compromised account to their new, clean account.
For nearly everyone, a standard user account will be all that they ever need to do everything they need to do. It is safer that way, and is why they should not use an admin capable account. They should have an admin capable account, for when prompted to install new programs. But they should use a standard user account for their daily routines.
7
-
1)
@0:36
The terminal:
Note that all of the examples given require that your system's GUI (graphical user interface) is cooperating.
If for some reason your GUI stops responding, or your mouse stop working, you will need an alternative for starting the terminal (which, once started, can be used to trouble-shoot and fix any issues, or to do a clean reboot).
There are a few terminals that you can access, that are independent of your GUI. You access them by pressing Ctrl+Alt+F3 (or F4, or F5, etc).
Each one will open a terminal. From there, you can run a command to reboot your computer, or any other commands to help identify problems and apply fixes.
Pressing Ctrl+Alt+F6 (might differ depending on which Linux distribution you are running), will take you back to your GUI.
2)
@12:01
That will copy only files that have a dot (a period symbol).
If you have a file named "stuff", then using "cp *.* Pictures" will not include your "stuff" file when the copying takes place.
If you really want to copy everything, then use only an asterisk (*).
cp * Pictures
If you want to see what will be copied, before executing the cp command, then run (for example):
ls *.*
Whatever "ls" shows you is what will be copied when you, instead of using "ls" you use "cp".
3)
@19:44
Yes, issuing some command with the "--help" argument will usually provide documentation on how to use the command.
Note: "usually", not "always".
Also note that Linux documentation is built around the "man" command (stands for reading the "manual" for a command).
So for help on the cp (copy) command, you can use either:
cp --help
(or)
man cp
Does it matter?
It might.
The help that is returned will be similar, but not the same.
You might need to run both, in order to have your question(s) answered.
Cheers!
7
-
7
-
@10:00
"0 MPH to 60 MPH test"
-- Traction Control should have been turned off (it is on by default).
-- The camera should have been on the road for that acceleration test -- not on your face.
@10:44
"All Sport mode really does is it re-maps the throttle and also tightens up those adaptive shocks."
Sport mode holds lower gears longer, to make the throttle more responsive.
Sport mode increases the turbo boost, for better acceleration.
"It doesn't give you more horsepower."
That is true, but needs clarification.
Sport mode allows the car to use 100% of its power (without getting into aftermarket HonData modifications). It allows the car to use 100% of the power that the car comes with from the factory.
The other modes reduce performance, in favor of better fuel economy (and softer ride).
So although Sport mode does not give you more power (than what the car comes with), it does give you more power than the other two modes, because the other two mode reduce power (both via turbo boost and transmission shift points).
If you drive the car in either Econ or the default mode for a while, and then shift to Sport mode, you will feel the car wake up.
Perhaps more noticeable is if you drive in Sport mode for a while, and then switch to one of the other modes, you will feel the car ease up.
"...not much of a difference between Econ and Sport, in terms of 0 MPH to 60 MPH times"
Sport mode holds lower gears longer, and increases the turbo boost.
@12:35
"This one has Lane Detection"
It works only when driving between 45 MPH and 90 MPH.
It will make only minor adjustments. If you start to cross the line on a turn, you are going to cross the line. The Lane Detection system will not make more than minor adjustments.
Note mentioned in this review is that those 19" wheels, with their low profile tires (meaning less sidewall), in combination with the way Honda tuned the suspension, results in a sedan that really grips the road during hard turns. Those tires will stay planted much better than most people think, and will hold sharp turns at speeds most people would never try. It is not like a mid-engine Corvette. But it is very, very good (but do not drive like a nut -- even a million dollar Ferrari will lose control if pushed too hard).
Lastly, the brakes are very, very good.
They are silky smooth, and slow the car down with ease. They will probably save many people from accidents, when they had to stop short.
The Accord (Sport and Touring) is a great car. It is a blast to drive, and it is comfortable. The stereo, however, is so-so.
The other Accord styles are probably also very good. I have not driven them. For performance, the 19" wheels (available only on the Sport and Touring) is a must.
Cheers!
7
-
@0:16 "Leo, I've had several people tell me that I have too much stuff on my desktop, and that is why my computer is so slow."
Too many desktop icons is simply a clue that you have too many applications installed. But even that is not where the trail ends.
Every time you install a new program, there is a good chance that it installs services that run in the background, and start up automatically.
It is those myriad of services, trying to do who-knows-what that is slowing things down.
They might be phoning home, looking for updates, or sending the authors your personal information on how you use their software, or possibly anything else about what you are doing or what you have on your computer. You might even have a service that is running crypt-o mining software, using your computer's idle time, to the benefit of someone else.
The more programs you install, the more likely it is that one or more of those programs are either poorly configured, or are nefarious to some degree.
Browsers will slow down, when you add every extension under the sun -- and I have a feeling that anything that sparkles is added to our questioner's computer.
@0:22 "I think my computer is slow because it is old. It is six years old."
That is possible, for example, if the person who wrote in is playing demanding games. However...
I am using a fist generation Intel core i7-950. It was all the rage back in the day. But a current $119 core-i3 is 4½x faster than my old i7. Even a somewhat old, $85 core-i3-10305 will be 3x faster than my ancient i7-950.
Yet, I have no performance issues, for general computer use. That is because I resist installing every interesting program that catches my eye.
If the person that wrote in wants to identify whether or not his old computer is the culprit, he can reinstall Windows, and then install two or three of the programs he deems to be slow. My money is on him having no more slowness issue with those programs.
If he resets his computer with a fresh OS installation, then his computer will be as fast as the day he turned it on for the first time -- which will be more than triple as fast as my daily-driver, old i7.
He has a zillion desktop icons, because he installed a zillion programs, and their unknown registry and services rompings and browser extension clutter are responsible for his performance issues.
A new computer, that is twice as fast as what he has, will suffer similar performance issues, if he installs the same blizzard of programs. The new computer will be faster. But it, too, will suffer from whatever all of those programs are doing in the background.
6
-
6
-
Our host did an amazing job, walking us through the myriad of steps and options. Narrating, along with time synced screen captures, is a complicated and time consuming process that our host makes look easy. But even with his guidance, it made my brain hurt.
It seems that Microsoft made their cloud storage service intentionally complicated, to dissuade people from grabbing a copy of all of their files.
-- Microsoft could have included a "Download Everything" button. But they did not.
-- Microsoft could have allowed you to open an Explorer window on their cloud server, you select all files / folders, and copy / paste (or drag) everything to your local PC's storage device. But they did not.
-- When you choose their "Download" option, you get zip files. Now you have to deal with that.
zip files are fine, as an option. But that you cannot (even as an option) download everything in the folder tree that OneDrive shows you, and have that same tree duplicated locally, is intentional by Microsoft.
And if you have X terabytes of OneDrive files, then after you download it all as a zip file (assuming the zip format supports such a size), you then have to unzip your X terabyte zip file to recreate the folder structure on your PC. So you would need double the space, and double the time, to finally have all of your files, in their native tree structure, on your local PC.
Microsoft has the brightest software engineers on the planet on their payroll. So the above is all 100% by design. Nothing is an oversight.
Microsoft wants your files, and they do not want it to be easy for you to retrieve all of your files (as that indicates that you might leave their service).
Microsoft makes it simple to hand them copies of your files, and complicated to get them "all" back. Individual files are easy to grab. But not so when you want to grab everything.
Like so many other subscription services, the companies make it simple to join, and yet you need a support team to navigate parting ways.
I copy important files on to two external drives. One I keep local, and the other I keep elsewhere (protects me in case of a fire or burglary).
The files on my external drives are in a VeraCrypt folder, making them useless to anyone other than me.
It is simple, safe, and I am neither at the mercy of Microsoft having down time, nor my ISP possibly having down time. And there are no monthly cloud storage fees for using my own external drives.
Unless you have a good reason for uploading your files to compete strangers (i.e. Microsoft's OneDrive cloud servers, controlled by anonymous people), then why do so?
This video is very helpful for two reasons:
1) There is no doubt that countless people are using OneDrive, where our host's step-by-step guide will be of great value.
2) For people on the fence about using OneDrive, hopefully they will not.
6
-
Leo, please create a video on installing and running virtual machines.
For anyone that is not careful, or is careful and just screws up, a virtual machine can make recovery simple, and near-instant.
If the person who wrote in was checking his e-mail on a virtual machine, then he could have restored his virtual machine to the last time he took a snapshot (snapshots are quick and simple to take). You tell your virtual machine app to restore to your last snapshot (remember to periodically take snapshots), and 1 second later, you are done. VMs are not 100% safe -- but they are darn close. It is highly unlikely that any malware could escape a VM and infect your host machine.
And you can have one VM for checking e-mail, and a different VM for web browsing, etc. As long as you have taken a snapshot when your VM was clean, you can return to that snapshot almost instantly.
If you have enough RAM, you can run multiple VMs simultaneously. Another benefit is if you want to tinker around with Linux, or Win95, etc. Just install them as a VM, and have fun.
Oracle's VirtualBox is free and simple (at least compared to other offerings). I installed Box World on my Win98 VM, because it will not run elsewhere, and I love that game. VMs are amazing!
6
-
6
-
6
-
6
-
6
-
6
-
There are companies that outsource tech support that do not need to do so.
Some of those companies have oceans of cash flow. They are wildly successful.
By outsourcing their tech support, it means that some executive can report that instead of the company earning $1,000,000,000.00, they earned $1,001,000,000.00, and so they get a $50,000 bonus.
Looking at this from only the point of view of "Is the tech support quality?", will take on a new meaning when you are the very competent tech support person that loses his/her job, to pay some other person slave wages to replace you.
America made it possible for these companies to flourish, and the thank you America gets is that they lay off Americans, and send American dollars to foreign countries.
If a company is struggling to meet their payroll, then I will not fault them for taking such measures.
But for a company that fires countless Americans, simply to add 0.25% to a balance sheet or to a stock offering, while that company pays their executives 7-figure and 8-figure salaries, is repulsive.
If that company let go, one or two 7(or 8)-figure employees, then they would not have to let go 100+ other employees.
I worked for one of those companies, when they had 50 employees.
We grew by leaps and bounds. The company's President went out of his way to make everyone feel like family. And the revenue started coming in. We were treated to free fruits, transit checks (to offset our commuting costs), free top-tier health benefits for our entire family, company sponsored picnics, and good wages. We were never short staffed. In fact, we were staffed, such that if someone was on vacation, and two others called in sick, we still had good coverage.
Most of the employees recognized how well we were treated, and we responded in kind, by going above and beyond for our company.
But our company was financed by our parent company. When we became wildly profitable, they ordered our President to take cost cutting measures of every kind. He refused, and our profits continued to grow.
Eventually, the (then) CEO (Sharon Rowlands) of the parent company canned our President, for refusing to abandon his principles and throw the employees (who made the company what it was) onto the street.
That resulted in the end of free heath care, and every other nicety. That year, no one got an increase. And every year, thereafter, were more excuses. And that was also when they canned the Manhattan based customer service personnel and outsourced it. Not because they had to -- but because it looked better on a spreadsheet for some executive bean counter.
Then, most employees did only as much as needed to keep their jobs.
Then, most employees used all of their sick days (when prior, they used them only when they were actually sick).
Employees went from being family, to being computer data, and not knowing if they were next to be cut.
Customer service went from having employees that went above and beyond to make the customers #1, to overseas customer service that got the job done, but that's it.
if your American company is earning $100 million in profits, is it proper to lay off American workers to bring that number up to $101 million?
Shame on companies that piss on the country that made it possible for them to live the American dream.
6
-
6
-
6
-
6
-
6
-
6
-
6
-
6
-
6
-
6
-
Years ago, I stopped tinkering with all of these clean-up tools.
1) I have never seen a significant storage space change. Well... when hard drives were 300 MB in size, it made a difference. But not with today's TB SSDs.
2) If you are using an SSD (which nearly every computer within the last 5 years comes with), then clutter will not slow anything down.
Mechanical hard drives get slower, as they fill up, due to data being read or written to its inner-most portions of its disks (less real-estate for each rotation). When mechanical drives are empty, they use their outer most portions first. Each of those rotations contains close to twice the data as its inner most portions. None of that matters with SSDs.
With today's TB size SSDs, if you clean up 500 MB, that is 0.05% of your disk space (or 1/2000 of your storage space), and I doubt you will see any performance change. You can benchmark before and after, and I bet that there will be no change.
Installing 3rd party software is the most common culprit for what slows down your computer. It makes registry changes and additions, starts up services in the background, and phones home.
All of that will slow things down, more than cleaning up 500 MB or even 5 GB of data -- especially if you still have 400 GB of free space.
Every time you add 3rd party tools, you are trusting that those tools will do no harm. In today's "monitor everyone" environment, I suggest that you never install any software -- unless you really have a need for that software.
6
-
6
-
6
-
6
-
6
-
6
-
6
-
6
-
Assuming that the two computers that you want to network are on the same local network (as our host explained), then you can use drive mapping to share files between those two (or more) computers.
Consider two computers: 1-local, and 2-remote.
You want the local computer to have access to some folder on the remote computer.
On the remote computer, open up file explorer, right click on the folder that you want to share, then click on properties, and you will see a "Share" button. After clicking on "Share", you will have to tell that remote computer which users (which logins) will be allowed to access the folder. Add whichever users you wish to give access.
In fact, you can create a new user on that remote machine, and never use that new user's login. But with that new user account on the remote machine, you can add that new user's name in the sharing section. Now that new user account, on the remote machine, will allow that account name to connect to that shared folder.
I suggest that you have at least one file in the folder that you are sharing. It will help confirm that all is working, when you set up the local computer to access the remote computer's shared folder.
With the above set up on the remote machine, now go to your local machine.
On your local machine, open up file explorer. Then click on "This PC", in the left-hand column. That will change the options listed near the top of the window. One of the options you will now see is "Computer".
Click on the "Computer" menu that is on the top of the window.
Once there, you will see (near the top of the window) "Map network drive".
Click on that, and you will be able to enter the information about the remote computer. Once you correctly enter the information about the remote computer (including the password of the remote computer's account), then you will see that remote computer's shared folder. By default, you will be able to use that remote computer's folder just like any other folder. If you want, you can change the permissions to (for example) read-only. You would have to go back to the remote computer to set custom permissions (such as read-only, or delete permissions, or using sub-folders, etc).
Most of the above can be accomplished via the command prompt, via the "net use" command.
Run:
net use /?
...to get help with that command.
As far as I know, as long as the two computers can see each other on the network, then the above "map network drive" tool will allow you to share a folder (or as many folders as you set up for sharing).
The above works for Windows 7 and Windows 10.
I do not have a Windows 11 box to see if anything is different. But it is probably the same.
The above is basically telling the remote computer to share a folder, and which user(s) can have access to that shared folder.
Then the local computer uses "Map network drive" to connect to that shared folder on the remote computer.
If on the local computer you have trouble entering the name of the remote computer, you can use the remote computer's IP address, instead of the hostname of the remote computer.
6
-
6
-
6
-
6
-
Supplying your face-print or your finger-print, to access computers containing sensitive data, is fraught with risk.
Once a bad actor gets your face-print or your finger-print, then they have your private pass-key. Yes, having two-factor authentication helps. But how many people people do not use two-factor authentication?
For non essential login credentials, then use the above.
But if your livelihood or your company's trade secrets could be attacked or stolen by someone with access to the above, then you should not use a finger print or a face print as the sole means of access.
Can you imagine the potential damage if the Chief of Medicine physician at a hospital were able to access and alter any patient's treatments, by simply having her face scanned?
Or how about military computers, or banking computers? Gaining access, even if only to disrupt services, simply by scanning someone's face, is high risk.
Always use a long (virtually) uncrackable password/passphrase for anything that matters.
It is all well and good to improve the convenience of authenticating yourself. But understand that convenience and security do not make for a happy marriage. With convenience, you are giving up some level of control.
For any critical on-line services that I use, I always use a unique, long, unbreakable, cryptic pass phrase.
I use a password manager to facilitate the above. That, too, involves some risk, if a key logger should get my password manager's master pass phrase. But they would also need my password database file, and any key-files that I might be using as part of my master pass phrase.
So there are trade-offs.
But always use a strong password / passphrase for critical services.
Apple understands the importance of still requiring a pass-code. Every so often, you are required to tap in your code, even if you normally gain access via your face scan or your finger print.
When you power on your iPhone, you must enter your pass-code.
By the way, as far as I can remember, "PGP" (Pretty Good Privacy) was the first software to implement public/private key encryption -- and has since been replace with "GPG (GNU Privacy Guard)".
Both PGP and GPG are free and open source. If you decide to download the above, be very careful to get it only from its official site.
6
-
@rossmanngroup Yes, a patch would be ideal. Playing devil's advocate: The personnel that wrote the code for version 10 might not be with them, and whoever is there might not want to devote the time to search the source code, write a fix, do beta testing, and deal with any bugs that their testing might have missed.
They should do all of that. But the above could be why they do not want possible headaches for software that they want to go away. An inexpensive permission server as "plan B", is an easy alternative.
I am not sticking up for them. They are degenerates. One way or another, they are obligated to keep the version 10 perpetual licensing active. I am pointing out that yes it is their problem, and they should not make it the customer's problem. But they might have legitimate issues with patching, which is why I wrote about a nearly free permission server alternative.
Lastly, if they remove all activation requirements, then people who currently do not have the software might install version 10, for free. With permission servers still running, the company can prevent losses by people that would have otherwise purchased a current version (that is, people that currently do not run that software).
Making an older version free (no permission server activation) can have unintended consequences of losing legitimate sales of current versions.
6
-
6
-
6
-
6
-
6
-
6
-
6
-
6
-
I find "youtube-dl" to handle just about any downloads, and it is cross platform.
It will download just about any content.
youtube-dl will download vidoes from nearly any site, often without needing to right-click to get the specific link to the video. You can usually give the link to the general page that has the video, and youtub-dl will find the video and download it.
Some sites do not seem to have their certificates in good standing, and youtube-dl will complain and not download the file.
You can add the following option:
--no-check-certificate (two dashes preceding the the word no, and then a single dash after the word no). This will bypass the certificate issue, and download your file(s).
"youtube-dl --help (two dashes preceding the help option) is akin to the Linux man page and will display numerous options.
youtube-dl can also download playlists from files (such as what our host demonstrated with wget), and it will download a playlist from a site that has playlists (such as from youtube), and it will resume partial downloads, etc.
Perhaps wget has similar functionality. I never used it.
I am mentioning "youtube-dl" because many viewers of this channel are probably running Windows, too, and youtube-dl will run on both Windows and Linux (IOS, too, I believe -- not sure).
5
-
The Electoral College prevents fraud from affecting other states.
So if one corrupt town stuffs their ballot boxes, they could swing the state. But that is it.
If the President was chosen strictly by the popular vote, then every election, we would have recounts everywhere. Absolutely everywhere.
Every court in the land would be inundated with lawsuits.
Remember Bush vs. Gore and the Florida gridlock?
Without the Electoral College, that gridlock would have no bounds.
Did the Democrat win California. Probably. But did California stuff ballot boxes? Probably. Does it change the election results? Unlikely, because California would go Democrat, anyway. But without the Electoral College, those extra, fraudulent ballots in California cause the results of the election to change nation-wide.
One small town, anywhere, would be able to swing the election, if it were based on the popular vote.
5
-
5
-
5
-
5
-
5
-
5
-
5
-
5
-
5
-
5
-
5
-
5
-
5
-
5
-
@3:41 "And that's why I have no way of showing it to you."
Leo, a few years ago, I purchased (in person) a Windows 10 Home license from Micro Center. It came in a physical box, with a bootable USB flash drive containing the OS.
Upon booting from that flash drive, I was offered several versions of Windows to install. However, the activation key (behind a sticker in the box) is only valid for the Home version. But I have used that USB flash drive to install the Pro version on a different computer, which remains not activated.
So that USB flash drive will let me install any of the Windows 10 versions I choose from the listing.
I do not recall if S-Mode was one of the choices. But I think it was there.
With the above in mind, if you download from Microsoft their Windows 10 ISO, I believe (although I am not sure) that upon starting the installation process, it will let you choose any of the Windows 10 versions, just as my USB flash drive did.
If that is true, then you could create an S-Mode virtual machine from Microsoft's ISO download. That would provide you a way to show us (@3:41).
5
-
5
-
5
-
She has not been red-pilled.
She believes that both parties are a farce. To some degree, she is correct, because that are, when referred to together, called the uni-party.
She does not see President Trump as a viable candidate. There is no way that she will vote for President Trump.
Come election day, she will either stay home, or she will hold her nose and vote for President* Biden.
She is, however, a bellwether of how independents will likely vote. If she is sick of the Democrat party, then certainly independents are fed-up with the Democrat party.
Independents who do not have Trump Derangement Syndrome, also see what is happening, and will not have a problem voting for President Trump.
5
-
5
-
5
-
5
-
5
-
5
-
5
-
@JohnA-bear I went with quarterly exams, and not so strenuous as to mimic passing a bar exam.
My reason is that most law officers are well intentioned, but will fail if we make the exams too difficult. The goal should be for the law officers to be reminded, on a regular basis, to uphold their Constitutional oath, and to know more than the basics about our Constitution. They do not need to be Constitutional scholars. But they should know enough to not trample on our rights, and not abuse their authority.
There are folks that perform First Amendment audits, and too often the police care called, and the police immediately defend the people that made the call. For example, a First Amendment auditor would have a video camera recording as they walk around the lobby of a post office, or of a public library, or the public sidewalk adjacent to a financial institution, etc. And sometimes the police trespass the auditor from public property. Then the auditor sues, and gets a handsome financial settlement. And only then are those police officers given training, after the fact.
Rather than those police officers immediately telling the person that called that no crime is being committed, and anyone is allowed to record in a public lobby, the police get it wrong. So they have no understanding of basic rights. But they are trying to do the right thing. Ergo, they need a quarterly exam, just enough to keep them on their toes and understand that their oath is for a reason. But not so much to stress them out if the exams are too difficult.
When law officers have a better understanding of our Constitution, it will make their jobs easier, conflicts will be easily settled, the officers will have more confidence, innocent people will neither have their rights violated no be falsely arrested, and government attorneys will not have to deal with as many lawsuits pertaining to all of the above. It is a win for everyone.
5
-
5
-
5
-
5
-
5
-
5
-
Two points:
1) If you choose the cloning route, then you are exposing yourself to a slight risk of losing everything. How?
If while you are performing the cloning operation, your source drive dies, then you have no complete backup (no complete clone) from which to recover.
2) Will you really open your computer case, each time you make a clone?
If you leave your source drive and your destination drive connected all of the time, then if you get hit with a virus, ransomware, etc, you could lose the data on both drives.
And if you get hit with something nasty (even a power surge), can you be sure it affected only your source drive? Will you feel comfortable with your cloned drive, not knowing 100% whether or not it was impacted, too?
The effort of opening your computer's case, plugging in the cables to do a cloning operation, and then unplugging that cloned drive, and closing your computer case, just seems like something that few people would actually do. They would probably just leave the cloned drive plugged in, which leaves you open to what I described above.
As our host pointed out... with a traditional backup, you can have that image stored on an external USB drive. That makes it as simple as can be to plug in and unplug for each backup. You can even make a copy of that USB drive to another USB drive, and store that one with a friend or neighbor, which will protect you from losing your data in a burglary or fire. And by performing a backup (instead of a clone), you can encrypt and password protect your data (so that your friend or neighbor) cannot see your data.
5
-
5
-
5
-
@0:37 "You don't have to take, ah, ah, our, our, our word, ah, on this"
The press should have questioned Brian Deese's nervous statement.
The press should have asked:
Why should the public not take your word?
Brian Deese then goes on to read different company's quotes.
Note that a company does not speak. Rather, people that own the company, or are employed by the company, speak.
But Brian Deese named none of the "people" that he is quoting.
Is it not great to have an official White House briefing, where the public servant reads anonymous quotes?
I will lay odds that all of them are Democrats, and that most of them receive government favors.
I will also lay odds that some of those quotes are not current.
I will also lay odds that some of those quotes were taken out of context.
And, of course, Brian Deese read zero quotes from a multitude of sources (including decades of long established government statistical reporting) that conclude that we are in a recession.
What's next, quotes from Nancy Pelosi and Maxine Waters?
5
-
5
-
The "find" command can be used to identify hard linked related files, via the -samefile option.
One day at work, I was looking to recover disk space and found a large file to delete. After deleting it, the available disk space remained unchanged. This was due to that file having more than one name (it was hard linked to another name).
Assuming that the file that I want to delete is named "testfile.txt". Then, running:
$ find -samefile testfile.txt -print
./testfile.txt
./testfile2.txt
The above reveals the other i-node for that file (the two filenames refer to the same file -- they are not copies of each other). Of course, that was a simple example. You might need to search from "/" instead of from your current directory, in order to locate all matching hard links.
I would like to see a video going over more applications of the "find" command (finding files with certain permission, sizes, owner, prune, mount, etc).
5
-
Although Windows, by default, mounts each drive (or each drive's volume) as a unique drive letter, you can configure any drive to be mounted Linux style (you can have Windows mount a drive to any location you choose, via Disk Management -- which requires administrator rights).
Although it is a simple process, it is not as simple as connecting the dots. You kind of need to know the Windows procedure.
Once your USB drive (for example) is plugged in:
You must first tell Windows (via Disk Management) to remove the drive letter. You then tell Windows (via Disk Management) to mount the drive via an NTFS mount point. That mount point must be an empty directory. Once mounted, that mount point (that directory) becomes an NTFS junction (pointing to some cryptic target, which I do not understand). But once set, your USB drive will now sit in the directory of your choice. When you go to that directory, you will be on your USB drive.
This might be handy for someone that is running out of drive letters, or...
this might be handy for someone that does not want to remember several drive letters, and would rather have directories that have meaningful names, where each directory is a different USB drive.
Cheers!
5
-
5
-
5
-
5
-
5
-
@2:44 "This is gold."
The guy recording finds this amusing.
I wonder how amused he would be if he owned that business, and he had to pay for all of the damage and lost business?
As to all of the scenes:
All of the stealing, and all of the vandalism, is paid for by all of the actual customers.
Eventually, those businesses find it too dangerous and too costly to do business in such crime-ridden areas. Then the degenerates that caused those businesses to leave will cry racism and discrimination.
Employees lose their jobs when those businesses close.
Normal, civil people that cannot afford to relocate get hurt the most, when they now are forced to travel further to find food -- and in their financial situation, they cannot afford that extra travelling expense. And if they are elderly, or handicapped, the burden is enormous.
99.99% of these videos are from businesses in Democrat run cities. And most of the people that will complain, when those businesses leave, will re-elect those same Democrats.
5
-
5
-
The people that illegally took the serving, military personnel's private vehicles should be arrested, and charged with grand theft auto.
Never, again, will a company or employee of the company, or agent hired by the town, or a bureaucrat, or any human... never again will they take such vehicles.
Just because someone is a government bureaucrat, should not preclude them from being prosecuted for taking (or hiring others to take) vehicles that they are legally not permitted to take.
Just because someone is hired by a government bureaucrat, should not preclude them from being prosecuted for taking vehicles that they are legally not permitted to take.
I do not mean that they cannot tow the vehicle if it is blocking a fire hydrant, or parked in a red zone.
I mean that all fines, for towing the vehicles, must be paused (must not accrue interest) while the service member is deployed. And the vehicle may not be sold.
With the $260,000.00 settlement, no one involved in causing untold headaches for those service members have learned a lesson. None of them care. They had zero consequences for illegally towing and illegally selling those vehicles. But you know who had consequences? We The People, through our tax payments. "We" paid for the illegal actions of the bureaucrats and towing personnel.
The actual people that were involved in the illegal towing (from arranging it to performing it) should be charged, criminally.
Imagine coming home from a war zone. Bombs exploding, friends dying at your side, losing limbs, etc, and when you get home, you have to deal with your car being gone, and get into a legal battle. The people involved really need to pay, criminally, for their illegal actions. Their job title should not give them a free pass, and put the tax payers on the hook for their illegal actions.
5
-
5
-
5
-
5
-
5
-
Unless Geek Field Notes
offers a reason for why booting from a virus free disk (CD ROM or flash drive, for example), and using that bootable media as the foundation for erasing and re-creating all partitions, and reformatting the target drive, will not be sufficient for irradiating the keylogger, virus, etc (everything), then I do not agree that it is necessary to toss out a working drive, and incur the cost of a new drive.
If the bad code got into the firmware, then that, too, can be reinstalled/updated via a clean boot device.
If Geek Field Notes
was just keeping it simple, then that is fine. But not everyone has spare hard drive $$ available.
Also, this video gives the impression that a ""complete bastard" virus is, perhaps, not "data" based, but rather it is "biologically" based. After all, if a virus somehow is beyond being deleted via partitioning and formatting, then is must be a life form?
To my knowledge, any offensive software (virus, key logger, trojan, worm, ransomware, etc) is just that -- it is software. It is software coded to be malicious. But it is still software. So under what circumstances should someone not use the option to re-partition, re-format, and re-install the OS?
5
-
5
-
5
-
5
-
5
-
5
-
@0:40 -- If I understand what our host explained, there is a potential problem.
If, for example, you have 3 devices, all set up to automatically sync, then if you screw up a file one of those 3 devices, then your screw-up gets copied to your other 2 devices.
Whereas, if you were to not set automatic syncing on one of your 3 devices, then you would recover your file from the device that did not get synced.
I suggest that if you can count on yourself to periodically manually sync your files, then that will give you finer control over the safekeeping of your files.
But if you know yourself, and you know that you will not bother to periodically manually sync your files, then set the automatic syncing.
Putting 100% on autopilot is giving up a level of control. But autopilot is good for some people -- until they accidentally mangle some file and kick themselves for having that mangled file overwrite the good copies on their other devices.
Lastly, when you use cloud storage, you are using someone else's computer (complete strangers).
You are handing your files to complete strangers, in the clear. Yes, your files get encrypted in transport to the strangers. But they get decrypted upon arrival at the stranger's computer.
Microsoft, Google, and any other cloud storage service can see everything that you put on their computers. They are not likely looking (unless you are a noteworthy person -- a celebrity, or government official, or someone making headlines, etc). But it is likely that they scan everything, and who knows what type of index or profile they build on you. If you have trade secrets, or anything that can ruin your life, you would be nuts to hand those files over to them.
If you encrypt your files, before they get uploaded to a cloud service, then you are protecting yourself. But if you upload your company's trade secrets, without first encrypting them, you are reckless.
Cloud storage services require you to agree to contracts written 100% by their attorneys, to serve their interests, that you are required to agree with, which turns ownership of your files to them. In other words, any files that you put on their servers are now owned by them.
If you do not need the convince of syncing files between devices, then just make copies of your important files, and manually put them on your other devices, as needed. But if you care zero about sharing your files with anonymous people, then cloud services are a great option.
5
-
5
-
5
-
5
-
5
-
5
-
5
-
5
-
Yes, change is inevitable. But that does not mean that we should blindly go along with change, like lemmings. It all depends on the nature and rationale of the change.
If you are running a business, you should not change your key people, just to have change, and expect everyone to just accept it. I worked for a company that did just that.
I was employed in a Fortune 500 company's IT department. Things were running smoothly. The management personnel were on the ball. They seemed to make the right decisions for virtually everything.
Well, after ~10 years, the board of directors decided it was time for a change. So they brought in a new president. Everything went down hill -- or so it looked that way.
Perhaps two or so years later, another change at the top. And things got even worse.
And with each change, loads of executives were shuffled and dismissed and new executives were hired, with different titles, and departments were merged, and renamed, and on and on and on. Each new executive had to show that they were worth their keep, and so they made changes. No longer could employees focus on their responsibilities, assuming they were even given clear responsibilities.
Competent employees found new, greener pastures.
Inevitably, customer affecting outages occurred, and we became a CYA culture. The movie "Office Space" touched on this.
Every action, no matter how insignificant, had to be approved by multiple teams, most of whom had no clue what that action meant. Red tape, galore. Huge time wasted, for the simplest changes. Virtually no different than huge changes. But even with huge changes, most of the people that had to approve them had no understanding of them. So we went in circles.
With the original management, we frequently had changes. And everyone understood the rational for each change. The changes were good. It was also challenging. But it made sense. So the employees were gung ho and very productive. Then, with each new change in management, the employee's focus changed to avoid trouble. Employees became conditioned to figure out how not to be blamed for problems created by those that foisted groundless changes for others to implement.
If you want to drag a company into a world of extreme time wasting "process", then implement ITIL. It is a one-size fits all for every IT department, that ensures that no IT department can ever excel and out-perform (in any meaningful way) the competition, when the competition is also using ITIL. Everyone will be wearing the same shackles. But the executives will get lots of spreadsheets to make them think that they know what is going on, right down to how long it took to move a cable.
Change should be evaluated on a case-by-case basis.
5
-
There is a way to "mostly" transfer all of an application's data from one drive to different drive, regardless of how that application works.
You can use symbolic links.
A symbolic link creates a file that references a different location.
Any file can be referenced via a symbolic link.
You can have a video file (some-video.mp4), or any file be referenced via a symbolic link.
You can have a directory be referenced via a symbolic link.
Windows has a "junction.exe" command, as well as a "mklink" command.
The "junction" command might not be installed -- I think it is part of a developer's pack. But "mklink" is easy to use and will get the job done.
Note that symbolic links might not be supported by all file systems.
The default file system for Windows is "NTFS", and NTFS supports symbolic links. So unless you went out of your way to use some other file system, then you should be fine.
Running either one of the above (junction or mklink), from the command prompt, with no arguments will produce a help screen of output.
I find the "mklink" easier to use, and it will definitely be on your computer.
To relocate an application:
1) Make sure that the application is not in use (you will be copying files, and none of those files should be open / in use/ busy).
2) Create a directory on your new hard drive, where you want to store that application.
3) Copy everything (all files and sub-directories, etc) from the current location to the new location.
4) Delete everything from its original location, including the directory name where the data used to reside.
5) Via the command prompt, create a directory symbolic link, with the exact same name as the directory that you just deleted, and have that directory symbolic link point to the new directory (see #2, above).
Note that if you use your file manager to navigate to your old location, where you now have a symbolic link, your file manager will still show you that you are on your c: drive (because, technically, that is where your symbolic link is). But if you did everything correctly, then you will, indeed, be accessing the files in their new location.
Down the road, you might find that your application was storing data in yet some other directory. So you will then have to decide whether you want to repeat the above, again, for this newly discovered directory.
I suggest that you practice, before trying this on important data.
Create a temp-directory, and dump some unimportant files into it.
Then follow the above steps, and confirm that when you access the temp-directory (which at this point should be a symbolic link), you should see the unimportant files in the other drive where those files now exist.
In any event, do a full backup before you try this. If you screw up your application, you will regret not having a full backup.
5
-
5
-
Healthcare workers cannot maintain social distancing. The are in direct contact with patients. Not only people having heart attacks, and car accidents, etc, but they are in direct contact with countless virus-infected people. They are the most susceptible to contracting the virus. And if we lose our healthcare workers, it is all over.
Cheaper masks will not have the disease filtering properties of an N95 mask. But:
-- If you have an itch while wearing a mask, or accidentally lean your hand on your face, then scratching yourself by pressing on the mask can keep your hands from infecting you.
-- If you have the virus, and you cough while wearing a mask, your spray will be contained and have less of a chance of infecting others.
-- If someone coughs on you, and you are wearing a mask, then you stand a chance of their spray hitting your mask, and not hitting your face.
The less that you expose your face to the virus, the less that your hands touch your face, the better your chances are of remaining virus free. So masks, any masks, are beneficial.
5
-
5
-
1) You will never wear out your flash drives (unless you go out of your way to do so -- and even then it will take years).
One type of crypt-o mining is named "Chia". That process requires a dedicated storage space to perform on-disk work for creating huge files. Most Chia miners use an NVMe SSD.
There are countless Chia miners that have been pounding on their SSDs for 3 years (24/7/365), without rest, and their SSDs still show no signs of any issues.
If you read the comments in Chia forums, you will be hard pressed to find anyone reporting that they wore out their SSD. Although some SSDs have failed, they were likely manufacturer defects, or they took power hits, or were not properly cooled, etc. Excessive writing to an SSD will make it hot -- even very hot (and heat kills). But a light breeze will keep it cool.
2) Samsung has a "Magician" application that will display the condition of its SSD drives (I am not certain if it works with other manufacturer's SSDs).
However, when "Magician" (or other similar tools from other vendors) reports that your SSD is bad, you can ignore that. Why?
Chia miners have been using SSDs that Magician claims to have been worn out, far past when the warning was displayed. In fact 5x more past that time.
What such applications do is compare how many terabytes of been written (TBW) against a (seemingly arbitrary) value provided by the manufacturer.
So if your SSD has a 600 TBW value assigned by the manufacturer, then when you have written that much, the monitoring tool will warn you that the drive is bad (but it is not bad).
The 600 TBW value (which will vary, depending on the manufacturer and the drive model) simply ends your warranty. It also cajoles customers into replacing perfectly good drives (more sales).
There are SSDs with 1200 TBW values that have written 5x that number, and have no issues. Chia processing has brought this to light. But if you believed the monitoring tool, you would have made 5 purchases instead of 1.
If SSDs were wearing out, you would know people that wore them out, or you, yourself, would have worn them out. But I bet that no one reading this is aware of anyone that has ever worn out an SSD. That speaks volumes for it not being an issue.
The amount of writes that most people make to their SSDs is a drop in the ocean. Your SSDs will outlive your computer, and outlive you (speaking about "wear" only -- other defects or heat changes everything).
3) If you are worried about whether or not your computer is mysteriously writing data to your flash drive, you can:
3a) monitor taskmgr. It will show you a graph, where you can easily see if data is being written to your flash drive.
3b) use a flash drive that has an activity light.
5
-
5
-
Leo, I downloaded this video, and saved a copy to an external mechanical hard drive, a USB flash drive, a DVD, a CD, LTO tape, reel-to-reel tape, and 51 floppy disks.
I could not find punch cards.
I made 7 sets of everything, to bury a set on each continent.
I am considering making additional sets, for each of our oceans.
And I might make one more set, and place it on Funk & Wagnalls' porch.
5
-
Two items:
1) Salvaging your old drive:
The old drive might have had bad sectors, which is a bad sign.
After having a backup of that drive's data, I would have performed a long format (the type that takes ½ of forever to complete). It makes no assumptions that the drive is good. Instead, it checks every sector during the formatting operation, and will mark each bad sector such that Windows will not see those parts of your drive's platters. It would be as if they do not exist, leaving only good sectors for Windows to see.
Of course, that still might be a temporary fix, if the drive is failing, as more sectors could go bad (or more bits within sectors go bad) after the formatting is done.
Drives will function properly if X number of bits in a sector have gone bad (where X is probably 10 or less). If enough bits have gone bad, but the sector can still ultimately work, then that could cause slower operational times. And I do not think that the drive will take preventive measures to deal with the rising number of bad bits in a sector (and at some point, you will have data loss).
Steve Gibson, of Gibson Research Corporation (GRC) has a SpinRite tool that monitors the health of hard drives. It works proactively. When it detects that X number of bits in a sector have an issue, it will copy that sector's data to a problem-free sector, and then mark the original sector as bad.
Short of a catastrophic drive failure, running SpinRite on a regular basis (perhaps monthly, or quarterly) will continually mark problem areas, keeping your drive running as if nothing is wrong.
2) An alternative to "xcopy".
@4:44 -- I recommend "robocopy".
robocopy f:\ e:\ /mir
The above translates to "f:\" being the source directory, "e:\" being the destination directory, and "/mir" stands for mirror, which means it will copy anything and everything.
robocopy will show you its progress for each file that it is copying. So if your copying job seems like it might have stalled, then if you are using robocopy, you will know (no guessing). It reports in 1 tenth of 1% increments.
Running "robocopy/?" will list a myriad of options, to handle just about any special copying criteria you will have.
Get to know robocopy. Make it your friend. You can, of course, copy-paste or drag folders via the GUI, or use xcopy (nothing wrong with those choices). But when you need to do something complicated, robocopy will have an option to handle your needs. And the /mir option makes it simple to make a mirror copy of folder "A" to folder "B". Note, however, that every copying tool will have issues with files that are in use. So robocopy cannot make a mirror image of your "C:" drive.
5
-
4
-
4
-
If you do the "re-install Windows" option, then upon doing so, you might not be able to login to your web sites. That is... if you have your browser automatically log you in, then... well... with a fresh Windows installation, your browser will not have your login credentials (it will not have anything from what you previously had).
So make sure that you will be able to make use of a web site's "Forgot Password" option. Make sure you know where to find it, and also make sure you have the means to get the code that the site will send to your phone, or to your e-mail account.
And if you use your browser to automatically log you in to your e-mail account, well, then if you cannot get into your e-mail account, then you cannot retrieve the code sent to your e-mail's in-box, when you try to reset your passwords.
Hopefully, you can get such "reset" codes sent to your phone?
Or, maybe you can login to those sites with an app on your phone, and create new passwords that you will then be able to use to log-in with your web browser.
All of the above will not be a headache if you use a password manager. But make sure you have a copy of your password manager's database on a flash drive, or somewhere other than on the computer that you will re-install Windows to. Also make sure you have the installation file for installing your password manager to your new Windows installation. Or, make sure you know that you can download the password manager software from the company's web site.
Another option, to possibly negate the need to re-install Windows is to download "autoruns" from "sysinternals" (which will direct you to a Microsoft site). I would provide the link, but youtube tends to toss comments that contain links.
If you run "autoruns" with admin access, it will show you everything that starts when your computer starts, and what starts when you login.
You will be able to un-check any item. It will take affect after you re-start your computer (or log out and log in, if it is related to a login item).
Note that if you un-check the wrong item, you can cripple your computer -- to the point where you might not be able to launch autoruns to put the check mark back.
Whatever you decide to do...
...first make a full backup of your computer -- even though it is compromised. The full backup is your safety net to being able to use your computer, if your fix goes terribly wrong. At least you will be able to restore your computer, and try your fix, again.
Lastly:
When you are confident that you have a clean computer, go and change the passwords to all of your sites. This might be a good time to install a password manger, if you are not already using one.
Cheers!
4
-
4
-
4
-
4
-
Although Windows will format a drive, to be fat32, note that the formatting will fail if the drive is larger than 32 GB. That is, if you use whatever formatting tools are native to Windows (whether using the GUI (graphical user interface) or via the format.com command line option).
There are many 3rd party tools (some are free and very good) that you can use to format lager-than-32GB-drives to use fat32.
So, for example, if you purchased a 128 GB flash drive, or a 2 TB external drive, etc, you can use the free MiniTool Partition program (www.partitionwizard.com) to format your drive(s) to fat32 (or other formats). Once formatted, Windows will work with the large fat32 drive with no problems.
I believe that for backwards compatibility with older Windows versions (Win98 or WinXP, 32 bit versions), current day Windows will not format fat32 beyond 32 GB, because the older OS's could not handle larger than 32 GB fat32 drives. I guess that when folks were transitioning away from WinXP to Win7 (64 bit), they did not want folks to use their Win7 OS to format a 64 GB drive as fat32, only to have that drive fail when used in the still popular (for that era) WinXP computers. And Microsoft has never changed this position, even with their current Win10 OS.
Cheers!
4
-
"I don't think in Windows 10 it's difficult setting up a local account. Why it's different in Windows 11?"
Correct. But in Windows 11, Microsoft has made it more difficult to circumvent their insistence that everyone use a Microsoft account.
"Also, why do people recommend setting up PC with a local account instead of a Microsoft account?"
Many people (myself included) do not want to be at the mercy of a Microsoft server.
If Microsoft should have a service outage, and you can't get a green light from Microsoft when you are logging in, you could get locked out of your own computer.
If you have no internet service, perhaps due to an outage in your area, you do not want to get locked out of your own computer.
Yes, you will still be able to login. But for how long, or for how many times, before Windows deem it that you must get permission from their servers?
Microsoft will collect even more of your personal data from your computer, when you sign in to a Microsoft account.
It is none of Microsoft's business (or any stranger's business) when you login to your computer.
Microsoft appears to be moving to a "You own nothing" business model.
They push their Office suite, via a rental. Now they are working towards you renting your operating system, where you need their permission to use your own computer that you paid for (you paid for the hardware and for a Windows license, and yet you still need Microsoft's permission to login).
With a local account, you will never be locked out of the computer and operating system that you paid for; that you own.
By the way, our host created a local account, which by default, is an administrator account.
I recommend that you then use that account, to create yet another account; a standard user account, and never use the administrator account again, except for a rare need.
Using your computer with administrator privileges can cause you to inadvertently mangle your computer, because you will have permission to make egregious mistakes.
4
-
4
-
4
-
Responsible web sites will detect when you are trying to login from a new device. When you attempt to login to your bank, for example, using a new computer, or a friend's computer, etc, you will be challenged (well, my bank will challenge you when it detects a new computer (or new network address or new MAC address)). Again, it is up to the company to design their web site to work responsibly.
Also note that if you are a privacy advocate, then using your phone or e-mail address for two-factor authentication will allow big tech to track you. The common factor is your phone's number, or the common factor is an e-mail address, etc.
But if you install apps without a second thought (especially google apps), or do not care about having all of your life tracked, then by all means use two-factor authentication.
For most people, two-factor authentication is beneficial. Just know that it is used for tracking.
I use two-factor authentication for banking, and that's it. I do not want to be burdened with extra login hoops for nonessential web sites.
For anything else, I use my password manager to create long, strong, uncrackable passwords -- and I never repeat a password between two sites.
If, for example, someone manages to get my "steam" password, changes it (locks me out) then I am screwed. But "steam" does not need my phone number. And the e-mail address I gave them is not my regular e-mail address.
With a password manager, all of the details you need, for every site you visit, is easily documented. You just need to take extra time documenting the details of any new accounts into your password manager's database. It is easy to do -- but you need to actually do it. And I keep a copy of my password manager's database (a single file) in multiple locations (and also include the installation program file, too, in my backups).
4
-
4
-
4
-
SysInternals (now owned by Microsoft) has many, very useful utilities that won't slow down your computer. One of them is named "autoruns".
autoruns will show you every program that starts automatically (you will probably be surprised at the high number of programs that it lists).
Windows has numerous locations from where programs will automatically start, and autoruns checks them all.
If you buy a new computer (or install Windows from scratch), I recommend running autoruns, and taking a screen capture of everything that is starting automatically.
Then after any new software that you install, run autoruns and compare with your screen capture (and you should probably make another screen capture).
Even if you do not install new software often, you should run autoruns periodically, to see if anything new is starting (by comparing its output to your previously taken screen capture).
autoruns allows you to uncheck any of the programs that it lists. That will stop that program from automatically starting.
But be careful. If you uncheck something that you should have left alone, you can cripple your computer. And if you cannot get Windows to start, then you cannot run autoruns to put back that program to auto start. So 1) be sure that you know what you are unchecking, and 2) have a recent backup of your computer.
autoruns should be run with admin privileges, because when you install software, that software could put start up programs in places that only an administrator can check.
-----
If your computer is old, and it suddenly gets slow, it could be that your CPU's thermal paste has dried up. When that happens, your CPU will run very hot, and will throttle down, significantly. Your fan can spin away at warp speed, and it will not help. Without thermal paste, you cannot cool your CPU.
I do not believe it is common for the paste to dry up. But it happened to me when my first generation, Intel i7, turned 15 years old (I still use it). A new dab of thermal paste fixed it.
If your computer ever gave off a burning smell, and then the smell went away, that was probably your thermal paste waving goodbye.
4
-
This affects everyone, even if they do not think so.
There are an elite, few people that have access to every person in the USA's traveling whereabouts. Those few people have wild power to corrupt politicians, CEOs, friends, etc.
They will know where every government official has been. They can blackmail those government officials. Or they can feed that information to opponents of those government officials.
In other words, many elected offices will wind up having different people running, due to "dirt" being available on who was where, visiting whom, and when. You will not get the government that you would have had, if flock surveillance did not exist.
When some mayor does not want it revealed on where she has been, then she can be someone's puppet to enact policies and veto or sign bills into law, based on the puppet master controlling her. Veto that bill, or we will make it public that your son has been visiting [fill in the blank].
There are no checks and balances with this flock surveillance state.
Even the judges that will hear cases on this subject will be tracked, and therefore susceptible to coercion. Imagine being railroaded, and when you have your day in court, unbeknownst to you, the judge is being coerced by the same flock surveillance state.
This power, for government employees to track everyone's whereabouts, will 100% be abused.
4
-
4
-
4
-
@2:05 -- He forgot both of the questions.
He rambles on about Putin, because "Putin" is the only word he remembers from the questions. But his ramblings are generalizations, because he is trying to give an answer without revealing that he forgot the questions.
@2:31 -- He remembered that the question pertained to an interview, but he still does not remember what the current questions are. Because:
@2:39 -- I, I, I, don', don', don', I, I don't think it matters a whole lot, in terms of this next meeting.
Translation: Since "I don't think it matters...", then he does not have to answer the questions. But he can't answer the questions, because he does not remember the questions. So he found a way to say "It does not matter". That was his answer, which is not an answer, because he forgot the questions.
If we had honest reporters, then what they should do, when they see he does not remember the questions, is to ask him to repeat the questions.
They should be blunt and ask him if he remembers the questions.
America and the world should know if the President* of the United States Of America is mentally fit for that office.
It might seem cruel to put Biden on the spot, but it must be done for the sake of our nation and the impact on the rest of the world.
4
-
It is kind of hard to fill your e-mail provider's quota. If that is happening to you, and it is not a spamming issue, then you probably have lots of attachments from someone (or more than one person).
Attachments such as music, and especially videos, will eat into your quota far, far, faster than simple correspondence of text.
But even other types of attachments, such as spreadsheets, pdf files, and other documents, will more quickly eat into your quote compared to simple text within an e-mail message.
But the #1 culprit would be video attachments, followed by music file attachments. And that includes your sent folder, if you are attaching videos to your messages.
4
-
4
-
"history" saves exactly what you typed in.
So if you have some program that accepts arguments (or options) on the command line, and one of those arguments is a password, which shows up in clear text along with the rest of the command line, then that password will be in your history).
For example:
./some-crummy-program --verbose --user Perhaps --passwd Hello
Type the above in, and the entire line (including your "Hello" password) will be in your history.
I believe that what you are referring to is after you entered your command, and the program prompts you for your password. In this case, when you enter your password (and it does not write to the screen (or it displays ********)), then at this point, you are interacting with the executed program -- you are not entering a shell command.
Or to put it another way...
If you are not at your bash prompt, when you type something in (like a password), then what you type in will not be in your history.
I am guessing, a bit, at what you actually typed in at the shell prompt. If you provide an example of your command line, it would be helpful.
Cheers!
4
-
4
-
4
-
4
-
4
-
@0:15 "...an assault weapon"
Assault weapons = Machine guns
Machine guns = Assault weapons
The only entities that have assault weapons (machine guns) are the military and museums that have permission to have them.
Just because I dress up my Pontiac Ferraro to look like a Ferrari, does not make it a Ferrari.
The difference between the AR-15 that is available to the public vs the AR-15 that is available to the military differs by miles. The killing power differences are off the charts different.
A publicly available AR-15 only looks like the military version. They even share common parts. But when used in battle, the publicly available AR-15 is like bringing a knife to a gun fight, compared to the military AR-15.
Stop using the language of the radical left.
The AR 15 that Rittenhouse used is not an assault rifle.
Every time the radical left labels it an assault rifle, correct them. If you do not, then they win in the court of language, and more and more rifles will join the so-call "assault rifle" list. Eventually, every gun will become an assault weapon.
When the radical left calls such rifles "assault rifles", tell them to define what it is that qualifies that rifle as an assault rifle. They will not, because they can not, because it is not an assault rifle.
Cheers!
4
-
1)
@3:34 -- Excluding files from being backed up is not in the free version -- at least that is what is listed on EaseUS's version comparison chart.
I do not believe that you can enable that option on the Free version. It is probably there to entice folks to pay for an upgrade, by showing features, but not being able to enable them without paying for one of the upgrades.
These are all of their versions:
"Free", "Home", Workstation", "Server", "Advanced Server", "Technician"
My guess is that no matter which version you download, you get the same one -- only that various features will be enabled or disabled.
Pay for an upgrade, and the feature, which is already installed, gets enabled.
2)
@4:32 -- "How long your backup will take..."
On EaseUS's site, in their comparison chart, they have a "Speed" rating, from 1 (slowest) to 4 (fastest) stars.
The "Free" version has 1 star. So it looks like they might be throttling the backup's file copying speed.
Leo, did you notice a slower than expected amount of time, based on how much data you have, as well as from backing up with other software?
Did they throttle the backup speed?
3)
Was there an option to make emergency bootable media?
Also, if you screw up your computer, but it will still boot up, can you restore from your backup while Windows is running?
Or must you boot from an emergency flash drive to restore everything (to ensure no files are in use, if Windows was running)?
4)
If there is an emergency media option, can you use it on other computers?
I am considering one of the paid versions. That can get too expensive for me, if I have to make repeat purchases for every computer. And I would rather not install 3rd party software on more than one of my computers, if I can boot from emergency media and perform a backup (and restore if needed). I do crypt-o mining on a computer, and I trust no 3rd party apps for that computer. But bootable media would be a solution for me to do a backup.
How versatile is the emergency boot media?
If someone loses their computer in a burglary or fire, being able to use emergency bootable media to restore to a new computer might be critical.
Thank you.
4
-
4
-
4
-
4
-
4
-
I am using a 1st generation i7, with 4 cores.
I think that it is 15 years old (maybe older -- somewhere in that range), and I have no need to upgrade.
Sometimes I render a video, or use ffmpeg, where a faster CPU with more cores would be welcome. But my rendering is usually, at most, for 30 second clips, so it is no big deal.
The only upgrades I ever did was adding more RAM, and replacing my RAID 0 mechanical drives with an SSD. It is quieter, faster, and less power hungry. However, it is SATA based. NVMe storage would be great, but between the cost of an add-in card and the drive, I might as well buy a new PC. So I stick with what I have, which serves me well.
And our host did a great job touching all the bases.
4
-
4
-
4
-
4
-
4
-
That suspect was both stupid and racist. Why?
When you have an illegal gun in your car, and you drive like you own the road, then that is a wildly stupid thing to do.
When you accuse others of being racist, because they are enforcing laws that you are flaunting, it is because you are a racist.
He lied, and he put on the "I am a victim" BS act.
That is a man to be avoided. Can you imagine how he would conduct himself in a confrontation with people (other than the police)?
That is a man with lots of jail time in his future. I will lay odds that he has been in jail before, or that he has an outstanding arrest warrant.
Stupid, lying, racist, argumentative, is no way to advance yourself.
4
-
@5:52 "...law enforcement has access to this."
Sort of.
Your friend that works at your local precinct, or is with the state police, or is with US Customs, etc, has no more access to those phone numbers than you do -- at least in a legal sense.
They would need a warrant, signed by a judge, to look up that information, unless exigent circumstances does not allow them time to get a warrant. There might be other criminal, investigative allowances granted to law enforcement to look up phone numbers. But they have to keep that internal. If they are caught looking up such information, without cause, it could cost them their job -- and if the circumstances are egregious, they could face criminal prosecution.
My point is that law enforcement has rules, polices, and laws to obey. They cannot simply willy-nilly poke around for their amusement, or to help out a friend.
4
-
4
-
4
-
4
-
4
-
4
-
4
-
@6:40 "SSDs, for example, wear out"
Technically that is true. But you will never wear out your SSD, even if you go out of your way to wear it out.
One type of crypt-o mining is named Chia.
Chia uses a temp storage device to perform its operations. That process involves never-ending reads, writes, and deletions (deletions are a form a write operation).
There are countless people, globally, that are mining via Chia. With few exceptions, they use NVMe drives (SSD drives) as their temp storage for the process. Those folks have been running their Chia operations for 18+ months, 24 hours a day, every day. Yet, no one has reported that they wore out their SSD. Not a single person, based on the Chia forums.
SSDs have a TBW (terabytes written) value, specified by the manufacturer. The SSD keeps track of how many bytes of data you have written to the SSD. If you exceed the TBW value, then you end your warranty. And if you run the manufacturer's software that checks the health of the SSD, it will claim that the SSDs status is "Critical".
Yet, people continue to hammer away on those SSDs, for not double the number of bytes written when things supposedly turned "Critical", but 100x the number of bytes written, and the SSD keeps reporting critical, yet keeps working at full speed with no performance issues.
So, yes, our host is correct that there is a finite number of writes that a SSD can handle. It will, in theory, eventually wear out. But it will probably outlast your computer, and nearly every part in your computer, before it wears out. It will likely live on long after you are 6 feet under.
Now if you have a $2 SSD or a freebie from a giveaway, those SSDs are slow beyond words. Perhaps, with their ultra-low-end quality, they will wear out if you use it 24/7/365 without rest? But that assumes that anyone can write enough data to them to wear them out, because writing data to those snails takes half of forever.
But for an SSD that is included in your computer purchase, you will never wear it out. If your SSD dies, it is due to a power hit, overheating, controller failure, or some manufacturer's defect. If your SSD dies, it will not be because you over-used it.
4
-
4
-
4
-
4
-
4
-
4
-
4
-
4
-
4
-
@5:54 -- Hashed passwords.
There are lists that have countless millions of hashes, and the corresponding passwords that were used to create each hashed value.
For example, if your password is:
verystrongpassword1
...the above would be hashed to:
BD2172ADBD934AE9E85E28205E71BC8F1707F187 (using the "SHA1" hashing scheme).
So if you are using passwords that you made up, then there is a good chance that all of the various hashes for it have already been computed, and added to various lists.
All someone has to do, when they obtain one of the lists, is to search for the hash associated with your account, and they will see the password that was used to create that hash value.
Note that more responsible sites also salt their customer's passwords, before creating the hash. In other words, the site will add, for example, "aklsh@#$@#121" to everyone's password, and then create the hash. That would make the hash useless to everyone. But not all sites do that, and we have no way of knowing which sites do so (or even if they say they do, we still cannot confirm that they do).
If you use a password manager, as our host encourages, and you have your password manager create long (I suggest 15+ characters), cryptic passwords, then it is highly unlikely that any hash of your password would be on the dark web. Repeat the above, with a different password for every site you log-in to, and you will be as safe as you can be (especially with two-factor authentication).
4
-
@0:15 "...and faster than traditional hard drives"
Yes and no.
SSDs are not all built on the same NAND cell technology.
There are four types of NAND cells. From fastest to slowest (and from most expensive to least expensive):
-- SLC (single layer cells)
-- MLC (multi (as in double) layer cells)
-- TLC (triple layer cells)
-- QLC (quad layer cells)
Not only are SLC SSDs the fastest (and by a magnitude of over 1000x), they are also the most durable.
But, you say, you have a QLC drive -- and it flies (just like the numbers on the box claim).
Yes, it does. But it is deceptive. Why?
Nearly all TLC and QLC drives have cache. And what is that cache made from?
That cache is made from SLC NAND cells. And that cache is usually between 25GB to over 100GB of the drive (bigger drives typically have more cache).
The box never gives you the true, native speed of the QLC NAND cells, which is probably 15MB/second, at best (and is 1/10th the speed of any of today's hard drives).
Nearly all consumers will never hammer their QLC SSDs long enough to run out of cache. Once the SSD is not busy, it empties its SLC cache onto the QLC cells -- in the background. So all of the time, you are always getting the performance of the cache (of the SLC cells).
If you write hundreds of gigabytes to the QLC SSD, without rest, you will see it fly for a minute or two, and then you will see if grind to a snails pace.
So the statement "...and fater than traditional hard drives" is misleading. But for most folks, it is never an issue.
Note that it is only the write speed that will suffer, when you run out of cache. The read speed will always remain fast (although SLC will still outperform QLC).
Also note that one of SSDs key advantages is that it can read and write countless small files, simultaneously, at breakneck speeds. Mechanical hard drives are slow at doing so. This is why a computer with a SSD will reboot so much faster than a computer with a mechanical hard drive.
Cheers!
4
-
4
-
4
-
4
-
4
-
4
-
4
-
Leo, 4 questions about EaseUS, that I cannot find in any youtube videos, web searches, or on their web site:
1)
Can you mount a backup image as a virtual drive?
That would allow you to access the files in the backup image as just another drive letter.
The above makes it simple to copy a file (or files) from a backup image. Being able to explore the backup image, the same as any other drive letter, would be very helpful.
2)
Can you exclude files from being backed up, based on names or expressions, such as:
*.flac
3)
Can you exclude directories from being backed up?
I have a music directory that I already have copies of in 3 locations. I do not want to waste 300GB of space by allowing EaseUS to copy it again to a backup image.
4)
Does its emergency boot media allow you to perform a backup?
I would rather backup my computer while Windows is not running (while zero files are in use). Or does that matter?
If a full backup, taken while Windows is running, can be used to completely restore my computer after an OS drive failure, then that is fine.
But will I have to first install Windows from scratch, in order to make use of EaseUS's software to execute the restore?
Or will their emergency boot media be able to restore the full backup image to a new drive, negating the need to first install both Windows as well as installing EaseUS?
I would rather boot from emergency boot media, and have it restore my OS onto a freshly formatted drive. So is that doable with a backup image taken while Windows was running?
-----
If EaseUS falls short, but Macrium Reflect will do all of the above, I will consider using Macrium Reflect.
I got turned off by Macrium Reflect, because when I installed the free version (to see if I liked it), it nagged and nagged and nagged me to purchase an upgrade. There was no option, within their software, to stop their nagging, which was pop-ups every day.
When a company does that, it concerns me about their trustworthiness. Will their software be "phoning home"? Their data collection, etc. It is akin to web sites with "in your face" advertisements that should not be trusted. Perhaps Macrium Reflect is trustworthy, with their paid version? I don't know. All I have to go by is their "can't turn off nagging". So I would rather not roll the dice, if EaseUS checks all of the right boxes.
But right now, I am unsure if either EaseUS or Macrium Reflect checks all of the right boxes.
Acronis True Image used to check all of the right boxes, but no more (that is another saga).
Even if you do not have answers to all 4 of my questions, maybe you can answer 1, 2, or 3 of them. That will get me closer to making a purchasing decision.
Thank you.
4
-
4
-
4
-
4
-
4
-
4
-
4
-
4
-
4
-
My landlord mandated that all tenants use "Smart Rent", and they insisted that we let them plug in their wireless access point in every apartment, and also give them our personal WiFi password, in order for their access point to have internet access within every tenants apartment.
I refused to give them my WiFi password. But I let them plug in their wireless access point. After they left, I unplugged it. I never heard from them.
Their "smart" devices allows them to remotely unlock the door to any tenant's apartment. They claim it is to help a tenant that locks themselves out. That is true. Also true is that they can unlock my apartment at their whim. Also true is that they would have a record of every time I locked and unlocked the door to my apartment. But without their access point plugged in, they get no information from me.
If a tenant locks themselves out of their apartment, it is the landlord's responsibility to send over a maintenance person to unlock the door. And they charge $50 for that service. But now they can charge the $50, and not show up to unlock the door. But with tenants that unplugged those surveillance devices, they will have to come over for a lock-out issue.
The sad part is that nearly everyone in the apartment complex was happy to grant access to complete strangers to monitor their comings and goings, as well as unlock their home, with or without permission, at their whim. And since those smart devices are on each tenant's local network, those devices can see every computer in their home, and can access those computers, by finding a crack in any computer's security. Imagine that... nearly all of the tenants gave complete strangers a connection to their personal, private, home network.
If only I had the resources to sue these people.
4
-
4
-
4
-
4
-
4
-
4
-
4
-
@1:48
"19 inch rims"
Those rims are fitted with low profile tires.
The benefit of low profile tires is improved handling.
This is achieved because "low profile" tires have less sidewall, resulting in the tires not rolling onto the sidewalls when under heavy turning.
Those 19" wheels, along with a well designed suspension, translate to a sedan that can take turns, hard turns, with ease. It is not a Corvette. But it is very, very good, and will handle better than most people think, and better than most people will ever try. And in Sport mode, the suspension stiffens a bit more, making for even better handling.
The 1.5 liter engines come with Goodyear tires.
The 2.0 liter engines come with Michelin tires.
Under normal driving, most folks will not know the difference.
But if you whip the car around a turn at speed, if you push it hard into a corner, then that will demonstrate that the Michelin tires control the car better.
Note that those 19" wheels have very good brakes.
Larger wheels means (at least it does in the Accord) larger brakes. The Accord's brakes are silky smooth, and they stop the car with ease. This will probably save many people from accidents, when they have to stop short (and hopefully no one is behind them).
@8:10
"All wheel drive"
"You're not getting it here..."
True.
But for folks that are not aware:
With all wheel drive, if one of your tires blows out (and cannot be patched / plugged / repaired), and needs to be replaced, then you must replace all of your tires. The only exception is if your tires are somewhat new (all have low mileage on them). But once the tires begin to wear, if one tire fails, you have to replace them all.
So all wheel drive is helpful in the mud and snow. Just know the potential $$ it might cost if you lose a tire.
4
-
4
-
4
-
4
-
4
-
Life expectancy and speed:
1) I used to have four, 240 GB (OCZ brand) SATA SSDs in an old computer, in a RAID 0 (cost much less to have those four drives vs one 1 TB drive, back then). Anyway, I used those drives for 10 years, until I replaced the computer. Those four SSDs never wore out, and I still have them, collecting dust.
2) In April of this year (2021), I started doing Chia processing on four 2 TB, Samsung 980 Pro, M.2 SSDs. The Chia processing writes approximately 3 TB to 4 TB of data to each of those drives, daily. At the time of writing this comment (October 2021), all four of those drives are showing no signs of tiring.
3) I have a 2 TB Samsung T5, to which I write 3 to 4 TB of data each day. I have been doing this for months. The drive is showing no signs of tiring.
4) I briefly had a 2 TB Samsung T7, which sucked. It apparently used fast NAND fabric for something like its first 100 GB of writing, and then some crap NAND fabric for the rest. So when continuously writing hundreds of GBs (or a TB or two) of data to the T7, it would fly for the first 100 GB, and then slow down to sub USB 2.0 speed.
When the T7 drive is idle (but connected to your PC), it will silently move the data from its super fast NAND cells to its super slow NAND cells. Thus, freeing up the fast NAND section of the drive for new write requests. As such, nearly all users will always have the fast NAND section of the drive available for use, and nearly all users will never experience the drive slowing down.
If you run CrystalDiskMark or some other performance measuring tool, and leave it at the default values (something like 5 GB of data for the test), then the T7 will show amazing results.
But change the values to 250 GB, and watch the results go down the toilet -- and be prepared to leave the test running for an eternity, because it will run for a very long time.
Folks posting benchmark videos never really push the T7 with lots of data. So those videos always show the T7 as a top performer (because they are inadvertently testing only the ~5% fast sections of the T7.
If you need the capacity that the Samsung T7 offers, and you will never write more than a few GB to it at a time, then you will have a super fast drive that never shows signs of slowness.
But if you intend to write huge amounts of data to it, then look elsewhere. The T5, on the other hand, is half the speed of the T7 (the fast portion of the T7). But the T5 will never slow down, no matter how much data you write to it. And the T5 will flirt with 450 GB/s, if you can feed it at that speed, and you can fill the entire drive, without rest, at that speed. Try that with the T7, and it will choke. I returned my T7.
Cheers!
4
-
Leo, did you run the delete command with admin rights, in case more than one user had jobs in the print queue?
I am asking, because I would imagine that if it is your own print job that is stuck, then you should be able to delete your own file?
Or do all of the file in c:\windows\system32\spool\printers\ take on the ownership of a system service name?
Yes, the admin login does work, regardless of ownership of the files in the queue, and so it might seem like the least complicated remedy.
But I frown upon using an admin shell, unless there is no other alternative.
When using an admin shell, if a mistake is made, you could wind up in a world of trouble. Under your own login, you at least will not accidentally be able to cripple your computer.
So who owns the files that populate the c:\windows\system32\spool\printers\ directory?
4
-
4
-
4
-
4
-
4
-
Steve, they probably charged themselves, so that they could find themselves not guilty (or at least minimize the penalty -- and they pay themselves, anyway).
By doing so, they convey that the wrong doing has been litigated, hoping that no one would notice the con job, so that no one sues (well, the case has already been settled -- right?).
And if someone sues, the state will point to their findings from charging themselves, and present those findings as conclusive, such that the matter is closed.
There has to be a self-serving reason for them charging themselves.
4
-
A RAID 1 or RAID 5 will prevent data loss, if you have a single drive failure.
That does not mean that you should not do backups.
If you get hit with a virus or ransomware, no RAID will save you.
If you accidentally screw up an important file, no RAID will save you.
A copy (a backup) of your data, stored on a USB drive, will save you.
RAID is for performance and/or reliability. Different RAID levels are simply different configurations (the level has nothing to do with which one is better ... the number simply identifies the configuration).
RAID 0 (two or more drives) is 100% for performance. But if any drive in your RAID fails, you lose everything.
RAID 1 (an even number of drives) is 100% for reliability. If you lose a drive, you lose nothing.
RAID 5 (three or more drives) is for both performance and reliability (close to RAID 0 performance). You can lose any one drive and keep going.
For RAID 0, if a drive fails, then... after you replace the failed drive, you create a new RAID 0 (makes your computer see a single drive), and once you format it, then you copy your data over from a backup.
For RAID 1 and RAID 5, if a single drive fails, your computer will keep running like nothing happened (other than a warning).
When you replace the failed drive, your RAID controller will automatically populate the new drive from your other drives, and when done, you will have fault tolerance, again.
If two drives happen to fail, then kiss your data goodbye. You will have to replace the failed drives, create a new RAID, and restore your data from a backup.
Copying important files (photos / videos) to a second drive is helpful, but not all encompassing.
For example, when you save all types of settings on your computer (even simple things, like which icons are where), if you then have to replace your drive, all of your settings will be gone.
Do you have copies of all of the installation files for all of the programs that you installed? Do you have all of your registration, product keys, etc, info?
If you lose your drive, then restoring from a backup to a new drive will put everything back in place. Otherwise, you will have to re-install Windows and re-install everything else.
If you do a full backup, then... if your drive fails, you can replace the drive and load back all of your data from a backup. After doing so, it will be like nothing happened.
4
-
If your rights are at the whim of the government, then you do not have rights.
You can submit a request for a permit, and that is subject to a bureaucrat's whim? If a bureaucrat is a tyrant, then you will not have your request for a permit approved.
And it gets better.
The bureaucrat can simply not get back to you in a timely matter. That amounts to a denial of your request, while the bureaucrat will claim that they never denied your request. But absent an approval, you are denied.
We do not need to get permission from the government to have a lawyer represent us in a criminal case. And yet for free speech and airing grievances at our elected officials, we are expected to get the permission of those who are harming us?
And what starts out at 30 days will turn into 45 days, and later 60 days, and then 3 months, and eventually "Whatever we (the bureaucrats) feel like".
If any courts uphold this wild trashing of our Constitutional rights, it will get overturned on appeal. If it ends up at the US Supreme Court, it will 100% get overturned.
4
-
4
-
Not mentioned in this review is that the Altima is a pig off the line.
If, for example, you are in the left lane at a light, and you realize that you need to make a right turn at the next light, then forget about trying to get ahead of the car to your right.
Once the Altima gets rolling (maybe 25 MPH), then it has good acceleration.
But from a standstill? Forget it.
Most of the time, this will not be a problem. In fact, it could be helpful for folks that are not good drivers, that might spin the wheels. Or, perhaps Nissan figured out that this would help with fuel economy?
There is no switch (like a sport mode) to circumvent this. Nissan detuned the Altima, preventing it from having any balls from a dead stop.
Lastly, the stereo is for people that are not interested in sound quality. The bass is not natural, and the speakers do not work in harmony. You can hear each speaker. With a well tuned stereo, you should hear only a wall of music, with voices and instruments coming from various locations (and those locations do not necessarily correspond to speaker location). With a well tuned stereo, the speakers become invisible. This is not the case with the Altima.
Cheers!
4
-
4
-
4
-
4
-
4
-
4
-
4
-
4
-
In November of 2023, I purchased a tower PC from Best Buy, during their Black Friday sale.
After unboxing it, hooking it up, etc, one of its fans was rattling.
Best Buy is not too far from me.
I spoke to the Geek Squad manager, and asked him if I were to bring in the faulty fan, would he give me a replacement. Note that this was during the window where I could return the PC for a refund.
He told me that I would have to bring in the tower PC, and they would ship the tower PC back to the manufacturer. The manufacturer would replace the fan, and ship the tower PC back to Best Buy. It could take up to 5 weeks to have the tower PC returned to me.
I explained that I live in a 3-story apartment building. No elevator. And aside from the labor on my part, there would be considerable shipping costs that Best Buy would incur. On top of that, the PC could get damaged during shipping, to and from the manufacturer.
The PC could get lost or stolen during shipping.
The faulty fan would take 2 minutes to remove. That would seem to be far less labor intensive, and zero shipping involved.
He said that it is store policy to ship the tower PC back to the vendor; that it is the vendor's responsibility to fix the issue.
If the vendor will not accept the return of the fan from Best Buy, then Best Buy should tell them that they are endangering their relationship.
I explained that when a policy is highly counter-productive, and wasteful, someone in the store should have the authority to do the right thing. A store policy should not be used to frustrate the customer, when that store policy is absurd for the situation at hand.
The store's general manager gave me the same story.
Considering the above, the store's general manager should have handed me a replacement fan. Or, he should have told me to bring in the bad fan and he would hand me a replacement fan. If Best Buy would not go to bat with the vendor on behalf of the customer, then Best Buy should at least eat the cost of the fan, which I believe was $12 (their cost).
I was very tempted to bring the PC back for a refund. But the effort involved dissuaded me from doing so. Also, the Black Friday sale price was really low. Nothing else came close.
They sold me a replacement fan at their cost. It very much bothered me to spend money that I should not have to spend on a new PC. But that fan would have cost me 2x or more anywhere else. Apparently there is a high mark-up on the price of fans.
I will never shop at Best Buy, again. They lost my business over an inexpensive fan. And I have posted this even on social media, which hopefully cost Best Buy other sales.
And now with our host's report, I am confident that never shopping at Best Buy is proper.
4
-
I have never used Vivaldi, but I heard that it is feature rich, very versatile, loaded with customization options.
For privacy and security, Brave (as our host mentioned) is the way to go.
For the highest level of privacy and security, use TOR browser (a Firefox fork).
Used on its highest setting, few sites will function, due to the browser blocking all manner of privacy and tracking actions from web servers.
For any browser, know that when you add extensions, you are making yourself easier to be tracked. Leaving your browser in its default configuration will let you blend in with the most people using that same browser. But short of using only TOR browser, you are going to be tracked.
4
-
4
-
KeePass is free, open-source, powerful, and secure.
It gets great reviews.
You can also use VeraCrypt (free, open-source, powerful, and secure) to create an encrypted volume. That encrypted volume, when mounted with your credentials, will show up as a new drive letter (in Windows) or be a new mount point (in Linux).
VeraCrypt is not a password manager. But since all files kept on your VeraCrypt volumes are encrypted, you can save you passwords in a text file, or a spreadsheet, etc.
The advantage of using VeraCrypt is that you can save any and all files in an encrypted volume. That volume is a single file, which you can make copies of (to keep safely in more than one location), and the file is useless to anyone other than you.
But if you want all of the slick features of a very well thought out program, whose focus is strictly on managing passwords, then KeePass is a great choice.
In case this is new to you:
Never use the same password in two different places, and use wildly difficult passwords that humans cannot remember, and computers cannot crack. KeePass makes this easy.
The only password you will need to remember is your master password, which gives you access to all other passwords.
There are lots of videos on both KeePass and VeraCrypt. Both programs are fantastic.
I suggest that you watch this video, for selecting a master password:
https://www.youtube.com/watch?v=3NjQ9b3pgIg
4
-
4
-
4
-
4
-
4
-
4
-
4
-
4
-
4
-
4
-
3
-
3
-
Since this Windows alternative mimics Windows, and allows Windows' applications to run, then I wonder if ReactOS is susceptible to the countless threats that attack Windows (worms, viruses, ransomware, tracking, etc)?
Should anyone, that is thinking of replacing (end-of-life) Windows 7 with ReactOS, research anti-virus software (not just for the protection, but also for compatibility with this sudo-Windows OS)?
If we need to use anti-virus software with ReactOS (and I suspect that we do), then we want to be sure that whatever anti-virus software we install will function properly. Or does ReactOS include a type of Windows Defender application?
Thank you.
3
-
3
-
3
-
3
-
Schiff can still be brought up on federal criminal charges.
Due to Schiff accepting a pardon for his crimes, he cannot be charge for those crimes. Ergo, he cannot plead the Fifth Amendment when testifying in any federal court of law, including giving congressional testimony.
After being sworn in to testify, if he lies, then he will be charged with perjury, and Attorney General Pam Bondi will prosecute.
After being sworn in to testify, if he refuses to tell all, then he will be held in contempt of court (or contempt of Congress), and he will be locked up.
He will have to admit, in open court, all of his federal crimes -- or get locked up.
So it is time to subpoena Adam Schiff, and get him on the stand or before congressional hearings to testify under oath. And we all know that President Trump has that on his to-do list.
3
-
I dealt with this problem, when my car stereo's USB port would not read NTFS partitions. The manual states that it is compatible with only fat12, fat16, and fat32.
I have close to 100 GB of purchased .flac music files, which I was aiming to play in my car, via my recently purchased 128 GB flash drive.
So NTFS was out.
Neither fat12 nor fat16 would support that amount of data.
Fortunately, the fat32 specification supported my needs, and more.
But Windows could not or wound not complete the formatting. No reason given. Just that the format failed (and I tried on two different PCs -- Win7 and Win10). Scratching my head...
Enter the free, third party partitioning tool, and viola!, problem solved.
3
-
3
-
Anderson Cooper, will you visit the loved ones of the next dead American Soldiers that are fighting for non American interests?
Anderson Cooper, let us hear your pitch to the family that loses loved ones. Let us hear you explain to them the justification for them losing their son, daughter, mother, father, husband, or wife.
What will you say: "You should be proud that they were killed defending Syria."?
So it is our president, who is responsible for the decision that Turkey's president made?
No admonishment of Turkey's president?
Anderson, what is your criteria for blaming the person in Turkey? What decisions, what actions, will that person have to perform for you to blame him?
Rather than blaming Turkey, for the actions of Turkey, you praise them by calling them an ally.
Anderson Cooper, why don't you use your show to organize a militia, that you will lead, and personally defend Syria from our Turkish ally?
You are sellout and a coward.
3
-
3
-
I believe that $2,000,000,000,000.00 will be cut. Here's why:
-- We have brilliant businessmen combing the books. Those businessmen will be bringing in teams of other brilliant businessmen.
-- There will be incentives, to finding cuts, and actually executing on those cuts. If need be, I believe that Musk might offer incentives out of his own pocket, and write it off on his taxes. So there will be a strong incentive for his team to make the cuts a reality.
-- Anyone employed in the Executive branch of the government can be fired by President Trump. So even if it takes an act of congress to close down an agency, President Trump can still fire everyone in that agency (or, perhaps, 90% of the personnel in each agency, if some legitimate need exists to keep a few people) -- and he will fire just about all of them.
-- Deals will probably be made, for Washington swamp dwellers to avoid prosecution, by turning state's evidence on higher ranking personnel involved in criminality.
-- Anyone on record that spent $10,000 or more on anything clearly frivolous, will probably be criminally charged. They will have their day in court. But as the arrests pile up, watch how fast the rats run for cover, and plead for leniency; willing to sing like a bird, to avoid prison time.
Folks, this time around, President Trump will not be new to the job. He will not make mistakes, like he did with Nikki Haley, Mike Pence, Reince Priebus, Jeff Sessions, and other RINOs.
This time around, President Trump knows his way around.
Also, President Trump is not going to take orders from anyone. President Trump is not going to be distracted by anyone. President Trump is not going to be delayed by anyone. President Trump will not care if they do another impeachment.
This time around, President Trump is going to flex his authority and roll over anyone in the way of draining the swamp.
I expect President Trump to exceed my expectations. We are going to see a change, for the better, in the federal government like no one can imagine.
3
-
@2:48
"... legal asylees are not charged with any crime"
She is correct.
She is also a crafty misdirector of the point of the dialog.
When people show up at your door, how do you know who is a "legal asylee"?
Yes, the ones that are really seeking asylum (not just making it up), and satisfy our country's laws (as passed by congress) insomuch as they are deemed to truly be "legal asyleees", then they are not breaking our law.
Very few quality.
Each and every border crosser that enters, but not at a port of entry, is by law not a "legal asylee".
Even the border crossers that enter at a port of entry are not "legal asylees", with few exceptions.
To put it another way, AOC is saying that people that do legal things are not breaking the law (implying that every border crosser is doing a legal thing)
Any person in our country that has not broken a law is not a law breaker.
So for AOC to say that "legal asylees" (also known as those that are complying with our law) are not law breakers is, "duh", true.
Let's build on AOC's logic:
I drive. I do not break the law when I drive. Ergo, I am a legal driver.
That does not mean that every person that drives does not break motor vehicle law.
I use my telephone. I do not use it to break any laws. Ergo, I am a legal telephone user.
That does not mean that all telephone users do not use their telephone for an illegal act.
AOC attempted to define every single border crosser as a legal border crosser (calling them all "legal asylees"). Yet they are not all legal border crossers.
She makes a true statement, but in a way that misdirects the truth.
She is despicable.
3
-
3
-
Louis, I suspect that you have never heard good (or great) vinyl.
You must dial in all of these settings, with precision:
-- the effective length of the tone-arm
-- the cartridge's weight
-- the vertical tracking alignment / rake angle
-- the anti-skating
-- the overhang
-- the offset
-- the zenith angle
-- the cartridge's azimuth.
You need a quality phono-amp.
You should also get platform that minimizes vibrations (feedback) from reaching your turntable. Even if you do not think that you have feedback, you do (unless you addressed it). Once you minimize the feedback, everything will sound more focused.
Also note that 80%+ of vinyl pressings are not good (or are barely good).
I estimate that perhaps 2% have outstanding sound quality -- and only for one of the two sides.
You have to know which stampers to avoid, and which ones to seek out, in order to increase your chances of landing a great sounding pressing.
When you get all of the above settings dialed in properly, and play one of the gem pressings, your vinyl will blow you away. It will sound spooky real, like you are in the room with the band. Your Vandersteen speakers are up to that job.
It takes time and hard work to get vinyl to sound fantastic. But you know that anything worth having takes time and hard work.
I love digital, too (which has noise and jitter, until you use a quality transport). But when I really want to hear my stereo at its best, I play one of my amazing sounding pressings.
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
Microsoft is simply calling their spyware "AI", because when the public hears "AI", they believe that they have SkyNet on their desktop.
Well, not exactly. But people love "AI". It is all the rage. So call your spyware "AI", and 98% of your battle is won.
It is like companies that call just about any feature "turbo", to imply great power, even though there is 0% relationship to what a turbo charger is.
It is like companies that call just about any feature "HD", even when it has nothing, whatsoever, to do with actual high definition video. Have you seen the advertisements for "HD" glasses? Utter nonsense -- and yet it sells and sells and sells.
So Microsoft just names their spyware "AI", and calls it a day.
If they need more propaganda, maybe they will call it "Turbo AI", or "HD AI", or even "Turbo HD AI". Or, perhaps Microsoft will follow the nonsense from the world of entertainment (movies, TV, etc), and call their spyware "AI+".
People love having Amazon's Alexa microphone in their private homes, listening to every spoken word. Well, those same people will not just welcome Microsoft's "AI" spyware, they are salivating over it.
3
-
3
-
3
-
3
-
I saw a very good Tempest player, in a Flushing, Queens arcade (decades ago). I was also very good, and we played a couple of two-player games.
Perhaps that was Dave?
I also played in Nathans, on Central Avenue, in Westchester, NY (if I am remembering the location correctly).
I routinely put up high scores when I traveled.
One place where my brother played, was in Penn Station (NYC -- Manhattan). As best I can remember from his stories, those games (whether Tempest or any other game) had the highest high scores we had ever seen. I did not play those Penn Station games. It was not in my daily travels.
Not mentioned by our host, is that there were different versions of Tempest (three of them, I believe).
Version 1, if I am not mistaken, had a bug or a hidden feature, that allowed you to get 40 free credits. That helped me practice, without spending all of my part-time, after school, minimum wage earnings.
That "feature" also allowed you to start on any of the levels that you would normally be able to start on, if you had played your way all the way up, level by level by level.
So you were able to start on the green circle (which might have been level 81). I liked to start on the invisible circle, because those levels were very challenging. I also liked to start on the green circle -- extremely challenging.
Although the game sped up as you climbed the levels, two colors got noticeably faster:
When you got to the invisible circle, the game went to a dramatically faster speed. The next serious speed increase was on the green circle. Things were so fast, that if you blinked, you had a good chance of getting killed.
I never got to the green circle, without the "feature". I could not conquer the invisible infinity level. It was super fast, with very smart enemies, and made my brain hurt. The green circle (directly after the invisible infinity level), although faster, was easier -- or to be more precise, less difficult.
As best that I can remember, when I started a game on the green circle, my best score was after completing 9 or 10 of the green levels.
Supposedly, when you complete all of the green levels, you keep getting more green levels at random.
One issue with the arcade games is that sometimes the fire button was flaky, and the arcade staff did not take my word for it. They pressed it, and it worked. That was hardly a proper test.
When you get to fast levels, you are not just standing there, holding down the fire button. You are often making single presses (or double presses), for precision shots. When one of those shots did not register, you got killed. It was not a matter of having all eight shots already fired. it was a contact issue with the fire button. Really frustrating, especially when you traveled to get to the arcade to play that game.
Dave, have you ever played the green levels? Did you make it there through the invisibles?
3
-
The Altima is a great car, but has one non-adjustable setting that is a major red flag (at least for me).
From a stopped position, it is a pig off of the line.
For normal, typical, day-to-day driving, it is not a problem. In fact, for many folks, it will help control the car; prevent wheel spin.
The problem is that when you do want to accelerate, quickly, from a stop, you cannot.
For example, if you are at a light, in the left lane, and you realize that you need to make a right at the next light, you can forget about getting ahead the car to your right when the light turns green.
Once rolling, the acceleration is very good. But Nissan has de-tuned the engine, perhaps for better gas mileage or bad drivers. If you do not mind having low power from a stop, then this is a very good car for the price.
3
-
3
-
3
-
@trtrhr Windows 10 is relatively secure, except for Microsoft knowing every keystroke, mouse click, and file access that you perform. For Microsoft's benefit, it is spyware.
Most people do not know that, or do not care. They use facebook and google, which are just as bad. But Windows is easy, so people buy it.
Linux is faster, more reliable, and more secure. It is also free and open source (for nearly all distributions). And although you can run just about any types of programs that you can think of, on Linux, you will not have some of your favorite Windows programs. But you will have access to a sea of free and open source alternates. But some favorite game, for example, might not run on Linux.
Linux Mint is known to be user friendly, as far as Linux distributions go.
If I knew how to remove all of the data collection performed by Microsoft, I would stick with Windows 10. But you need a room of experts to figure it out, which includes stopping Windows from reinstalling their spyware when they push out an update. There is more to it than just disabling things on various settings. You need to run powershell scripts and make changes to the registry, too. So I will never run Windows 10 (other than as a virtual machine, if I come across something special -- like using "quick assist" to help a friend remotely".
You can install Oracle's Virtual Box, and have that run a Linux OS to see if you like it. But know that it will run much slower than if you installed the Linux OS directly on your hardware.
3
-
3
-
3
-
3
-
It is a sign of what Disney has become.
Disney has turned woke.
President Trump: "Everything woke turns to $h1t"
And as long as they have woke executives, this will get worse.
Those woke executives care zero about the issue, because they are not personally dealing with it. As long as they get their 7-figure salaries, they will care about nothing else.
Eventually, things will get so bad that Disney's woke CEO will either be fired, or will fire his executive team.
More and more parents will see what is in their movies, and more and more stories about the filth that goes on at their theme parks (including child sex predator related activities), subscriptions, attendance, ticket sales, and merchandise sales will plummet.
This is the beginning of the end for Disney.
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
Leo, I do not know what those Edge processes are, that are running, even though you did not start up your browser. But that might not mean that those processes are required.
There are custom, trimmed down versions of Windows 10 and Windows 11, that do not have Edge installed.
"Windows 11 Superlite" is one example.
I never used it. I am not recommending it. Anyone using it is at their own risk.
But it seems to be a fully functioning Windows 11 OS, absent the bloatware that Microsoft normally includes. Trusting "Windows 11 Superlite" with your data is a risk that each person would have to make, if they decide to use it. But it does not have Edge installed.
In fact, it has no browser installed.
If offers a menu for you to pick, from a numbered list, which programs you want to install. On that list are several browsers. Without that menu to install a browser, downloading a browser (without a browser) would be a problem.
Some folks might have single purpose uses for a Windows computer, where no browser is no problem.
3
-
3
-
3
-
I noticed that .mp4 files usually having diminished sound quality, and that .avi files sound better. Additionally, .avi files are much larger than .mp4 files.
I have no idea what codecs are being used, so I suppose they play a role.
Three questions:
1)
Can a .mp4 file, with the proper codec, have sound quality that is on par with an .avi file?
2)
Without getting into IMAX level quality...
For home use, what codec + container will yield optimum video quality and audio quality (with the understanding that the file will be larger, which, for my question, is not an issue)?
3)
As it pertains to video quality and audio quality, does the container matter? Is the video quality and audio quality solely in the hands of the codec, regardless of the container?
Sorry if you answered any of the above in your video. It was a bit too deep for me.
Excellent work researching everything and producing your presentation (you make it look easy).
Cheers!
3
-
3
-
3
-
3
-
1)
If your CPU's thermal paste has dried up, then you will not be able to cool your CPU. You can have a flagship cooler, running at warp speed, and it will be ineffective. The CPU will likely throttle down its speed, when it gets too hot.
I learned this the hard way, with my 1st Gen i7 CPU (Core i7 950), that I still use, today.
It takes many years to burn away your thermal paste. I think that mine lasted 10 years, of 100% up-time, before I had to scrape off the crud and re-apply the paste.
2)
Your GPU throws off lots of heat, too.
The higher-end your GPU, the more heat it can generate. The more work you throw at it, the more heat it will generate.
3)
Your SSD will not heat up from read requests. If it does heat up, it will likely be inconsequential.
Write requests will heat up your SSD. And the more advanced your SSD, the more it will probably heat up.
In other words:
If your SSD is capable of writing at 400 MB/s, it will heat up when it writes at that speed.
If your SSD is capable of writing at 4,000 MB/s, it will heat up much more, when it writes at that speed.
But the amount of heat will be negligible for 99.99% of typical use cases.
What heats up an SSD is when you run something that writes to the SSD, non-stop, for several minutes. For example: Chia crypt-o plotting will heat up your SSD like nothing else, because it never stops writing to the SSD while it is plotting.
3
-
3
-
3
-
3
-
The user gave no information about his hardware. But it sounds like he has a configuration issue, due to him needing to restart his computer.
1) For mechanical drives, files being written to (or read from) the outer portion of the disks will be far faster than the inner portion of the disks.
For example: An empty drive will probably write at ~275 MB/s, and when it is nearly full, might drop to ~135 MB/s.
The outer portion of the drive simply has more platter real-estate with each rotation, resulting in faster performance for files on the outer portion of the drive.
2) SSDs have deceptive manufacturer advertising, and even many reviewers either do not know, or they intentionally leave out an important design aspect of SSDs when providing reviews.
Those high performance numbers you see on the box (or the web site that is selling the SSD) are for (let's call it) the caching section of the SSD.
Without exception (as far as I know), 100% of consumer level SSDs are comprised of two types of NAND cells (which is where your data gets stored).
And different types of NAND cells will perform at wildly different speeds.
The manufacturers use (it varies from model to model) fast (more or less) NAND cells for approximately 10% of the SSD's storage capacity. The rest of the SSD is comprised of slow NAND cells.
The slow NAND cells are inexpensive, which is why ~90% of the SSD will be comprised of the slow NAND cells. And good luck finding how an SSD is comprised when scouring the manufacturer's web site, white papers, technical notes, etc. They bury that information.
When you write to the SSD, it will always go to the fast section. So you will virtually always experience the drive's top speed.
When the SSD is not busy (which is most of the time), its controller moves the data to the slower portion of the SSD (you will not see that happening) -- resulting in always having free space in the fast portion of the SSD.
If you want to see just how slow a supposed fast SSD can be, write enough data to it, non-stop. When you fill up the fast portion of the SSD, the drive will have no choice but to write data directly to the slower NAND cells, and you will (depending on the SSD model) likely see the performance drop like a brick. You could go from 3 GB/s to 100 MB/s.
When you see Crystal Disk's benchmarking results, they typically involve using 1 GB of data. That will always test the fast, and only the fast, NAND cells of the SSD.
Change it to use 250 GB of data, and when you wake up the next day, you will likely see lousy performance results.
For 99.99% of users, the above will never be an issue, as few of us ever write enough GBs of data, non-stop, to experience such a slow-down.
If you want an SSD that will not slow down much, there are a few high-end, consumer level drives that do a very good job, no matter how much data you throw at them:
-- Samsung 990 Pro (also the 980 Pro, if you find one).
-- Western Digital Black SN850X (although if you ever need warranty service from WD, you are in for the ride of your life).
-- SK hynix Platinum P41.
There are Enterprise / Data Center level SSDs that are made 100% of the fast stuff. They will never slow down. They will also break the bank.
If you are interested in doing further research, NAND cells come in these verities (from fastest and most expensive, to slowest and cheapest):
-- SLC (single layer cells) -- also the most robust.
-- MLC (multi layer cells (not sure why they did not name it DLC for dual layer cells))
-- TLC (triple layer cells)
-- QLC (quad layer cells) -- also the least robust.
The SSD's controller also plays a critical role in the drive's performance.
3) I mentioned the above, because the user's question pertained to large file copies slowing down.
But that user has either a hardware issue or a configuration issue.
-- Are his file copy issues limited to a specific drive? If yes... has he tested it in a different computer?
-- Does he have a spare drive that he can connect to his main computer (that has the issue), to see if the spare drive also has the issue (and if it does, then the problem is with the computer).
-- Backup his computer, and do a fresh OS installation. If the problem is no longer there, then he had a configuration issue (maybe a driver issue). Restore his computer from his backup, and happy hunting for the configuration issue.
-- Boot to a live Linux distro, and do a large file copy. If all goes well, then it is a configuration issue with his normal OS.
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
If you have space to store items, then consider not tossing your old computer. It might come in handy.
I have a game, Lode Runner, that was developed when the 8086 CPU was all the rage.
That game's speed is based on your computer's speed. If played on any of today's computers, the games ends in the blink of an eye.
So I kept my ancient Quantus X/T computer. I also kept an old monitor, to be able to plug it in.
There are ways to emulate the game on a modern computer. But it is not the same as the real thing.
.....
I have a few 15k RPM, 73 GB SCSI based hard drives, when they were considered to have huge capacity and be faster than a speeding bullet.
I want to see what I have on those drives, from the 1990s. But I have no way to plug them in. I tossed out the computer with the SCSI controller.
No one makes a SCSI -> USB adapter. So I would have to find a SCSI card and a PC with an available slot, and find the cables for the drives, and it is an expense and a hassle, all of which would have been avoided if I did not toss my old computer that was SCSI based. At the time, SCSI was the high-end choice over IDE based drives. It was used by businesses world-wide. So I thought nothing of tossing out my old Gateway 2000, 66 mHz DX/2 PC with its LSI SCSI controller.
And I was either too dumb or too poor (or both) to make copies of everything before I dumped the old computer. Now I want to erase the drives before selling them or dumping them, and I have no way to see what is on the drives or to erase them.
A hard drive degausser costs thousands. Should I pay a service to degause the drives? Is it worth the expense. Can I trust them to take possession of my drives? I will not hand over my drives to strangers.
I am kicking myself for not having at least saved the SCSI card and cables from that old PC.
That is a mistake I will not repeat.
3
-
3
-
@3:15 "Do you ever look back on some of the jokes that you told, and go 'Okay, I don't know that that would work, now'?"
Yes, it would work now.
Stop assuming that the country is mirroring the radical leftists that run the media.
If the humor in those skits was used today, the show would be a screaming success. Everyone would tune in for real comedy.
Of course Twitter would go bonkers. That is because it is a liberal cesspool, and liberals are bonkers.
The rest of us, the huge majority of us, the normal people, would love it, as we did before the inmates started running the asylums.
3
-
Louis, although Seagate's drives are not as reliable as Western Digital's drive... Seagate honors their warranties, without hassle. They go out of their way to give the customer a pleasant experience. That is a rarity these days.
Additionally, Seagate includes free data recovery in their warranty (not sure if it is for all drives, but my external drive had that included). When they recovered my data, they put it on a separate drive. So not only did I get that separate drive, Seagate also replaced the failed drive, and told me to keep both drives.
Western Digital's warranty process is a nightmare (perfect for your wiki). Every conceivable frustration and delay tactic under the sun is used by Western Digital. In fact, Western Digital pressures the customer to chalk up $25 (might be more) as a "convenience fee". In other words, they will supposedly honor their warranty, without all of the BS, if you pay them to do so. If you don't, it will probably takes weeks, or even months, for Western Digital to ship you your replacement drive.
If a warranty matters, then buy Seagate, and avoid Western Digitial.
3
-
3
-
@okpk3897 "...tweeted directly to Donald Trump to give the apology"?
The tweet did not apologize. Rather, the tweet made excuses, and in the same breath, included a "but I was right about this other thing".
And although it seems like yahoo addressed their BS better than other fake news media (like MSNBC and CNN), they should not be deemed to be on the road to recovery. That yahoo might now be less caustic than other fake news is not helpful. Like a mugger allowing you to keep bus fare. Should we thank the mugger?
If you believe that yahoo might start being less critical of President Trump, then you must be very young. This will change nothing. And if there is a change, it will be that yahoo makes sure that they do not get easily tripped up, the next time they throw BS at President Trump.
Think about it. Do you honestly believe that yahoo is going to turn over a new leaf? Do you really think that their hatred of President Trump is any different?
Nancy Pelosi, Adam Schiff, and Maxine Waters will campaign for President Trump's re-election, before yahoo becomes less critical of President Trump.
yahoo is a cancer on our freedom. They should not be given any benefit of the doubt. They have actively and falsely attacked President Trump for years, and will continue doing so. Do not assume that they are kind people. They are not. Do not give them an inch.
3
-
3
-
Via Alexa, Amazon listen's to everything that you say, and everything that your family says, and everything that your guests say, etc (it has to listen, in order to know when you are speaking to it).
For those that did not realize that Amazon might be keeping a database on everything being said, now you know.
For those that know this, and still pay that giant tech company to record everything under your roof, then do not ever complain when, one day, your data is found to be leaked, sold, or used against you or a loved one.
One day, when your child decides to become a movie star, or a mayor, or any public figure, then that is when Amazon will be in a position examine your household's conversations for the last decades (yes, Amazon has the resources to store the data from every household, forever).
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
@0:21 "I could have said 'No'"
Typical BS speak. Why?
Lemon could have said "I like turtles", or "Follow the yellow-brick road", etc.
You see, Lemon is playing word games. Yes, he could have said "No". What Lemon is not saying is the if he did say "No", then he would be on the unemployment line.
You can always say "No".
Lemon is making it seem as though if he said "No", that he would have retained his original job. That is a lie by omission, and a lie by inference.
Lemon was given the choice of a new, lower stature spot, and it was take it or leave it. So he took it. "No" was not an option, if he wanted to remain employed.
3
-
How to choose an external hard drive:
I suggest that it be based on (in no particular order) 1) price, 2) performance, 3) features), 4) reliability, 5) warranty, and 6) Miscellaneous.
1) Price:
As to the price, shop around. Each of us can judge for ourselves if the price is fair.
2) Performance:
For portable drives (which are available up to 5TB, as of May of 2024), they all perform about the same.
A portable drive requires no power brick. It gets its power from the USB connection.
For non portable drives (usually larger in size and capacity), they, too, usually all perform about the same.
Non portable drives come with a power brick that needs a wall outlet.
3) Features:
Some drives have a LED (light emitting diode) that glows when the drive has power, and blinks when the drive is active.
Some drives have no LED.
I prefer to have a LED. I can see when a backup is done (the light stops blinking), without waking up the monitor.
Also, if the drive has a problem, that light will give you some insight into whether or not the drive has power.
Also, many drives come with software. I recommend never using the included software.
4) Reliability:
They are all somewhat similar.
5) Warranty:
This is where the manufacturers part ways.
If everything above is about equal, then it would seem to make sense to get the one with the longest warranty. Well, normally that would be correct.
But a warranty is only as good as the company that honors their warranty.
Western Digital makes their warranty process a nightmare.
They have a system in place to deny claims for any technicality they can dream up. And even if you have everything perfectly organized and you did everything right, Western Digital will delay, delay, and delay getting you your replacement drive. If you do not call them during the time you are waiting, you might wait months, or possibly never get your replacement drive.
They will also hit you up for a "Convenience Fee", claiming that paying that fee will get you faster service.
Western Digital knows that you need your drive replaced. Western Digital knows that you are now vulnerable. So they squeeze you for a fee to get them to honor their warranty.
Their number one competitor, Seagate, is 100% the opposite of Western Digital, when it comes to honoring their warranty.
Seagate does everything to make the customer's experience a good one. In fact, they go so far as to off free data recovery for some (perhaps all?) drives that fail under their warranty.
So if you are deciding between a Western Digital drive and a Seagate drive, the choice is simple.
There are other brands, which I do not have experience with their warranty process.
Note that Western Digital has other brands that fall under their umbrella.
Sandisk, HGST, and G-Technology are all Western Digital brands, and will all fall under the same miserable warranty headache.
6) Miscellaneous:
Most drives (especially portable drives) come with very short USB cables. Perhaps 6".
If you need a longer cable, it will be difficult to know what length cable the manufacturer includes.
It is neither listed on the box, nor on the manufacturer's web site.
Your best bet is to look for a video review, and hopefully see the cable in the video. Or ask in the comments, and cross your fingers that someone replies.
So if a short cable is going to be a problem, then when you order the drive, also purchase a longer cable. Ordering an additional, longer cable, at the time of your drive purchase, might save you additional shipping costs.
Choosing a cable is yet another potential snag. Depending on the drive, it might use a different USB connector.
Most portable drives use a Micro-B connection to the drive.
Some non portable drives use a Type-B connection to the drive.
Check, as best you can, if you need a longer cable. And keep it under 10'. USB will not travel long cable distances, reliably. And check reviews, because some after-market cables are garbage.
3
-
3
-
3
-
3
-
Leo, you have found the right balance. You do not waste time with irrelevancies. You make your points, professionally, and in plain-spoken language. I suggest that you change nothing in your presentation. Even if you did, there is no escaping that some folks will find issues. That is just how it is, no matter the channel.
You make what you do look easy. That takes talent. Coordinating the timing of your narration with the activities you show via your computer's screen capture, without ever missing a beat, is not simple.
You are never condescending. Your audience has a wide range of people, from novices to experts. But some folks behave as if they are your only subscriber. They are either selfish, or unaware of their inconsideration. Or perhaps they do not know how to use tact to convey their message? The tone of a comment is often lost or misunderstood.
I agree with most (not all) of your positions on the topics that you cover.
I have concluded that where I disagree, it is because you are a generated AI bot, fed by a large language model database. ;-)
3
-
@1:20 -- The deep web is basically anything that will not show up in with a search engine.
For example, when you use your browser to see your bank balances, you certainly would not want someone to be able to search for that content and see your balances.
When you login to any site to see something, then that content will not be found via a search engine.
Even if someone (or a search engine) knew exactly where that content is located, that content cannot be indexed by a search engine, because without a password for that information, the search engine never sees that content, and therefore cannot index it. The search engine cannot get to it, and neither can anyone else.
Even though you can use a search engine to view postings on facebook, the search engine cannot access all content on facebook, because some of it is private.
In a nutshell, if it is password protected, then it is part of the deep web.
3
-
3
-
3
-
3
-
@JimE6243 Print preview will let you see how your printed pages would look.
If what you see in the preview is not to your liking, then you can print to a file, and edit that file (although I have never tried to edit such a file, I imagine there are tools to do so).
Or, if your print preview shows blank pages, or a page of ads, etc, you can exclude those pages from the printout.
If all else fails, you can do a screen capture -- even a scrolling screen capture, and print any part of what is on your screen.
Lastly, choosing between portrait and landscape layout for your printout might help.
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
When President Trump returns to the Oval Office, he should assign a team to investigate what President* Biden's doctors were hiding from the American people.
I am not talking about any health issues that are unrelated to his duties as President* of the United States of America.
I am talking about serious mental issues that put our nation in grave risk, that his doctors concealed from We The People.
If, for example, it is discovered that President* Biden has moderate to severe dementia, kept partially in check with medicine to get him through public appearances, then those doctors knew that President* Biden was incapable of carrying out his duties, and those doctors knew that President* Biden could not handle threats to our nation. That is a cover-up of the highest order, is insanely dangerous for 330,000,000 Americans, and criminal charges should be filed against those doctors, if the above turns out to be true.
If for no other reason, it will send a message to future presidential doctors about concealing serious mental health issues with the President of the United States of America.
But we could all be mistaken. As Joe Joe Scarborough says:
"This is the best Biden ever."
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
Those preaching activists are not only activists. They are racists.
And if you want to refer to them as activists, be sure to include the adjective "radical".
Those were radical activists.
Those were racists.
Those were radical activist racists.
It is because of them, and a complicit media, that we have racial tension in the least racist country on the planet.
Those in the media that promote the above are also radical racists. Just because they put on their "newscaster" uniform, does not make them a good, kind person. They, too, are radical, leftist, hateful, racist newscasters that propagate and give a platform to this crap.
Don't just call out the people being reported on, also call out the ones that are doing the reporting. They are on the same hateful team. They work together to pull off their con.
3
-
3
-
3
-
3
-
3
-
3
-
@10:08
"I don't know why they allow it", referring to identity spoofing.
My guess is that 99% of folks that use a spoofed gmail account get tracked, and the person getting tracked thinks that they are not being tracked.
And why are they being tracked? Because they signed up for the so-called spoofed gmail account using a device, OS, browser, location reveler, etc, that uniquely revealed their identity.
So google tied their so-called "spoofed" gmail account into that person's known fingerprint.
google slickly gets countless people to use their service to avoid tracking, and they almost all get tracked.
Rob Braxman Tech, you have an expert understanding of how to sign-up for a gmail account, anonymously. You are the exception. But it takes only a slight mishap when signing up, and you get identified.
If most folks had your insight into computer security, then my guess is that google would not offer spoofed gmail accounts. google counts on people, even tech savoy people, making mistakes when signing up and revealing themselves.
Cheers!
3
-
@0:15 "There is no problem with Microsoft. There is no problem with Windows."
Microsoft granted ring 0 access to CrowdStrike code.
Microsoft allowed code that has access to crash the OS.
Whether Microsoft wrote that code, themselves, or dropped it in from a 3rd party, it is effectively Microsoft's code, when it has kernel level access.
And when huge companies, globally, lose the services that they are providing, and when emergency medical services go down, and 100% of it is due to Microsoft ring 0 code, and 100% of the downed services are Microsoft Windows boxes, then it is a problem with Microsoft, and it is a problem with Windows.
Some people might say that it was not the fault of ring 0 code; that it was data read in from the user space (ring 1 space). Same result.
If your kernel code allows a user to deploy a file that will crash the system, then that is a problem with the kernel code.
The same thing can happen to everyone running an anti-virus package.
When Microsoft allows code that can bring down millions of computers, then it is Microsoft's fault. There is fault to go around. But Microsoft is not blameless; not even close.
If I hand my car keys to drunk drivers, then although the drunk drivers are at fault -- I am, too.
Microsoft handed their car keys over to CrowdStrike, without checking their sobriety.
Next:
I believe (can't be sure, of course) that this was an attack. Why?
Those definition files were simply too easy to check. All CrowdStrike had to do was test it on one of their own computers, and their computer would have blue-screened. So either CrowdStrike was wildly reckless, and never tested, or some CrowdStrike employee did test the code, and deemed it a success, because he wanted to crash the computer -- and deliver the code to the world.
Our hosts said that if it were an attack, then they could have encrypted everyone's files, etc.
Not necessarily. Why?
That would require access to CrowdStrike's kernel code, and being able to distribute that kernel code. That likely would require more personnel to get involved.
But a definition file, that changes nothing with the kernel code? That is routine, and there are probably many employees that can distribute definition files.
Changing the kernel code, to encrypt files, is far more involved than changing no kernel code, and simply taking advantage of a weakness in the kernel code (the latter, of which, is what took place).
My guess is that one of two types of attacks happened:
-- A disgruntled employee.
-- CrowdStrike's systems were compromised by bad actors that wanted to make headlines. Those bad actors might have simply gotten on to an employee's system, and tinkered with a definition file. That type of break-in, to an employee's computer, is simple, compared to breaking in to a server to change kernel code. And with remote access, an employee's home computer could have been compromised -- and it is that home computer that the employee uses to upload files to the CrowdStrike server.
If it was the latter that happened, then that is a huge embarrassment for a software security company.
The fact that nearly two weeks after the major incident, we still have not been given any meaningful information on the root cause, is consistent with a cover-up, and is why I believe it was an attack.
We know the trigger (bad definition files). And the only reason we know the trigger was that CrowdStrike had to tell us. But the root cause of how those bad definition files came to be, well... all we hear are crickets.
3
-
I have yet to hear Zuckerberg name names.
Who from the FBI pressured him?
Was it directed at him, personally, or to his staff?
How did the FBI initiate contact.
Think about trying to have a meeting with Zuckerberg. Do you think that you can call the operator and that the operator will ring his phone?
What records did the FBI use to find out where Zuckerberg was, or his personal phone number(s), or his personal e-mail address(s), etc? And who, specifically, from the FBI spoke or communicated with Zuckerberg?
Did Zuckerberg ask the FBI agent "Who from your office assigned you to contact me?"
Zuckerberg is finally waking up. But he is still running cover for the Biden* administration -- perhaps inadvertently. But with his wealth, and round-the-clock legal advisors, he has to know what questions to ask.
When President Trump returns to the Oval Office, and both the House and the Senate will have a majority of Republicans, we will get to the bottom of this and many other Democrat law-fare scandals. We will finally learn who, within the Democrat party, was at the helm, directing all of this criminal activity. We will learn their names, and what they did.
Justice is often slow. But justice will eventually prevail.
3
-
A new installation of Windows will typically start fast.
So if your system suddenly takes more time to start, then try to determine what changed.
Did you just install something?
Did you just visit a sketchy web site?
Did you just make a Control Panel setting change?
Etc.
When you do install something new, even if it does not require a re-boot, you should probably do a re-boot.
Make sure that all is well, rather than waiting days or weeks before you do a re-boot.
And before you install anything, you should do a backup.
Yes, you can often do an uninstall. But that does not always work, or some malicious program might refuse to uninstall (or claim to uninstall and still run in the background). The uninstall could leave things behind, or break something.
If you have a backup from when your computer was running fast and without issues, then if something goes wrong, you can go back to running fast without issues.
3
-
1)
The very fast speed of the NVMe drive is due to its fast buffer (probably using 20 or 40 GB of SLC NANDs). If you copy more than its buffer capacity, without rest, you will not get those very fast speed results. It will still be fast, but probably only 40% or 50% of the top speed. Some NVMe drives will run at top speed, 100% of the time, depending on the type of NAND cells that they are using (Samsung's "Pro" NVMe drives are an example of such drives, and is why they are more expensive).
2)
Unless you are doing backups, or some other large and sequential file transfers, the benchmark results that really matter, to 99% of the average user's experience, are the Q1T1 values.
3)
The reason PCs with SSDs boot up so fast is due to the values below the top row. Boot time is when Windows and other OS's are reading and writing all over the place.
3
-
3
-
3
-
3
-
Those companies can verify you via an alternate e-mail address.
It is simple to have an alternate e-mail address.
Anyone can create a new e-mail address that is not part of Google or Microsoft, etc. Then, if you to recover your Google or Microsoft account, you can have them send a message to your recovery e-mail address.
That recovery e-mail address can sit dormant, and simply be there for when you might need to receive a message to recover one of your accounts. Although, if you set up a free e-mail account, you should access it every few months, in case the service decides to close (what they see as) stale accounts.
Google and Microsoft 100% want everyone's phone numbers. And they want those phone numbers to track you. Yes, as a means of recovering your account it is great. But can anyone name any Google or Microsoft employee that cares whether or not you lose your account and can't recover it?
If Google or Microsoft cared, they would have a customer service department. They certainly are not short of the funds to have it. Google and Microsoft care so little about us, that you could not get a human on the phone to help you with any issues.
Google has its oceans of $$ because they know more about you than the government, and your information is for sale. So of course they want your phone number. They want your phone number, but good luck finding their phone number.
3
-
3
-
3
-
@8:08 "If you turn on the backup feature, which is incredibly easy to do, without realizing it..."
Microsoft did that, in order to get hundreds of millions (billions?) of people, worldwide, to exceed their OneDrive storage quota, by adding your "Documents" folder to OneDrive. To increase your quota, you have to purchase more storage space.
That was a deceitful move by Microsoft's executives. So Microsoft should not be trusted. Ergo, do not use OneDrive.
But if you must, then be sure to encrypt any personal files, before sharing those personal files with complete strangers (remember, you are giving a copy of your personal files to anonymous people at Microsoft). Microsoft is a huge data harvester (just think about all of the data collection items that are turned "on" by default, when you install Windows, or create a Windows account). And it is simplistic of Microsoft to scan all of your OneDrive files, and build a profile on you.
As our host demonstrated, Microsoft is really working hard to get copies of your files. And consider the hundreds of millions of people, globally, that do not watch this channel or similar channels, and are not aware of Microsoft's executive's deceptive practices. This is a red flag.
If you are not a person of interest (a mayor, governor, movie star, news anchor, congressman, head of state, someone in the news, etc), then no one at Microsoft will be sifting through your documents. But Microsoft can easily have algorithms that scan all of your files (and since it is so simple for them to do that, I am confident that they do).
So if you do not have a serious need to use OneDrive (or any other 3rd party storage of your files), then I suggest that you never use a Microsoft account. No Microsoft account = never having to concern yourself with OneDrive. Your Office documents will not be able to default to OneDrive, because you will have no OneDrive account, because you are not using a Microsoft Account. The same goes for any other software that would normally default to OneDrive.
I understand the attraction of OneDrive. But recognize the shiftless people that manage Microsoft. If I asked you for a copy of your documents, you would never hand them over to me. And yet so many people rush to hand over those same documents to strangers that have gone out of their way to get their hands on your documents.
Avoid the entire maze and avoid the hidden pitfalls, by simply not using a Microsoft account. And Microsoft makes "not using a Microsoft account" difficult. Yet another red flag.
3
-
3
-
3
-
3
-
Dave, couldn't Windows keep a database on every file's attributes (size, type, compressed, etc) and use that information towards providing a better estimate?
For example, if Windows were to first examine all of the files that were tagged for copying, I would imagine that it could factor that in, along with the drive's speed (it should have that info, too), and come up with a reasonable estimate. But that initial examination would hold things up.
However, if a database is maintained in the background by a service (while the system is idle), where it keeps track of all of the relevant file info needed for a proper estimate, then I would think that Windows would be able to quickly estimate how long each file will take to be copied, add it up, and report the result to the user.
And as each file copy is completed, the estimate subtracts that from the total time remaining.
3
-
3
-
Turning a blind eye to massive surveillance is a recipe for the end of privacy.
Apple's iPhone model 16 tracks on which part of the screen your eyeballs are focusing.
So because Apple does that to everyone, then it is nothing untoward about it?
If Apple did that to 10 people, then it would be a problem.
If Apple did that to 100 people, then it would still be a problem.
So how many people's precise eye contact with specific screen locations have to be tracked before it becomes "Apple is not interested in you"?
Leo, as a test (only a test), upload documents to Google's or Microsoft's cloud service that contains language of your plans to violently harm high ranking government officials. Never post those documents anywhere. Just fabricate some language of that nature, and upload it to your cloud service's storage. Or, do the same with documents containing illegal items regarding child trafficking, or large drug transactions. You get the idea.
Nothing to worry about, because no one is targeting you. Or, perhaps you will decline such a test? Concerned about losing your account, or getting a knock on the door by agents of a 3-letter agency? That happened to a father who uploaded photos of his toddler's rash at the request of a doctor.
And then there are the interesting people -- very interesting people.
Do you think that no one is checking documents that were uploaded by anyone associated with Trump or Harris, or governors or movie stars, etc? Is it okay that executives at a cloud service can have the goods on people in high ranking government offices -- to leak to the press or pull their strings?
How about if you decide to run for mayor, and become a person of interest? All of your uploaded documents can be viewed by the cloud services executives, going back to forever.
I suspect that if anyone working for the Pentagon were to upload classified documents (or any documents of any kind) to Google's or Microsoft's cloud storage service, that they would be fired and probably arrested. But why, when no one's documents are that interesting?
We have huge tech companies monitoring everything that we do, and we should chalk it up to being lemmings of no interest?
Twitter used to take down countless tweets, and ban account after account. But no one's tweets were that interesting. Right?
Facebook did the same thing, until Zuckerberg changed his mind. Sure, they were targeting no one in particular, but it eventually came down to specific people that were breaking no laws, and yet had their posts taken down and their accounts suspended or banned. What starts off as a wide open search is leads to targeting specific people.
Microsoft's "Recall" feature, not yet in full swing, will be taking snapshots of your screen every 5 seconds, and you can't disable it, without breaking file explorer and other key Windows components. Why would Microsoft prevent people from removing "Recall"? But as long as Microsoft does that to everyone's screen, then no big deal. Right?
This has nothing to do with paranoia or anxiety, and people who are shining a light on such privacy invasive practices should not be painted with that brush.
Frogs do not know to jump out of water that is slowly coming to a boil. They are not alone.
3
-
Please stop calling these men "trans".
They are men, asserting that they are women.
They were born a male, and one day they will die a male.
They are men that inject themselves into women's sports.
Those men are not completely to blame. Why?
There are authorities that decide who plays and who does not play. Whether it is high-school, college, girl scouts, etc, there are people running those events. All of them, that allow men to play in women's games, should be fired. That includes the people that they report to, such as Principal, or those that set policies, such as a school board member.
Every last person that allows men to play in women's sports should be fired.
3
-
@2:59 -- file copy confirmations:
Use "robocopy.exe" via the command line. The /mir (mirror) option is very handy (and dangerous if you screw up).
It will not pester you for confirmations, depending on whether you told it not to.
If you need it to do something complicated, it can.
If you do not want to memorize all of the options you needed to perform a complicated copy procedure, then put robocopy.exe, along with whatever options/switches and arguments that you need in a batch file. Want to see the output, then have it write to a log file with the name of your choosing. It is very powerful, and easy to use.
By the way, www.tgrmn.com makes a commercial program named ViceVersa. It clearly shows you the differences, if any, between any two directories (and their sub-directories), and has easy to use options to copy from here to there, making screw-ups impossible (unless beer is involved). It is amazing.
3
-
3
-
3
-
3
-
@andrewadent4733 There was a Next Generation episode where some aliens somewhere (can't remember the details) needed to clone the crew, and Riker said "It's our bodies. No one should tell us what to do with our own bodies" (or something like that). Clearly a pro-abortion message.
And Whoopie and her "I am god's gift to the show" know-it-all attitude, and above reproach attitude, and look up to me as an the most righteous entity in the universe attitude, was a turn-off. That the show would even allow her radical leftist, better than thou snobbery on the show, is telling.
When the Captain is bewildered with seemingly insurmountable issues, he turns to Whoopie's character for guidance, which further conveys to the viewers that Whoopie is the enlightened one. Her character's life expectancy is hundreds or thousands of years. Again, giving the impression that she has knowledge and wisdom that spans the ages. This was all done to put her on a pedestal, to carry over into issues outside of the show.
The show might as well have made characters for Stephen Colbert and Nancy Pelosi.
Just having a wildly, radical leftist as Whoopie in the show, even if she never spoke a word, spells out the show's leftist leanings.
Did they have Rush Limbaugh or Sean Hannity play a character?
The Next Generation was a left leaning series. Not all episodes. But too many.
3
-
3
-
3
-
3
-
If you inadvertently allowed malware onto your computer, then there is a good chance that it will not be able to create problems outside of your current login account.
For malware to gain access to system files, it will generate a User Account Control (UAC) prompt. At that point, if you click "Allow", then you are in trouble.
So never use an administrator account for your day-to-day activities, and always have more than one login to your computer, so that if malware becomes an issue with your login, then you can use a different, clean login. Of course, some other login (a clean login) will probably not help you recover files from "My Documents" under the compromised account. That is where backups will save you.
@4:51 "There's nothing you can do about it, after the fact."
True, for information that the assailant has stolen from you. But you can kick him off of your computer.
Download "autoruns" from sysinternals. It is a Microsoft site. The tool is free.
Run autoruns with admin privileges (from a clean login). The tool will show you every program / service that starts automatically, and from where it starts.
You can uncheck any item, and that item will not automatically start (but if it is already running, it will keep running until you either logout and login, or restart your computer -- which one you do depends on the item that you unchecked). Autoruns will list each item, and what triggers it to start (ie: when you login, or when your computer starts, etc).
For malware to continue to have access, it needs to automatically start (because you would not knowingly start it). Autoruns gives you a way to stop any process or service from automatically starting.
But beware. If you stop a critical program or service from starting, you could cripple your computer, to the point of it not booting up or you not being able to login. If that happens, then your only chance at survival is if you have a full system backup that you can restore.
If you get a new computer, then I suggest that you install autoruns, and take a snapshot of everything that it lists. Then, periodically run autoruns, again, and look for new entries. The sooner you catch something new, the sooner you will figure out what it is. I also suggest that you take a snapshot immediately before installing anything, and another snapshot immediately after you complete that installation. Autoruns will then reveal what, if anything, that new program, browser extension, version upgrade, etc, is now automatically starting. It will not spotlight new items. You have to compare, side-by-side, the before and after listings from autoruns.
A lot of items will be listed. Windows has things automatically starting all over the place. Comparing two snapshots of the listings will take some effort to identify what got added.
3
-
3
-
3
-
3
-
3
-
3
-
3
-
@6:57 -- Leo, I believe that a long format (unchecking the quick format option) could be helpful.
Although "chkdsk/r" locates bad sectors, will it scour the entire drive and mark bad sectors to prevent data being written to those sectors?
It implies /f. So it should fix issues with the disk. But based on the speed that chkdsk/r/f completes, I do not believe that it performs as complete of a check as a long format would perform.
A long format takes half of forever, because it tests the entire disk while formatting, and would seem ideal for the issue at hand.
If the long format completes, then whatever space is available on the drive should be usable, as the formatting process was able to use it.
If the long format does not complete, then there is likely an existing issue with the drive.
Whatever the case may be... since that drive had stalling issues on multiple Windows boxes, I would not trust it for anything important. I would not trust it on the Mac, either.
One other possibility could be that if the external drive derives its power from the USB cable, then if the PC's USB port is not delivering enough power, the drive could stall. But the user stated that the issue happens with multiple Windows boxes. Is he using a hub on those boxes?
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
@10:14
"Another thing that Honda just nails -- nails it right out of the park; hits a home run, is this steering wheel."
The good:
-- The buttons are well laid out.
The bad:
-- The leather, against your skin, is noisy.
Sliding your hand on the wheel (which is constant and unavoidable) results in hearing "shhh shhh shhh".
-- If you like to keep the tilt steering at its lowest position (near your lap), like I do, then the top of the steering wheel will block approximately ¼ of the top of the dashboard.
Yes, you can lower your seat to compensate. But that means that the steering wheel is no longer near your lap, and you, again, need to reach up higher to hold it (defeating the purpose of keeping the steering wheel in the lowest position).
@16:09
"Of course, you do have the 'Eco' mode..."
In that mode, you will get better gas mileage. However, the car is less responsive, and at times it is frustrating.
If, for example, you need to speed up to get ahead of someone, then when you press on the gas, almost nothing happens. Yes, it does speed up. But not enough to pass a car you need to get passed. Give it enough gas (meaning press down quite a bit on the gas pedal) and the car will jump forward. So it is kind of like nothing, nothing, nothing, and boom.
You kind of feel like you are fighting the car. So if you are in stop-and-go traffic, or alone on the road, then "Eco" is fine. But if you need the car to react, without delay, to the gas pedal, then forget "Eco".
"Sport" mode is the opposite of "Eco". The car is very responsive and fun to drive. Any little tap on the gas is rewarded, without delay. This could, over a long drive, become a little jarring.
The default mode is when neither "Eco" nor "Sport" is enabled (and this is how the car starts, regardless of how it was when you last drove).
Honda did a very good job (in "neigther" mode) in finding just the right balance. You can keep it in this mode and it will be responsive and comfortable and the car will go when you need it to go.
-----
By the way, this Sport model takes turns really well (better than most people think). It stays planted around turns and has nearly no lean. In "Sport" mode, the suspension stiffens up a bit more and (I believe) lowers the car slightly.
Helping the lateral stability are the low profile tires (minimal sidewall on the tires). This reduces the flexing when taking hard turns (keeps the tire from rolling on its sidewall and keeps the flat part of the tire glued to the pavement).
The downside to this is that if you hit a big pothole, you do not have much room between the tire and the rim. This can result in breaking a rim (where on a car that does not have low profile tires, the rim would stand a better chance of surviving).
-----
Lastly, the stereo is good, but not great.
You can enjoy it. But you will never forget that you are listening to a stereo.
On better stereos, you simply hear a wall of music, rather than hearing a bunch of speakers.
On better stereos, the speakers disappear (your ears cannot identify their location), and you get a more realistic soundstage and better imaging.
Honda could have done better with this. My 2003 Nissan Sentra's stock stereo is better than the Accord's stereo. Perhaps the cabin is responsible? But Honda has the resources to dial in a better sounding stereo, and they should have.
-----
I love this Accord (the 2.0 Sport model). Highly recommended. The 2020 model can be had for $28,000 + DMV fees + taxes, if the dealer has it on the lot. They will probably try to add on "prep" fees, and might tell you that by law they have to list it separately. That is true. So in such a case, if the prep fee $800, then your offer should be $27,200. The prep fee could just as easily be named "pure profit" fee.
Good luck!
Cheers!
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
The fact that commission based personnel are being hurt, economically, shows that Budweiser's executive personnel are taking zero responsibility for their actions, and cares zero about anyone other than themselves. Why?
Budweiser could easily compensate those commission based workers for the losses caused by executive management. They can give them stock, or even partially bump up their base pay to share in the financial losses.
But no. Budweiser cares zero about people working paycheck-to-paycheck, not being able to pay their bills.
If Budweiser actually cared, and softened the financial hit that their base-pay workers were feeling, that would go over big with the public.
In times such as this, we get to see the true nature of people. And we are seeing that Budweiser's executive management (for sure their CEO) are totally in this for themselves.
Think about it. A few million dollars, distributed to their thousands of commission based employees, would not even be a decimal point on their financial spreadsheet. But Budweiser's executive personnel would sooner cut off one of their own fingers, than have the decency to help out their own workers who they (executive management) caused to have this problem in the first place.
3
-
@0:02 Reporter's question:
"What makes you think Vladimir Putin will alter course, based on the action you're taken today?"
@0:06 President* Biden's response:
"Let's get something straight. You remember, if you covered me from the very beginning, I did not that, in fact, the sanctions would deter him (Putin). Sanctions never deter."
Now let's go back and listen to the reporter's question...
And assuming you believe President* Biden, that "sanctions never deter", then what is President* Biden doing that will "deter" Putin?
@1:06 "...is to be sure, that after a month, we will sustain what we're doing, not just next month, the following month, but for the remainder of the entire year. That's what will stop him (Putin)"
-- Raise your hand if you know what "we will sustain what we're doing" is?
-- Raise your hand if you know what "That's what will stop him (Putin)" is?
What will stop him (Putin)?
3
-
I disagree with that moderator (unless that moderator has some valid reason that we do not know about).
When I reply to an e-mail message, I want to have a record of exactly that to which I am replying. Editing it, to make it blank, makes trouble-shooting a headache.
If this is job related, you should not want employees modifying what had already been written. That can lead to trouble. Some people will make claims of this or that, and the record of what was really there is now gone.
Yes, you can try to dig up an older reply (if your e-mail application does not auto delete), where what was originally written is still there. But that takes time, and you have to verify that the message that you dug up is complete, and that someone else did not delete a portion of it.
In an investigation for work issues, this gets messy fast.
It is very convenient to have all of the replies right there. No one is forcing you to re-read the entire thread each time someone replies. But the entire thread is there for anyone that needs to scroll down for something, or do a "find" or "search" function to look for something that they need.
Sometimes you might need to quote two or more sections -- one from yesterday, and another from a month earlier. Well, good luck doing that when everyone is deleting it.
Does removing the repeated section of the e-mail message save space? Yes.
And in the days of $500 10 GB hard drives, a case could be made for saving space.
But with 18 TB drives to be had for under $200, how much space is being saved (as a percentage of the drive), by deleting lines of text? A few KB here, and maybe a MB there?
And when you reply, attachments are not carried over (attachments are not included in replies). And it is the attachment that is far, far, far more space consuming than what you type out on your keyboard in an e-mail message.
If an attachment is 2 MB, that is 2,000,000 characters. That's two million keystrokes. Have you ever typed 2,000,000 keystrokes? Have any of your replies ever contained 2,000,000 keystrokes? So typed replies that are a few hundred keystrokes are not space hogs. It would take ½ of an eternity for a company with 500 employees to fill up one 18 TB hard drive, without attachments. So it makes sense for replies to exclude attachments. But it does not make sense for replies to exclude typed text.
I see no meaningful upside to deleting the text from others, when replying. It makes for extra work for everyone, makes researching previously written text problematic, and saves hardly any disk space.
Our host showed us how to see what is often hidden in e-mail messages to which we are replying. So this is a helpful video. But that moderator telling his users to delete text from replies is either not tech savvy (does not understand that the space savings is virtually meaningless), or for some reason is running their mail server with a tiny capacity hard drive.
3
-
3
-
I am planning on divorcing myself from Windows, when I purchase my next computer. But I might still need access to my old Windows OS. However, I have no room for 2 monitors and 2 keyboards, etc.
My question is:
Is there a way to put my Windows machine, in its current state, into an .iso file, and have my Linux machine boot up my old Windows machine via the .iso file, resulting in me being able to use my old Windows machine as a guest on my new Linux machine?
If yes, then how do I wrap my current Windows machine into an .iso file?
If no, then is there a different way to have VirtualBox run my old Windows computer?
To be clear, I want to be able to run my old Windows computer as a guest machine, and have it run exactly as it is currently configured (and I understand the performance will be slower, which is not an issue).
Linux is somewhat new to me, and I do not want to lose my old Windows machine, until I am fully functional on my new Linux machine.
Thank you.
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
@0:10
"The left maintains then Vice President Biden's unmasking of General Flynn is no big deal"
Well, to them, it is no big deal. To them, all crimes are no big deal, as long as it advances their criminal pursuit of power.
@2:01
"I want the system fixed"
What is there to fix?
Just prosecute the offenders with laws that are on the books. There must be laws already on the books -- right?
Stating that this should be fixed implies that the law was not broken, and that we need laws to prevent this.
1) Existing laws were broken. So just prosecute the offenders.
2) If existing laws are not stopping the Democrats, then what is the point of creating new laws? Why would new laws keep them from breaking those laws, too, with impunity?
The answer is to have consequences for their criminal actions. The answer is to prosecute the offenders. The answer is to let the criminals know that all laws will be enforced, and that your "I am above the law" days are over, and you are going to be locked up for those crimes you committed while believing that you were untouchable. You might have believed that your were above the law, and you can mull that over while behind bars.
3
-
@12:00
Using sub quality equipment (turntable, tone-arm, and cartridge) as well as not initially dialing in the cartridge (overhang, anti-skating, vertical tracking alignment, counter-balance, azimuth), makes for a pointless test.
Add to that, a likely piss-poor, low quality analog to digital converter, low quality phono stage, and listening via PC speakers, adds to the already pointless listening test.
Try stacking records, on a professionally set-up VPI, Clearaudio, Brinkmann (among many other reputable brands) turntable, with a quality tone-arm (Graham, Tri-Planar, Swedish Analog Technologies, etc) and a quality cartridge (many to choose from), feeding a quality phono-amp -> quality pre-amp -> quality monoblock amps -> quality speakers, and you will hear the difference when records are stacked.
Also note that most (90+%) vinyl sucks. So if the record's sound quality sucks, then hearing it suck even more (when stacked) is quite a challenge. But if this test was done with quality components, with a rare and great sounding vinyl pressing, you will hear the degradation introduced by stacking records.
Also note that you cannot use a record clamp, or an outer ring weight, to 1) reduce warp and 2) effectively add mass to the vinyl pressing.
Record changers are great, when sound quality is not a priority.
When sound quality is a priority, then you must give up convenience, and spend a good deal of time professionally dialing in everything.
Quality sound, from vinyl, is neither cheap nor easy.
The equipment in this video makes listening to vinyl both cheap and easy. Ergo, poor sound quality. Ergo, pointless test.
Cheers!
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
For process explorer, I believe it shows you only processes related to your login. I believe that you must right-click it and run it with admin privileges, in order to have it display all processes.
A lot of the conga line of processes is bloatware -- direct from Microsoft.
Run "Tiny 10" or "Tiny 11" or "Spectre 10" or "Spectre 11" (custom made Windows packages that includes only what is necessary for Windows to function properly), and you will probably see less than half the number of processes running (assuming you did not install stuff and start up a bunch of stuff).
Note that the above offerings are "Run at your own risk", because they are not from Microsoft. Third party developers stripped away the bloat from the Windows installation package. So you are trusting that they 1) did not screw up, and 2) that they did not add in anything untoward. The point of this is to lend credence to the fact that the official Windows releases are loaded with bloatware, because the unofficial versions (noted above) are bloatware-free, and run with far, far less RAM usage.
You can create a virtual machine that runs one of the above version of Windows, just to poke around.
I never ran it. But in videos of others running it, Task Manager was using less than half the amount of RAM upon boot up. And the list of processes in Task Manager was not long (I do not recall how man processes were there, but it was less than half).
And if some process that you need is missing, it can be added via a tool that the developer includes.
But, again: Run at your own risk. Those packages could have malware. Use a virtual machine for testing it, or use an old, unimportant PC if you want to install it directly. Due to the absence of bloatware, your old Windows XP box with 2 GB of RAM that is collecting dust will have no problem running Tiny 10 or Spectre 10.
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
@7:09 "So beyond 42 gigabytes of write, these drives will slow down"
Not exactly (correct me if I am mistaken).
Consider the following statement, which is intentionally wrong:
"The drives store 100% of new data in their faster SLC cache, and only during idle time do they write that data to their slower TLC (or, as the case may be, QLC) NAND cells."
What actually takes place is that while the data is being written to the faster SLC cache, the drive is simultaneously offloading the data to its slower TLC (or, as the case may be, QLC) NAND cells.
So if you were copying 50 gigabytes to the drive in one shot, then...
...by the time you sent 42 gigabytes to the drive, the drive would have already transferred, perhaps, 10 or 20 GB to its slower NAND cells.
So with a 42 GB SLC cache, it takes more than 42 GB of data to keep it full.
Like filling a 42 gallon tank with water, while at the same time people line up and fill their glasses with water from the nozzle. It will take more than 42 gallons to top off the tank.
Also note that, although the drive will slow down, and significantly so, when you fill up the cache, that slow-down is very temporary. The drive will work, non-stop, emptying its cache to the slower NAND cells. So under normal use (where you are not bombarding it with scores of gigabytes of data), it will always run very fast. Just don't think that once you fill the cache and it slows down that you ruined the drive. It will empty its cache and run at full speed, again.
However, the test at the 12:30 time mark, suggests that my above analysis is correct only for the TLC drive.
Apparently, the QLC drive has a cheaper controller, that does not offload its cache while new data is still coming in. When its cache fills up, then it is forced to do so, which is why we saw the slow-down. The less expensive QLC drive allowed its cache to fill up.
The TLC drive would have also slowed down, eventually. But it would have taken more data to fill its cache, because its controller was emptying its cache while new data was coming in to the cache.
Cheers!
3
-
@ExplainingComputers The design, to both write to cache and to read from cache simultaneously (or close to simultaneously), must exist. Why?
If you decide to copy 500 GB to the drive, it will all get written without stalling. So at some point the cache will get full, and yet the copy process continues. And you never see (in your benchmark) a pause where when the cache gets full it pauses to empty the cache, and then returns to accepting more into the cache. It just slows down. And I doubt that it seals (so to speak) what is in cache and is allowing new data to go directly to the QLC NAND cells, and eventually emptying the cache when all other data writes complete. That would be asking for trouble, if when the cache gets full it was in the middle of a file being written to the cache.
The only way around this, that I can think of is, that once the cache gets full, that the QLC drive (when the cache is full) quickly jumps back and forth between writing out a few bytes and reading in a few bytes. If it is doing that, then that might look like the copy process is constantly writing (albeit at a slower speed), when it is actually constantly pausing to write to the QLC NAND and then quickly returning to read more into the cache. If it does this 10, 20, 50 (whatever) times each second, the benchmark will still report on average bytes per second, so you would not see the pauses.
I am taking an educated guess at this. And it would explain why the TLC drive never slowed down, if the TLC's controller was more sophisticated, such that it can work on both ends of the cache, simultaneously.
By the way, if you were to copy 500 GB to the QLC drive, then when it reports that the copy job is done, is it really done? Or is it only telling the OS that it is done because it has all of the data (some in cache NANDs and some in the QLC NANDs), and it happily chugs along in the background emptying its cache?
And, if immediately upon the copy job claiming it is completed, if you were to issue a shutdown command, would Windows (or other OS) know that the drive is still working on emptying its cache, and delay the shutdown? Or does the drive simply keep a note on what it has to continue emptying from cache, upon the next boot up?
3
-
3
-
3
-
3
-
@16:35 -- Shame on every company that went down, and stayed down for an extended period of time -- regardless of whether or not their boxes were BitLocker encrypted.
Why did I write the above?
Every one of those critical Windows boxes should be running daily backups.
Every one of those critical boxes would have been up and running, with minimal delays, if they had restored from yesterday's backup.
Yes, there will be instances where you would want to copy a database, for example, off of the downed box, before doing a restore -- so that you can put back a current database after restoring from yesterday's backup. But to not have backups? That is outrageous.
This CrowdStrike disaster reveals that these businesses and government agencies, running critical services, have no disaster recovery plan in place.
What if this had been an attack to bring down millions of systems, without a simple fix available?
What if the attack wiped out system32 files, before blue-screening?
Shame on all of those companies that had to wait to hear from CrowdStrike, in order to restore services. They were all extremely irresponsible and reckless.
3
-
3
-
3
-
What Philips is doing is not only repugnant, it is illegal.
It is like purchasing a refrigerator, and then get told that unless you sign up and let them monitor your refrigerator, they will turn off your refrigerator.
And consider all of the people that do not have internet access, outside of dial-up, and people that have low-end data plans for their smart-phones, and therefore carefully watch their data usage..
This will not last, and Philips will be sued, and Philips will lose.
HP did something similar, with their Instant Ink program.
They sold printers and advertised different Instant Ink plan options -- one of them being a "Free" plan, that limits you to 15 pages per month.
A year or so after you purchased your printer, HP ended the "Free" plan. Well, they get sued. They lost. And they grandfathered in everyone that was on the "Free" plan.
But that does not go far enough.
If you are grandfathered in, and you upgrade your plan, you will not be allowed to return to the free plan.
Note that when HP advertised your printer, they advertised that you can change plans at any time. Well, not more - for the free plan. So HP lied.
So HP advertised a "Free" plan, which is why you purchased their printer. And now, if you now decide to accept that offer, they will refuse you.
It would be great if everyone that has the free plan would print 15 pages each month, of a full page that uses the most ink possible. The plans go by pages printed, whether you print a dot, or a page fully covered in ink. So you can print 15 pages, fully covering each page with ink, and HP will have to replace those ink cartridges, for free, as they run low on ink.
3
-
3
-
3
-
What we just witnessed is for the best -- for both of them. Why?
As soon as the guy hesitated at the $1,000 offer, the girl should have dumped him.
Instead, you could see that she was happy when he eventually turned down the $1,000 offer.
In other words, she was happy not to lose him.
Even after he walked away with the $10,000, she appeared to feel as if she suffered a loss.
Any girl with any wholesome values and dignity would have dumped that guy at the $1,000 hesitation.
So he is a dirt-bag for accepting the the cash, and she values herself very lowly, for still wanting him after what he did.
And it gets worse.
She should have said that it is not up to him to sell her for cash.
And it gets worse.
When the host offered him $100, a real man would have told that host to eff off, because he is about to get stomped on for insulting his girl. But no. That guy anticipated a better offer, and went down that road, instead.
If what we witnessed never happened, their relationship would have end badly, anyway. It is for the best that she discovered what a soy boy he was now, rather than wasting more time with him.
3
-
3
-
3
-
3
-
@0:59 "Usually, not your password. Usually, it's the hashed version of your password, which is less concerning because there's no way to map that to the password."
True. However:
There are hash tables that contain tens of millions (perhaps hundreds of millions) of passwords and their corresponding hash value (or values, because there are many hashing algorithms).
If your password is 8 characters or less, then your password is virtually guaranteed to be in one of those tables.
Even longer passwords are in there, from huge companies that implemented sloppy, nearly non-existent, password security. Their passwords were leaked, hashes were made, and now there are hash tables that have countless passwords that are simple to look up (as simple as loading them into an Excel spreadsheet, doing a "find" on the hash, and seeing the associated password (or "grep" in Linux for a plain-text file of hashes or the "find.exe" command via Windows command prompt).
If a site salts your password that they store on their server, and creates a hash from that, then that offers much better security. But there is no way to know how companies are storing passwords. Even if they make claims, we have no way to verify their claims.
.....
Never use the same password for two different services (something our host has said in several videos).
Never use a pattern of passwords for different services. For example, do not use your dog's name, combined with a number, plus the name of the site.
Eg:
Facebook password: rover369fb
Twitter password: rover369tw
GMail password: rover369gm
If any of the above services are breached, then any one of the above reveals enough clues to guess your other passwords.
Use passwords that have nothing, whatsoever, in common.
To accomplish that, use a password manager (something our host has said in several videos).
A password manager will give you passwords, such as these:
4088D74A2BEFE941982CB1R
z=c^]pJfn2<'8Lp^P`q*nbCv-5E
nk1K8OKlCdZGzbKL55pAz5D
The above are unbreakable, even if a 3-letter government agency put all of their computing power towards that effort.
...and the length and the make-up of the password is easy to configure, and you never have to remember them.
You have your password manager create a unique, and unbreakable, password for each site that you use, and your worries (for the most part) are over.
3
-
3
-
It will vary from manufacturer to manufacturer, and will vary from model to model.
If it does not list speakers in the description, then it probably does not come with speakers. But it might come with speakers, and they just omitted it from the description.
You will have to contact the vendor, or ask questions in a forum, and cross your fingers that someone that owns it will respond.
Note that it is not expensive to purchase your own speakers, and certain ones will sound very good, without breaking the bank.
Or, you can go hog-wild, and purchase amazing speakers. The options are wide open.
I was in Micro Center in 2021, and they sold speakers for $19.99. They are probably fine for youtube videos, etc. But they will not rock your world when playing music.
3
-
3
-
3
-
I am assuming that the backup software keeps a database (of sorts) in some file that is part of the backup?
Consider the following scenario:
After Sunday night's full backup, I then, on Monday morning, intentionally delete file "dangerous-file.txt", and I then do an incremental backup on Monday night.
On Tuesday, my storage drive fails. I replace it with a new drive.
I then do a restore from my full+incremental backup.
Will the "dangerous-file.txt" get restored?
That file was present during the full backup, but was absent during the subsequent incremental backup. So if the backup software restores everything form the full backup, and then restores and overwrites files that have been added or modified in the incremental backup, then it would seem that the "dangerous-file.txt" would be mistakenly resurrected.
But that would be a major issue with all kinds of files getting restored that should not get restored, because the user deleted them.
So the backup software must be maintaining a database on what files disappeared from the time the full backup was run, to now when the incremental backup is run?
And that database would have to be implanted into the backup archive file(s), itself.
I have never run a test to see if a restore would mistakenly restore files.
And I have never seen any reports or reviews or anything that mentions that backup software handles this circumstance properly.
Has anyone tested this?
3
-
3
-
3
-
Although President Trump does the right thing, regardless of politics... in this case, that pardon will probably wait until after the midterm elections.
Freeing Derek Chauvin could result in losing swing voters, and black voters, and low information voters, resulting in radical leftists taking control of both the House of Representatives and the Senate.
It will make it impossible for President Trump to have any sane laws passed, or have any insane laws removed. The entire funding of our national budget would be thrown into chaos.
Chauvin's freedom, unfortunately, needs to wait until after the midterm elections. The stability of our nation, and by extension the world, must come first.
3
-
@openyoureyes4799 So your statement has changed
-- from: "driving is your right as a human being"
-- to: "It's our right to travel the roads of our country without being harassed!"
So travel all you want. No license is needed to sit in the passenger's seat.. But if you want to get behind the wheel of an automobile, or a truck, or a bus, or any other road vehicle that is capable of easily maiming and killing others, then a license to operate that vehicle on a public road is mandatory. Our policing authorities would be negligent if they did not ensure that only safe and licensed drivers were behind the wheel.
The purpose of the police is not to harass drivers.
The purpose of the police is to ensure that drivers do not inflict death on others.
Driving is not a right. Driving is a privilege for those licensed to do so.
Private property (not public property) ownership is a right.
If you want to drive without a license, or without insurance, or without being sober, etc, then you are free to do so, on your private property. But on public property (property you are sharing with the rest of your city/state/country), then your fellow citizen's safety comes first.
3
-
@ConquerCollin No one has said that you do not have the right to travel down the road.
That is not the same as having the right to drive down the road.
You can travel by bus, or taxi, or limousine service, or passenger in a car, or passenger on a motor cycle, etc, and do so whenever you want to, and as often as you want to, needing permission from nobody. You are free to move about as you wish.
But if you want to operate any of the above (if you want to get behind the wheel), on a public road, then for that you must be licensed. If you disagree with the word privilege, then call it what you will. But it is not a right.
Just as you have the right to serve food to your family or friends, in your private home, without a license, you can drive your car on your private property, without a license.
But as soon as the public is factored in, you need a license, whether to serve food, or to drive.
3
-
3
-
3
-
3
-
3
-
3
-
3
-
@9:09 -- The flac format supports multiple (lossless) compression levels, including 0 compression.
Presumably, you used your application's default compression value?
My Honda Accord's factory stereo can play flac files, but has a problem advancing to the next song. It takes 3 seconds, which is an eternity -- especially when you are manually trying to jump a few songs forward or backward.
It has no issue with wav files. So I converted all of my music files to the wav format, and my delay issue is gone.
However, the wav format provides next to no metadata. So my car's display will not even show me the name of the artist (it gets listed as "Unknown". And that is all the more problematic, when wanting to search for an artist.
Your video has renewed my interest and might have resulted in my finding a better solution (which I will have to test).
I will convert all of my flac files to non-compressed flac files. My car's stereo might have an easier time with zero compression in the flac format. If that works, I will also have my metadata.
-----
@12:44 -- MQA is technically lossy. But it deletes samples that contain frequencies above the capabilities of human hearing. Even if someone could hear such frequencies, there is basically no musical content at those frequencies.
@14:06 -- Yes, we lose the ability to hear high frequencies, as we age. But lossy formats do other harm to the sound's fidelity -- such as soundstaging.
However, in order to hear the harm, you need a revealing stereo, professionally set-up.
Most people plop down their speakers where they look best. Most rooms have too many reflections / echoes. So for 99.999% of us, we will probably not hear the harm that lossy file formats deliver. But if you have a revealing stereo, with your speakers properly positioned (feet apart from each other, and from you, and from the back wall, and properly towed in, and properly tilted up or down), and at least some basic room treatments, then for such a stereo, you will hear the difference between a flac file, and an mp3 file that was derived from the flac file.
Well, one more caveat.
Most songs have sub-par or nothing special sound quality. So if the studio did an incompetent job, then the format will not matter.
But if you have some properly mixed and mastered flac files, played on a revealing stereo, etc, then you will hear the difference between a flac file and an mp3 file, even if you are in your senior years.
3
-
3
-
3
-
I had reported scam SSD drives (16 TB SSDs for $49), multiple times to Amazon. I called them. I spoke to them. I showed them the exact listings. One representative agreed that the listings were scams, and said that the listings would be taken down.
Two weeks later, I called to let them know that the listings are still up, and customers are still being scammed.
Weeks later, and those same scam listings were still up. Customers still being scammed.
It has now been over a year, and there are countless scam listings, and Amazon does not care. In fact, I believe that Amazon is a co-conspirator in the scam. Amazon benefits from the fees that they collect from the scam sales.
If Jeff Bezos sent out a memo to have scam listings taken down, or mentioned it in a meeting, those scam listings would be gone in 24 hours.
Bezos does not care. It is his company that allows scam listings. This is on him.
3
-
@4:19 "Nothing she said there, was bad"
@3:44, she says "I like everybody"
Either she is not really a conservative, or she does not understand what is going on.
There are "hate America", "hate the police", "hate capitalism", etc, radicals all throughout the Democrat party.
There are also a fair number of RINOs (Republicans In Name Only).
How can she "like everybody"?
We need someone that says "I have disdain for the radical left".
I am sure that she would be better than Gavin Newsom. But we could do better.
It is like when we nominated Mitt Romney. An off-again, on-again, quasi republican.
Hannity was right, when he said, @3:48, "There are people I don't like in life".
3
-
@3:58 "You and I, we're just not that interesting."
Leo, you might have a mayor, or a senator, or a movie star, etc, in your audience. And if an employee who has access to any e-mail account identifies such customers, there is a very high chance (in my opinion) that those employees will look at the person-of-interest's e-mail messages.
If you (our host and this channel's viewers) could view a high ranking government official's e-mail messages, or a famous recording artist's e-mail messages, or the e-mail messages from someone that made headlines for some reason, could you resist the temptation?
I suspect that few people, with such access, would not be able to resist a chance to see the private communications of such celebrities.
I also suspect that employees seek out celebrities that are using their service. Why wouldn't they, if it is a simple matter for them to find celebrities and read their e-mail correspondence?
@5:39 "...and somebody who doesn't use protonmail."
Leo, how can that be?
If one of the parties is using gmail, for example, then the transport between them and protonmail (in both directions) will be in the clear.
3
-
The experts that put together the TOR network, and the TAILS OS, know more than the arm-chair, self proclaimed computer gurus saying that you should also use a VPN.
TOR was expertly designed to keep your internet activities private. Those trying to improve upon what the experts designed are unwittingly introducing vulnerabilities into their on-line activities.
They hear "VPN", and they get a woody. Without understanding how TOR works, and the vulnerabilities of VPN services, they just have a knee-jerk reaction to the VPN acronym, thinking they are putting a vault inside of a vault, when that it not the case.
I bet that most people that combine a VPN with TOR never even heard of the "five eyes".
Those people are putting all of their eggs into the VPN's basket, trusting that the VPN is not logging everything that they are doing. In fact, I bet that those people do not even grasp that their VPN can log and see 100% of their internet activity. They are taking, what would have gone directly to TOR, that no one can see, and first handing it off, in the clear, to some stranger (some VPN) in the middle.
Yes, your connection to your VPN service is encrypted. But it is 100% decrypted before it is handed off to TOR (or any other destination). After your data reaches your VPN, it gets 100% decrypted. Then, a new encrypted tunnel, created by the VPN's server, re-encrypts your data, and sends it on its way.
For privacy, you never want anyone else performing encryption for you. You always should have your own, local computer doing the encryption.
Use a VPN to reach services that are not accessible from your country or your region.
Use a VPN for when you want a presumed level of security and privacy, as well as decent speed (because TOR is slow, but TOR is secure and private).
Folks, if you buy a Ferrari LaFerrari, do not try to modify it the way you would modify a Camaro or a Mustang. TOR is the Ferrari, built and designed by brilliant people. Use it as designed by those brilliant people. Accept that you are not smarter than them, in this regard.
3
-
3
-
@1:16 "Also, they're (Clintons) ancient as f--k. So at this point, prosecuting them would be a moot point, almost"
1) There is the rule of law, and it applies to everyone. Giving such high profile, powerful people a free pass sends a terrible message.
2) Prosecuting them sends a "nobody is above the law" message, deterring others from engaging in criminal activity, based on their status.
3) Put the Clintons through the legal grinder. They did it to Trump, and many others.
4) Whatever time the Clintons have left, let it be behind bars. Why should they get to live in the lap of luxury, benefiting from their life of crimes?
It they had 6 months to live, let them go to their maker with a criminal conviction on their record, for history books to teach future generations that the Clintons were criminals.
3
-
3
-
@13:45
"Honestly, sound quality is not real good."
I agree. Honda put in charge of their stereo department someone that either has never heard a very good stereo or Honda just decided to cut corners with the stereo (or both).
I own the Sport model, and I own a 2003 Nissan Sentra.
The stock stereo in the 17 year old Sentra sounds better than the stereo in the new Accord.
Honda has the resources to do a better job. They could have, should have, but did not.
The problem with the stereo is that the Accord never lets you forget that you are listening to a mechanical device.
On a better stereo, the music is a wall of sound. On the Accord, you hear individual speakers. It is not terrible. But it is nothing close to special.
On a better stereo, you get a very good soundstage and very good imaging. You get depth of instruments and voices (if it is in the recording).
On a better stereo, the speakers disappear. Your ears cannot locate the position of the speakers.
The Accord's stereo falls short on all of the above. And it is a shame, that this otherwise amazing car, with all of its performance, looks, reliability, fuel efficiency, quality paint job, etc, is bundled with a so-so stereo.
To get the best sound quality out of the stereo, you should purchase .flac files (never .mp3 files), copy them to a flash drive, and plug the flash drive into the USB port.
Note that not all .flac files sound the same. The exact same song is often available on the original release, greatest hits, best of, anthology, compilations, and endless re-masters (re-masters usually sound worse, due to over-processing by knuckleheads at the recording company). Sites like us.7digital.com offer demos that are a good indication of how the purchased files will sound. If you choose carefully, using speakers that are decent, you can pick out the ones that sound best, and end up with a much better sounding music collection. This will help wherever you play music, including in the Accord.
Cheers!
3
-
3
-
3
-
3
-
3
-
3
-
3
-
What I find troubling is that we never hear closure to these breaches.
-- There are logs, galore, that computers keep.
-- There are logs, galore, that tech companies use for physical access to secure areas.
-- There are videos, galore, of all sensitive (physical) work spaces.
Yet, we never hear that [First Name] [Last Name] has been arrested and charged with [Crime Name].
We never hear that [First Name] [Last Name] has been fired.
We never hear how someone was able to access the supposedly secure records.
From what location did the suspect perform the illegal act?
Did they have remote access to obtain the supposedly secure records?
Was there encryption with the supposedly secure data?
If yes, then how did the suspect bypass or break the encryption?
If no, then why was there no encryption?
It is beyond the pale that such wildly serious crimes are committed, and aside from hearing about them, we are never told who did what and how.
Who was fired? Who was charged with a crime? What was breached? Was the crack in the system sealed? Or will the same thing happen again?
We basically know nothing, and that is almost as disturbing as the crime -- and is, perhaps, itself a crime (a cover-up).
3
-
3
-
1) Both of them should be arrested.
The driver, for being intoxicated.
The passenger, for obstructing the officers during a traffic stop. After she got out of the car the second time, the officer should have warned her that if she gets out, again, she will be arrested. After being arrested, and putting her in hand-cuffs, in the police vehicle, the level of drama would have gone down. She could sit in the police car and scream all she want. At least the officers could focus on the driver, without having to worry about the passenger.
The officers cannot let down their guard when someone at the scene is out of control. And, yes, that passenger was out of control. When the police tell you to stay in the vehicle, and you repeatedly refuse to stay in the vehicle, then you are out of control.
She did not throw punches. But when someone refuses to follow police orders, the police have to assume that the person is dangerous, even if they are in a bikini.
2) Both of them (especially the passenger) are in for a life of sorrow. If they do not use their looks, now, to make themselves millionaires (and hire someone to handle their finances), then they will be on public assistance by the time they are 30 years old.
No man is going to put up with their crap, once their looks are gone. And as far as looks go, they are average (maybe a bit higher than average). They are in decent shape, due to their age and natural metabolism. 100% certain that they will be obese by the time they are 35. Combine that with having no respect for themselves or others, and they are done. Right now, boyfriends put up with them for pump and dump. As their looks wane, they will wake up to the reality that everyone that pretended to like them, did so due to their physical attributes.
3) in approximately 10 years (or less), when their youth can no longer save them, they will blame the world for their despair. Nothing will be their fault. Nothing will be their life choices.
If others are to blame, it is big tech and media outlets for encouraging them to act as they do. But ultimately, it is their own fault. The fun and games have a few years remaining, and they do not know it.
If they ever come to realize that they never grew up and never chose to act responsibly, it will be too late.
3
-
3
-
1)
I purchased the exact same drive, a few months ago, when Best Buy had them on sale for sub $100 (I think it was $95).
It works fine. But I hope I never need warranty service.
2)
WD makes it next to impossible to get warranty replacements. They throw up every imaginable roadblock, from alleged ticketing system issues, to "We will send your replacement out next week" (and that line is repeated, week after week), to waiting ½ of forever for a human to answer your call, to navigating their "press 1, press 2, etc", phone ecosystem, requiring more than proof of purchase documentation, etc.
It is a nightmare, that many people will simply just not deal with an buy a replacement.
Seagate is the opposite (a pleasure to deal with), and they offer free data recovery for drives under warranty (not sure if all drives have that offer -- check your warranty). And they put your recovered data on a different drive. So you get your warranty replacement, and you also get whatever they recovered on yet another drive -- and you keep both.
But WD drives are dependable. So I rolled the dice with this WD 5TB Elements drive, due to the sale price.
3)
By the way...
I do not delete the included software (it takes up very little space). If I ever re-sell the drive, having that software can only help.
I tuck it away into a "new_in_box" hidden directory, so that I don't have to look at it.
4)
Note that the speed tests results will get slower, as the drive fills. It is the nature / design of mechanical drives.
It seems that mechanical drives initially write to the outer portion of their disks, which, per rotation, have more real-estate, compared to the inner portion of their disks. So when the drives is ½ filled, your read and write speeds will be somewhat slower.
5)
@9:25 -- Perhaps it is due to the thickness of the drives?
That 5TB Elements drive has more platters than their 2TB drive, making the 5TB model thicker, and a possible issue fitting them into laptops (which is where most 2.5" mechanical drives end up).
3
-
For those who are not aware...
TikTok, used by China's population, is the opposite of what we are shoveled here in the USA.
In Chia, it is an educational tool. All of the filth and debauchery fed to USA's teens is absent for TikTok's teens in China.
----------
On the topic of banning TikTok in the USA, that is great, if the bill was specific for TikTok.
But it is only a matter of time when another radical leftist gets elected into the presidency, and then tyranny will strike all conservative social media.
As bad as TikTok is, the bill, in its current form, will be far worse for America in the long run.
The conservatives in congress should write a TikTok specific bill, with no wiggle room for abuse with other social media platforms.
Radical leftists have shown us that they will lie, cheat, and steal to win elections and turn us into a communist country. With the current bill, they will 100% use and abuse it, against free speech.
3
-
That officer meant well, but he put a dangerous driver back on the road. If she pulled out, and injured someone, that would be not only her fault, but the officer's fault, too.
Law enforcement had a dangerous driver, with a history of dangerous driving, and he turned her loose on the road to continue driving dangerously.
That car's registration has been expired, and she knew.
And she does not have a valid driver's license. It is insane to let her drive away.
Yes, she was polite. That counts.
But if you or a loved one gets crippled or killed by her, then so much for her politeness.
And she is far more likely to cause a serious injury, compared to other drivers, because...
...not only was she speeding, she was speeding with a doughnut tire on the car.
It is only a matter of time before she causes serious injuries or death. She is a driving hazard.
At a minimum, the officer should have towed her car, or had her call someone with a license to drive.
But due to her history of clearly flaunting motor vehicle laws, she should have been arrested.
Every time she is caught driving without a license, she should be arrested.
The officer let her off easy, and it will do nothing, whatsoever, for her reckless driving habits and contempt for safety and motor vehicle laws.
You should not coddle people that repeatedly piss on safety and piss on the law. You should never reward such people for the above.
3
-
Professor Asao Inoue is a fully fledged, anti-American, racist, Communist.
He pulls some punches, because he knows that normal people will slap him down -- and so he inches his way towards all-out Communism and all-out war against white people.
Asao Inoue is a degenerate, and he corrupts young, impressionable minds at schools. He hates America. He hates freedom.
Asao Inoue is everything that is wrong with politics and education. When you hear people complain "They this", and "They that", complaining about the ills of society, well... Asao Inoue is the face of "They".
High crime, illiterates graduating, hating ones country, degeneracy, etc, are all due to Asao Inoue and others like him.
3
-
Our host has great political insight. However, he still does not grasp the depravity of the radical left.
The radical left does not obey norms and standards. They do not obey the law.
When President Trump arrives in New York, do not put it passed the radical left New York government to arrest President Trump, and put him in handcuffs, on TV.
No matter what they promise President Trump, it means zilch. They will promise President Trump anything, in order to show him being cuffed and put into a police car.
As to the Secret Service. They report to the United States Attorney General, and he is a Trump-hating, radical leftist.
The radical leftists have thrown due process out the window, for the January 6th defendants. They will do the same for President Trump, and nearly all of the usual (fake) news outlets will explain why it is acceptable for President Trump to be denied constitutional rights.
3
-
3
-
I was choosing between the Nissan Altima (SR / VC-T SR), Toyota Camry (TRD), and the Honda Accord (Sport 2.0).
The common theme was the sportiest ride (the firmest suspension in each of the lines, resulting in the best handling / cornering).
All had 19" wheels (largest offered for each model) and low profile tires (minimal sidewall for improved handling).
All three cars handled great (for a family sedan). I was especially surprised at the Camry. In years past, it was always a soft cushy ride.
But as good as the Camry handled, it came in last place, because both of the other cars held turns better. Someone at Toyota just was not ready to commit the Camry to the full handling that it could have had. They went in for a sporty ride, but they went in only 80%. I guess that there is a segment of the population that will find this to be a good compromise (but not for me).
It was a tough choice between the Altima and the Accord. At first, I thought that the Altima handled better. I pushed it hard around a turn, and it took it like a dream. But when I pushed it harder, although it maintained control, and stayed planted, it made a grinding sound. In all fairness, almost no one will ever take a turn that hard. But taking such a turn is how to demonstrate the limits of each vehicle's performance, and discover which car will get you out of a jam if you have to act fast to avoid an accident. But I really liked the Altima's handling. I was very impressed.
In the end, I purchased the Accord. Here's why:
The Accord's handling was comparable to the Altima's handling (grips the turns much better than most folks would ever try). And I even preferred the way the Altima went into a tight turn, over the way the Accord went into a turn. But once taking the turn, the Accord, ultimately, never flinched. It seemed like it needed a little more finesse to take a hard turn correctly. But it got the job done.
The other game changer was acceleration.
All three cars had very good acceleration. But the Altima was a pig off of the line (the very good acceleration kicked in only when going approximately 20 MPH or faster).
Nissan chose to detune the Altima from a stop, either for safety, or fuel economy, or who knows? Maybe the Altima's traction control is at fault (and there is no way to turn off the Altima's traction control).
The Altima's acceleration from a stop would not normally be a problem for day-to-day driving. But if, for example, you are in the left lane at a light, and you realize that you need to make a right turn at the next light, then you can forget getting ahead of the car to your right. You can stomp on the gas pedal, and the Altima will take its time. This was too much to overlook for a car in this price range, and especially a in car designed for a sporty ride.
By the way, the stereos in all three cars are so-so. My 2003 Nissan Sentra has a better stock stereo. The manufacturers could have and should have done a better job. Either they all went to a meeting and jointly decided to cut corners on sound quality, or they all had someone in charge of the stereo department that never heard a quality stereo. Whatever the reason, they all dropped the ball on the sound quality of the stereo.
Cheers!
3
-
3
-
@ebinom8112 I would not go near a password manager that is bundled with anti-virus / anti-malware software.
In fact, I would try to remove every trace of any 3rd party's anti-virus software. Why?
Read all of the stuff you are mandated to agree with. Read it all. Every link, and every link from that link.
You will find lots of language that basically gives that company unfettered access to your computer (which it needs, to scan everything), as well as permission to do anything they want with anything on your computer.
You are giving them permission to spy on it all.
Are they? Who knows?
Who knows what information they upload to themselves, and sell to others (you give them that permission, too).
The is no way I would give them permission to manage passwords for my accounts.
They might be trustworthy and do a great job. But it is all guess-work.
If they have a data breach, will it matter? You have no way to know how they store your passwords on their servers (which they probably do). You have no idea whether or not they have a master key to see all of your saved passwords.
And what if, one day, you decide to use some other company's anti-virus software?
How do you deal with your passwords that are on the now, defunct, old password manager's anti-virus environment?
All of the above are not an issue with LastPass and keepass.
Also, as good as an anti-virus company might be, are they equally skilled in password encryption and password management?
By the way...
Windows Defender is all you need for anti-virus, and anti-malware.
Other anti-virus software might have some benefit. If you cannot identify what that benefit is, then it probably does not exist or does not merit consideration. In light of the troubling language in anti-virus agreements, I can think of no password related benefit that would make me consider using it.
I recommend Windows Defender + LastPass, or...
Windows Defender + keepass.
I believe that LastPass has better automation for conveniently logging you in to your accounts. keepass is good at that, but probably not as good as LastPass.
But both LastPass and keepass are rock solid, safe, and virtually invulnerable to a breach (if you use a strong master password).
If your LastPass or keepass data gets breached, it will not be due to a design flaw in their code. It will be due to user error / user carelessness.
3
-
3
-
Using a 3rd party cloud service is giving your personal data to complete strangers.
If your data is such, that if viewed or scanned or profiled by complete strangers does not matter to you, then upload your data to them.
If you check the agreement you are required to accept, to use the 3rd party cloud storage service, you will see a sea of legal jargon.
Within that jargon, you will see that any data you upload to them becomes owned by them.
If you encrypt your data, locally, and then upload it to them, then the data remains useful only to you, while they will retain/own a copy of your data.
For those not willing to share their personal data with strangers (as described above), then I recommend that you have two external drives (our host discussed this).
You can keep one in your home, for easy access.
You can keep the other one with a friend or neighbor (in a different building would be best).
But can't your friend or neighbor see your data?
Use VeraCrypt. It is free and open source. It allows you to easily make an encrypted virtual drive on your external drive. 100% of whatever you copy to that virtual drive will be encrypted. No one, other than you, can view its contents (assuming you do not use a simple password).
Once you enter your password, you can use that drive's data like any other drive.
Now you have your data in multiple locations, and it is encrypted to keep it private, and yet easily accessible by you.
If you have a "Pro" version (or higher) of Windows, then you can use Bitlocker (instead of VeraCrypt). Bitlocker, however, is not open source.
Folks, Microsoft, Google, etc, are huge spyware companies. Sure, they make great software. But they track everything that you do, and build profiles on you. Do you really think that when you upload your data to them, that they do not index it and scan it and offer some level of your lifestyle to advertisers or political organizations or government entities, etc? If they can cash in on it, they will cash in on it.
Yes, they make it simple for you to upload your data to them. Why not? They want your data. They count on be super convenient to get the public to upload their lives to them.
But with just a bit of effort, using your own external drives, and an on-the-fly encryption program (VeraCrypt / Bitlocker), you can keep your data as your data.
3
-
3
-
3
-
3
-
@4:23 -- USB -> SATA adapter.
For a few dollars more, you can get one that supports 3.5" mechanical drives, because for those drives, you need an external power source, which you get with the slightly more expansive USB -> SATA adapters.
And you do not have to use the included power supply, if you are using a 2.5" drive. It will work the same as the one in your video.
But if you need to connect a 3.5" mechanical drive to a USB port, then you will be able to do that, too, with the ones that include the (optional) power adapter.
If you are traveling, then that would be one more thing (the power brick) to carry around. But you do not need to carry around the power brick, if you have no intention of using the adapter with a 3.5" mechanical drive. Of course, I keep my adapter and it power brick together, because once separated, it is like trying to find that missing sock. I also put a label on the power brick, so that if it does ever turn up and I have no idea what it is for, the label will clear up that mystery.
I would like to find a USB -> (68 pin) SCSI adapter.
I have searched high and low. They simply do not exist.
I have several old SCSI drives (68 pin, 15K RPM) that I would like to erase, before selling or dumping. It seems that I will need to purchase a PCIe adapter for SCSI drives. I am having trouble finding that, too. Argh!
@5:30 -- Ethernet everywhere.
For a few dollars more, you can get one that doubles as a hub. So you get the Ethernet connectivity, just as you demonstrated in this video, without losing a USB port (because the adapter will have 2 or 3 of its own USB ports).
3
-
This was informative. But I see the following issues, that perhaps someone can speak to:
1) I saw $millions in equipment, with no focus on sound quality (I will address the listening test that we saw @10:18, later in my comments).
2) From where was the digital content, used for the process, sourced?
I realize that the vinyl factory will produce records from any digital file that the customer pays them to produce. But it would be nice to know from where that content came from (who made it, and with what equipment?).
3) How was the digital source file turned into an analog audio signal for the cutting machine to produce the lacquer disk?
For example, when you play a CD, your CD player creates sound from silence, by reading the zeros and ones on the CD, and then uses its built-in DAC (digital to analog converter) chip to create (from silence) the sound that eventually makes it to the speakers.
So what DAC chip was used? The sound quality can vary, wildly, from DAC to DAC.
What power supply was used (power supplies are critical and have a major role in sound quality, and can cost nearly ½ of the price of the DAC).
Also, what transport was used?
The transport is what sends the zeroes and ones from the computer to the DAC. A quality transport will minimize jitter (jitter is when the zereos and ones have non-perfect timing in their arrival at the DAC).
When you hear digital content played via a quality transport box (they make such stand-alone boxes for achieving outstanding sound quality), you will hear the music blossom. Once you use such a transport, you will always hear jitter when using mass produced equipment, such as most CD players, portable equipment, and car stereos.
Was a USB port used?
USB is the last comm port you should use for achieving the best sound quality.
The USB controllers on nearly 100% of computers are not designed for sound quality.
Yes, it is all zeroes and ones. But the timing of the delivery of the bits, and the noise introduced by the circuitry, have a major impact on the sound quality. The USB cable matters, too.
4) Considering the investment made at that factory, they allocated next to nothing (as a percentage of their capital) to the turntable, tone-arm, and cartridge used for the listening test. We did not see the speakers, so I will assume that they are low-end, mass produced speakers. I will also assume that the speakers were not professionally set-up in a treated room, in order to hear proper sound-staging, depth, height, imaging, etc (all critical to the soundfield you will hear when you play the record on a quality stereo system).
I am confident that I am correct about the speakers, because if they were high-end speakers (and for this process, they should be high-end speakers), then they would have included them in the video. I doubt that the speakers were even mid-fidelity. Perhaps they were Bose?
And we did not hear what was being played by that record.
They dropped the stylus on the 2nd song. A few seconds later, while that song was still playing, the video showed the stylus on the 4th song.
So they were actually playing the digital file that we watched @0:54.
That was deceptive.
The above is why so many records have sub-par sound quality.
$millions are invested to produce the records, with next to nothing invested to hear how they really sound.
I would wager that no one at the pressing plant (not even the executives or the owner) has ever heard a professionally set-up, high-end stereo. So they might actually think that their records are fine. And they might be great. But that would be luck, because no one at the factory does a proper listening test. And that includes whether or not someone knew how to professionally set-up the tone-arm and cartridge used in that turntable. These are all key to achieving outstanding sound quality, and all of it was missing from this video.
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
Why are the police (the ones stealing from innocent people) not arrested and charged with stealing?
What if the police were to go into a bank, and proclaim "Civil Asset Forfeiture"? Is the only difference that the bank has attorneys?
The police have no "we are above the law, therefore we can steal" card.
If the police went into Walmart, and stole the cash from the registers, can they claim "Civil Asset Forfeiture"?
The police swear an oath to uphold the law. And yet they are committing theft, under the guise of "Civil Asset Forfeiture".
Are the District Attorney's getting their "cut", so that the DAs will not prosecute the criminal element within the police department?
I do not see why the courts need to get involved, unless it is a grey area with a specific case of forfeiture.
But when the police pull over a car for a busted tail light, or 5 MPH over the speed limit, and they then steal thousands of dollars from the driver, then what do the courts have to do with that, when there are laws against stealing money?
I you stole thousands of dollars from a driver, could you claim "Civil Asset Forfeiture"?
3
-
3
-
3
-
3
-
Budweiser might be able to save themselves, if, and only if, the CEO resigns.
But he will not, because he is woke and narcissistic. He is digging in his heels.
Their parent company, Anheuser-Busch, is no different. They did not fire Budweiser's CEO.
All of Anheuser-Busch's brands should feel the same financial pain as Budweiser.
Note that any apology will not be sincere. It will be out of financial desperation. And if the public accepts their apology (assuming they offer one), then Budweiser wins. Back to business as usual.
No one got fired. A leave of absence keeps you on the payroll. The leave of absence will end, and the personnel will be back -- perhaps under a new executive title.
So all of Budweiser's actions are them doubling down on their woke, radical leftist agenda, and standing by their woke, radical leftist VP of marketing.
3
-
3
-
3
-
@ExplainingComputers Encouraging people to reach for less than participation trophies is conditioning them to have pointless, useless goals.
Encouraging people to SPAM the comments leads to more and more SPAM.
I know it feels good to pat people on the back and say "Good job!".
But doing so, when they have accomplished absolutely zero, is counter-productive.
Doing so dilutes the "Good job!" praise on others, for when those others actually do a good job and earn their praise, for something meaningful. When you tell anyone "Good job!" for any pointless task, then "Good job!" no longer holds any meaning.
Yes, give encouragement. But do so for something worthwhile. Even if it is for simple tasks. As long as it guides people to better themselves.
I know of know no school, class, tutoring program, computer based training, help center, volunteer organizations, social programs, government programs, etc, that promote "First" comments as a sign of upward movement or progress of any kind. It is rewarding inanity.
With 750,000 subscribers, you have influence. Please use it to recognize and reward actual deeds, and not encourage a false sense of accomplishment.
Cheers!
3
-
3
-
3
-
3
-
How long is nearly impossible to determine.
SSDs are rated, by the manufacturer, with a TBW (terabytes written) value. When you reach that number, monitoring tools will warning you that the SSD is in bad shape, or might fail, etc. Don't believe it.
The TBW value is used by manufacturers to deny warranty claims. The SSD's controller keeps a log of how much data was written to the drive. When you exceed the (arbitrary) number provided by the manufacturer, you simply can no longer expect any warranty service.
You can probably exceed the TBW value by 10x or more
In Chia crypt-o mining, it is popular to use an SSD as part of the process. People have been writing 24/7/365 to their SSDs for 3 or 4 years, without rest, and their SSDs still run at full speed. Of course, proper cooling contributes to such heavy use (heat kills).
I have never heard of anyone wearing out the SSD. If their SSD failed, it was probably due to either a power surge, overheating, or some manufacturing issue.
The other reason why manufacturers include a TBW value is because plenty of people will see a warning when they approaching that number, and will purchase a replacement SSD (even though their supposedly bad SSD would likely lived on for decades).
To my knowledge, SSDs do not slow down with age or years of use (perhaps if you really ever do wear it out, it might slow down).
3
-
3
-
3
-
3
-
3
-
@0:44 "How long is the wall?"
How long was it before President Trump took office.
How much did the Democrat controlled congress allocate for the wall?
$0.
When President Trump used the military's budget, he was stopped by the courts. President Trump obeys the rule of law. He obeyed court orders.
@0:53 "He promised to appeal ObamaCare"
Even with a Democrat controlled congress, President Trump eliminated the mandate. It was the mandate that forced people to buy insurance. President Trump ended that.
@1:02 "The debt went up higher".
That was due to our military's equipment being in shambles. The air-force could not get replacement parts. So once a plane was no longer able to fly, they cannibalized that plane for its remaining parts, to fix other planes.
Every one of our military's services was in a state of disrepair, as China and other adversaries were growing their military.
For over a century, we ensured that our military would win in two, simultaneous, wars. That was no longer the case.
It took trillions of dollars to get our military on its feet. That is what raised the debt. And then a Democrat president gets elected, and they wreck the military, again. And so the cycle goes.
@1:42 "Again. I don't want to take sides", right after he lied about President Trump's record.
Frank Luntz must have been paid a sweet sum to go on TV and claim that President Trump is a loser.
I used to trust him. Never again.
3
-
3
-
Steve, men that claim to be women, are not women.
So countless people will intentionally call those men "men".
Men that insist that they are women, will claim that they are being misgendered, when, in fact, they are being correctly gendered.
So that colleague that you work with, where you (a normal person) refuse to call that man a woman, will be considered to be harassing that man for repeatedly call that man a "man".
That cross-dressing, woman impersonator will claim to be distressed (and maybe they are?), and claim to be harassed, etc.
Someone's mental illness, believing that they are not who they are, can result in normal people being charged with a hate crime.
And although the bill does not contain pronouns, it is a step towards a future bill that will.
There are men that fake being women, to cheat, and to sexually harass women in locker rooms and bath rooms, etc.
There are men that have mental illnesses where they believe that they are women.
Society should not have to cater to the above, in any way, whatsoever.
Society should not have to alter reality, by calling men "women", in order to not be charged with harassment.
In fact, if someone called you (our host) a woman, and refused to call you a man, should they be charged with a hate crime for harassment?
People can call me anything they want. Will I be offended? Perhaps, but probably not. Would I ever seek to have them charged with a crime? Absolutely not. That would be insane. That would be joining their clown world.
Sticks and stones will break my bones, but names will never hurt me.
Apparently, a segment of transgender people have convinced law makers to criminally punish people when sticks and stones are absent.
3
-
3
-
The correct answer is not:
-- an executive order, because it is illegal to do what the Biden's justice department is doing. We do not need an executive order, that orders the justice department to stop breaking the law.
The correct answer is:
-- Order the attorney general to have every person from the justice department, that broke the law, to be arrested and charged accordingly.
Have a massive investigation, like our country has never seen. Catch all of the law breakers.
That is the only way to end the corruption at the justice department, and it is the only way to let future DOJ personnel know that they might not get caught for years, but eventually they will find themselves in prison if they, too, think that they are above the law, and abuse their power against political opponents.
3
-
3
-
3
-
3
-
3
-
When you take photos with a smart phone, it likely saves all types of metadata, such as the date, time, and location, etc, of the photo (or video).
After you upload those photos to facebook, it might not retain all of the metadata. I do not know if that is the case. It is up to facebook to choose whether or not to retain all of the metadata. If facebook discards that metadata (or a portion of that metadata), then your download of your photos might not include that metadata.
With a 2 TB portable USB drive costing $69, then short of someone having severe financial troubles, there is no reason to not save a copy of your photos and videos to such a drive. And 2 TB is probably overkill for most people. A 1 TB drive will cost $15 less than a 2 TB drive.
Allowing 100% control of your only copy of your memories to be in the hands of complete strangers (the facebook personnel) is reckless. Wouldn't you sleep better knowing that you have a copy of it all?
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
2
-
@joeybf Standards for (example) of where a car's break pedal should be is non controversial. But for encryption, and especially a standard that the world will use for every manner of computer security, falls under an entirely different level of scrutiny.
Governments, with their bottomless resources, will dedicate huge resources to breaking the code or finding any weakness in the code.
This is likely true for huge companies, too (Microsoft, Apple, Facebook, Google, Intel, etc).
All of the above would love to own a secret to compromising AES. That is why it is important to keep and support other competitors to the AES standard (not have all eggs in one basket). It is likely that many businesses will not trust AES, over the concern that their government might have a way in. It is why I asked my question in my initial comment.
Cheers!
2
-
Everything our host discussed is spot-on accurate, including the "trust" factor, because your VPN provider can see and log 100% of your activity. They can see everything in the clear.
And even if a VPN service claims that they keep no logs, you have no way to validate that claim.
And a VPN service could be handed a court order to keep logs, along with a gag order to not reveal that they were ordered to keep logs.
Also, several countries have reciprocal jurisdictional agreements, where they cooperate with each other. Search for "5 eyes" and "14 eyes" for more information. Each "eye" is a country that cooperates with the other eyes in its grouping.
If you want to avoid having to trust any VPN service, then use TOR (The Onion Router) network.
TOR is open source (no hidden shenanigans), and when used properly, is the most secure type of VPN that is available, because it was designed from the ground up to allow you to be as close to 100% anonymous as possible.
TOR is free, but not possibly compromised the way a free VPN service probably is. If you learn about TOR's design, you will understand that, when used properly, you will remain anonymous to every computer on TOR network. Your Internet Service Provider (ISP) will know that you are using TOR, but that is all that they will know.
But it is not all lollipops and sunshine.
TOR is slow. It relies on bandwidth from many computers, and that bandwidth is shared by everyone using TOR. Also, depending on how your connection is established, your connection might be travelling back and forth across continents, which is common.
If, for example, you need privacy and security to be a whistle blower, or are in a country that jails people for routine internet activity, then TOR is a good choice.
But if you need speed, then forget it.
Also, countless businesses know all of the TOR exit nodes (where your request leaves TOR network and heads to the final destination). So countless businesses reject connections from TOR based addresses. Those businesses do not want anonymous people using their sites, mostly due to criminal activity.
Also, in order to use a web browser with the most security, you must use your browser with JavaScript disabled (JavaScript is what makes your browser highly interactive with web sites). So when you use your browser without JavaScript, then whatever sites you are able to connect to will seem crippled.
You can use TOR for all of your internet activity. Or you can use only the browser (which is probably what 99% of people do). As such, you would have to download TOR browser (a custom Firefox version). I would provide the link, but youtube rejects comments that have links.
Search for TOR browser, and it should be the first hit and it should be a site that ends with org.
So if you do not want to trust a VPN's service or pay for a VPN's service, and your activity is minimal, then TOR might be a good choice.
Safety and convenience are not an easy marriage.
2
-
2
-
2
-
2
-
2
-
Leo, very good explanation.
I will never use OneDrive, or any 3rd party data storage service, because they can (and very likely do) scan and / or index your uploaded files and build a profile on you.
I do not share my files with complete strangers -- and the personnel at Microsoft are complete strangers.
If I should ever become a person of interest, I lay 100 to 1 odds that Microsoft (and all the other 3rd party data storage services) will have all of my uploaded data, even data I deleted years ago. Whatever anyone uploads will forever remain on their servers.
The only two exceptions where I might use a 3rd party data storage service are:
1) If I were to encrypt my files, locally, before uploading them.
2) If I want to have convenient access to those files, across different devices, and those files have no privacy or security tie.
Your video made it clear on what takes place, and is very helpful.
2
-
2
-
2
-
@3:53 "But flash drives, because they are typically so much faster, it's probably okay."
There are loads of low-end flash drives.
For example, Micro Center gives away free flash drives (they periodically e-mail coupons). Those flash drives are sometimes 8 GB, 16 GB, and 32 GB.
No purchase necessary. Bring in the coupon, and they hand you the free flash drive.
Well, those flash drives have piss-poor performance.
Some of them are below 20 MB/s for write speed. That is far below any mechanical USB drive. I had one that averaged 5 MB/s on writes.
Read speed was better (but nothing special), at 50 MB/s. But it is the write speed that counts, when it comes to safely removing the flash drive.
And those Micro Center branded flash drives are not alone. Transcend and Verbatim have inexpensive, low-end flash drives that are slow. And I am confident that other brands also have slow, low-end flash drives. There are countless millions of them in the hands of the public. So it is not a one-off, "don't worry about it" scenario.
Windows 10 (and probably other versions) has a setting that will not buffer writes. That means that you can pull out the flash drive, when Windows tells you it is done saving your file.
The above option is located under "Computer Management". So search for "Computer Management", and right-click it, and choose to start it as an administrator.
When Computer Management opens, you will see a branch, on the left-hand side, for "Storage". Under the "Storage" branch, you will see "Disk Management". Click that.
From there, you will see, on the bottom half, a list of your disks (a flash drive will be included as a disk).
You will see "Disk 0" (your boot drive), followed by "Disk 1", etc.
Right-click on the section with the word "Disk 1" (or whichever disk number is your flash drive). That column is different from the section to its right.
Next, click click on "Properties" (for that disk).
One of the "tabs" you will see is "Policies".
Under the Polices tab, you will see a "Removal policy" section. That is where you can choose between "Quick removal" (which on my boxes, is the default), or "Better performance", which is where buffering comes into play, and "Safely Remove Hardware" becomes necessary.
Note that "Safely Remove Hardware" is not there strictly for ensuring that all data is done being written to the drive. There is another reason for using "Safely Remove Hardware".
You might have opened a file, that resides on your flash drive, and you forgot that you have that window open (perhaps you minimized that window?). If you yank out the flash drive, while you have unsaved changes to your file, then you will have an issue to deal with, the next time you try to use that file. It might be corrupt, or it might simply not contain your edits. Or the application you were using might have created tmp files that it could not clean up, due to you yanking out the flash drive. But if you are certain that you are not accessing anything on that flash drive, then you can yank it out.
2
-
2
-
2
-
2
-
A few items that folks might find helpful:
1) Windows (versions 10 and up, I believe) comes with a Quick Assist program, that works much the same as what we saw our host demonstrate in this video.
It requires that the person providing the assistance to login to their Microsoft account. The person requesting help will run Quick Assist and give the helper the access code, etc.
So both parties will run Quick Assist, but only the person providing the assistance will need to login to their Microsoft account.
One other benefit of Quick Assist is that the person seeking help can choose whether to allow the helper to have full control of their computer, or only see the screen of their computer.
So if you want help from someone, to have them guide you, and you feel safer by not giving them control of your computer, you can use Quick Assist to grant them viewing access only, or you can grant full control access, whichever you prefer.
2) Google is the largest spyware company in the history of the world. I recommend that none of their products or services be used. There are good alternatives for all (or nearly all) of their offerings. I am guilty of using youtube, which is a google service.
3) When you install a browser extension, it adds an element of uniqueness to your specific browser, and lets google and and other trackers uniquely identify your on-line activity.
4) Remote Desktop is not defined in this video the same as the Remoter Desktop that is bundled with all versions of Windows.
Pertaining to the Remote Desktop that comes bundled with Windows:
The client side of Remote Desktop is enabled (available) on every Windows installation (that would be the person providing help).
The server side of Remote Desktop is enabled only on Pro versions (and higher) of Windows (that would be the person seeking help.
So how does the Remote Desktop that is bundled with Windows differ from what was demonstrated in this video?
With the Windows bundled Remote Desktop, the client side grabs the screen of the server side, and (this is key) it also locks the server side's computer.
So, for example, if you are home, and you want to use the computer at your desk, which is located at your employer's building, you can safely do so, and not worry that someone might walk past your office desk and see what you are doing. They will see a locked screen.
So the built-in Remote Desktop that comes bundled with Windows functions differently than the Chrome verity that was demonstrated in this video.
If you have a Microsoft account, then I recommend that you not install google's remote desktop browser extension. Just use Microsoft's Quick Assist. It works well. However, Microsoft is also a huge spyware company. But at least you are not tinkering with browser extensions. The more you clutter up your browser, the more trouble you might encounter.
2
-
2
-
Leo, Microsoft calls the so-called feature "Back Up", because if they labeled that feature by an accurate title, they would have to call it "More fees for Microsoft".
OneDrive used to be about the user choosing what to store on-line with Microsoft's OneDrive tool. But some unscrupulous Microsoft executive decided to fleece millions (perhaps billions) of people by designating other folders to be synchronized, resulting in millions of people instantly exceeding their on-line storage quotas, and if even a small percentage of those people pay Microsoft for an increased quota, then Microsoft runs to the bank.
How simple, and devious.
"Hmm. Where would most people have loads of files -- large files? How about 'Documents' and 'Pictures'? Yeah, that's the ticket."
So without user's expressed consent, Microsoft makes copies of your documents and pictures (that you never intended to share with them), and to add insult to injury, Microsoft charges you a fee for their pilfering.
And I do not consider "consent" or "expressed consent" when someone does not hire a lawyer to read a War and Peace agreement where, on page 72, Microsoft unilaterally declares and defines "expressed consent".
Leo, this is a good example of why Microsoft (and other big tech companies) should not be trusted with your private documents. I am convinced that they run algorithms on your private documents to build a profile on you. Why not? It is simplistic for them to do so. There is money to be made by them knowing more about you than you know about you. Considering that they pull this OneDrive quota scam, then it is consistent to conclude that they scan everything of yours that they copy to their servers.
Microsoft makes copies of your private files, without your expressed consent, charges you a fee, and mislabels it all as "Back Up". There is simply no way to trust Microsoft's executives with any private documents. Never use a Microsoft account.
And are billions of people, the world over, supposed to understand the maze that Microsoft has set-up? Of course not. 99% of the world is not tuned in to channels such as yours. They have no clue how to avoid the OneDrive pitfalls, and Microsoft knows that and preys on that.
Never share private files with Microsoft. Do not use a Microsoft account. And Microsoft makes that next to impossible, when creating a login, for all but tech-savvy users.
This video was very informative. How could the general public possibly understand what Microsoft is doing with OneDrive?
2
-
Pre-internet, the only way to sign a petition was to use a pen, in person, with the person collecting the signatures.
If someone collects thousands of signatures, the old fashioned way, and delivers that to the intended party, that shows determination, unity, and organization. That will also convey authenticity, as physical, hand signed signatures do not fall out of the sky.
The above will be an eye-opener for the person to whom the signatures are handed.
On-line petitions convey laziness on the part of whoever collected the signatures (and lacks validation), and will likely not motivate the intended party to give it much weight.
2
-
2
-
2
-
2
-
2
-
2
-
2
-
If your computer is slowing down, it is likely due to you accepting offers when prompted to do so, and installing things that catch your eye.
There are ways to do the above, without slowing down your computer (at least, not slowing it down for long).
If you are someone that likes to explore and install numerous applications, and numerous browser add-ons, etc, then do so in a virtual machine. Several very good ones are free, and open source.
For day-to-day, routine tasks, I have been using a first generation i7-950 since its debut, approximately 15 years ago. I have never had issues, because I do not take risks.
If I want to explore, or see how an application works, or test anything, I run a virtual machine. Doing so sandboxes that activity within the VM. And restoring the VM to the state it was in, prior to monkeying around, takes 1 second.
On my i9 computer, I also use virtual machines, because I have more RAM. I can run multiple VMs, and they do not see each other, and they keep my activities segmented / compartmentalized. It is virtually identical to running multiple computers, each one for a specific purpose, and only that specific purpose. And the beauty of doing this with VMs is that you can undo your mistakes or reckless actions in an instant, with a VM. VMs allow you to take snapshots of the VMs state. You can very quickly return to one of those states.
Also, if you want to tinker with Linux or any other OS, VMs are your ticket for doing so. You can run just about any OS under the sun.
You have something that worked with Windows XP, then run Windows XP as a VM. No need to worry about not getting updates for XP, as when you are done having fun with your XP VM, just clobber it and it will return to the state it was in before you used it. Get a virus, or worse on a VM, just restore the last snapshot, and you are good to go. It takes a second to restore the last snapshot.
You can do your banking in one VM, and do your facebook in a different VM, etc. That will help you avoid being tracked, and keep unrelated activities from crossing paths.
You can use your Chrome browser in one VM, and Firefox in a different VM, etc.
And if you have a visitor, you can give them a VM to do their business. When they are done, you restore it to its last snapshot, or you can leave it as is. Whatever fits your needs.
There are many hypervisors (the foundation for running VMs) available.
The most user friendly (as far as I know) is Oracle's Virtual Box. It is not as feature rich as the other offerings. But the other offerings might make your head spin, with their endless configuration settings. If you have the head for it, try one of the others. But I believe that Virtual Box will be more than enough for most folks.
If you get a new computer, I recommend that you install VM software, and almost nothing else -- and do all of your activities in one or more VMs. That will keep your actual Windows installation running at its full potential and will keep it clean. You should never see a slowdown (short of Microsoft releasing a problematic Windows Update).
Keep in mind that each VM that you run will need enough RAM allocated to it (that is a value that you set for each VM). The RAM for each VM will, of course, be taken from your actual physical RAM. So depending on how many VMs you will run, simultaneously, and how much RAM you will allocate to each VM, is something you have to consider in how much physical RAM your physical host machine has. 32GB of RAM should be enough for most folks, to be shared by your VMs (keeping in mind that your actual Windows box will need (let's say) at least 8GB devoted to itself).
The above will keep your physical Windows machine perpetually clean, and running at full speed for all time.
2
-
2
-
2
-
@1:28 "...so that they can just slip in line..."
That is called "Line Cutting".
No one is allowed to reserve public parking spots (which is akin to reserving a spot in a public line for your car).
When your car gets there, then that is when you have your spot in the line.
Do the affluent get to have others save public spots for themselves?
Imagine you are in a full parking lot, waiting for 15 minutes for someone to pull out, and then someone just drives in and takes the spot of a friend that was sitting there, parked.
They do not get to exchange spots. When someone pulls out, then the person who was there first, waiting the longest, gets that spot.
The person pulling out (the person leaving) does not get to choose who is next.
I have seen family members stand in parking spots in Manhattan, "reserving" the spot for their spouse or parent. So you drive up to that available spot (the only available spot), and someone is standing in it, waiting for a vehicle that is not there. So those with someone that can stand in the spot gets to reserve spots? It is absurd. it is selfish. It is illegal.
It is not a matter of who gets there first. Rather, it is a matter of who gets their car there first.
If I were on the line, waiting to charge my EV, and someone tried to cut the line (such as what Jennifer Granholm did), there is no way that they would get in front of me.
By the way, those charging stations are powered by fossil fuels, making Jennifer Granholm's propaganda event all the more absurd.
That's right. Fossil fuels are used to generate the electricity that powers those charging stations.
2
-
2
-
2
-
2
-
Christoper Clark, there is no point in reasoning with the deniers.
These are folks that fit into one or more of the following categories:
-- They hate the government. If a government doctor cured cancer, they would claim "cover-up", because he had the cure for years and because ("fill in the blank") kept it a secret.
-- They are not American, and are envious of our great accomplishments.
-- They are self-loathing Americans (sadly, many citizens hate their own county and piss on the land that people, the world over, risk life and limb, to join).
-- They are pathetic, clueless people that have no life, other than to criticize the accomplishments of others. Their only joy is to see others fall.
2
-
2
-
2
-
@0:31 -- Count me in on that.
Approximately 3 months ago, Windows blue-screened me. It was complaining about a video driver (without specifying any file names). That was bizarre, because I did nothing related to my video driver. All attempts I made to boot my PC failed with the same blue-screen. It never got to the login screen.
I thought, perhaps, it might be hardware related, because I had changed nothing.
Alas, my last option was to do a restore. Since the blue screen complained about a video driver, I saw no reason to restore my d: or e: drives (one for apps and one for general data / saved files). So I used my emergency boot flash drive, and restored only my c: drive.
A few minutes later, I was back in business.
Please note that I had only 1 partition, divided into 3 logical drives (let's call that option "A").
Previously, I used to have 3 partitions, each with a single logical drive (let's call that option "B").
For both "A" and "B", I was using a single SSD (a single physical drive).
For most general day-to-day use, you can't tell the difference between the above two options. In both cases, you see a C: drive, and a D: drive, and an E: drive.
But when you want to reallocate space between the drive letters, that is when the difference becomes apparent.
Option "B" was, at times, somewhat problematic, because when I wanted to resize partitions (take free space from one partition, and allocate it to a different partition), Windows had no native tools to accomplish that task (that was a Windows 7 box -- not sure if Windows 10 or Windows 11 has that functionality). Perhaps "diskpart" (native Windows tool) can accomplish that task -- but it is too easy to wreck your computer with "diskpart").
When you have different partitions (on the same physical drive), Windows basically treats those partitions as if they are on different physical drives.
So to reallocate space, between the different partitions, I usee a 3rd party partitioning tool (Mini Tool Partition Wizard was my choice) to resize partitions. And to further frustrate the process, a reboot was required.
But with a single partition, and 3 logical drives, Windows built-in disk manager can re-allocate space from one logical drive to a different logical drive -- and no reboot is needed.
Frankly, I cannot think of a reason to split a physical drive into multiple partitions, when you can split a physical drive into multiple logical drives.
Leo, please note that you did not create a new partition. You created a new logical drive within the existing partition.
2
-
2
-
2
-
2
-
2
-
Three items:
1)
@2:51 "You can have terabytes of files on your fat32 disk".
The included disk management software that comes with Windows will not format a fat32 partition that is larger than 32 GB.
If you have a 64 GB disk, or a 2 TB disk, etc, and want to use FAT32, then you need to use a 3rd party formatting tool. There are many to choose from. A few of them are free, and are easy to use.
Once your 2 TB disk is formatted for FAT32, via a 3rd party tool, then virtually any Windows system (or any device that supports FAT32) will have no problems with the disk.
I believe the reason for Windows not allowing their included disk management tools to format more than 32 GB as FAT32 is for backwards compatibility with old versions of Windows (like Windows 98, and perhaps 32 bit versions of Windows XP, etc).
2)
If you will be using only Windows systems, then it is best to use NTFS, especially if you will be using that drive often.
The reason to use NTFS is that it is the only native Windows file system that supports journaling. Journaling will help prevent data corruption, in the event your computer crashes (or loses power) while you were writing to the drive.
Well, Windows does have a ReFS option that includes journaling. But it is used mainly for RAID environments, and will refuse to work with a flash drive or any USB drive. I believe it works with Storage Spaces, or something similar, and 3 disks are the minimum for setting it up with ReFS. So for 99.9999% of us, NTFS is the only Windows file system we can use that includes journaling, and for 100% of us, it is the only Windows file system that has jounaling and also will work on any drive.
3)
In 2024, most Linux distros will likely support NTFS. Although it runs in the much slower "user space" (rather than in the kernel), and the performance will be much worse than using a native Linux file system. But for general use, where top speed is not necessary, then NTFS should work fine with Linux. There are probably some obscure Linux distros that do not include support for NTFS. But anyone using one of those obscure Linux distros, they will likely know which package to download and install to have their Linux distro work with NTFS.
2
-
2
-
2
-
2
-
@6:31 "You might want to go to those sites first and see if they offer their download image..."
Please never download Window from anywhere other than directly from Microsoft, as our host demonstrated, before the 6:31 time mark.
If you download Windows from anywhere else, it could be plagued with malware. It might simply send back metrics to someone, or it might be more insidious.
Root kits could be included in the ISO, and no anti-virus will detect it. Sony was caught including a root kit in one of their CDs, a while back (close to 20 years ago). Then, when other bad actors discovered the vulnerability, they exploited it.
Install Windows only from Microsoft, and then let Windows Update take care of the rest.
If Windows Update falls short on some tool, then get that tool from the 3rd party (but make sure that Windows Update has no more updates). Although a 3rd party tool could be a risk, you will have a clean copy of Defender checking such tool downloads, and you have the VirusTotal site to check your downloads. Also, your 3rd party downloads cannot interfere with kernel level processes -- whereas, an ISO can.
2
-
2
-
@Doriandotslash Good info. I was not aware of ntfsundelete.
I will never use Bitlocker. It is closed source code from Microsoft -- a huge Spyware company.
I still use Windows. But I am going to be switching over to Linux on my next PC, and I will use VeraCrypt (and I imagine that files lost in a VeraCrypt volume are gone for good).
Any Linux OS is far superior to Windows, for security, privacy, reliability, and performance. But I am new to Linux, and want to choose a good distro.
I have narrowed my choices down to MX Linux and Parrot Security.
MX Linux seems to be very popular, and will probably be around for the long haul.
But Parrot offers an AnonSurf feature (funneling all traffic via TOR), which you can toggle on and off. So I like that. But I am unsure of Parrot's overall functionality. For example, I do not know if it will be good for gaming. It is Debian based, so I am assuming that if Debian is good for gaming, then Parrot should be, too? I'll find out.
I am also intrigued with Qubes OS. I would love that OS as a daily driver, as it seems to be the King of compartmentalizing your on-line life. TAILS is also very good, but too restrictive (for your own good) for a daily driver for me. I would go with Qubes, but it is basically a virtual machine generator, and has too many specific hardware requirements and virtualization is not good for gaming.
I threw a lot out there, hoping maybe you would offer a recommendation for or against a distro. Finding reputable, knowledgeable folks for help is not easy. There is a blizzard of information out there, and it is hard for a newbie to know what is what. Any advice is appreciated.
Cheers!
2
-
If you are not getting e-mail messages from (let's say) Bob, then you have probably asked Bob to carefully check that he typed in your e-mail address without any mistakes.
Sometimes, people will look at something, and claim that they "carefully" checked it, when they did not.
So just because Bob tells you that he made no mistakes, Bob could be mistaken. How can you check this?
You should send an e-mail message to Bob. When Bob tells you that he received your e-mail message (have him on the phone), then tell Bob to click "Reply", and send you a message in that manner. This way, you know for a fact that Bob is using your correct e-mail address.
If you get that reply from Bob, then Bob was typing in the wrong e-mail address.
If you do not get that reply from Bob, then it is one of the issues that our host spoke about.
A note of caution about using hotmail (Microsoft) or gmail (Google):
Those are both huge spyware companies. So all of your e-mail messages (sending and receiving) are 100% in the clear for them to index, or read, etc.
Considering that Google has made oceans of $$ by profiling nearly everyone, it is not far fetched to assume that they are scouring all of your e-mail messages to add that information to your profile. It is all automated.
Any e-mail service can do the same thing. However, Microsoft and Google are in a league of their own in their talent for doing so, and they have the resources for doing so.
And if they identify people of interest (Governors, Mayors, Movie Stars, Musical recording stars, people in the news, high profile news anchors, Sports Stars, etc), then the executives at Microsoft and Google might not be able to resist reading their e-mail messages. What are the odds that they might be doing that?
Ask yourself this question:
If you could read the e-mail from Madonna, Hillary, Trump Jr., Hunter Biden, Beyonce Giselle Knowles, Shaquille O'Neal, etc, could you resist?
Those executives are human. There is nothing stopping them from reading anyone's e-mail messages that are on their service. Do you think that they resist that temptation?
Microsoft and Google offer free e-mail accounts, not because they are altruistic, but because your e-mail content is their product. They use your e-mail messages to profile you.
2
-
2
-
2
-
@ameliah8164 You wrote: "It's really hard for me to understand your foreigners' thinking. Perhaps because the government is unreliable and deceives history, you always have a lot of conspiracy theories."
Madam, your words are those of a con artist. Why?
Where did I write anything about "conspiracy theories"?
You brought up "conspiracy theories", and you accuse me (who never wrote anything about it) of bringing it up. You tried to associate me with a conspiracy theory that you brought into this dialog.
Why not write: "you always have a lot of racists"?
Tie that to me, too. Why not? I wrote nothing about it.
Why not write: "you always have a lot of drug addicts"?
Tie that to me, too. Why not? I wrote nothing about it.
You have the audacity to try to pull off that crap; to tie me in with bringing up "conspiracy theories", when that it preciously what you did. You brought it up. You introduced "conspiracy theories" into this discussion. You are the initiator of the "conspiracy theories" topic.
Quote anything that I wrote that where I conveyed a conspiracy theory.
You will not, because you made it up. You lied.
You have a hard time understanding foreigners, because you either 1) read things that are not there -- you imagine sentences that do not exist, or 2) you lied about it being hard to understand foreigners. You do understand. But you make things up (to get attention?).
Frankly, you are the one the is writing things that need to be "figured out". You are making things up. Or you are delusional because you think that you are reading things that are not there.
Again:
Quote anything that I wrote that where I conveyed a conspiracy theory.
You will not, because you made it up. You lied.
2
-
Are you on other platforms? Which ones?
If not, keeping all of your eggs in the youtube basket is risky.
All you have to do is utter an innocent remark that some elitist at youtube finds offensive, and you can kiss your channel goodbye. In today's cancel culture, of which google is a driver, there are landmines everywhere, and new ones planted daily.
"agadmator's Chess Channel
", with over 1,000,000 subscribers, got yanked, because "black" and "white" were mentioned (because the chess pieces are black and white). It took the host a week or so to get it straightened out, and he was reinstated.
And congratulations on your success. You earned it!
2
-
2
-
2
-
If we had responsible internet service providers, they would detect e-mail blasting, and warn the user to cease and desist their spamming activity.
If a second occurrence happens, ban their account.
Yes, the spammers can keep creating new accounts. Well, let them. Let them keep getting banned, and keep having to find a new way to send out bulk e-mail messages. Make the spammers put in the effort, over and over and over.
Alas, internet service providers apparently do not care.
There are ways to track down who is sending out the spam, and hold them accountable. But this takes us back to internet service providers not caring -- and it is the internet service providers that would be able to identify the spammers.
If, for example, a Comcast account was used to do spamming, then Comcast can detect it, and Comcast can address it. The same goes for every other ISP.
Spammers must use an ISP. But when the ISP's do not care, then nothing good will come from it. In fact, we run the risk of the government eventually passing a law, forcing ISPs to take action. And when the government gets involved, it fixes one thing and breaks three things.
2
-
2
-
2
-
2
-
2
-
@06:43
Steering wheels:
Honda offers a heated steering wheel. It just does not come equipped with one, in the base package.
@07:48
The host put: "Accord: 10 speaker Premium audio" along the bottom of the screen.
Note that there is nothing "Premium" about the Accord's stereo.
Honda can call the stereo the "Ultimate" or "Spectacular" or "Awesome", etc stereo. It is just a label.
The stereo is good, but nothing special.
@07:57
I have not heard the Sonata's "Bose Premium" stereo. But I would be embarrassed to ever brag about owning any Bose equipment. They are like the McDonalds of the audio world.
@08:16
"...the Sonata has the edge in sound quality"
It would have been helpful if the host offered some rational for his conclusion.
For all we know, it could be because he likes boomy bass, and maybe that is what the Bose Premium stereo is delivering?
Or, maybe the Sonata has boosted highs, and the host likes that.
Which car's stereo has better imaging, soundstaging, realism, etc, is what counts (at least to me).
On a very good stereo, the speakers "disappear". If you close your eyes, you cannot point to them (not that you get stupid and forget where they are -- but your ears cannot detect their location).
But we have no idea how the host concluded that the Sonata's stereo is better. There are so many subjective factors where people will disagree.
And he is playing youtube audio (hardly the place to find quality sounding source material to conduct a listening test).
Can the Sonata play files stored on a flash drive? The Accord can play .flac and .mp3 files (and maybe other formats) from a flash drive. That can be important to some folks.
15:22
"...we will have to apply value points, of a ½ point per thousand dollars of difference."
Folks, ignore what the host calls "value points".
You should never pay anything close to MSRP.
So it is not clear what each car will actually sell for. And that price will differ from buyer to buyer. Yes, the Sonata will be less overall. But the host is scoring based on MSRP, and that is not what you will be paying.
Your purchasing decision should be based on how the car drives, all of its features, reliability, gas mileage, maintenance costs, etc. You can decide whether or not you are prepared to purchase the car, knowing its price (pay near the minimum noted on kellybluebook.com -- and do not yield to anything that the sales personnel tell you, no matter how sincere they appear to be -- it is all an act to separate you from your $$). They pull "it's the law", when adding a separate "prep fee" to the price. So if your offer is $28,000, and the prep fee is $800, then your offer should be 27,200 and let them add their prep fee to that. Yes, it is the law that they must separate the prep fee. But the law does not require them to have that fee. If is pure profit.
If you put a high value on the Accord having much better acceleration, then that will factor in a higher value for you, and could justify the Accord's higher price. Or knowing that Honda makes very reliable cars, and have a higher resale value, and owners love them, etc. All of that could justify its higher price.
So you give value points based on your needs.
If you go by the host's system, then when you hit the lottery, you will never buy a Ferrari.
2
-
2
-
2
-
@3:50 -- Jay, if you had two or more files in your `pwd` from where you ran the find command, that ended in .txt
then the find command would have complained.
The shell will replace all wildcard matches and use that for the command that gets executed.
If you had:
file1.txt
file2.txt
in your working directory, then your find command would have run:
$ find /home/jay -name file1.txt file2.txt
and the above would error out, because the find command will not accept more than one filename parameter.
To avoid ever having that issue, all uses of the asterisk should be escaped when used with the find command.
In your examples, you never had a match in your `pwd`, so all of your examples worked, because when the asterisk is not matched in your working directory, then the shell maintains the asterisk.
But to ensure that a literal asterisk is applied to the find command, whether it matches files in your working directory or not, the asterisk (or "?") should always be escaped.
By the way, I was not aware of the "+" option (I knew of only the "\; option). A look at the man page for find reveals that they differ (but for most uses, either one will work and give you the same results).
Cheers!
2
-
2
-
2
-
Many folks still have some favorite 16 bit programs, which require intermediary programs to make them run properly -- or at all, on today's computers.
Often, such 16 bit programs are old games.
Some of those old games are great. Where they lack some of the dazzling graphics, they excel in their simple brilliance, and can be super challenging.
You need a program such as DosBox or MAME to run them on a 64 bit Windows OS.
I believe that MAME supports 8 bit programs, too, as many games that MAME supports surfaced in the 1970s (and there is no way that they were 16 bits).
I never installed a 32 bit version of Windows 7 or Windows 10. But I would guess that those 16 bit programs would run natively on a 32 bit Windows OS? When installing Windows, I believe that it gives you such a choice of 32 or 64 bit versions? I have not installed Windows for some time, so my memory is vague on this. But I believe that such choices were offered at the start of the installation.
Does Windows 11 have a 32 bit option?
Leo, well done on your explanations.
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
@cardigansrule When I was shopping for my Vandersteen speakers, I visited 6 or 7 stores on the east coast, USA. At the time, I knew nothing about that brand.
My brother subscribed to The Absolute Sound and Stereophile magazines. He told that he has read good things about Vandersteen speakers, and that I should take a listen.
Well, out of those 6 or 7 stores, all but one store had nothing special sound quality. I was wondering what all of the fuss was about. Why would anyone spend thousands of dollars on these ordinary sounding speakers. The last store that we visited was in New Jersey. There I heard what all of the fuss was about. They sounded amazing. The exact same speakers. And all of the stores were using highly regarded amps, pre-amps, etc. That influences the sound quality, but not to the degree that I heard. The speakers went from ho-hum to wow!
So set-up, etc, is critical.
"...but if you're going to spend this kind of money on audio-phoolery..."
Just because they are out of your financial reach is no reason to bash them. I cannot afford a Corvette. But I do not disparage them, just because I cannot afford them.
2
-
If you rely on a written list of passwords, and that piece of paper disappears, then you are screwed (or do you have a copy of that written list somewhere else?).
Someone in your office decides to stick it to you, and takes your list.
Your dog eats it.
You are burglarized. You get a new computer, and you are locked out of all of your sites. Perhaps you can use their "Forgot Password" feature, and cross your fingers.
Most password managers are easy to use, and you can save a copy of your password database on a separate drive. You can even keep a copy of your password database with a cloud storage service. If you have a strong master password, that remote copy of your password database is useless to anyone other than you. And having a copy, elsewhere, will get you out of a world of trouble if your storage drive fails, and it had your password database. Or if you are burglarized, etc.
Use a password manager.
Use a strong master password.
Make a copy of your password database, and keep that copy in a different room (or with a neighbor or friend or cloud service). You can purchase a 1GB flash drive for under $1. It will easily hold your password database (which will likely be ~5MB or smaller).
2
-
2
-
2
-
Such messages will often appear when you visit a sketchy site. You should not visit such sites. But if you feel you must, then do so in a sandboxed environment.
Such an environment will contain any bad things from escaping; preventing bad things from reaching any other part of your computer.
Windows 10 Pro (or 11 Pro) and above offer a sandbox option. The downside is that you cannot save that environment. In other words, when you close the sandbox, it all goes away as though you never ran it.
Another option, which is far safer than visiting sketchy sites directly, is to run a virtual machine, via 3rd party software.
Depending on which virtual machine software you are running, and the settings that you chose, you can contain what you are doing within that virtual machine. And virtual machines can be saved (you can take a snapshot of a slice in time, and restore that virtual environment to that slice in time).
You can download the free and open source Virtual Box, by Oracle. It is probably the easiest virtualization software to use. But that comes at the price of it not being a secure as other 3rd party virtualization options.
It is not the most secure environment. But it is far, far safer than visiting bad web sites directly. It will probably prevent almost any bad programs from escaping into your actual computer.
If your browser (within your virtual machine) gets infected, it really does not matter. You just close the session (do not save the session), and restore the virtual environment to what it was previously. Just do not use your infected, virtual browser for anything important (like visiting your on-line banking sites).
Want to test a browser plug-in?
Do it in your virtual machine.
Don't like it? Close the virtual machine and restore it to before installing the plug-in.
The virtual machine snapshots / restores are fast. It is not like restoring from a traditional backup program.
But the safest approach is to never visit a questionable site, and never download / install / run programs that are risky. But if you must, Windows Sandbox is the safest choice, followed by 3rd party virtualization software.
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
If you use a VPN, then the most anyone will be able to see is that you connected to that VPN server.
That will hide all of the sites that you visit. Not even the ISP will know anything more than that you connected to a VPN server.
And you do not have to use big tech. You can purchase a home VPN router. They are not expensive.
While traveling, that will let you connect to your home's VPN router, and then that router will relay your activity to the sites you are visiting. You will need to have a VPN router on your end, too, or VPN software to initiate the connection to the VPN server in your home.
I have never done the above, because I do not use hot spots. But the above is my understanding of adding a layer of privacy and security when using public networks. Maybe someone can elaborate?
For those looking to see how exposed many computers are, look for videos of people using Kali Linux, which is loaded with all manner of security and forensics tools.
I have not dabbled in those videos for a few years. So maybe current operating systems offer better safety? But some years ago, when I watched those videos, the people with the know-how knew how to do all manner of "secret agent" type snooping.
2
-
2
-
2
-
@WatchLuluTV "thats 3 words"
Not according to President* Biden.
He said in a speech:
Two words: Made in America
He said it with conviction, and his audience applauded.
So if our President* asserts that "Made in America" is two words, then "Never use PayPal" is two words.
What also affirms that "Made in America" is 2 words, is that none of the mainstream media reported on it.
So the people that tell us what is factual, what is misinformation, etc, found that "Made in America" is 2 words.
If the above is good enough for President* Biden, good enough for his audience, and good enough for all of the mainstream news channels, then "Never use PayPal" is good enough, too.
You can find President* Biden's "Two words: Made in America" comment if you search for it.
I would provide the link, but youtube tends to toss comments that have links.
2
-
2
-
2
-
2
-
2
-
"can you use ssd in nas and will it caus wear and tear on ssd or is it better to use mechanicals on nas"
Yes, you will cause wear and tear on the SSD. But unless you are writing large files to your SSD, 24/7/365, then you will not wear out your SSD.
There is a crypt-o process named "Chia". One of the operations that takes place with Chia is creating large files. That process hammers a storage device (typically an SSD) relentlessly. Yet, few people Chia users have worn out their SSDs. So for typical use, your SSD will outlive your computer, and probably outlive you, too.
Mechanical drives will reap the most benefit from being in a NAS (assuming a RAID 5 configuration), when dealing with large files. But if you already have SSDs that you are not using, they will work just fine, and will (most likely) be faster than mechanical drives that are in a RAID 5, due to SSD's far faster random reads and writes.
Not all SSDs are equal. Some are horribly slow -- much slower than mechanical drives. Odds are that you do not have such a slow one. But that is why I wrote "(most likely)", above.
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
Absent from this report is that Amy M. Degise is a radical, leftist democrat.
In my opinion, the only reason Degise turned herself in was because she knew that the police would come for her. She knew that she needed to salvage what she could from her criminal behavior, by turning herself in -- all so that her lawyer can say, in court, that she realized that she was wrong for leaving the scene of the accident.
When someone flees the scene after hitting someone in the street, that person deserves jail time.
When that someone is a law-maker, it is outrageous that she was not given jail time.
Her paying $5,000 will annoy her. But she will not be putting off any vacations or taking out a loan to pay that fine.
Her driver's license being suspended for a year will also annoy her. But as a council-woman, she will not have much trouble getting around.
The media needs to follow her, because I suspect that she will drive with a suspended license. And when caught, they will release her, again.
And New Jersey tax payers will probably re-elect her, and continue to pay her salary.
2
-
1)
@6:01 -- Brands:
Avoid Western Digital. Here's why:
I do Chia crypt-o mining. That requires lots of drives. The more drives you have, the more success you will have.
I have scores of WD drives, and scores of Seagate drives (both internal and external).
Performance wise, you will never notice any differences.
So why did I write to avoid Western Digital?:
-- The warranty.
Both WD and Seagate offer similar warranties.
But a warranty is only as good as the company that honors their warranties.
I have had a few WD drives fail, and I have had a few Seagate drives fail (all while under their warranties).
Dealing with WD is a nightmare. They do everything under the sun to frustrate and delay the process. Whatever you can dream up, WD does it, and more.
My conclusion is that some bean counter at WD thinks that he (or she) is saving the company money, by having customers give up -- thereby saving WD from replacing the failed drive -- and that the customer would go buy another drive.
WD will pressure you to pay a $25 (not sure if that is still their price) convenience fee for faster warranty service.
So here you have a drive covered under their warranty, and WD intentionally delays shipping of your replacement drive, if you do not pony up some green stuff.
WD is able to ship you your replacement drive, without delay. They just refuse to do so, if you do not grease them with $25.
Their delays last weeks. Mine took weeks, and on more than one occasion.
So how about Seagate?:
Seagate does everything right. They go out of their way to service the customer's warranty claim. They go out of their way to minimize the customer's frustration from losing their drive / data.
In fact, when one of my Seagate drives failed, Seagate asked me if I wanted them to attempt data recovery (WD does not provide that service). I asked Seagate for the price. Their answer was "It is free". Apparently, unbeknownst to me, my Seagate drive's warranty included free data recovery.
Due to my Chia processing, my drive was 99% full. When Seagate recovered the data, they shipped me two physical drives, containing all of the recovered data (they apparently did not have a single drive of sufficient capacity at their Oklahoma recovery site). They also shipped me a replacement for my failed drive (one of equal capacity), from their California warehouse.
So Seagate was easy to contact, and a pleasure to deal with.
Seagate performed free data recovery, and shipped me a replacement drive as well as two recovery drives, and they told me to keep them all.
Clearly, Seagate wants to provide the highest quality customer service.
2) For under $50, you can purchase a new, 1TB drive. For $10 more, you can get double that capacity. That is probably enough backup space for most people.
If you can budget it, then purchase two of them, and periodically copy data from one to the other.
If you ever have to restore your PC from a backup image, it is comforting to know that you have your data on two other drives.
3) G-Technology is a WD brand.
Their drives are very good. But I have purchased my last one. If a warranty need arises, then it will be handled by WD -- and that is a nightmare.
Also, unless G-Technology's current line of drives has newer code in their controllers, know that you cannot stop their drives from sleeping.
So if you want a fast external hard drive, then whenever you go to access it, you will have to wait for it to spin up. I believe they sleep after 5 or 10 minutes of inactivity.
If you will be using your external drive frequently, then that sleeping will be frustrating.
During my adventures with WD, I inquired about the sleeping issue. They offer no tools to stop their G-Technology drives from sleeping.
Note that Sandisk is also a WD brand. So a warranty claim will become an adventure.
4) Activity lights.
Not all external drives have an activity light. That might not matter to some folks.
If you are backing up your computer, and you turn off your monitor, then that activity light will allow you to see when the drive is no longer in use. You will not have to wake up your monitor to see what is happening.
Also, an activity light might help you diagnose a problem, if your backup stalls, or you have some other type of connection or drive issue.
Good luck figuring out if the drive you are considering has an activity light. I doubt that you will find that information on the box, or in an on-line manual, or on the manufacturer's web site. Your best bet is to find someone with a youtube video with that drive, ask in a comment, and cross your fingers that they reply. Sometimes their video might show the drive in use, and depending on the camera angle, you might see if it has an activity light.
One of my Seagate external drives has an activity light that glows. When the drive is active, it slowly changes the intensity of the glow. Not exactly easy to spot at a glance.
2
-
Even if highly intelligent life is widespread throughout our galaxy, and even if that life is actively trying to contact us, and even if that life somehow knows where we are and they are broadcasting signals aimed directly at us...
...Space is so unbelievably vast, it would take countless thousands of years for any signals to reach us.
And forget about other galaxies. Andromeda, the closest galaxy to us, takes light 2,500,000 years to reach us.
And light travels at 186,282 MPS (miles per second), or 670,615,200 MPH.
As to our "observable" universe:
It (the matter contained within) could go on for endless light-years further.
And there could be, 1,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000 light years away, another universe that had a big bang.
And the above could repeat with no end.
By the way, our galaxy is over 100,000 light years across (587,849,956,300,000,000 miles), and our local (so to speak) cluster of galaxies are in a void that stretches over 150,000,000 light years across.
There is no way to describe how large our tiny solar-system is, which is a grain of sand compared to the distance to our closest star, which is also a grain of sand compared to the size of our galaxy, which is an atom compared to the size of our observable universe.
So for anyone to state that we are alone in the cosmos conveys the enormity of their stupidity.
Cheers!
2
-
@askleonotenboom "When sending encrypted email to a non-proton account, proton sends a link. The "email" is then a) password protected, and b) displayed only on the proton site. Technically it's not email at all, but it is secure."
I did not know about that. Good info.
It will keep other parties from seeing the communications.
However, any encryption done on protonmail's servers can be read by protonmail's employees (at least those with access to the decryption keys).
Does protonmail keep a key? We do not know. And that is a red flag. For most content that people will be sharing, such encryption should be fine. But when your livelihood is on the line, or your freedom is on the line, or any such important matters are on the line, I would not trust protonmail to do the encryption, and trust them to not have a key.
I trust protonmail with my privacy and security as much as I trust google with my privacy and security. Viewers should know that protonmail offers an additional layer of security -- but we are trusting them. We know nothing about the personnel at protonmail -- who their engineers are, their political affiliations, their work history, etc. They are complete strangers. People should know that they are trusting their personal information with complete strangers. I give protonmail the benefit of the doubt. But fully trust them, when I do not know them, and I do not know the code they are using? That is asking too much.
When privacy and security matter -- really matter -- never trust a 3rd party with your encryption. Encrypt your own messages, on your own computer, with open source encryption software, such as GPG.
2
-
@11:57 (stereo)
"The overall sound quality is quite good"
True, if the only other stock car stereo you ever listened to was a 1976 Monte Carlo.
Honda's stereos are not good. Also, they are not bad. They are neither here nor there.
Honda's car stereos never let you forget that you are listening to a mechanical device. The stereos make themselves a part of the performance.
A quality sound system gets out of the way, and displays a wall of music (a soundstage).
A quality sound system makes the speakers disappear (when you close your eyes, you cannot identify the location of the speakers).
A quality sound system presents each singer, and each instrument, in their own space (when the recording was done right).
A quality sound system does not get fatiguing. You can listen to it for hours at a time, and enjoy it the entire time.
Honda's stereo does none of the above (or, at best, has only a sense of the above).
By the way, Nissan's Altima and Toyota's Camry are of similar quality. It is like the three companies got together and agreed to skimp on the stereos. Either that, or the people heading up their stereo departments never heard a quality stereo.
Note that I am not expecting the sky and the moon from a stock stereo. But these companies once did provide quality stock stereos that did everything right, and had no glaring issues.
Rating this car's stereo as "The overall sound quality is quite good" will encourage these car companies to continue down the "who cares" stereo sound quality road. Or perhaps the host of this video has never heard a quality stereo, and he really thinks that the Accord's stereo is quite good?
Again, it is not bad. But it is also not good. There is a lot of room for improvement (and not on the volume side, but on the realism of the music side).
Cheers!
2
-
2
-
2
-
2
-
2
-
Shame on Microsoft, and other software companies, that automatically opt you in for data collection.
There used to be a time when you were either asked, upon installation or first use. Or, you were never asked, because the default was no data collection, and you had to manually turn it on.
Why does Microsoft make the default to be spying on you? Because 1) far, far fewer people would agree to being spied on, and Microsoft counts on complacency of many people to just not bother to change the default setting, and 2) because nearly no one knows that they are being spied on, and 3) because even if someone wants to disable the setting, they can't find it, and 4) because they can.
I am reluctant to encourage having laws made that govern free enterprise. But in this instance, I would like to see a law that requires blatant and obvious notification to users that they are opted in, and "click here" is presented to the user, right away, to opt out (with a "Don't ask me again" check-box). And the "click here" may not be a dumpster dive in search of a buried setting. After clicking on "click here", that screen should allow you to decline data collection, and without you having to scroll down or search.
2
-
2
-
2
-
@zrolo6329 If you are looking up how to bake a cake, google will probably steer you in the right direction.
If you ask google to provide results for "hillary crimes", then your results will have google's leftest, biased, algorithm to "help" shape your conclusions on the subject.
duckduckgo.com does not apply biased algorithms. They simply provide matching results.
Also note that if you search google for how to bake a cake, then expect facebook and others to inundate you with unsolicited ads from anything and everything related to baking.
The same search, using duckduckgo.com, will result in zero ads.
Kleenex does not spy on the public. Kleenex does not irritate our nostrils. Kleenex does not control a monopoly on mucus catching. So there is little to no danger in using the term "Kleenex" over "tissue", or Jell-O over gelatin, or Roller Blades over in-line skates, or Xerox over copy, etc.
google does have a near monopoly, on deciding what the world sees, on every political front. Sundar Pichai, for whom no one voted, should not, single-handedly, decide for planet Earth what spin he feels is best for human-kind.
Just because google rolls off the tongue more easily than duckduckgo, is not a valid reason to allow world opinion to be shaped by any single person.
2
-
2
-
2
-
2
-
Chia crypto processing is probably the #1 application for pounding on SSDs.
I have written more than 10 petabytes to a Samsung 980 Pro, and it has no issues.
I write approximately 5 TB to it every day.
In Chia forums, this is a topic that surfaces, and no one has worn out their SSD (well, I have never seen anyone comment that they wore out their SSD).
Perhaps cheap, QLC NAND based SSDs will wear out in your lifetime. But I suspect that for typical use (not like what I described above), even a QLC SSD will last long after your great, great grandchildren are old and gray. If it fails, is will likely be due to some other issue (like an electrical surge), and not due to you wearing it out.
Manufacturers publish TBW (terabyte written) values for their SSDs. They will cover you for warranty replacement, within that value. But you should expect your SSD to last 100x or more, beyond that value.
2
-
It has been my experience that distros help out those folks (like me) that lack the experience to customize everything to their liking.
With a distro, others (that prepared the distro) have done the leg-work in preparing the look and feel of the distro.
And for advanced users, and even expert users, there are still distros that would probably be best for them.
For example, the "TAILS" distro.
It is unlikely that a single person, no matter how experienced they are, would be able to configure their distro to be as air tight (security wise and anonymity wise) as TAILS.
For me, my distro decision will be based on support in the user forums.
If the forum is difficult to search for answers, or the members are impatient jerks that get-off on making others feel stupid, or the members nitpick at questions that are not phrased precisely correctly (often the case when you need help is struggling with how to explain yourself to others), then they can keep their distro.
I loathe Windows (mainly version 10, for all of the spying), and will be installing Linux on my next computer.
But to Windows' credit, answers to most questions are easily obtainable.
In my search, by way of Virtual Box, of trying Linux distros, I have often found that most forums have trolls who, rather than trying to help, try to insult.
They are the reason that most folks would rather pay for Windows, rather than use a faster, more reliable, and more stable OS, for free.
Linux is fantastic. But it lacks the "anyone can use it" ease of use.
So when a fantastic Linux OS, which is better than Windows in almost every respect, and it is free, and yet it still cannot compete with a pay-for OS (Windows), it means that the Linux developers and the people in the support forums are failing to provide a turn-key alternative to Windows.
There are countless great people that develop and provide support for Linux. But it is not enough to counter the "Bow to me, I am a Linux expert" trolls that lurk in the Linux digital landscape.
2
-
Some scammers like to gain access, in order to install crypt-o mining software.
They will use your computer's resources to hunt for coins.
The above is not something that anti-virus software is likely to flag, because crypt-o mining is deemed normal use for a computer.
So unbeknownst to you, your computer might be doing heavy lifting (so to speak) in the background. The scammer can set the crypt-o processing to a low priority, so that you will not have any noticeable slowdown with your normal use of your computer. But all of your computer's idle time will no longer just sit there. It will, instead, be used for mining.
When your computer is under heavy load (which crypt-o mining does), it will draw more power from the wall. So you will pay a higher electrical bill while mining for the scammer.
If your computer's fan (especially noticeable for a laptop) revs up, inexplicably, while you using your computer for simple tasks, then that is a sign that something else might be running on your computer in the background.
Running task manager will reveal the heavy usage of your computer's resources. Scammer bet on that most people never run task managers (or even know what task manager is).
2
-
1) Leo, I do not believe that seeing high (but not 100%) RAM usage (via Task Manager) actually means that you have free RAM (well, it depends on how you evaluate it).
Windows will use "swap", and that will technically free up actual RAM. But if browser processes are heavily using swap, then you might have a performance issue, even though Task Manager shows some free RAM.
I had a first generation i7 system, that had 6GB of RAM. Back in 2006, that seemed like overkill. Then, as browsers were made "better" with each release/update, my i7 system would experience slow-downs. I removed the three 2GB RAM sticks, and put in three 8GB RAM sticks. I never experienced another slow-down, again.
Yet, through it all, Task Manager always showed free RAM (even before I added RAM). I concluded that "swap" was the culprit (or insufficient RAM was responsible).
2) You mentioned browser extensions.
For the privacy conscious among us, it is best to not add anything to your browser.
A vanilla browser will mix in to the crowd, more so than a browser that has unique (or somewhat unique) add-ons. Yes, others also have the same add-ons. But the more a person adds this and adds that, that person starts to become part of a smaller and smaller group that share those same browser qualities.
As I understand it, browsers are happy to reveal all of the above to web servers, allowing you to be more easily tracked.
Some say to not maximize your browser, as that gives away your screen size (yet another item that adds to your "uniqueness").
I am not suggesting that folks not use add-ons or not maximize their browser window (I keep mine maximized). But they might not know about such tracking, and that might matter to them.
2
-
2
-
2
-
2
-
2
-
2
-
@19:47
"The base audio system is really good in here"
Until this point in the review, I agreed with everything.
The stereo in the Accord is not good. It is not bad. But it is not good.
I own one, and I never turn on the stereo, because it is not good. I do not have a lemon. It works as designed. It is not good.
The head unit is from Panasonic, and the speakers are from Pioneer (and I suspect that the Pioneer speakers are the problem).
The music lacks energy, and sometimes it yells the music at you. It sounds like you are listening to equipment, rather than listening to music.
The Toyota Camry and the Nissan Altima are in the same ballpark. They all sort of suck.
My 2003 Nissan Sentra's stock stereo is far better, and a pleasure to listen to.
I am crossing my fingers that changing the speakers will help, because the head unit is integrated into the touch display, and is probably a huge deal to upgrade and will probably void the warranty.
As to the charts that get displayed in this video. They are mostly meaningless. Trust your ears, not a report.
Cheers!
2
-
1
-
1
-
Not everyone has a garage with an extra set of rims, and a jack, and the physical dexterity to switch between winter and summer tires. And although a service station can do the switching, you still have to have a place to store the wheels that you are not using, and have a way to transport the tires to the service station and back home, and you have to have the spare $$ to pay the service station.
All season tires, albeit a compromise, allows you to drive in all conditions, without any of the storage problems and tire changing problems. It is why most vehicles come from the factory with all season tires.
Sports cars typically come with summer tires, because if you have $100,000 for a sport's car, you will likely have some other car that you will drive when it snows, and you probably want your sport's car to not be held back by using anything other than summer or competition level tires.
1
-
1
-
1
-
@jasonschuler2256 Wired Equivalent Privacy (WEP) was touted as the impenetrable standard, and used by countless billions of wireless devices.
That is, until it was cracked, and is now deemed unsafe.
Enter Wi-Fi Protected Access (WPA). Yet another champion of impenetrable wireless encryption standardization. That is, until it, too, was cracked, and is now deemed unsafe.
Enter WPA2. Much better, but still has a vulnerability.
All manner of encryption algorithms have been breached over the decades. Our military once used Indian "Code Talkers", because the finest minds of the day could not ensure that their encrypted communications were safe.
History is replete with encryption standard after encryption standard found to have vulnerabilities. And whatever is the standard of the day is, is the one that will be the target of every major technology company and every government world-wide. They have resources that would make your head spin.
No one single encryption scheme should be supported at the exclusion of all other encryption schemes. When the day comes that a weakness is found in Rijndael, we should have other similarly strong encryption schemes that are available for immediate use. There is simply no reason to dismiss other encryption schemes, any more than the silver medalist at the Olympics should stop competing for the gold.
1
-
1
-
1
-
1
-
1
-
@7:28 -- The Florida recount:
Folks, the Electoral College ensures that corruption by a state, or by a county in a state, does not spread beyond that state's borders.
In other words, if the corruption does not get addressed, then it will win the state for the cheaters. But since the popular vote does not count, the winning of the state (albeit bad), will normally not change an election.
Without the Electoral College, a single, corrupt, voting precinct would upset the totals for the nation.
The Electoral College prevents the cheating from affecting the totals for the nation.
Also, as it pertains to Florida.
There were endless court battles. But those court cases were limited to Florida.
Without the Electoral College, then after every election, we would have endless court battles in every local, state, and federal court, from sea to shining sea.
The founding fathers were brilliant.
1
-
1
-
1
-
1
-
I wonder how many Britain people would like to comment on the tyrannical government that they are now under, but remain silent, due to the chance of the tyrants sending the police to arrest them for their comments.
Yes, it has gotten that bad. People in Britain that have posted comments on facebook, that the radical left found offensive, have been arrested.
Those poor folks are living in a dictatorship, and it will only get worse.
When President Trump returns to the Oval Office, I believe that he will call out those tyrants, and put a global spotlight on them.
Folks, President Trump is the only thing stopping this (what you saw in this video) from coming to America.
It is already here, in a lesser form. What you are seeing in Britain is the next step that we will see here in America, unless President Trump wins and puts a stop to it.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@3:49 "If you're using a fitness application, which is predicting the number of step you walk, you expect it to send that information. But it's a choice users make."
Let's unravel that deceptive language.
1)
No, I would not expect a fitness application to send my steps. Why should it?
The application is on my phone. The application should be able to compute whatever it needs to compute. Why is some server in the company's data center involved. Whatever that server is doing, so could your smart phone's CPU.
The difference is that the company's server is doing far more than what is in the smart phone's application. The company's server has a huge database of everyone, and they use that information for who knows what.
Your fitness application only needs the server for application updates (new version of the application -- bug fixes, etc).
When you create an Excel spreadsheet, you don't need Microsoft's servers to document what is in your spreadsheet. Well, neither do you need the fitness application's servers to do the same.
2)
No, it is not a choice users make. Why?
If the application presented, in plain language, what it is doing that you do not see, then far, far fewer people would trust that application, and the fitness application's company knows that.
So they bury legalize language in a long end user license agreement, that few people read -- and the company is banking on few people reading it, and even fewer understanding it.
When only a handful of people, out of every million people, bother to read the agreement, that is by design, by making the agreement cryptic for all but lawyers and a few others.
Such applications could include an audio file that has someone explain exactly what they are doing with your data. It would be simple to include. But they do not, because they do not want you to know.
3)
If you want to have a phone on-the-go, then you have to purchase a smart phone. That requires you to agree to Apple's terms or Samsung's terms, both of whom track your every move.
That is what China did to the people of Taiwan. Do you think that the entire population of Taiwan would have knowingly agreed to that?
This is alarming stuff.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
They used the Southern Poverty Law Center as the credentials for labeling Justice Barrett as being prejudice.
Folks, this is an example of radical leftists calling up "down", and calling down "up. This is an example of the radical left attempting to change language.
The Southern Poverty Law Center is a far left, radical, hate group.
They are everything that Behar accused Barrett of being, and then some.
It is like a company that names themselves "We Love Puppies", and they throw puppies off of buildings.
The Southern Poverty Law Center is ANTIFA, with a law degree, and a hatred for patriotic, G-d fearing, decent Americans.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
After you download a file, but before you run that file, you can upload it to Virus Total (I am not including the link, because youtube tends to toss comments that contain links).
If Virus Total returns numerous detections, then that file is probably nefarious. Do not run it.
If Virus Total shows no detections (or perhaps one or two), then that is a good sign (but not conclusive). Follow our hosts advice and have your anti-virus software check, too.
Some anti-virus software will report false positives. Since Virus Total uses numerous anti-virus engines, you might occasionally see a positive (meaning a red flag) report on a file you are testing. But if all of the other anti-virus engines report no detections, then the one that did report a detection is probably a false positive.
Also note that many (perhaps all?) anti-virus software will check files up to a certain size (that size will vary, from anti-virus vendor to vendor).
So some malicious programs will pad their code with tons and tons of blank space. That makes their malicious program's file size huge, and it will result in anti-virus programs not detecting the harmful code within.
If you use a hex editor, you can open the suspicious file (in the editor), and when you scroll through it, you will probably see countless pages of zeroes.
If the author of the file padded endless pages of zeroes in his code, then that is a major red flag.
In general, if you download a set-up.exe file that is 700 MB in size, that is a red flag.
If you download a set-up.exe file that is contained in a zip file, the same principle applies. If you extract the .exe file (or have your unzipping program list the contents of the zip file), and the .exe file is huge, then that is a red flag.
If you are determined to run the dangerous file, then back up your computer before you run the file.
However, if that dangerous file steals your contact list, or passwords, etc, then although you can restore your computer from you backup, you cannot undo the fact that the malicious program already sent your private information to the author of the program. And while your machine was infected, did it reach out to other computers on your network, and infect them? And then those computers will re-infect the computer you restored? Do not take any chances. Do not run such programs.
1
-
1
-
There are some disadvantages to using a Microsoft account to login to you computer.
1)
Your data (even more than usual) will automatically be stored on Microsoft's servers. For most people, this does not matter. But it will matter to many people.
2)
If you exceed Microsoft's quota (which I believe is 5GB), then you will be nagged to purchase more space.
Your 5GB quota is shared by all of Microsoft's platforms.
3)
If your Microsoft account is ever compromised, you could find yourself locked out of your own computer.
If you go through the reset procedure, you might still run in to a dead end. Depending on what took place with your Microsoft account, they might put your account under review. Will some anonymous Microsoft employee find in your favor? If they do, how long will you be without your login?
So if some activity with your account violates Microsoft's Services Agreement, then you have problems.
4)
There is a principle involved here.
You should not be told by a $trillion company that you must sign in to their servers to use your computer.
5)
What if Microsoft has a service outage?
6)
You purchase a Pro edition of Windows, and BitLocker will not work, unless you have a Microsoft account. BitLocker will not work with a local account. Major trust factor there.
What on Earth does a Microsoft account have to do with you encrypting your data for your privacy and your security?
I do not use BitLocker. So I cannot confirm this one. But the "Ask Your Computer Guy" channel posted a video, 4 months ago, reporting this.
7)
You can use all of Microsoft's on-line services, without signing on to your computer with a Microsoft account.
After signing on, you can login to your Microsoft account to use whatever services you choose.
-----
If you need the convenience of sharing data between devices, or you do frequent computer changes / upgrades, and want all of your settings transferred, then login to your computer with a Microsoft account.
But if you have no reason to be at the mercy of a Microsoft server, for access to your own computer, then do not use Microsoft account to login to your own computer.
Even if you have a good reason to login with a Microsoft account, be sure to create a local account on your computer. At least you will have the comfort of knowing that you will not lose access to your own computer.
1
-
1
-
@5:35 -- "climate change"
A certified leftist never passes up an opportunity to throw in a political phrase that has nothing to do with the video.
She could have said "to fight institutional racism", or "the wage gap", or "open borders", etc.
But she chose "climate change", which is actually a good choice, because easily influenced people will see an imaginary dotted line between seals, nature, and the climate.
So choose a video where 100% of the viewers will agree on saving the seals, and will love the care given to the baby seal, and use that stage to segue into your political agenda, with a hint of a connection.
1
-
1
-
1
-
If they have a normal Police Chief, and a normal District Attorney, then they should identify everyone involved in stealing those cars, and charge them with grand theft auto (or whatever the crime is called, the same as if you were to go on to that same property and steal those cars).
They should also be charged with trespassing.
If they had a warrant, based on BS, then the person that authored the BS reason for the warrant should be criminally charged, accordingly.
It is unacceptable for this to go on, with no consequences.
Even if the court rules in favor of the home-owners, and they get their cars back with no fees, then what about the court fees, and the attorney fees, and the "I don't have my car" aggravation.
And who pays for the tow to get your car home?
And who pays for damage done by the illegal towing / stealing of your car?
The home-owners should sue the government employees who cooked up this criminal enterprise, and charge them a nuisance fee.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
Musk is likely looking at relocating Twitter to Texas or Florida, etc.
But one step at a time.
He first has to get his staff (the normal, non-woke, non-destructive people) to fully grasp all of the nuances of Twitter's hardware, software, and networking.
Once that is done, and they can map out a new location, as well as coordinating the networking between the old location and the new location (there will be a period when both sites are live), and finally conducting a planned, orderly shutdown of the old location, he will vacate San Francisco's data center.
There is also the problem of staff either relocating to the new location, or hiring new staff already residing at the new location.
This is a huge undertaking, and must be carefully planned out.
Musk has the resources to undertake this endeavor, and I will lay odds that it is already on his radar.
1
-
@roilo8560 I have never encountered that situation.
I suspect that there are postings on what happens on Linux operating systems when memory is exhausted (including virtual memory). TAILS does not use virtual memory, but it will probably exhibit the same stability symptoms as a standard Linux Debian OS that is out of RAM and virtual memory.
The system will probably become unresponsive in one way or another, until you free up memory -- that is, assuming that the system is stable enough to allow you to end processes that are not necessary.
The only time that I used TAILS was on an old Dell core duo laptop (probably in the neighborhood of 10 year old). It was slow (no fault of tails -- the computer was just slow). It has 2 GB of RAM, which is not much. But it ran TAILS with no problems.
I did not launch more than its browser, so the 2 GB of RAM was sufficient. If I launched many of its other included apps, then maybe it would have run out of RAM (but I doubt it)?
You will not be launching memory hungry programs, because it does not come with such programs -- and you cannot install such programs (well, with effort, you can, and you will defeat the privacy and security of TAILS and have other complications, due to such a non-standard use of the OS). You will not be running memory intensive games, or photoshop, etc. RAM should not be an issue.
As of a few years ago, I ran TAILS with 2 GB of RAM on a slow laptop with no issues. Note that I did not open scores of browser windows or scores of browser tabs. I have no idea how much memory each additional browser or tab would consume. I did open several browser windows and tabs -- but did not go browser crazy.
Since it is reasonable to assume that anyone running TAILS on a computer that was purchased in the last few years will have at least 4 GB of RAM (and probably more), I doubt that you will run out of RAM. But if you do run out of RAM, then closing programs will be the fix when you experience difficulties with launching new applications.
Your question is a fair one. But I doubt that you will encounter an insufficient RAM issue, unless you use ancient hardware.
1
-
@roilo8560 When you install a Linux distribution, you can choose whether or not to include swap space (disk space for virtual memory), and you can change this after the installation.
I have seen videos where someone was having an issue with the performance with a specific program, due to it insisting on using swap space. So the user unmounted his swap partition and his program stopped having performance issues.
I do not know why, but some programs are written to put some stuff into virtual memory. Perhaps in case of a system crash, they use that space for recovery the next time you launch the program?
My point is that swap space is not necessary. It is advisable to use swap space for general computing. But TAILS is not general computing.
Years ago, when computers ran on 8 MB of memory, swap space was critical.
Today, for general desktop computing, if you have 16+ GB of memory, you will probably not need swap space. If you are a power user, then you might need 32 GB of memory to get away with no swap space. And that amount of memory is common today.
For business use, then you might need 500 GB+ of memory. Who knows? It depends on what the service is and the demand, etc.
If you launch endless programs and keep your computer running 24/7/365, then swap space becomes more important.
There might be some programs that will have problems if there is no swap space. I do not know of any, but I would not be surprised if some exist.
Will TAILS simply just automatically shut down programs if it runs out of RAM? I doubt it.
As to "...with no regards to data loss if the physical RAM is taken up".
When you run out of RAM, something has to give. You will lose something, if there is no way to store it all.
Stuff that is already running will probably remain running. But if an already running program decides that it needs a bit more memory, and there is no more memory, then it is unpredictable how that program will deal with not being able to consume more memory. It might become unstable. It might crash. It might freeze. Or it might simply not perform the task that needs the additional memory. Whether or not you will notice that some additional task did not occur is anyone's guess.
There are TAILS forums that could give you better answers than I can. I am a jack-of-all-trades pseudo expert. For in-depth analysis of how the TAILS kernel will deal with out-of-memory issues, you should seek out folks that understand the kernel code, or people that understand the code for the programs in question that you will be running.
Depending on how each one was written will determine how they will react if no more memory is available. And I am not sure how much testing is done for that issue, and even the results of those tests will vary, depending on what is being asked of the kernel at the time of the memory outage.
Lastly:
"...or if unoptimized programs are downloaded..."
TAILS will try to keep you from downloading and running programs.
TAILS goes out of its way to keep you safe from yourself.
If you install anything (if you use TAILS with any software that is not included in its distribution), then all bets are off, and you are on your own journey.
1
-
@1:04 "...that the government is really going to create millions of new citizens over night", says our deceptive host.
Note that he used the noun "citizens", rather than "voter".
Our host does care whether or not illegal immigrants are citizens.
Our host cares only about their votes.
And before he quotes any laws forbidding non citizens from voting...
Illegal immigrants have been voting in our elections for years. Democrat controlled governments do not enforce voting laws that cost them votes.
All manner of ballot harvesting goes on with Democrat "mules" that do the ballot harvesting, as well as mail-in ballots to countless homes where "citizens" do not reside (but illegal immigrants do reside).
So our host's use of the noun "citizens" instead of "voters" sets the stage for the rest of his BS rant.
When you catch a slimy used car salesman using deceptive language, you know that a load of BS is on its way. And so it was in our host's video.
He also said "over night".
Really? Is that how it works?
Or does it take years and years at bringing in more and more illegal voters?
Our host knows that this is not an "over night" process. He used those worlds to convey that illegal voting is a ridiculous concept. How can it happen "over night"?
It does not happen "over night". But it happens. It takes years, and he knows it.
@4:58 "...they best start lobbying for more newcomers" (our host implying that our nation should desire countless more immigrants via open borders).
The United States Of America takes in more "legal" immigrants than the rest of the world, combined.
Our host's "lobbying" cry is his deceptive attempt at trying to convince viewers that open borders are good.
youtube does not have enough storage space for me shine a light on all of our host's misleading statistics. It is so simple to put up charts and make up BS, which is what our host did.
Our host is a radical leftist, open boarders fanatic.
He is looking us in the face and lying, in his effort to maintain open boarders, to create a permanent voting block for Democrat control of government.
@3:28 "Hooray, I'm with you on that"
Yet another deceptive social engineering ploy.
So our host is with us. Ergo, we can trust him.
Con artists routinely bring up a topic where people will agree (in this case, he brought up controlling reckless spending). Of course we are all against reckless spending. So our host must be on our side -- right?
He lied. He is a proponent of reckless spending. Such spending benefits the welfare state, and the welfare state votes for Democrats.
This guy is one heck of a BS artist. There is not shortage of characters like him in Washington DC swamp. You ever wonder who the actual people are that screw everything up? You just watched one of them.
1
-
@9:09 "They already assume that there was a coup attempt that day".
I would say that at least 2/3 of leftists that claim that there was a coup attempt are lying.
If you hooked them up to a lie detector, they would be shown to be lying.
Leftists go along with the BS coup narrative because they hate Trump, have no moral low bar, and are willing to hang him (so to speak) on a lie.
When it comes to elected officials, the 2/3 number rises to 98%. Nearly all of them know the alleged coup is a lie.
@10:37 "I don't know why they (democrats) didn't wait until September, or something like that (to hold their January 6th exhibition).
The answer is:
1) The Democrats are sinking at an alarming rate, and are desperate to change the non-stop coverage of inflation, gas prices, crime, border crisis, etc.
2) The Democrats have some other circus prepared for September. Or, perhaps, they will build on yesterday's exhibition and make BS arrests in September.
1
-
1
-
Bill Gates wants you to respect his privacy?
Microsoft Windows, especially version 10, is the most intrusive, anti-privacy operating system in history.
Windows 10 tracks every file access, every copy/paste operation, every mouse click, every web access, every (fill in the blank).
How much gets reported back to Microsoft and is archived for your profile? Who knows, because Windows is closed source code.
Run a free, open source, Linux operation system alternative.
It will be faster, more secure, and will respect your privacy -- it will not spy on you.
There are scores of Linux distributions.
If you want a simple one, then download and install Linux Mint.
It is not Windows. So there is a learning curve. But it is not much of a learning curve.
99% of every program that you run has a free, open source, Linux alternative.
Open source means the code for all of the programs is human readable, so there are no hidden privacy scams.
Once you start using a Linux operating system, you will kick yourself for not doing so sooner.
Microsoft does not respect your privacy. So Bill should not expect others to respect his.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
Space is not expanding. Space is the presence of nothing / the absence of anything and everything. Double nothing is nothing. Zero times anything is zero.
Stuff (or matter) within our view (and beyond) is not expanding (like your gym shorts). Rather, the rocks, gases, celestial bodies, all the stuff out there, is spreading apart (putting distance between each other).
Space, the cosmos, goes on forever, regardless of whether or not there is "stuff" floating/traveling/flying through it or taking up residence in it. Space is nothing, and nothing goes on forever. It does not expand. If someone tells you otherwise, then ask them what was there before space "expanded" to there.
1
-
1
-
1
-
1
-
@3:18 -- We are looking at the results of the public education system, sitting there, unable to explain anything.
Alex, you should have asked them "How many dimes are in a dollar?"
Or, "How many minutes are in a quarter of an hour?"
Or, "What state is Utah in?"
Or, "What continent are we on?"
Or, "If you were born 10 years ago, how old would you be today?"
Etc.
They would likely get all of them wrong. Either that, or they would refuse to answer, because they would get all of them wrong.
1
-
@monza8844 "As an IT guy for over 40 years, I'm telling to slow down with the drama."
Quote the drama.
"Your basically telling people to use a computer for basic functionality like E-mail, internet, music, movies, and then call it the day."
I neither basically wrote that, assertively wrote that, nor generally wrote that. You just made that up. You quoted nothing to support your attempt to support your fabricated claim.
"My dear man, you're using i7-950, a 15(!) year old CPU, it has a benchmark score of 3,203 on Passmark, while a modern CPU like mine scores 46,644, that's a 14 times higher score."
You are making my case.
"Your hard drive runs at about 150 MB/sec with about 75 MB/sec write speed."
Quote where I wrote which storage device my computer has. Or since you imply clairvoyance, reply with my hard drive make and model. You will not, because you just made that up, too.
"You know what a modern NVME SSD like mine runs at? 7,300 MB/sec read and write speed, that's about 50 times faster."
Non sequitur.
But you did manage to find a self-serving reason for telling everyone about the speed of your NVMe drive.
Nearly all NVMe drives are comprised almost entirely of QLC NAND fabric. Nearly none are comprised of SLC or MLC NAND fabric. You are going by the numbers on the box, and benchmarking tests that never exceed the drive's very limited SLC cache.
But just as my i7-950 CPU handles my workload, so does your NVMe drive, due to your light work load.
And I know your NVMe writes are light, because you are claiming 7,300 MB/s. That drops off a cliff when you write enough GBs, without rest.
"Your system can support no more than 24 GB of RAM, while I'm using 64GB of ram, and can add another 64GB if I wanted to."
Who is better than you?
"That processor of yours is 15 years old, so you're basically discussing modern day computing in the context of 15 year old hardware, and you shouldn't to that."
Yes, I should do that, and did do that, to illustrate that if a 6-year old computer (mentioned in the video) is running slowly, and my 15-year old computer is running at factor new speed, that the 6-year old computer is being bogged down with background processes, likely due to countless software installations, or malware.
"Of course your system isn't going to handle modern software very well, isn't that obvious?"
It depends on the software. Isn't that obvious? Regardless, that is irrelevant to the viewer's 6-year old computer getting bogged down.
"Just having a modern browser open, and running a Steam launcher can eat almost up to 2GB of your memory. Yes, YOUR very old system will struggle with that, but not a modern system."
My browsers open within a second. Steam opens within 3 seconds. A 13th generation i7 would do so faster. In my case, that would be throwing money down the drain. I do not need a Ferrari to run errands. I can live with the aforementioned start-up times.
"Yes, YOUR very old system will struggle with that, but not a modern system."
My very old system struggles zero with the above examples that you pulled out of the sky.
"Ask anyone to open Task Manager on Windows 10 and count the number of tasks running the background; the total number of system and user tasks on most systems will be 130-180.
I asked my neighbor, my pizza guy, and my Phrenologist. They then asked my why I asked them.
I told them that someone told me to ask anyone, and gave me no reason. So I asked them, and gave them no reason.
"Modern systems are designed to handle that many tasks."
Modern day digital audio transports have less jitter than 15 years ago. I mentioned that, because you seem to want to discuss topics not germane to my opening comment.
"You're living the past dear man, and that's fine with me..."
I am not. And if I were, you are clearly not fine with it.
"I'm not going to tell you upgrade your 15 year old system if you're still pleased with it..."
Promise you will not tell my mommy.
"...but don't start telling people to use their computer from the year 2023 or 2024 as if it's one from the year 2009."
Quote where I wrote that. You will not, because I did not.
You made conclusions about my personal life as it pertains to my computer knowledge and what I own.
No where did I include my background, because it is irrelevant. Statements of fact have no baring on experience.
If I say that 3+3 does not equal 5, I don't need you to tell me that you have a degree in mathematics.
Everything that I wrote in my opening comment is true and correct.
You also concluded that my i7-950 computer has its original storage, and that it is my only computer.
Reply with what you know about any of my computers, other than my i7-950. Start off with whether or not I have any other computers, and if I do, what hardware components do I have?
If you reply with more nonsense about things I never wrote about in my initial comment, I will consider that you are trolling for attention (such as you telling the world about your fast hardware, when nobody asked). I will not engage a troll, once I have concluded that they are trolling. So be sure to reply with words that are germane to my opening comment. I recommend that you quote me, to avoid going off on tangents that have nothing to do with what I wrote in my opening comment.
In case you still do not understand my opening comment:
You can bog down any computer, with enough errand processes.
That goes for my 4-core i7-950, a 96-core Ryzen Threadripper Pro 7995WX, or even an IBM z16 with 256 cores of Telum CPUs and 40TB of RAM.
1
-
The government can force Internet Service Providers (ISPs) to not forward data on the port numbers related to crypt-o currency transactions. This will, of course, stop transactions for everyone in the region being serviced by those ISPs. But tyrants that seek power have no low bar. They will screw their entire population to get their way, and they will blame (for example) the truckers.
Of course, the crypt-o software will roll out a new release with new port assignments. And then the government will mandate ISPs to block that port. Rinse and repeat.
Eventually, the government will force ISPs to block the sites that make the crypt-o currency software that serves the downloads. In other words, the government will force ISPs to block connections to the sites from which you download the software.
New work-arounds will surface, and the chess match continues.
Eventually, geo-political deals will be made to fine and / or arrest the developers of the software.
The above is one such scenario, and it is plausible, based on the illegal, overreaching, authoritative government actions we have seen thus far.
If President Trump was in office, none of this would be happening, because Trudeau would not dare take on President Trump.
1
-
1
-
1
-
1
-
1
-
1
-
@1:00 -- Louis, if you spotted him in a restaurant, walked over, and placed a microphone on his table, he would tell you to take it away. You might then say "Why? You are not that important. You have nothing to hide. You let big tech collect everything on you. So why not let me record you, too?"
There is no way he would allow that.
You could then say "But you already opened that door. You already screwed up, because you have those other social media accounts. So why does it matter, now, that I want to leave my microphone on your table?"
There is no way he would allow that.
Also, if he became an executive at a big tech company, you can bet the farm that he would be pulling up everything on every notable person -- movie stars, musical artists, people in the news, youtube influences, etc. He will remember the people that pissed him off, and he will pull up everything on them, too.
It is people like that host (@1:00), that that say "Let the police search your home. So what."
He is a defeatist. He is an excuse maker for big brother surveillance. He is a suck-up to tyrants.
He is a propagandist for the worst privacy violators our country has ever known.
He either has no concept of our Constitution, or he chooses to piss on it.
And yet he whines on and on as if he knows what he is talking about -- as if he knows the score -- as if he knows better.
Louis, how dare he poke fun at people wanting to keep their private moments private.
Of course people are going to make mistakes, and defeat their own efforts, in trying to remain private. But at least they are trying. They are taking steps in the right direction.
Whereas that host is basically saying "The hell with it. Nobody cares."
Well, then why are so many big tech companies devoting so much of their resources to capturing every nuance of your existence, if nobody cares? Why are those big tech companies collecting all of that information for people that no one cares about?
It is done for advertising, and it is done for having the upper hand over everyone else. Imagine what you could do, if anyone upset you, and you had everything they ever did at your disposal. Imagine you had every personal item about their life at your fingertips.
We The People should never allow that.
That host, @1:00, is a disgraceful person.
1
-
1
-
1
-
1
-
1) If you come across a situation where you are being asked to login to dispute something, etc...
Do not use the link from the e-mail message.
Go directly to the site's login page, by typing in the link into your browser (or, if you have it bookmarked, that is even better).
(and when I say "typing in the link", I mean to type in the link that you know from past usage -- and not typing in the link that the e-mail message is encouraging you to use)
2) As to opening mysterious attachments, the only (kind of) safe way to do so is in a sandbox or virtual machine.
In those environments, the malicious program has virtually no way to escape the enclosure of the sandbox / virtual machine.
It is not 100% safe.
For example, you should not allow the virtual machine to have network access to your physical machine.
But using a sandbox or virtual machine is way, way safer, than running mysterious attachments directly on your computer.
And when you are done with the virtual machine, you should scratch it (return it to the state it was in before you ran the risky code -- this should be easy to do).
Do not rely on your anti-virus software to protect you, when engaging in risky activity.
The safest option is to not open mysterious attachments.
1
-
1
-
1
-
1
-
@0:53 "He still remembers being brought to the sight, as a one-year old, in 1992."
Rumor has it that he also remembers the doctor spanking him when he was 10 seconds old.
Folks, the take-away from this news report is that the BBC News reports fake news.
You see, they tried to make the story wholesome and relatable, and make a connection with your emotions, by bringing up the BS 1-year old fabrication.
Instead, they revealed that they are lying.
No one... absolutely no one... remembers anything from when they were 1 year old. But the brainiacs at BBC News never considered that. They unearthed that photo, and figured "Hey, we can show proof that he was here when he was 1 year old." Now I question if even that photo is of that "Anthony", who they claim made the new discovery.
1) We do not know who "Anthony" is. No surname. No title.
2) For all we know, they made up this entire story.
3) Or, perhaps Anthony made a claim, and he showed them some fancy equipment, and BBC News bought it.
This whole video is absurd, including the title, claiming that scientists were "shocked". No one was shocked.
I asked my my neighbor. I asked my pizza guy. And I asked my phrenologist. All of them collect rocks, and none of them were shocked.
This entire story is a lie.
Not surprising, since BBC News stopped being News, years ago. They do sprinkle in some news, just to play the part; to pretend that they are legitimate. But they are not news.
Thumb's down click earned.
1
-
1
-
1
-
1
-
1
-
1
-
@3:56 "In fact, we produced more oil domestically in my first year in office than my predecessor did in his first year"
The question is: Why?
Answer:
In President Trump's first year, he was taking over from President Obama, who was anti-oil. So it took President Trump nearly a year to undo the damage from his predecessor and ramp up domestic oil production.
For President* Biden, he took over from President Trump. So in Biden's first year, the domestic oil production was on blast from the Trump administration. But in the months after President* Biden took office, he killed oil production, leading to what we now have.
Imagine an idiot buying a company from a genius.
It takes time for the idiot to destroy the company. In the first few months that the idiot owns the company, it will still be in great shape form the genius that owned it. But a year or two later, that idiot's mismanagement of the company becomes terminal.
Such is the case of President* Biden's first year, after being handed a booming economy and oil production.
1
-
This is happening in Democrat run cities, and only in Democrat run cities.
The Democrat leadership wants this, because it puts 99.9% of these students on public assistance, for their entire lives.
By being on public assistance, they will vote Democrat, because Democrats keep sending them money. Even though the low amount of money each person gets keeps them in perpetual poverty, they remain desperate to keep it, and so they vote Democrat.
Democrats that push the above agenda are flat-out evil.
To keep themselves in power, they put millions of people into perpetual poverty. That is vile, from the vile Democrat leadership.
What was not reported is that the schools that do have students that are proficient in math, are less than 10 students for the entire school. They simply have more than zero students, proficient in math.
Again, what you saw in this video is 100% Democrat run cities, from top to bottom.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
Although this was being portrayed as wanting to hear a Chinese accent, my takeaway is that free speech is under attack.
Make fun of one of the groups that the radical leftists deem it necessary to protect, and big tech swoops in with their cape and kicks you off of their platform.
Notice that the individuals that run big tech companies deem those "protected" groups to be inferior. They would not come to the rescue of any group they deem to hold power.
And by "protecting" those groups they deem to be inferior, the individuals running big tech see themselves as superior.
They are so wrapped up in their bubble of power, that they do not see how aristocratic, conceited, and blue-blooded they portray themselves as.
If the individuals that run big tech did not label some groups as marginalized, then those individuals would have no one to save. Those individuals would have no one to lord over -- or at least no excuse to lord over them.
The individuals that run big tech actually demean entire races, and entire cultures, by calling them marginalized and appointing themselves as their saviors.
The individuals that run big tech are the epitome of racists, as they see themselves as superior to other races and cultures, and they see other races and cultures as inferior, and incapable of standing on their own.
1
-
1
-
1
-
1
-
1
-
1
-
Did they give the fired employees golden parachutes?
Also, their CEO was spewing BS, defending his staff. So clearly he was on board, too.
Did the board of directors fire the CEO?
Folks, this is still all a ploy to bring people back.
The same radical leftist executives are there.
This is not an apology.
This is not a surrender.
Rather, this is a tactical maneuver.
Until they fire the executives that were involved (and by "involved", that includes all of them who defended the woke position), and they announce that they screwed up and that they will never do that again, then do not trust them.
If they refuse to say that they will never do that again (or anything similar), then they are still on board with the wokeness.
Do not get taken in by their BS. The firings, although good, are just for show. And they probably gave them huge parting severance checks. Not hearing about that, means it took place. The board members should announce that no severance was paid (or perhaps a few months severance). But if they paid them each $2,500,000.00 severance, then that is worth being fired.
Again, do not let them BS you.
You will know when you hear and see the right messaging from them. So far, it is dribs and drabs, and mixed with propaganda.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
You can 100% clear out any remnants of your computer ever having a Microsoft account. There are two ways.
1) Reinstall Windows, and set it up, at installation time, without a Microsoft account.
-- You can do a fresh install, in which case it would be like turning on your computer for the first time. So you should have a copy of all files that you do not want to lose.
-- I believe that if you tell Windows to do an installation, and Windows sees that you already have Windows installed, it will offer you an option to keep your files (but you should still have a copy of your files). I do not know if this option, of keeping your files, will retain any Microsoft account related files. I do not think it will. But that is a guess.
2) Search on-line for someone that figured out which registry settings, and other settings, need to be changed, cleared, removed, etc, to have your computer mirror one that never used a Microsoft account. I do not know if anyone has posted the above. But just about anything and everything is posted somewhere, on-line. Just be careful about whose steps you would follow.
Method #1 is, in my opinion, the safest and the most thorough.
1
-
1
-
I recently got a text message from US Customs, that they will not release a package, until I contact them via a supplied link.
Many people can't resist the temptation of "I wonder what international package is being sent to me?", and so they click the link.
I deleted the text message, without opening it (I saw it, partially, without unlocking my iPhone).
If I had opened the message, it would have been seen as "delivered" by the scammer, and my contact info would have been tagged as a live one.
Another one that was common, leading up to the election, was scammers selling gold coins (as if they were really actual gold), with a bust of President Trump on the coin, and guess whose voice was used as the salesman for the advertisement?
1
-
1
-
@nomaderic Again you are obsessed with racing.
Nowhere did I ever state, suggest, or recommend racing.
Nowhere did I ever state, suggest, or recommend doing anything unsafe.
Nowhere did I ever state, suggest, or recommend racing ahead of someone, cutting them off, and pressing the brakes.
You made all of that up.
Why does your mind keep going down that path?
Getting ahead of someone to make a turn can be unsafe (they way you are stuck on envisioning it). And I suspect that you drive slow and people cut you off, which is why you see anyone getting ahead of you as always being unsafe.
People get ahead of me all the time.
Most do so safely. Some do not.
I get ahead of people all of the time, and never cut them off.
I get behind people all of the time, too.
This is what is referred to as normal, safe driving -- not racing.
The next light can be 1/2 mile away. There is nothing unsafe about getting ahead of the person next to you (a slow driver like you), to make an exit.
Lots of exists have run-offs (a new lane dedicated for the exit). That is the lane used to slow down for the exit. I suspect that you slow down before getting into the run-off lane and create traffic, and cause others to unexpectedly brake, and risking accidents. Such drivers care zero about the chaos they cause behind them, and mindlessly drive away from the traffic and unsafe conditions that they create.
You wrote:
"I see people do exactly what you described everyday"
You see imaginary conditions that I never described.
You see the worst in every condition.
You see every person that passes you as a maniac.
You see normal, safe driving as speed daemons, because they passed you.
I never proposed speeding.
I never proposed unsafe driving.
I never proposed cutting anyone off.
You fabricated all of that in your mind.
You took a simple aspect of my review, pertaining to the car's acceleration from a stop, and you went off the deep end.
Yes, people race and do unsafe things. But that has zero to do with anything that I wrote, and it has everything to do with your convoluted, paranoid driving state of mind.
1
-
@nomaderic You wrote:
"Im one of, if not the fastest guy on the road."
You wrote the above after giving a dissertation on unsafe driving.
Driving as "the fastest guy on the road" will raise your odds on having an accident.
If it is a serious accident, then your posting, here, will be uncovered by insurance companies, police, and attorneys for your mangled and deceased victims.
Deleting your comment is too late. Once posted, it is forever.
And to be sure that it remains here for all to see, I am copying your post and pasting it below.
I hope you never injure or kill anyone.
I hope it never happens to you.
Amazing how my simple, initial comment about the Altima's acceleration from a stop got twisted by you into an admission of your "Im one of, if not the fastest guy on the road."
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
Pelosi is cognizant of President* Biden's train wreck of a presidency*.
She is doing what Joe Scarborough did, when he said that this is the best Biden ever.
Since Pelosi has repeatedly praised President* Biden, day after day, week after week, month after month, year after year, and she now witnessed him failing so miserably that he dropped out of the race, so she is trying to salvage what little she thinks is left of her own credibility.
She wants President* Biden to be remembered favorably. That would validate her praise of him (or so she thinks).
She tied herself to President* Biden. So because President* Biden has gone down in flames, she is trying to prop him up so that she does not also go down in flames.
Pelosi is not stupid. She does not really think that President* Biden belongs on Mount Rushmore. She says it for her own political salvation.
Pelosi is not stupid. Rather, Pelosi is evil. Pelosi lies, habitually.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@0:20
"Vinyl is better" is a meaningless statement, or, perhaps, misleading.
Most vinyl sucks (over 90%). But if you find the right stamper, you have about a 2% chance of finding 1 outstanding side of a pressing.
If you have quality audio gear (never seen on your channel), and professionally dial in your turntable, tone-arm, cartridge (99.99% of people do not do this), and a quality phono-amp, and a quality pre-amp, and quality amps, and quality speakers, professionally positioned, and your room is absent of excessive reflections, and you professionally clean your pressing, then you will have vinyl listening experience that must be heard to be believed -- and your sarcastic put-downs of vinyl will cease.
Yes, vinyl is both a pain and expensive to achieve the above. But if you have the determination and the $$, you will be a happy camper. And, yes, it will sound better than anything digital (which is also imperfect).
1
-
1
-
1
-
1
-
1
-
@AT-os6nb "the only way free speech can work is with full anoynimity, single account per person, no robo comments, etc"
No one having accountability?
News anchors providing the news, and we do not know who they are?
Teachers posting outrageous remarks on facebook, and we do not know who they are?
Mayors issuing directives, and we do not know that it came from the mayor?
The United States of America is not a nation of cowards, posting comments from under our desks.
That is what the "deep state" does. They pass regulations (with the effect of law), with anonymity.
The answer is not to cower behind a curtain. Rather, the answer is to fine or criminally charge the people that run social media platforms and disallow free speech on their platforms (limited to those sites that have Section 230 of the Communication And Decency Act protections).
Sites without 230 protections are free to do whatever they want. But they are on the hook for anything illegal that appears on their site.
But sites with 230 protections are prohibited from being publishers. They are prohibited from be editors. They are prohibited from deleting people's comments (unless the comment is criminal). They are prohibited form banning users (again, unless there is criminality involved). They are prohibited from shadow banning people, etc.
Anonymity is optional for the public, and only the public.
There should be zero anonymity for public servants, especially those in a position of authority. To be clear, what they do on their own time, for their personal account, is their business. But anything on taxpayer's time, on taxpayer's equipment, of any official capacity, must be 100% identifiable.
Free speech works when you can speak your mind, and not be banned, and not be arrested, and not be deleted, and not be threatened by the government.
Free speech is absent when the government, for example, tells facebook which postings to take down.
Free speech works when there are no "official" consequences to anything you say or write. But you must expect and accept that others will use their free speech to slap you around (in a manner of speaking), and that is their right. Everyone gets to speak, and no one gets jailed or banned (again, as long as the speech is not criminal).
As soon as a single word is banned, then speech is no longer free.
As soon as the only way to speak, without fear of an "official" reprisal, is to be anonymous, then speech is no longer free. No one gets to silence anyone, for any reason, other than criminal reasons (like murder for hire, etc).
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@0:15 "Donald Trump is the greatest President in our country's history".
Well, although he is in the top 5, or perhaps the top 3, he is not the greatest. But we are seeing a living legend in our own time.
George Washington was the greatest President in our country's history.
He, along with our founding fathers, created our country. That is an achievement beyond comprehension. And all-the-while, he was fighting the British, who were far more powerful. Washington's troops were freezing to death, and starving to death.
And Washington gave up power, at the end of his term. There was no one before him to set that example. Think about all of the power-craving degenerates in our government that would never give up power, voluntarily. Washington could have refused, but he did not. And there is much, much more, making Washington the greatest President in our country's history. We just do not see President Washington, in action, on TV and on-line, the way we see President Trump. So it is hard to grasp the enormity of President Washington's accomplishments and love of freedom and country.
1
-
She lied about calling 911.
She lied about no one being in there.
She lied about the police being the reason for her going to get fired.
She lied about her not doing anything wrong.
She lied about the police having no reason to taser him.
What normal person calls 911, and lies and lies, to mess with her boyfriend?
What normal person, that supposedly has to go to work, calls 911 to mess with their boyfriend, and does not see how that will keep her from getting to work?
She is probably a drama queen at work, causing all kinds of trouble. She knows that she is on thin ice with her management, for being such a psycho at work, and they would love nothing better than to have cause to fire her. Well, she just handed them cause to fire her, and she knows it.
A person in good standing at their job would not lose their job for being late. But for not showing up, due to a prank 911 call, is enough to get just about anyone fired. But she is blaming the police for her imminent firing. If she set her building on fire, she would blame the police for her getting fired.
She is not only a mental mess, in need of years of professional psychiatric help, but she is also a blithering idiot. How stupid do you have to be to do what she did?
Raise your hand if you think she votes Republican (clearly she votes for leftists, assuming she ever votes).
1
-
Remember when child sex predators used to open their raincoats in the park?
Now, they work as teachers, school board members, and Disney executives.
Wherever you find children, you will find child sex predators. Not all of them are child sex predators. But child sex predators seek out jobs where they can be alone with children, or be around children, or influence children.
So why do child sex predator teachers hang the pride flag in school, and tell their 11-year old students about their sex life, etc?
Because first and foremost, they are child sex predators. That is #1 on their priority list. It is the reason they cajoled their way into that job.
Regarding normalizing their illegal behavior...
No matter how many children's minds they corrupt, their behavior will never be normal.
If you spend years in a prison, it might seem like killing is normal. But it is not.
No matter how many people become abnormal, they are abnormal.
If 90% of the population insist that 3+3=5, they are all wrong. 3+3=5 is not normal, no matter how many people insist that 3+3=5.
Child sex predators cannot normalize that which is abnormal. Child sex predators can get children to behave abnormally. But that behavior remains abnormal.
Child sex predators are trying to get normal people to accept the abnormal.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
If anyone wants to try software or visit a web site, etc, and they are concerned about safety or getting hit with malware, etc, there are steps that will allow you to do so without too much risk.
1) Windows 10 Pro and 11 Pro offer a "Sandbox" feature. It will create a Windows environment on your computer where whatever you do in that Sandbox will not be able to escape that Sandbox (well, there are exceptions).
If, while in your sandbox, you send e-mail to someone, that e-mail will get sent. But if you run malware.exe within that sandbox, then although your sandbox will get infected (so to speak), nothing else will. As soon as you close your sandbox, it will be as if it never existed. The next time you open your sandbox, it will be clean, as if it is the first time you are using it.
Keep in mind that if you ran some virus within your sandbox, you might not notice that it tried to do harm (because the sandbox contained it). That same virus, if run without the sandbox, will ruin your day.
Also, the Windows Sandbox environment has no "save' option. So if you downloaded and installed anything into the sandbox, and then you closed the sandbox, it all vanishes.
2) Run a virtual machine.
With a virtual machine, you can far more safely take risks, because it is unlikely that anything you do on your virtual machine will be able to affect your actual Windows machine. If a whole bunch of spyware gets into your virtual machine, it will not escape your virtual machine (well, it can, if you set up your virtual machine to allow access to your physical Windows machine -- so don't do that).
And with a virtual machine, you can save your environment, even take a snapshot of a running virtual machine. If you royally screw up your virtual machine, then you can restore its previous state, and that takes 2 seconds. And you can create unlimited virtual machines, and run only 1 of them, or several of them simultaneously. It all depends on whether or not your physical Windows box has enough CPU cores, and enough RAM, and enough disk space. But just about any i3 or better computer, with 16 GB of RAM, can run a virtual machine.
The above two options are not 100% safe. But they are far safer than screwing around on your actual Windows environment. And if something goes wrong, it will likely be that you did something wrong. So be careful. If in doubt, do not take risks.
3) If you really want to be safe, then buy a renewed mini PC from Amazon. Some decent ones cost under $100. Use that box like the rebel that you are, and if it really gets screwed up, then who cares? Just restore Windows. But keep that box from networking with your other devices.
Leo, please consider making a Sandbox video.
1
-
1
-
1
-
1
-
1
-
Leo, I use keepass. It allows for saving content, other than passwords (and I imagine that other password managers also allow the same).
For example, I save software registration codes, so that if I set up a new PC, I can install my purchased software.
I save legal documents in keepass.
I save family SS numbers, and other such personal information.
I save passwords from sites that I used throw-away e-mail addresses to create (so no recovery method is available), and they do not have any of my contact information (never gave it to them).
I might be able to find some information in an old e-mail message. But you cannot rely on e-mail archiving. I was using an e-mail service for 20+ years, and they went belly-up.
Not everything is recoverable. At least not without a headache. Getting a registration code resent to you could be next to impossible, assuming the company still exists, and has a mechanism for answering such a request. And if that mechanism involves using an e-mail address that you no longer have, well, then back to square one.
I guess I could save registration codes in the clear. But if my PC should ever get compromised, I do not want to have an issue of being accused of sharing my registration codes, or them being invalidated.
Perhaps I should export my vault's contents, as you suggested, and give the file a deceptive name, such as "zip.exe", and stick it in my Windows directory (and optionally renaming it if/when I might need to use it). Hiding in plain sight can be effective.
1
-
1
-
1
-
Several years ago, when HP launched their Instant Ink program, I just happened to need a printer. I print less than 3 pages per month. But I still needed a printer.
I also needed a fax machine and scanner, which this multi-function inkjet has (most have a built-in fax and scanner).
At that time, HP offered a "Free" plan, where you could print 10 (or was it 15?) pages per month, for free. After that, each set of 10 (or 15?) pages would be charged to your credit card at $1 for each set.
Some time later, some HP bean counter convinced the executives to end the "Free" tier. HP caught hell for that, since countless people purchased their printers preciously based on HP offering their "Free" Instant Ink plan.
So although HP no longer offers a "Free" plan, they have grandfathered in everyone that was already signed up for their "Free" plan. And if I ever change my plan, they will not allow me to return to the "Free" plan.
It has been many years, and I have never exceeded my "Free" plan's monthly page limit. So although I despise HP's disreputable tactics, I feel good that I have the upper hand with my plan (not that HP cares).
And since I sometimes do not print for weeks, then when my printer starts up, it has to clean its printer heads from dried up ink. That wastes a fair amount of ink. But it matters not, to me, because my ink is free.
In fact, I print so infrequently, that HP has sent me replacement ink cartridges, while I still have plenty of ink remaining. The are obligated to replace aging ink, at some point.
So I never have to concern myself with running out of ink or ink expiring or ink cartridges drying up or the rip-off prices of purchasing new ink cartridges.
I hope that my crappy inkjet never dies.
The automatic document feeder died after a couple of years (passed the warranty). But at least it keeps on printing -- for free!
But when my printer dies, I will not consider HP for a replacement. Not a chance (unless they offer a "Free" plan -- which is very unlikely).
1
-
1
-
1
-
@3:09
"...they both get up to speed reasonably well"
The Altima is a pig from a stop.
Once it gets going, it has good acceleration. But if you are, for example, waiting at a light in the left lane, and realize that you need to make a right turn at the next light, then you can forget about getting ahead of the car to your right.
@3:41
"...since it simulates gear changes"
If I get a CV transmission, the last thing I would want is simulated gear changes. It defeats the whole purpose of having a CVT.
The beauty of a CVT is that the car just keeps pulling. It feels like it is in its sweet spot, and never leaves its sweet spot. All of that is for naught with artificial and useless knocks from the transmission.
"It has a kick, to make it feel real"
No. That kick makes it feel phony, because that kick is phony.
What makes a proper CVT feel real is the smooth, unending pull of the car.
You do not hear Tesla owners complaining about no gear shifting. And Tesla does not risk mechanical failure by including phony kicks.
1
-
@1:36 "...you can't go wrong with 1password."
The same was believed of lastpass, until they had a data breach.
When software is closed source, you are rolling the dice.
1password is probably a perfectly viable and safe solution, and I am not dissuading anyone from using 1password. But I would not go so far as to say that you can't go wrong with them.
A widely used, open source password manager is probably a safer solution, because countless programmers, world-wide, can walk through exactly what those programs are doing, and identify any cracks or any intentional shenanigans put in place by its developers.
@1:58 -- BitWarden is open source.
@2:18 -- KeePass is open source. I use KeePass.
@6:03 -- Roboform.
I once installed the free version of Roboform, and it constantly nagged me with pop-ups to upgrade to a paid version. I e-mailed their support personnel, and they wrote back that the pop-ups cannot be disabled.
That folks, for me, is a red flag. I do not trust them.
Since then, did they ever include a "do not nag" option? I do not know know. I have no interest in finding out, when there are other excellent solutions available.
Even if Roboform now allows you to disable the nagging, why should I trust those developers / executives from Roboform?
Lastly, be very careful from where you download any software, especially financial and security related software. Make sure you are on the genuine site, and not a look-alike.
1
-
@joelhodoborgas I keep a copy of my comments, check later to see if they survived. If they are gone, I copy / paste the comment, again.
Sometimes it takes a day or two, and several attempts. Usually my comments eventually survive. But it should not be that way.
youtube and parent, google, are not free speech platforms, and violate section 230 of the Communications and Decency Act.
Hopefully, President Trump will remove section 230 protections from them, for being editors, which is prohibited by the Act (other than for illegal content).
1
-
1
-
1
-
@5:33 -- Cancel President's day.
I agree.
Since the holiday's inception, it was named "George Washington's Birthday". But radical leftists hate America. Ergo, they hate George Washington.
So leftists decided that Carter and Obama should share the glory, and diminish the the achievement of George Washington, who started a new nation, fought a horrific war to start our nation, and created a Constitution that protects our freedoms and led to the end of slavery. Also, George Washington was the first President to voluntarily step down at the end of his term. He could have refused, and anointed himself a king. That was critical to the survival of our new nation, and spoke volumes about the integrity of George Washington.
So leftists decided to water down President George Washington, by canceling the celebration of his birthday, and turning his holiday into a meaningless "President's day" holiday.
So, yes, cancel President's day, and reinstate George Washington's birthday.
1
-
Some of the Democrats are just plain stupid, and some of them are just plain evil.
As to the stupid ones:
They have the gift of gab. So their mouths moves and words come out, and they assertively "tell it like it is", even though they are clueless.
Then there are smart Democrats that lie, as easily as we breathe. They know that Putin has nearly nothing to do with the price of gas. And whatever role Putin does play in the price of gas, it is because Democrats gave him that role. How?
We have more oil in Alaska than the Middle East and Russia, combined.
We need not be dependent on anyone, whatsoever, for energy. In fact, we can unilaterally supply fuel to the world.
So other countries that set prices are doing so, because Democrats allow them to do so, because Democrats created our dependence on them.
If we produced fuel without government (Democrat) restraints, a gallon of gas would be below $1 per gallon.
1
-
@3:18 "...for both genders. For all genders. Whatever."
That is an example of caving in to the radical left's brainwashing.
Dana Perino's brain has been infiltrated.
Once you acknowledge that more than two genders exist, you have been indoctrinated. Not necessarily in a major way. But the radical leftists have made headway with her.
Even if Perino does not believe it, she is brainwashed to the extent that she propagates the nonsense.
She caught herself saying "both genders", and corrected her language (even though her language was correct). And that is a win for the radical leftist's agenda.
For her to correct herself, where no correction is proper, is a sign of her accepting the propaganda of more than two genders.
She said "both genders", and should have left it at that, because there are only two genders, and she knows that there are only two genders. Yet, she caved in to the propaganda, and for that moment, became a tool for the propagandists.
By the way...
If a teacher wants to teach students about feelings, then that should be in a "feelings" class; not in a math class.
Just as class on learning Spanish should not include learning how to repair automobiles.
Leave it to radical leftists to wreck all that is good.
1
-
Space does not expand. Space is the absence of everything. Whatever is out there is out there. Whatever is not out there is not out there.
The stuff that occupies the space moves around; travels, due to gravitational forces that all objects exert on each other.
And, of course we see galaxies moving away from us (expanding). But that is not "space" expanding. That is just those stars moving away from each other.
As to this host's claim of what someone, positioned on the edge of the observable universe, would see, if they looked outward:
This host claims "Space never looks like that", alluding to that that person would not see nothing, when looking outward.
Well of course space never looks like that, from our perch in our galaxy. But she does not know what it would look like to someone in a galaxy on the edge of our observable universe.
It is unsettling when supposed authorities make up nonsense, rather than admit that they have zero clue to a specific topic. I would have respect for this host, if she just stated that we are still searching for that answer. But, instead, she fabricates that "space" (nothingness) expands, as though space is an object (space is the absence of objects -- space is nothing, and you cannot make nothing into more nothing). If you have no apples, then I cannot have "more" no apples than you.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
All storage mediums (with the exception of punch cards), no matter how much care is taken, are subject to data fade.
The magnetism that denotes zeros and ones will, over some long period of time, become unreliable for a portion of the stored data. This will probably take 10+ years to be an issue, or even longer.
The drive can still be 100% functional, and still have a few zeros or ones get lost.
This is easily remedied.
Every few years, copy your storage drive to another storage drive. Then format or erase or delete the data from the original drive, and copy it back, again. New magnetic adhesion will now be with the data on the originating drive (the old data is now newly written, starting the data fade clock from day 1).
And if you have used less than half of your storage drive, you can simply create a new directory (or partition), copy everything there, and then back to its original location. But make sure that the data actually gets copied back to its original location (and the the computer does not ignore copying files because the files still exist -- the files must be written, anew, to the original location).
And keep a minimum of two drives that have the same data. Ideally, three drives works well, because you can keep your working drive and a duplicate drive in your home, and you can keep the third drive at a friend or family member who live elsewhere. This protects you from loss due to fire or a burglary.
-- You pay zero to google or anyone else to store your data.
-- You need not trust google, microsoft, etc, with your data.
-- You are never at the mercy of your internet connection, in the event that you need your backup data.
-- Your up-front cost is minimal.
-- You remain in control of your data.
By the way, stop using Windows (especially version 10). It tracks every keystroke, every mouse click, and every file access.
Use one of the scores of free, open-source Linux operating systems. They contain no spyware or tracking or privacy issues.
Unsure which Linux distribution to use and want it to be user friendly?
Then install Linux Mint.
https://distrowatch.com/ will have links to "mirrors" from where you can download just about any Linux distribution on the planet.
Linux: Almost without exception:
Free, open-source, reliable, bug free, virus free, less vulnerable to attacks, and faster than Windows.
Cheers!
1
-
1
-
1
-
1
-
@3:43 "Then, he (Trump) sets up his own social media site"
@3:57 "...and there's nothing these other sites can do about it..."
All, the above is short sighted, because our host is underestimating the depravity of the radical left. How so?
Every computer that is on the internet (which is 99.99999999% of all computers) is at the mercy of their internet service provider (ISP).
For example, Comcast (which owns the radical left NBC stations), can block traffic to or from any person or any web site or anything on the internet.
So Comcast can block all requests that go to President Trump's site, and they would likely use the same excuses that twitter and facebook are using.
All of your internet activity, 100% of it, goes through your ISP.
If your ISP has an equipment failure, you lose 100% of your internet access.
So you know that you are 100% at the mercy of them not blocking you or the sites you visit.
Do not be surprised when they block President Trump's sites, and eventually blocking sites that support President Trump, and even eventually blocking all conservative sites.
Remember that the radical left is not stupid. Rather, they are evil.
They will do anything to reign over you. Blocking President Trump's sites is a no-brainer for them. They will do so without hesitation, and with glee.
Cheers!
1
-
When I purchased my first laptop, I did so from Micro Center. That was because I did not want to have the problem that was reported by the person that wrote in for this video.
Micro Center has all of their laptops on display, and you can get the feel of their keyboards. So if you have a Micro Center within a reasonable driving distance, then you might want to check out your candidate laptop, before making the purchase. Best Buy, I believe, also has their laptops on display -- but Micro Center probably has a wider selection. Costco also has a decent in-store, hands-on display of laptops.
Amazon reviews can be helpful. But even if some customer writes a review stating that the laptop's keyboard is very good, their hands are not your hands. Nothing beats typing on the keyboard with your own hands.
By the way, I am using a Gateway2000, programmable keyboard, that was included with my 1993 purchase of a DX/2, 66mHz PC, with 8MB of RAM, and a 340MB hard drive, running DOS 5.0. With every PC upgrade over the years, I continue to use this same keyboard. I never had any issue with it -- built like a tank, and the programmable keys (remapping and macros) are great. The only thing I lost is the software that allows you to save the keyboard's settings to a file, and load any of those saved files back to the keyboard. I searched everywhere on-line, to no avail.
1
-
1
-
Two additional BS terms, coined by radical leftists:
1) Sanctuary cities.
Sanctuaries are for innocent people seeking refuge from political tyrants; not for law breaking border crossers. Those people are criminals. As such, they are fugitives from justice.
Ergo, cities that protect criminals -- cities that protect fugitives are "Fugitive cities".
Never call them sanctuary cities. The "sanctuary" adjective implies goodness. So radical leftists turned that adjective on its head to make organized, government run, criminal crossings, sound benevolent, by calling cities that protect the criminals "sanctuaries".
When you give aid and comfort to criminals, then you are co-conspirators.
Always call those cities "fugitive cities".
2) Critical race theory:
There is nothing critical about a fabricated, race baiting, divisive, hateful, get rich scheme.
Just as CNN and NBC are fake news channels, so it is with "Fake critical race theory".
FCRT is critical only to those that profit from its BS agenda, and critical only to those that spread its propaganda.
What's next?: Critical gender theory? Critical child sex theory? Critical defund the police theory?
Always refer to it as "fake critical race theory" (FCRT), the same as referring to some channels as "Fake News".
Whenever you hear an expression by the radical left, and it makes your brain hurt, then take a moment to dissect their expression, and you will find a gross misuse of the meaning of words. Or to put it another way, an attempt to re-define language.
Never let them get away with it. Never use their language. Always correct their language.
If you use their language, then you give credence to their language.
1
-
1
-
1
-
1
-
Where is President* Biden's condemnation of John Kerry, Nancy Pelosi, Tom Carper, Raphael Warnock (all Democrats):
https://www.youtube.com/watch?v=434qo6l9_dg
Where is President* Biden's condemnation of Anthony Fauci:
https://www.youtube.com/watch?v=O1DT---dYs0
Forbes knows about the above mask violators, and does not tie it to this "Breaking News" Biden plea.
Why should the public take these power-hungry tyrants seriously, when none of them practice what they preach?
Why should the public give a thumb's up to "Forbes Breaking News", when they knowingly and intentionally do not report this hypocrisy?
Why does the author of "Forbes Breaking News" hide in the shadows?
Notice how the viewers have no way to know who actually prepared this video. This is how propaganda works. Make a presentation that attempts to look reputable, yet provide no credits for the person responsible for the presentation. This, too, is done intentionally.
When news was real, you were always told who was doing the reporting. There was never any guess work. You knew who everyone was.
With Forbes Breaking News, it is Mr. Anonymous presenting their version of what is supposed to be news.
1
-
1
-
1
-
1
-
1)
When AI uses closed source code, that should be disclosed. A warning that the AI is programmed by people that might have an agenda, and the output from the AI might reflect such an agenda. Ergo, the output from the AI should not be trusted, implicitly.
The output from an AI will likely contain the biases of the people that programmed the AI.
2)
If an AI is used to impersonate a public official ("deep fake"), or a person running for public office, a public service warning must be included with that impersonation, unless the impersonation is clearly obvious and intended for satire.
3)
If an AI is used to impersonate a public official, for the purpose of issuing a public announcement that is deemed to be from that actual public official, then any harm that is a result of that impersonation will be a violation of the law.
This would be the same as someone wearing make-up, or a mask, and portraying themselves in an official capacity. For example, it is illegal to impersonate a police officer. So if you use an AI to create a deep fake of the Police Commissioner making a public announcement, that would be illegal -- assuming it was not clearly for satire.
4)
If you use an AI to impersonate the CEO of a company (or any executive of a company), then any harm that falls upon the company, as a result of the AI's impersonation, will hold the creator liable.
For example, we can't have a deep fake of a CEO of a food distribution plant making an announcement that baby formula is contaminated with botulism. Anyone creating such a deep fake would be in violation of the law, as well as financial losses of the company, and financial losses of the public for discarding safe food, and chaos that would overwhelm hospitals, etc.
The above goes for impersonating a doctor, a lawyer, or any person that the AI can impersonate and bring harm to the public.
We must not have an AI of the President announcing that missiles were launched, or that biological agents were released in major cities, or that banks are defaulting, etc.
We also must not have AIs spreading fake news, unless the criteria for #1, above, is established.
We should strive for all AIs to make their source code available to the public, and to distrust any AIs whose developers refuse to have their source code examined by the public.
1
-
1
-
For the uni-party Republicans that vote in favor of this bill, it will come back to bite them in the butt.
They will be the target of its abuse.
They will be locked up for breaking the unconstitutional law that they endorsed.
The bill allows the government to deem your past communications as permissible evidence against you. Your free speech, used last year, or last decade, etc, will be permissible evidence for your prosecution. As soon as an election cycle gives Democrats enough power, they will start locking up the very Republicans that voted in favor of this unconstitutional law.
So if this bill becomes law, then expect to see Republicans switching parties, or simply rolling over for Democrat demands, in order to keep themselves from being prosecuted.
The Republicans that vote in favor of this bill have still not grasped the evil of the Communist leadership in the Democrat party.
The Republicans that vote in favor of this bill are so enveloped by their positions of power, that they have deluded themselves into believing that they have some shield, or influence, that will keep them from being incarcerated or turned into a hostage to their Democrat masters.
1
-
1
-
1
-
1
-
If your computer has enough RAM, then I suggest you run a virtual machine (VM). Oracle offers a free and open source version named Virtual Box.
There are other companies that offer virtual machines. But Virtual Box is noted to be the easiest one to use.
On your VM, you can visit any site you want, and accept any cookies. When you are done, you can have your VM reset to before you did your browsing. Your VM will be returned to exactly how it was before you just used it. And Virtual Box makes it simple to revert back to its previous status.
You can take a snapshot of any given moment and restore that snapshot.
You can even take a snapshot of your VM while it is running. Later, when you start up your VM, it will be in its still-running state, exactly how you left it when you took your snapshot.
The hardest part is setting up the VM. It is not that difficult. But it is the most involved part of the process. You will have to have a Windows 10 (or XP, or 7, or 8, or 11 -- your choice) ISO file of Windows. You can download, for free, a Windows 10 and / or a Windows 11 ISO from Microsoft. So no problem there. But you have to have the ISO file to feed into Virtual Box. It is a one-time process.
Once you have your VM ready, you should take a snapshot (a simple menu item choice). Now you can return to that snapshot whenever you want.
No matter how royally you might screw up your VM with malware, etc, you simply tell Virtual Box to restore your saved image (snapshot). That takes less than 2 seconds, and you are good to go.
Download Virtual Box from Oracle's web site. Nowhere else. The same goes for any other company's VM offerings.
Download the ISO file from Microsoft. Nowhere else.
You will need a minimum of 4GB of free RAM to run a VM. I suggest devoting at least 8 GB of free RAM to your VM. If your computer has only 8GB of RAM, then you will need more RAM.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
For the Panama Canal, nothing other than outright USA ownership is acceptable. Otherwise, we remain at the mercy of whoever is running Panama.
Once President Trump's service to our nation ends (in 4 years), we can probably kiss all of President Trump's efforts goodbye.
But when we own it, then no one can change their mind and take it back.
As to buying the Canal from Panama. No.
We built it. We paid for it with our tax dollars and thousands and thousands of lives. And our thank you, from the Panama overlords is to not only charge us for using what we built and paid for, but to wildly overcharge us for what we built and paid for.
They screwed us. So when will we learn to stop leaving ourselves opened to be screwed?
We take back the canal, and we charge the fees, and we determine the fees, and we decide whose ships may pass. The Panama overlords will not like that. Too bad, and too late. They should have thought of that before treating the people that built it like vermin.
If we do not own it, then when President Trump leaves office, or perhaps a 10 years later, we will be right back to square one. We must own it, and never gift it back to them or anyone else.
1
-
1
-
1
-
@1:32 -- John Kirby gave a speech, and he probably got help from Kamala Harris, as such a word salad is not easily created.
He implied, over and over, that there is no threat, while also saying that he needs congress to pass new laws to blah, blah, blah.
I hope that if an actual missile strike is detected, that John Kirby does not say "we need congress...", while the missiles are incoming.
So I will translate John Kirby's rhetoric:
-- He has no clue who is flying those drones.
-- He has no clue what purpose those drones serve.
So just as a 3-year old could truthfully say that they know of know danger, so did John Kirby.
One other possibility is that John Kirby is lying. It is what the leadership of his party does, as easily as the rest of us breath.
Those could be government drones, and John Kirby is simply lying to We The People.
Thank goodness we will be rid of President* Biden, and senior government officials like John Kirby, come January 20th, 20205.
Think of how refreshing it will be to hear our next, new, Trump appointed National Security Communications Advisor to just tell the truth.
1
-
1
-
@4:57 "...what appears to be a retraction."
Rashad Richey's new words reflect nothing, whatsoever, with the definition of the word "retraction".
Rashad Richey's new words are to protect Rashad Richey. That's it.
Rashad Richey's words are him trying to re-word his original words, where he lied and lied, and slandered that woman.
Knowing what Rashad Richey knows now, if he could lie some more, and convince a jury that that woman did what he claims, then Rashad Richey would lie some more.
Rashad Richey is no ordinary racist.
Rashad Richey goes out of his way to slander white people.
It is one thing to be a racist in your private life, where you insult your neighbors or co-workers.
It is another thing to go on TV and spew your racism on the airways.
He would likely ruin the lives of every white person he sees, if he had the means to do so. His world revolves around his racism.
Do not accept his BS re-wording. Do not forgive him. Do not assume he was too quick to judge. He did what he did, deliberately.
The only consideration you should give him, is if he apologizes without any twisted language (a flat out allocation), and he resigns. Anything less is Rashad Richey using word salad to protect Rashad Richey. Anything less is a retreat. And in a battle, Generals will tell you that a retreat is not a surrender. A retreat is to escape so that you can re-group and attack, again. Do not let Rashad Richey retreat.
1
-
1
-
1
-
@dfs-comedy Thanks for the info.
Is Kdenlive what our host used for this posting?
By the way, if there is something that I want blocked-out, there is no way I would use youtube's editor. Because I would have to hand over my "unblocked" video to them, to allow them to then block the parts that I need blocked. And I do not trust anything related to google, the biggest spyware entity the world has ever known.
I would not upload my video, until I "locally" did my edits, keeping private information from ever touching a google service.
google, and therefore youtube, has the resources to easily keep copies of original, unedited content. Not that anyone at google/youtube is looking at my uploads. But should some unknown person become a person of notoriety, a person of interest, a celebrity, a political person gaining notoriety, then that is when google/youtube will be able to easily pour through that person's full, unedited, history of uploads.
I will lay any odds that executives at google/youtube have a blast, looking at what movie stars and governors (and their staff) upload, before edits. How could anyone resist having those unfiltered versions of famous people's videos, and not look?
Just a note of caution to folks that care about their privacy, before they inadvertently use youtube to edit sensitive sections up their uploads. For routine edits, where privacy and security are a non-issue, then youtube's editor is a convenient choice. Otherwise, stick to editing, locally, on your own computer.
1
-
1
-
@0:39
"...but we're still facing the right direction"
Perhaps the car is facing the right direction. But the camera certainly is not facing the right direction.
Top Gear:
Why do you focus the camera only on faces? We can always see faces.
What we cannot always see is what you are seeing when racing the car.
What we cannot see, and what you should have let us see, is what you were seeing. Let us see the road! Let us get the same first-person perspective that you are getting.
The way this video chose its camera angles, we might as well be listening to it on the radio. There is nothing to see.
And not for nothing, you had a camera mounted in the car (we can see it) that is in the ideal position for viewing the road. Yet for reasons that are buried in Area 51, you deny us the footage from that camera. And admit it. You (Top Gear) watched that footage, and you enjoyed that footage, and you chose to not share that footage on youtube. Why?
Surly you must have a reason for only showing us the host's face?
Is the host in love with himself, and thinks he is doing the world a favor by showing us only footage of his face?
@1:54
"If I had to describe it"
You would not have to describe it, if you let us see it. The whole point of having it on video was defeated, because you did not let us see the video.
If the point of this video was to show us two guys shaking in a car, you succeeded.
1
-
1
-
1
-
Our host is connecting dots that are not there.
It makes zero difference whether or not a customer knows that Walmart checks your receipts.
What if Walmart had a policy that states that they can pat you down and do a cavity search? Well, you know about it, before entering the store. Right?
And that countless people cooperate, and show their receipts, makes no difference. Those same people could have themselves patted down and have cavity searches. So that means that you, too, have to comply?
Yes, if a store has reasonable grounds to detain you for stealing, then that is lawful. And in the case of the person spoken about in this video, the store did have reasonable grounds, because that customer set them up.
But if you walk up to a shelf, take a box of cereal, pay for it, and walk out the door, then Walmart's personnel may not detain you.
And then there is this language game of whether or not Walmart's personnel can ask to see your receipt. Well of course they can ask you. They can ask you to go bowling. And you can decline their request.
Even the person that set up Walmart for the law suits proved that. He did not get charged with a crime, because he committed no crime. He was under zero obligation to show anyone a receipt.
The law worked exactly as it should:
-- A customer makes a purchase.
-- That same customer pretended to steal.
-- Walmart personnel asked him for a receipt.
-- That customer declined their request.
-- Walmart's personnel detained that customer (yes, he was detained, because he did not show them his receipt -- but he was detained).
-- The police showed up, and the customer proved that he did not steal anything, by way of his receipt.
-- Everyone went about their day.
The court threw out the customer's law suit, because the customer tried to get detained.
If you do absolutely nothing wrong, and a Walmart employee asks to see your receipt, you do not have to show them your receipt. In fact, you do not have to take a receipt when you make your purchase.
If Walmart's personnel detain you (without reasonable grounds), then your law suit would very likely have different results.
Lastly, you (the customer) have zero obligation to participate in the store's loss prevention. So saying that you have to show your receipt, to help the store, is absurd.
If Walmart truly wanted to minimize losses, then they would end self checkout.
When Walmart chose to add the risk of losses, by having self checkout, then they are on the hook for their own security decisions. You have nothing to do with it.
You make your purchase, and you walk out the door. If you are stopped, you are under no obligation, whatsoever, to help Walmart with their policies. You do not work for Walmart.
1
-
1
-
1
-
@8:23 "(stereo) sound quality is pretty good for the class"
No, it is not. Honda dropped the ball or chose to save $$ by including a BS stereo system.
I own a 2003 Nissan Sentra and a 2020 Accord Sport 2.0.
The stock stereo in the old Sentra is much better than what comes with any of the Accords.
This is subjective. If you go strictly by volume, then the Accord's stereo gets louder (not by much).
But you get louder junk. Like having a choice between a 50" super sharp TV and a 103" blurry TV. Give me the sharp one.
Consider having a choice between a normal sized portion of a meal prepared by a top chef, vs a huge meal prepared by McDonalds.
The McDonalds meal is larger (gets louder, so to speak). But give me the meal prepared by the top chef, and I will forego the extra sub-par servings from McDonalds.
The old Sentra's stereo is not quite "top chef" caliber. But it is closer to "top chef" and the Accord's stereo is closer to "McDonalds".
What makes the old Sentra's stereo so enjoyable, so engaging, so non-fatiguing, is that it gets out of the way of the music. It presents a wall of music, and separation of singers and separation of instruments. You forget that you are listening to a mechanical device, and, instead, you are treated to a musical presentation.
One way to identify a quality stereo system is to close your eyes and have your ears identify the location of the speakers.
In the old Sentra, you can't do that. The speakers disappear, because they throw a soundstage.
In the Accord, you never forget that you are listening to a car stereo. The speakers do not "disappear".
In the old Sentra, I have gone on long drives, and have played music for 2+ hours, and enjoyed every minute of it. I never get the urge to turn it off. Not so in the Accord.
In the Accord, after several minutes, the music becomes distracting and borderline annoying. I find myself constantly skipping to different songs (because too many songs just do not sound right).
By the way, when I was shopping for the 2020 Accord, I was considering the Nissan Altima (did not relize that Renault now makes them unreliably) and also considering the Toyota Camry.
Both the Altima and the Camry's stereos sound similar to the Accord's stereo. None of them are very good. They are so-so.
And you cannot upgrade the stereo via Honda. They offer no premium stereo (even if they call theirs premium, it is not -- it is just a less bad stereo with then labeling it as premium).
And you cannot upgrade the stereo after-market, without voiding the entire car's warranty.
The reason the warranty will be voided is because the stereo is wired in to the touch screen display, and the touch screen display is wired in to stuff all over the car -- stuff that is unrelated to the stereo. So Honda's position is that if you tinker with the touch screen, you essentially tinkered with the proper functioning of the vehicle, and kiss your warranty goodbye.
You can probably upgrade (after market) the Pioneer speakers that come with the Accord (they are not good speaker -- nothing Pioneer makes is very good), and maintain your warranty.
But you cannot upgrade the Panasonic head unit that is entangled into the touch screen display -- and Panasonic is not terribly good, either.
Cheers!
1
-
It is amazing how quick so many people are, to condemn the police officer, with virtually no evidence.
We have not heard one word from the arresting officer.
We have not seen the arrest report.
We have neither seen nor heard the body-cam footage. We do not even know if there is body-cam footage.
And yet, nearly everyone leaving comments is taking Scott Shearer's version of what took place, as the gospel.
What happens if it turns out that Scott Shearer was in the wrong? Would you want people, like yourselves, who jump to conclusions, on your jury, deciding your freedom?
We do not know who was right, and who was wrong. They might both be wrong. There might be blame to go around.
I am not sticking up for the officer. I am sticking up for due process and blind justice. If the officer is at fault, then hold him accountable. Right now, we do not know.
1
-
@7:12
"When she realizes the judicial supremacy over such things..."
We have three co-equal branches of government. None of them are supreme.
The executive branch is not compelled to cower to or obey the edicts of the other branches of government. So the President can order the wall built, without the consent of anyone else, and against any court rulings, and there is virtually nothing anyone could do to stop him.
President Trump knows this. But for the best optics, he is seeking, and getting, supreme court rulings that green light's his positions. He is smart to handle it this way (but is not compelled to handle it this way).
The only remedy available to the people, if they feel a President is out of control, is impeachment, or re-election.
And, by the way, impeachment is available to not only oust a President. It can oust any elected official and any judge.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@aless5207 I wrote 3 words (fossil fuels rule), directly below writing "Two words" (that is the joke).
You replied with literally two words (reliable fuels). That conveys that you did not understand the joke, because the joke is writing "Two words" and then using 3 words. You used 2 words. Ergo, you did not understand the joke.
I replied to your "reliable fuels" comments by writing "That's not two words" (continuing the joke, because you actually did write two words).
You then replied "Are you sure? :)", which, again, conveys that you did not get the joke, because I wrote that your two words were not two words.
At that point, it was clear that you did not understand the joke, because you did not see President* Biden make a fool out of himself by saying "Two words", followed by saying 3 words.
So I took the time to explain it to you, so you could watch the video. And instead of you replying with "Thank you", you wrote:
"I know it :) I mean
Two words: Better name is reliable fuels :)"
No, you did not know it, or we would not have this back and forth dialog.
No, you did not know it, because you are still using "reliable fuels", which is 2 words, and that is not the joke.
Writing "Two words", and then using 2 words, is not the joke. So, no, you did not know it.
So either you are playing dumb, or you are dumb, or you are trolling.
Two words:
Troll someone else.
1
-
1
-
@4:04 "Data shows that undocumented (illegal) immigrants, on average, commit fewer crimes, than native born citizens".
Let's unravel that BS:
1) Native born citizens commit the types of crimes that illegal immigrants do not.
For example, cheating on taxes. And illegal immigrants report far, far less crimes committed on them by other illegal immigrants -- so no record exist.
2) Illegal immigrants commit far-and-away more crimes than native born citizens.
3) Notice Melnek's use of "on average".
When you add up the number of crimes committed by 330,000,000 native born citizens, then of course they, in their totality, will commit more crimes.
Melnek did not mean on a 1-to-1 basis. Melnec was comparing, perhaps, 25,000,000 illegal aliens to 330,000,000 native born citizens. So of course the far larger group will have more crimes on record, affecting the average.
In other words, 330,000,000 native born people commit, let's say, 1,000,000 crimes.
But 25,000,000 illegal aliens commit 950,000 crimes. And Melnek reports that as average Americans committing more crimes.
Very deceptive.
4) If white people commit less rape than black people, then according to Melnek's rationale, we should excuse white people for committing rape.
As long as it is less, then nothing to see here -- according to Melnek.
1
-
@1:23 "It's rare for a vulnerability to be discovered by the good guys, before it's discovered by the bad guy."
I wonder about that.
When the good guys discover a vulnerability, they patch it. Are we going to hear about that?
Especially if a vulnerability was discovered by, and patched by, Microsoft. Unless we look up the details of a KB reference in a Windows Update, we will not know that the good guys discovered a vulnerability.
With 3rd party software, many frequently release updates. How many of us pay attention to vulnerability patches?
We tend to notice mostly feature updates.
For example:
Mozilla's Firefox constantly releases updates. I have never kept track of how many of them fix a vulnerability, and how Mozilla came to learn of the vulnerability.
When we do notice an update / patch for a vulnerability, how do we know how that vulnerability was discovered? Was it discovered by good guys or bad guys?
Sometimes we will know. But often we will not know, unless we make a concerted effort to take a deep dive into the update. Do you (anyone reading this) know anyone that does that?
It would be interesting to hear from a key Microsoft developer (or a project manager for updates), and find out what percentage of vulnerabilities are discovered in-house vs. in the wild.
It could be that 99% of vulnerabilities are discovered, and fixed, by the good guys. And since nobody is perfect, eventually a bad guy discovers one that the good guys missed. That one gets the attention of the computer enthusiasts / professionals.
Or, perhaps 99% of vulnerabilities are discovered by the bad guys? Or is it 50/50? How can we know?
1
-
1
-
1
-
The black woman was not delusional. She is simply evil. She is also a racist, for accusing the officer of being a racist.
Please do not inadvertently defend or excuse the acts of evil people, by stating that those evil people do not understand, or that they are stupid, etc.
That black woman knows exactly what happened.
That black woman knows exactly what she did.
That black woman knows that she caused that accident.
(I would love to see "Ring" footage from a home at that intersection, showing her rolling right through that stop sign)
Everything she is doing is an act.
Everything she is doing is an attempt to use race to talk her way out of being culpable for her crime (traffic laws are part of the criminal procedural code).
Also note that she is talking over the police officer, and trying to stop him from giving her information, so that when she goes to court, she wants to say that the officer never said (fill in the blank), or that she did not hear the officer say (fill in the blank), and the officer's body cam footage will bare that out. That is why, no matter how many times she interrupts the officer, he waits until she stops talking, and he says what he has to say, so that it is part of his body cam's record.
If she did not sign that she received the ticket, then she would have been brought to jail, in order to get it on the record.
Since traffic violations are criminal offenses, you can be cuffed and taken to jail for any traffic violation. The arresting officers using his/her discretion, and almost without exception, releases the law breaker at the scene. But if you become too combative, the office can take you to jail. So if you refuse to sign that you received the ticket, you will go to jail.
1
-
1
-
1
-
1
-
1
-
There are also lots of cases where legitimate people ask for help with some aspect of their crypt-o status (stuck transaction, help with an exchange, fees, etc).
That is when scammers reply, pretending to want to help, by pretending to be a "help desk" or part of a "help center".
In the scammer's reply, they usually give a ticket number and instructions on how to take their session private.
The scammers want to get the person needing help away from the public forum, because in the public forum, countless other people will see what the scammer is doing and warn the victim. But in private, the scammer has a much better chance at pulling off his criminal act.
Never accept an invitation to have a private dialog with a stranger over any crypt-o related issues (or any medical or financial issues).
Also, never install crypt-o software, other than from the actual developer's official web site. Much of the 3rd party tools (that are all tempting to use) will steal your information, and drain your digital wallet.
1
-
-- What is the name of the school?
-- What are the names of the school board members?
-- What is the name of the school board member that was speaking?
-- Which school board members voted in favor of segregation?
-- Which school board members voted against segregation?
-- Which school board members did not vote?
-- Did any of the school board members state, at that meeting, their disgust for the board members that approved segregation?
This is not something a "normal" school board member should remain silent on.
Those racist board members control the curriculum and the material being "taught" (for lack of a better verb) to young minds. Along with racist teachers, those board members are the indoctrinators.
We should not have nameless faces spewing this racist crap. The public, the tax payers, the parents should know who they need to fire / vote off of that board.
Note that the radical left white board members, that voted in favor of segregation, are elitists. They are (in their own minds) better than, and above, black people. They see black people as inferior, and they see black people as incapable of advancing without the crutch being offered by them (them = the radical left white board member).
And these are not your average, every day, John Fitzgerald Kennedy, liberal Democrats.
These are "radical" Democrats.
No normal person would vote in favor of segregation.
If John Fitzgerald Kennedy were alive today, he would be lambasting those radical, racist school board members.
1
-
1
-
Both the CDC Director and the President are correct.
Yes, wearing face masks is a good way of preventing the spread of the virus.
No, wearing face masks is not a good idea in some situations.
In other words, although the population, in general, should wear face masks, there are circumstances where wearing a face mask can contribute to spreading the virus.
President Trump gave an example, where he said that restaurant workers will touch their masks, and then they will handle the plates of people in the restaurant. So if you have a restaurant employee that is contagious, then their mask will be full of germs. Then, all it takes is for them to adjust their mask, press on it for an itch, or for any other reason. Then they will have the virus on their hands, and they will spread the virus.
Should people wear masks? Yes.
Is wearing a mask the best practice for 100% of the public? No.
1
-
1
-
1
-
You need the Pro version of Windows, to create a BitLocker volume.
But any version of Windows will be able to read a BitLocker volume. Ergo, your Home version will be able to access a BitLocker volume, that was created by a Pro version of Windows.
I discovered this when one of my Seagate drives failed, during its warranty period.
Part of the warranty included free data recover.
Seagate puts your recovered data on yet another drive.
They asked me if I wanted encryption. I told them "No.", because the data was useless to anyone else. But, when I got my recovered data back from them (on a physical drive), it was BitLocker protected (Argh!). And Seagate did not give me the password. I was able to call them, and they answered right away, and gave me the password.
I was able to use that password to see the recovered data on my Windows Home computer.
Seagate's warranty process was very good, and I got a free drive, too. They replaced my failed drive, and sent my recovered data on another drive.
Note that if they recover only 1TB of data, then they will send you it on a 1TB drive. So if your 5TB drive looks like it is going to fail, then fill it up (with anything) before it fails. The more data that Seagate recovers, the larger the drive will be that they ship you with the recovered data.
Check your warranty to verify if free data recovery is included.
Note that Western Digital's recovery service is the opposite of Seagate's recovery service.
WD makes it a chore to have your failed drive replaced. They are difficult to contact, and they try to add fees to have them replace your failed drive, have no free data recover, and takes months for them to ship you your replacement drive -- and that is assuming that you call them once per week to make sure that they do not ignore your ticket.
1
-
1
-
1
-
Adams is complaining about busses arriving at any hour, without warning.
That is like complaining that the police have to respond to a crime, at any hour, without warning.
That is like complaining that the fire department has to respond to a fire, at any hour, without warning.
That is like complaining that ambulances have to respond to medial emergencies, at any hour, without warning.
That is like complaining that the transit department has to respond to commuters, at any hour, without warning.
Etc.
Adams knows that thousands of illegal immigrants are arriving every day, 24 hours a day. So what would be different if he was given advanced notice that they would be arriving? He already knows that they are arriving, every day, 24 hours a day.
Adams wants the notice, as an excuse for him to complain, and to try and shift responsibility elsewhere.
Mr. Mayor:
You know the flow of illegal immigrants into NYC. You are in charge. You are responsible for handling the crisis that you and your radical leftist Democrat party created.
If Adams were to officially tell President* Biden to build the wall...
If Adams were to officially tell President* Biden to secure the border...
If Adams were to officially tell President* Biden to enforce immigration laws...
If Adams were to officially tell President* Biden to send agents to deport 100% of illegal immigrants...
...then Adams would not have this problem.
But Adams, being the radical leftist that he is, would rather go down with his sinking ship, than change is stance on illegal immigration. Adams can save his sinking ship, but refuses to do so.
1
-
This video was not about the cars. Rather, it was about the video editing room.
This was more of a movie production, and not about actual racing.
-- Every shot was for only a second or two.
-- Every shot had either the camera shaking, or zooming in and out, or special effects.
-- Nearly all of the video from inside the car was of the driver's face. We did not get to see the road, the way the driver sees the road.
It is a shame that people that have access to these cars, and race tracks, and camera equipment, that they can't seem to make the footage about the car. They have a compulsion to make it about the camera work and the post production video editing.
Just let us see the car racing, as if we were in the stands watching. Stop shaking the camera and zooming all around.
Also let us see the road from inside the car, and keep that angle for 20 or 30 seconds, uninterrupted.
Or is all of the camera theatrics and video editing enhancements due to the driver not having enough skill to properly demonstrate the car's potential, so you phony it up with all of the above BS?
Even when the Volkswagen did a straight line race against the McLaren, you still kept changing camera angles. As soon as we start to enjoy a scene, you change it. This is annoying.
1
-
1
-
1
-
@jdgoesham5381 If Walmart decided to pay all of its employees with pennies, that would be legal?
All employees (regardless of age and health) would have to haul heavy bags of pennies home, each pay day, and continue hauling and jump through hoops, in order to somehow pay their bills with pennies?
If you filled up your big-rig truck with diesel, the station's attendant is mandated, by law, to accept $250 in pennies?
If you owe $28,000 in taxes, your local government's office is mandated, by law, to take $28,000 in pennies?
When they refuse, the courts will order them to take the pennies?
I would like to see the man (from the video) who dumped the oil-soaked pennies in the employee's driveway, pay his settlement to the employees in pennies (even clean ones).
I would be in awe, even if he tried to pay his settlement in nickles. How would that go over? That same judge would tell the employees that they have to accept the coins?
1
-
Please note the "super pinned" comment, directly below the video (atop the title of the video, with a light-blue background). That super pinned comment stays visible throughout the entire video.
An anonymous youtube employee posted her comment, above all other comments. Her comment cannot be removed. Her comment has no reply button. Her comment has a colored background, to stand out above all other comments.
youtube's executives claim that they are not editors, granting them Section 230 of the Communications and Decency Act protections, shielding youtube from lawsuits. Yet, here we see an anonymous youtube employee being an editor. She is chiming in (that is editing), and she is doing so in a way that is superior to every other comment.
And this is not an accident by youtube's executives. It is not magic that allows this web page to have that functionality. youtube's executives ordered their programmers to grant anonymous youtube employees that screen real-estate for their personal views.
How many of us would love to have our propaganda stand out, atop all other comments, with a colored background, where even the channel's host cannot remove it or reply to it?
When will the Department Of Justice remove youtube's Section 230 protections?
1
-
In a free society, where our Constitutional rights are upheld, where our Bill Of Rights are protected, hate speech shall not be banned.
Case in point is that tyrants will ban your political speech, by labeling it "hate speech".
Our founding fathers specifically passed the First Amendment to our Constitution, the first of 10 items on our Bill Of Rights, to stop tyrants like that BBC interviewer, from banning free speech.
And, yes, that BBC employee is a tyrant. When someone tries to silence your free speech, that person is a tyrant. If that person gained enough power, we would all lose our free speech.
"We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness."
Without free speech, we have no liberty, and we have no pursuit of happiness.
Our rights, including free speech, are derived from our creator, and not from a radical leftist from the BBC.
1
-
1
-
1
-
1
-
@0:22
1) "ADVANCED" DRUNK AND IMPAIRED DRIVING PREVENTION TECHNOLOGY?
Is there a system that is not "ADVANCED"?
You see, the authors of the bill use language that makes it sound safe and reliable -- because it is "ADVANCED", all in UPPER CASE.
It is "ADVANCED", so it must be good. Right?
The first ever deployment of the system, and on the very first day, it is already up to the ADVANCED model.
2) "passively" monitor the performance of a driver...
How is "passively" monitoring the performance of a driver accomplished? And the bill does not state how "passive" monitoring is accomplished.
How would the same exact monitoring system differ if it were "actively" monitoring the performance of a driver?
Folks, it is "active" monitoring. But that would get the public to balk at the bill. So they call it "passive", when it will be doing "active" monitoring.
If it was truly passive, then it would not be able to detect whether or not you are impaired, and shut you down. Shutting you down is as active as active can be -- and yet they word the bill's language with "passively".
3) "...identify whether that driver may be impaired"
"may"?
So it is guess work.
I "may" win the lottery tomorrow.
I "may" get hit by a meteor while driving.
I "may" find a cure for cancer.
All of the language in that bill is written to give the elite access to control your car, so that they can control you.
When your passenger has a medical emergency, get ready for them to die, because your car will shut down on the way to the hospital.
1
-
1
-
1
-
That bill, if passed into law, would have given clemency to every deep state criminal. Yes, that was in the bill, to try and stop our next Attorney General from criminally charging members of the Biden crime family, Hilary, and the rest.
That bill also had $50,000,000,000.00 in tax payer's money for Ukraine.
And all you will hear from Bernie Sanders, NBC, CNN and the rest is that it the bill had disaster relief funding (and it sure wasn't the same as the Ukraine funding).
1
-
1
-
1
-
1
-
Rob, this was very enlightening.
I will be keeping a Windows 10 box at my disposal, for anything personal, and just be careful to not do anything risky when Microsoft ends its updates for Windows 10.
I avoid doing anything risky, anyway. But I will be all-the-more cautious with Windows 10, after it is retired by Microsoft.
In a pinch, I will run a Windows 10 VM inside of my Windows 10 box. Then revert that VM back to a known clean state after every use.
If this becomes too much of a hassle, then I will install Linux.
Of course, few people will take any steps to protect themselves. In fact, with Microsoft's propaganda machine, most people will probably salivate at Microsoft's spyware (not realizing that it is spyware). They will think that they have their own personal Sky Net on their desktop.
I like Windows for many reasons. I detest Windows for many reasons. But overall, Windows is intuitive and handles my workflow to my liking. But with this giant leap into a level of spyware never before seen in the history of our planet, I will toss Windows to the side and go with a Linux alternative.
Microsoft will know every keystroke (every password), ready to hand it over to any government agency.
-- Holy Hashing Batman. Not even local encryption is safe anymore.
1
-
1
-
1
-
1
-
1
-
@4:06 "...they (local police) can give it to the feds, who then give some money back, and not you got to go sue the feds."
Huh?
Steve, if I scam you out of $1,000 and give ½ of that to someone, you are not supposed to sue that someone else?
If the local police steal $1,000 from you, then regardless of who the local police handed any of it to, it is the local police that stole from you. The local police owe you your $1,000 and nobody else. After the local police are forced to return your stolen money, let them figure out how to get back the rest. Let them take the loss.
Stealing is criminal. Call it by an impressive sounding "civil asset forfeiture" name does not change the fact that it is stealing (it is a crime).
Civil asset forfeiture is legal, when an actual crime is involved (a suitcase full of narcotics, along with wads of cash). Absent such a crime... taking cash from people is stealing. The police officers (state, local, or federal) should be arrested.
@5:44 "These are all things they've actuall bought with money 'seized' from people."
Seized?
They stole that money from people, and should be arrested for mugging those people.
1
-
1
-
1
-
1
-
1
-
1
-
They are named "Humming Birds", because due to the very fast flapping of their wings, they make a "humming" sound.
But the author of this video decided that the viewers would rather hear random music, when we could have heard the humming sound from nature.
Many uploaders are obsessed with adding music, even to the detriment of the "you are there" experience.
I guarantee you that when the narrator of this video interacts with that hummingbird, he is not playing music. And yet he somehow concludes that although he wants to hear the bird, and not hear music, that we, on the other hand, want to hear music, and not hear the bird.
Go figure.
1
-
Does Microsoft get a fee for apps they deem to be "verified"?
It makes me wonder how much business EaseUS and countless other software companies (or even individuals) lose, when the general public does not put in the effort to get passed that warning message?
Is Microsoft using that warning message because they are truly concerned about our well being? Or is it a "Screw those who will not pay for a verified account", disguised as a "We care about you" message.
Although Microsoft has an ocean of resources, they are still in business for power and profit. For them to verify countless 3rd party applications, has got to be a huge labor cost. And nearly all of those countless 3rd party applications will release version updates that need to be verified. That is a daunting task, even for Microsoft, considering that 3rd party vendors will not want their releases to be delayed, waiting for Microsoft's verification blessing.
How is Microsoft absorbing that huge cost?
And since most 3rd party apps are closed source code, how is Microsoft verifying those apps as being safe?
Microsoft has gotten into the "You don't own your apps" game (such as Office now being rented by just about everyone that wants the app), and Microsoft all but forces you to rent your login (in a manner of speaking). Try setting up a new PC, without a Microsoft account (you need Microsoft's permission, via a Microsoft account) to use your new computer that you (supposedly) own.
Do you really own your Windows computer, with the Windows license that you also own (bundled into the purchase of your new computer), if you are not permitted to use your Windows computer, with your purchased Windows license, without getting permission from Microsoft (via a Microsoft account login which you are forced to use in order to use your computer)?
There is a way to bypass the forced Microsoft account login. But the public-at-large will not do so (or even know that there is a work-around, or have the tech skills to do the work-around, or not be too timid to do the work-around).
My point being that Microsoft is on a mission to funnel everything that you want to do through them. The more they control, the more they profit. So how are they profiting from forcing people to using only Microsoft verified apps? Just like the forced Microsoft login, people in general will not know what our host showed us, and will just not bother to install the software from a vendor that Microsoft has not verified. Is Microsoft telling software vendors "Pay me, or take a hike"?
Does anyone here have their app verified by Microsoft? How long did that take? What was the fee? Is it a one time fee?
Microsoft would not appear to me as being a shake-down company, if they gave the option to "Install Anyway" or the option to change the settings, right there in their warning message.
Microsoft does not even give a hint, in that warning message, that there is another option (the one our host showed us). This is no accident. Microsoft does not want the public to know.
1
-
1
-
1
-
@askleonotenboom I do not use BitLocker.
My only experience is when one of my external USB Seagate drives failed, and data recovery was part of the warranty. I had a backup, but Seagate sends you your recovered data on a physical drive. That is in addition to replacing your failed drive. So I took advantage of the free data recovery which resulted in a free drive, which will be the minimum capacity that will hold the recovered data.
The recovered data drive and the warranty replacement drive get delivered separately. The recovery drive comes from Oklahoma City, OK. The Warranty drive comes from Calexico, CA (assuming you are in the USA).
When I got my "data recovery drive", it was BitLocker encrypted (and they did not give me the password -- a phone call cleared that up). With the password, the data was accessible, which is what prompted me to make my initial comment. But I just formatted the drive and have it as a spare. The formatting cleared the BitLocker encryption.
As to what you wrote about the system disk being fully encrypted, and there being no password, that makes sense (and is news to me, because I do not use BitLocker).
Where is that "key"? It would be beneficial to have a copy tucked away somewhere. How would you apply that key if you put the drive into a different computer?
1
-
1
-
1
-
1
-
@0:05 "Not a joke"
Note that whenever President* Biden says "Not a joke" or "I'm serious" or "I'm not kidding", he is lying.
In the game of Poker, bluffing is used as a strategy. Sometimes, a plays has a "tell" that his opponents know about. The bluffer's "tell" gives him away, and the other players know that he is bluffing. It could be a nervous twitch, a roll of the eyes, a tapping of the finger, etc.
In President* Biden's case, it is his "Not a joke", "I'm serious", and "I'm not kidding" lines. When you hear them, he either just lied, or is about to lie. And note that he is not mis-speaking. He knows he is lying. It is intentional.
President* Biden is not sure that he sold his lie, so he oversells his lie with emphasis as described above.
1
-
1
-
1
-
Stores will never eat the 10% cost imposed by government mandated discounts.
The stores will raise their prices.
People that choose to use real cashiers will be penalized.
Many people do not have the skills to use self-checkout, even if an employee is standing by to help them. The customer does not want to be embarrassed by needing help, and so they go to the cashier's line, and pay more.
There are people that do not want to touch the touch-screens at the self-checkout, especially after Covid-19.
Touching a screen that countless others have touched is not advisable, for health concerns.
Every time the government gets involved in the operations of private businesses, things get better for a few people, and unintended consequences get bad for everyone else.
If you put all of your savings on the line, and mortgaged your home, risked it all, to have a shot as a successful business owner, how would you like it if you then get handed such mandates from bureaucrats at your state's capital, that have no skin in the game, and care zero if your life's efforts go down the toilet, due to their government intrusion?
1
-
I once left a detailed review on a product where the seller is flat-out false advertising, and cheating the customers on the quantity shipped.
In my review, I explained how this could not be an oversight by the seller, because I contacted the seller, explained to the seller how their listing is clearly wrong, and the seller refused to ship me the quantity that they shorted me.
So all of that went into my review.
Well, Amazon refused to post my review, with a "Does not meet standards" reason.
Whoever deemed my review to not meet Amazon's standards neither identified themselves by name, employee number, or anything whatsoever.
Also, the Amazon employee did not quote anything that I wrote that was in error or violated any Amazon policy.
So I called Amazon. Waste of time.
They could not give me any reason. They could not even bring up what I submitted in my review. I wanted them to bring it up, in order to point out what violated their review criteria.
So I submitted my review, again, and it got rejected, again.
I called Amazon, again. Rinse and repeat.
I asked Amazon for a way for me to send them my review, for them to look it over and tell me which sentence (or sentences) are at issue.
They told me they have no way to receive a message from me.
So Amazon repeatedly reject my review. No one from customer support has a clue as to why. No one from customer support could pull up what I submitted. And yet, when I submit the review, someone is seeing it and rejecting it.
The only thing Amazon did right was to refund my purchase, for the false advertising. The person I spoke to looked at the listing and agreed that the seller was cheating the customers.
Amazon never took the listing down.
I contacted Amazon two weeks later, to let them know that the false advertising listing was still up, and customers were still being cheated. They, again, told me that they would take the listing down.
Another two weeks passed, and I contact Amazon, again, to tell them that they never took down the listing.
That was it. Amazon convinced me that they do not care.
All Amazon cared about was collecting their fee from that seller.
When I say that Amazon does not care, I am referring to Jeff Bezos. It is his company, and the responsibility for knowingly allowing false advertising to remain listed falls on his shoulders.
Bezos could easily fix this. But it will delay his expedition to becoming a $trillionaire.
1
-
1)
If you put 1,000 miles on your odometer in a month, that does not mean that you used the roads where you live. You could be using the roads in a neighboring state.
So, California's tyrannical government will mandate that tracking devices be installed on every car, so that the government will know exactly where your car was driven.
And what about towing?
So they track your car going from here to there. But your car was not being driven. The tow truck was being driven.
What if you ship your car by train?
All of the above will inspire the tyrants in California's government to pry more and more. Those tyrants will tie you up in a knot.
2)
So you purchased a car, that California's government approved for California's roads. Then, some years later, California's tyrants tell you "Too bad. That vehicle that our government approved... well, we are no longer allowing you to drive it in California."
So think about a car that you will purchase today, that gets California's seal of approval for California's roads.
What happens 25 years from now, when those tyrants tell you "Up yours. You can no longer drive that car that we approved"?
What if it happens in 10 years -- or 3 years?
Oh, it will never happen that fast. If you think that, then you do not grasp the "F.U." mindset of California's tyrannical law makers.
3)
What law was on California's books, back in the 1960s or 1970s, etc, that let you know that the "then" new car that you purchased would be outlawed in some future year?
Although California's laws are unconstitutional, their courts piss on our constitution. So California's tyrant law makers get away with it.
Well, all of the above is due to California residents voting for the tyrants that are tying them up in knots. And the people that will have the biggest headaches with these unconstitutional laws will go and re-elect the same tyrants that are making their lives unlivable. So it is hard to feel sorry for them. They have the government that they elected, and re-elected.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
Another investigation should be made, to find out why it took them over a year to fire that tyrant superintendent.
For another entire year, that tyrant superintendent was making life horrible for other school officials, and their families, and for students, and their families.
Shame on whoever on that school board dragged their feet on this atrocity.
And we should be given the names, titles, and photos of the school board members, and how they voted.
The District Attorney should charge Marian Phelps with child abuse, or whatever the legal term is for her illegal actions against those children.
These crimes must not be allowed to drag on for so long, while people suffer.
Firing her is a good outcome. But she will find another job, and abuse others. She should be charged, criminally, and spend time behind bars.
Remember, her victims were both adults and children. Someone in that position of power, that goes after innocent children, should be put on trial, criminally. And the school board members that dragged their feet, or that knew what Phelps did and allowed it to continue... they must be fired / voted out. In fact, if any school board members knew that Phelps was abusing children, and allowed it to continue, then those school board members should also be charged, criminally -- perhaps as co-conspiritors.
We are talking about school board members -- those that we entrust with the care of children. If they knew that Phelps was abusing children, and they allowed it to continue, then what on Earth are they doing on a school board?
1
-
1
-
1
-
1
-
1
-
You can't form a militia, if the government bans guns.
So the argument that we do not have a militia, and therefore we do not need guns, is absurd.
Also, the argument that today's rifles (often called military rifles) did not exist when our Second Amendment was enacted, is also absurd. Why?
Muskets were military rifles, when our Second Amendment was enacted, and muskets were what the citizenry owned. The citizenry owned military rifles.
Our founding fathers made it clear in the Federalist Papers, and other correspondence, that The People were in charge of the government, and that The People should have the arms to control the government.
Also, for those that claim that our Founding Fathers could not have foreseen today's advances, that is also absurd.
Our founding fathers were brilliant. They created The United States Of America. They wrote the most brilliant document in the history of our planet -- our Constitution.
Should we ban the press from using television?
How could our founding fathers have foreseen such technology?
How about banning free speech on the internet?
Did our founding fathers foresee computers, mass storage devices, monitors, keyboards, mice, touch screens, satellites, and the internet?
1
-
@zualapips1638 Please show the readers of these comments:
1) The name of the Amazon representative that made the claim.
2) The media medium that the representative used to make the claim.
3) The name of the personnel or their company that independently verified the veracity of that claim.
Jero, are you really suggesting that if a company is doing mass surveillance, and when asked if they are doing mass surveillance, that they would remember their Boy Scout pledge and come clean and admit that they are spying?
Are you really suggesting that we just take their word for it, without them offering anything, whatsoever, to confirm the truthfulness of their 100% unverifiable claim?
If Alexa is not listening to everything being said, then explain to us how Alexa knows when you are directing your speech to Alexa?
To put it another way, what triggers Alexa to respond to "Hey, Alexa", if Alexa is not listening?
1
-
Giving us Alexa's source code, allowing us to compile that source code, and allowing us to install the compiled source code onto Alexa's hardware is the only way to really know what Alexa is doing (meaning, "everything" that Alexa is doing -- not just the obvious). But Amazon will never do that. Ditto for Apple.
Even then, there is code embedded on the chip sets on the board that is inside Alexa's casing. And by the way, this is an issue for all computers, too (we cannot know what data is being collected on some chip inside our computers -- and even the tiniest of chips can hold an encyclopedia of data).
In other words, even on a computer with no storage (no operating system), there is code on the hardware -- there has to be, so when you turn the power on, it follows instructions on how to boot up -- it needs to know to look for a hard drive, etc, and try to load the operating system. I remember reading (not sure where) that Chinese made boards have code to permit that government to collect data on its users, which is a problem for national security. I have not kept up to speed on this, so there might be regulations in place that military and sensitive government computers may not purchase any computer parts that are foreign made?
1
-
Steam's "Na Na Hey Hey Kiss Him Goodbye" is an amazing song, that, unfortunately, was mixed poorly. How?
At low volumes, it sounds very good. But if you want to blast it, you can't (unless you want ear damage).
Whoever it was, that created the mix in the studio, chose to make the vocals too LOUD (perhaps for radio). So when you turn up the volume, to get more of the instruments, the vocals become unbearable.
A the song's 1:43 time mark, there is no singing. You can turn up the volume and enjoy the wonderful sound of the band's instruments.
Soon the band starts singing, again, and if you do not lower the volume, you will kill your ears.
Songs should be mixed, such that the public should not have to tinker with the volume knob. There should never be a section where a voice or an instrument hurts your ears.
With any luck, the original capture tapes of the song still exist, and one day someone with access to those tapes will make a new master with proper instrument vs. voice gain levels.
1
-
1
-
1
-
1
-
Comcast provides my internet and cable services (I have no other choice).
When their service is down, they cripple the DVR that I pay to rent from them.
When their service is down, you cannot play a show that is stored on the DVR that is sitting next to your TV.
When you press play, or pause, etc, on the remote, your request goes to Comcast and asks permission to send that request to your DVR.
So if your Comcast internet service is down, then your remote will not communicate with your DVR (well, your DVR will see the request, but it first sends your request to Comcast for permission to execute your request).
If you happen to be watching a recording from your DVR, when you lose your internet service, then you cannot pause the show, and you cannot stop the show, etc, because your DVR will not accept your remote control's requests, without permission from Comcast.
I suspect that Comcast does this to deal with stolen DVRs.
But Comcast could ask for permission once per day, or twice per day, etc, and then allow the DVR to work for 24 hours. But nooooo. Comcast cuts you off, instantly, when they have an outage that affects your service.
So when you have no internet service, you would figure "Hmm. This would be a good time to watch a show that I recorded on my DVR. I do not need to connect to the internet for that", only to find out that when it would make the most sense for your DVR to entertain you during an internet outage, Comcast gives you the middle finger.
1
-
1
-
@lonniemcclure4538 "Are you certainly it is actually storing content locally and not just accessing an online DVR (where they can store one copy of content for everyone recording a specific program)?"
Yes, I am certain.
In fact, when playing a saved show (playing a recording), it will show "DVR", when playing from the DVR, and it will show the same, but with an icon of a cloud, when playing from a Comcast server.
And it is easy to tell, even without seeing the inclusion or exclusion of the cloud icon... it is east to tell the source of the recordings.
1) When you start the playback of recording, if it plays from your DVR, it starts right away. Well, your "play" request still goes out to Comcast and then back to your DVR, so there is a slight delay -- but not that noticeable. It is not an instant response by your DVR, due to the time your request takes to go to Comcast's permission server and back to your DVR.
If it plays from a Comcast server, then it takes a few seconds for your recording to start. So whenever I press play (only the first time, to start the show), if it hesitates, I know that it is busy waiting on Comcast's server.
2) When fast-forwarding, when playing form the DVR, it is smooth.
When fast-forwarding, when playing from a Comcast server, it is choppy (not terribly so, but noticeable).
But that cloud icon leaves out any guess work.
1
-
@1:55 "...when society is now demanding that people go along with it, or else you're a bigot or you're hateful."
Society is doing no such thing.
Only a small percentage of unhinged, mentally disturbed, radical leftists are making such demands.
Do not take marching orders from the insane. Let them rant.
If not for TikTok, their freakouts would never be seen, other than if you happened to be with them. And 98% of their freakouts are theater, because of TikTok.
If these mentally disturbed people were not able to post such cringe material, they would not be putting on these shows.
The more outrageous the performance, the more views it gets. So of course we are seeing these psychos on a regular basis.
But they are a microscopic portion of the videos posted and a microscopic portion of the activities taking place on social media and in real life. But that microscopic segment is like watching a train wreck, and people stop to watch train wrecks.
Train wrecks are far more attention grabbing than a train sitting in the yard. But there are countless more trains in the yard, than there are wrecks.
Stop giving these mental cases credence, by referring to them as some sort of power structure. They are mentally disturbed, narcissistic, attention seeking trolls.
1
-
1
-
1
-
1
-
Comcast forces customers to listen to advertisements, before connecting you to a representative.
Your internet service goes down. You call them up via your cell phone, not in the best mood (because your internet service went down). And what does Comcast do? They force you to listen to their sale's pitches. There is no way to bypass their phone commercials.
With Comcast, the wait is usually less than 15 minutes. But like HP, it is artificial, and trying to sell you their services while you have no service is terrible.
Also with Comcast, they make the maze of "press this" and "press that" almost impossible to navigate to a human. You reach one dead-end after another dead-end. Frequently, Comcast's automated system hangs up on you, when you do not press a button (a button that will not solve your issue and takes you down a hole that is unrelated to your problem).
So you are left with a choice of going in circles, never reaching a human. Or, the call ending abruptly. Or, spend enough time, mapping out all of the combinations that did not work, and after 10+ tries, you might find the route through the phone maze that connects you to a human.
It is not an "oops" by the executives that designed their "we hate our customers" phone system. It is intentional. If Comcast could save $50, over a year, by frustrating their customers, they will.
By the way, when Comcast's services go down, then your DVR loses access to Comcast's permission servers. So when you have no service, and you decide "This is a good time to watch a saved recording on my DVR", well... you can't. Every command that you use with your remote (pause, play, fast forward, etc), asks a Comcast permission server to grant permission to perform the action. So without internet access, you can't watch your saved recordings.
I would cancel my Comcast (Xfinity) subscription. But my area has no other internet service providers -- and I am facing the wrong direction for satellite.
1
-
1
-
1
-
1
-
The ship has engines for maneuvering in tight places. For example, it can spin in place.
My guess is that when the wind started to turn the ship's bow into the shore, the ship's pilot, instead of engaging the engines to oppose the wind, he mistakenly engaged the engines to turn with the wind, and plowed into the shore.
Yes, a lot of the ship is exposed to the wind. But short of a monsoon, there would not be enough wind to push that amount of weight that distance. Add if the wind was so imaginatively strong, then why did not the ship get turn on its side? After all, it is top heavy with unimaginable weight.
And where are the reports of high winds for that area?
You know that they track wind conditions over there. Or did the canal's meteorologists blunder their jobs, too?
Where are the reports of any damage, anywhere in that area, from high winds?
Why are we not seeing the exact wind speed and wind direction that was recorded at the time?
High winds is a joke. Yes, it can push the ship a bit, but not send it careening out of control.
There is simply no way that the owners of the ship would risk such an event, by not having engines to counter the wind.
There is simply no way that the government of Egypt would allow ships, that cannot control their own direction (even in high winds) to use the canal.
This had to be a major screw-up by the ship's pilot -- and I suspect that the canal's meteorologist was napping.
By the way, all of the ships in the area (lots of ships) all have equipment that measures the wind. Where are the reports from the other ships?
We are not getting honest reporting.
1
-
@srujan2482 What are the names of the two Egyptian pilots in the patrol boats upfront?
Please provide links to their interviews or their statements.
Where are the recordings of the radio contact between the patrol boats?
So far, every news report is regurgitating the same basic information.
Let us see the video of the bridge of the ship, at the time of the incident.
Let us see the video, that supports any of the stories we have heard.
Does the video exist?
If yes, then where is it?
If no, then why not?
When a disaster of this magnitude happens, where billions and billions of $$ are at stake, where law suits of every kind will be leveled against everyone involved and more, then we need to see proof positive evidence with everyone involved. We should not trust that anyone involved correctly did their job.
In this day of technology, with ships carrying billions of $$ worth of goods, and the ship itself costing more than a small country, there has to be audio and video.
The Egyptian government charges hundreds of thousands of $$ for each ship that passes through the canal. There is no way that they did not spend a few $$ to record the waterway.
If it really was the wind, then the ship's owner would release the video of the bridge to support his claim.
This blame game is going to take years to sort out -- if ever.
1
-
1
-
1
-
1
-
1
-
1
-
@Rascon5 "The couple is satisfied so it doesn’t really matter"
It matters when you have been fighting with Amazon for over a year.
It matters when you have to hire an attorney to get Amazon to do the right thing.
It matters when you have to have a news station broadcast the issue, to get Amazon to do the right thing.
It matters, when you do not have video footage of the incident. Without that video, the news stations would not have gotten involved, and Amazon never would have budged.
It matters, when you do not have disposable cash to hire an attorney.
It matters when you have this ordeal hanging over your head, gnawing away at you for over a year, not knowing that it will eventually be settled.
How many people would allow their home to damaged to that extent, and go through what that couple went through, not knowing if they will ever be compensated?
What Amazon put that couple through matters -- and not just for that couple, but heaven knows how many other customers have been screwed over by Amazon, that we never hear about. It matters because we got a glimpse of how Amazon flips off customers, and what it takes to force them to do the right thing.
I would not be surprised if Bezos got wind of what happened, called one of his executives and said "Are you out of you mind?", which prompted the settlement.
1
-
1
-
1
-
1
-
youtube's servers save the host's videos in numerous formats.
For example, below is a list of the formats for this (the one we just watched) video. I hope that it displays properly.
Since this comment section does not use a fixed length font, the columns are not lining up (and might wrap, depending your your computer's hardware and settings). You can paste it into a good text editor (like Wordpad, which comes with Windows), use a fixed length font (like "Courier New"), and if necessary, you might have to reduce the font size to, perhaps, "5", to see the listing without it being misaligned.
ID EXT RESOLUTION FPS CH | FILESIZE TBR PROTO | VCODEC VBR ACODEC ABR ASR MORE INFO
------------------------------------------------------------------------------------------------------------------------------
sb3 mhtml 48x27 0 | mhtml | images storyboard
sb2 mhtml 80x45 0 | mhtml | images storyboard
sb1 mhtml 160x90 0 | mhtml | images storyboard
sb0 mhtml 320x180 0 | mhtml | images storyboard
233 mp4 audio only | m3u8 | audio only unknown [en] Default
234 mp4 audio only | m3u8 | audio only unknown [en] Default
139-drc m4a audio only 2 | 2.66MiB 49k https | audio only mp4a.40.5 49k 22k [en] low, DRC, m4a_dash
249-drc webm audio only 2 | 2.73MiB 50k https | audio only opus 50k 48k [en] low, DRC, webm_dash
250-drc webm audio only 2 | 3.25MiB 60k https | audio only opus 60k 48k [en] low, DRC, webm_dash
139 m4a audio only 2 | 2.66MiB 49k https | audio only mp4a.40.5 49k 22k [en] low, m4a_dash
249 webm audio only 2 | 2.72MiB 50k https | audio only opus 50k 48k [en] low, webm_dash
250 webm audio only 2 | 3.25MiB 60k https | audio only opus 60k 48k [en] low, webm_dash
140-drc m4a audio only 2 | 7.06MiB 129k https | audio only mp4a.40.2 129k 44k [en] medium, DRC, m4a_dash
251-drc webm audio only 2 | 5.83MiB 107k https | audio only opus 107k 48k [en] medium, DRC, webm_dash
140 m4a audio only 2 | 7.06MiB 129k https | audio only mp4a.40.2 129k 44k [en] medium, m4a_dash
251 webm audio only 2 | 5.82MiB 107k https | audio only opus 107k 48k [en] medium, webm_dash
602 mp4 256x144 15 | ~ 4.88MiB 90k m3u8 | vp09.00.10.08 90k video only
269 mp4 256x144 30 | ~ 10.31MiB 189k m3u8 | avc1.4D400C 189k video only
160 mp4 256x144 30 | 3.20MiB 59k https | avc1.4D400C 59k video only 144p, mp4_dash
603 mp4 256x144 30 | ~ 7.63MiB 140k m3u8 | vp09.00.11.08 140k video only
278 webm 256x144 30 | 3.33MiB 61k https | vp9 61k video only 144p, webm_dash
229 mp4 426x240 30 | ~ 18.53MiB 340k m3u8 | avc1.4D4015 340k video only
133 mp4 426x240 30 | 7.02MiB 129k https | avc1.4D4015 129k video only 240p, mp4_dash
604 mp4 426x240 30 | ~ 13.09MiB 240k m3u8 | vp09.00.20.08 240k video only
242 webm 426x240 30 | 5.93MiB 109k https | vp9 109k video only 240p, webm_dash
230 mp4 640x360 30 | ~ 34.66MiB 636k m3u8 | avc1.4D401E 636k video only
134 mp4 640x360 30 | 13.54MiB 248k https | avc1.4D401E 248k video only 360p, mp4_dash
18 mp4 640x360 30 2 | 18.78MiB 345k https | avc1.42001E mp4a.40.2 44k [en] 360p
605 mp4 640x360 30 | ~ 24.28MiB 446k m3u8 | vp09.00.21.08 446k video only
243 webm 640x360 30 | 11.06MiB 203k https | vp9 203k video only 360p, webm_dash
231 mp4 854x480 30 | ~ 57.27MiB 1051k m3u8 | avc1.4D401F 1051k video only
135 mp4 854x480 30 | 26.53MiB 487k https | avc1.4D401F 487k video only 480p, mp4_dash
606 mp4 854x480 30 | ~ 37.56MiB 689k m3u8 | vp09.00.30.08 689k video only
244 webm 854x480 30 | 18.86MiB 346k https | vp9 346k video only 480p, webm_dash
22 mp4 1280x720 30 2 | 62.16MiB 1140k https | avc1.64001F mp4a.40.2 44k [en] 720p
232 mp4 1280x720 30 | ~110.58MiB 2030k m3u8 | avc1.64001F 2030k video only
136 mp4 1280x720 30 | 55.16MiB 1012k https | avc1.64001F 1012k video only 720p, mp4_dash
609 mp4 1280x720 30 | ~ 61.62MiB 1131k m3u8 | vp09.00.31.08 1131k video only
247 webm 1280x720 30 | 37.42MiB 687k https | vp9 687k video only 720p, webm_dash
270 mp4 1920x1080 30 | ~217.98MiB 4001k m3u8 | avc1.640028 4001k video only
137 mp4 1920x1080 30 | 121.01MiB 2221k https | avc1.640028 2221k video only 1080p, mp4_dash
614 mp4 1920x1080 30 | ~ 89.60MiB 1645k m3u8 | vp09.00.40.08 1645k video only
248 webm 1920x1080 30 | 64.19MiB 1178k https | vp9 1178k video only 1080p, webm_dash
youtube also has several audio-only versions. The above is all the the "video" versions, most of which have no audio.
Only two of the formats contain both video and audio: ID "18" and ID "22".
My guess is that youtube will either send ID "18" or "22" by default, but can combine other IDs, based on your internet connection (as our host explained).
With the right application, you can choose any of the above listed formats.
Lastly, @0:18 "We've done the illegal thing..."
It is not illegal to save a copy of what the service sends to you. In fact, Windows (or to be more exact, your web browser) does that, when you watch a video.
If they do not want you to have it, then they should not send it to you. They should not send it to the public; to anyone on the planet.
Them sending it to you, is your computer requesting to download the content, and the streaming service agreeing to allow you to download the content, and the streaming service initiating the upload to your computer.
When a service broadcasts a show to the public, they have no expectation, whatsoever, of that broadcast to not be saved by the public.
If they did, then they should have petitioned congress to outlaw VHS recorders, decades ago.
Radio stations would have petitioned congress to outlaw tape-decks, decades ago.
Imagine yourself using a CB (citizen's band) radio, to declare [fill in the blank], and you start off with "My remarks may not be recorded without my permission..." etc.
Then NBC News decides to report on your CB radio broadcast. Do you think that you can hold NBC News liable for reporting on what you put out on the public airways?
Yes, they often put that no duplication, blah, blah, blah, in their broadcast. That is completely unenforceable.
Where you run into a problem, is if you took your saved copy, and you broadcast it as your own.
I am not a lawyer. But you do not have to be a lawyer to know that recording a show is not illegal. And by extension, streaming / downloading a video is not illegal.
Burning a copy of that download to DVDs, and selling it on-line, or even at a flea-market, is likely illegal. But saving a copy for yourself is done by billions of people around the world.
1
-
1
-
1
-
If your computer is off, then there is zero chance of you being compromised. But if you use your computer responsibly, then (as our host conveyed) you are at virtually zero chance of being compromised while your computer is on.
I never turn off my computers:
1) I never want to wait, even for the few seconds it takes to boot up.
2) I keep certain programs running. I do not want to start them, when they can already be there.
3) I believe (not 100% sure) that turning equipment off and on is more likely to cause a hardware failure vs leaving it on 100% of the time.
Things tend to break when the power is suddenly applied; when motors kick in (such as fans).
A light bulb tends to fail when you flip the switch on.
Keep your computer(s) and any other important equipment plugged in to a quality surge suppressor (or quality UPS (uninterruptible power supply)).
Also note that (as our host conveyed) your router will protect you from uninvited incoming data (your router tosses it, and as such, your computer never sees it). However, you are not protected from other computers within your local network (other computers that use that same router).
So if you have a family member that is irresponsible, and they install malicious code that is designed to spread to other machines, then that family member's infected machine can likely see your machine and possibly do damage (because at this point, your router is out of the picture, and it is up to the specific security measures configured on your machine).
You can purchase a more sophisticated router, that creates separate virtual LANs that keep each of your computers from seeing one-another (such routers are pricey and have a learning curve to set up). Or, you can purchase an entry level router and plug it into your existing router, and plug your computer into your new, entry level router. That, too, will keep other family member's computers from being able to see (or get to) your computer.
If your electrical costs are prohibitive, then turn off your computer(s) when not in use.
Otherwise, do not deny yourself the convenience of having it running, ready, and waiting, the moment you walk over to it.
Lastly, heat kills.
If your computer does not have adequate ventilation (perhaps it is in a hot room), then do not use it for longer than necessary.
1
-
1
-
@askleonotenboom Microsoft's BS conflation between e-mail storage and OneDrive storage evidences their push to prematurely fill your quota.
Leo, I am sure you know this (but I will write it for anyone else reading this):
Attachments are not binary files That are ASCII text that is part of the body of the e-mail message.
E-mail clients look for a pattern that indicates the start and end points of a block of text. They then convert that text into what was originally a binary file.
So when someone e-mails you a photo attachment, their e-mail client converts that photo into a block of text, and then your e-mail client converts that block of text back into the photo.
So, if the sender were to use GPG's ASCII armor option to convert the photo to text, and then the sender copies/pastes that text into their e-mail message, Microsoft would not see it as an attachment (due to GPG's encryption making it indecipherable to Microsoft mail server). As such, that GPG attachment would go against Outlook's quota, and not OneDrive's quota.
So what Microsoft does is search everyone's e-mail messages for blocks of text, such as MIME formatted text, determines that that block of text was created from a binary file, and passes that value over to OneDrive's quota.
I bet that the attachments are not even stored on OneDrive's hardware. I bet that the attachments are kept with Outlooks hardware.
Microsoft is simply identifying blocks of e-mail text, and telling its OneDrive database to charge that against that person's OneDrive quota.
That Microsoft intentionally excludes a button to delete the attachment is evidence of them doing whatever they can to keep your data storage usage from decreasing.
The above is why I will not use 3rd party storage. It puts you at their mercy.
And you can bet that all 3rd party storage services have language in their End User Licence Agreement that gives them permission to change the language of the agreement whenever they want, to whatever they want, without your permission. They might as well change their EULA's to read "God mode: On", and leave it at that.
For times when a file size exceeds a mail servers limit, I will upload it to "wetransfer". They offer 2GB of free space, per upload. Your uploads get auto-deleted in 7 days.
They offer a paid option, where they will not delete your uploads. But they do not reveal the cost, until you sign up. Clown world.
1
-
1
-
1
-
The mainstream media is the unofficial, non declared propaganda arm of the Democrat National Committee.
Take any radical leftist democrats (house representatives, senators, mayors, governors, etc), and swap them with any radical leftists on CNN or NBC, and you will hear the exact same propaganda, and have the exact same votes take place.
Half of the radical leftists hold public offices, and half of the radical leftists churn out media propaganda. They are the same organization. They just wear different hats.
And facebook, twitter, and google are part of that same group.
1
-
1
-
1
-
1
-
1
-
1
-
PragerU,
We need:
-- The name of the school.
-- The location of the school.
-- The names of the board members.
-- The titles of the board members (vice chairman, chairman, etc).
-- Photos of the people responsible for the indoctrinating.
Without the above, the public is left with not knowing who is responsible. All we know is that some intangible school is pushing this Marxist agenda.
These people are government employees.
These people are public servants.
These people do not get to pass policies, that injure young minds, with anonymity.
These people do not get to operate in the shadows. Yes, we have them on video. But all we have are anonymous, blurry faces.
Even in this video's title, you state that parents are standing up to "School Boards", when the title should read:
FIRED UP: Parents Stand Up to School Boards "Members" against Marxist Critical Race Theory Indoctrination
Stop putting the blame on institutions, and start putting the blame on the people that run the institutions.
The school board is not responsible for approving Marxist curriculums. Rather,
[First Name], [Last Name], [Title], [Photo], of the [school name], located in [location]... those specific people are responsible for approving Marxist curriculums.
Shine the light on the actual people that are responsible.
Let the parents know...
Let the tax payers know...
Let "The People" know...
...exactly which public servants are harming our children, so that we know exactly who do fire, come the next election.
Thank you.
1
-
1
-
@0:25 "As I see it, you don't live up to these standards..."
Folks, when a radical leftist is using clown-world language, trying to make you look bad, pay attention to the words that the radical leftist used.
In this example, he said "As I see it, you don't live up to these standards...", implying that he has the higher ground; implying that his standards are higher than yours.
M. Mikklesen should have replied with:
"Sir, I do not lower my standards, to cow-tow to radical leftist's attempts to control other people's lives."
"Unlike you, I have a spine, and I have self-respect, and I do not try to demean others by asking an insulting question, implying that I am better than them."
1
-
1
-
1
-
1
-
-- Please post the name of that teacher.
-- Please post the name of the person that hired that teacher, and show his/her photo and title.
-- Please post the name of the school.
-- Please post the names, titles, and photos of that school's board members.
Stop letting radical leftists, paid by our tax-payer dollars, do so with anonymity.
Yes, we got to see the teacher. But who is she?
Without the above questions answered, the public is stifled with knowing what steps they could take to have her removed, and have the school board members removed, etc.
Please always post all information for all of the involved parties that are "part of the conspiracy" (as often used in court rooms when showing all of the criminals involved in a crime). All parties need to be held accountable. None of them should be able to conduct these activities, or be allowed to ignore such activities that are under their purview.
They are all part of the educational swamp. They are all part of the indoctrination of young minds. And they do so on the public's funding.
Stop letting any of them do so in the shadows. All of them need to have spotlights on them for their part in this outrageous state of affairs.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@Earth-in-space "Thx, but then you also assume that you know that there are no symbols - kind of?"
When people use password crackers, they make assumptions.
They use rule sets. Which sets of rules they use is up to them.
-- They tell the program the length that should be tried.
-- They tell the program the character set that should be tried.
That character set would be, for example, only lower case characters, or both lower and upper case characters, or to also include numbers, or to include "!@#%^", etc.
If it is to include symbols, should those symbols be tested only at the end of the password, or in any position within the password? Should it be tested with a single symbol, or two symbols, or more?
-- They tell the program to, perhaps, use only dictionary words. Or dictionary words with a number at the end, etc.
The combinations of rule sets goes on and on.
So the person running the program chooses a rule set, and crosses his fingers that he chose the right one. He makes his choice based on how long it will take for his computer to try every combination in his chosen rule set.
1
-
1
-
This is why using virtual credit cars will save people headaches, when disreputable companies refuse to let you cancel your subscription.
By using a virtual credit card service, you can create a virtual credit card (or many virtual credit cards), and you will have 100% control of the use of the virtual credit card. Ideally, create a unique virtual credit card for each subscription service. If you decide to cancel your subscription, and they refuse to accept your cancellation request, then you simply disable or delete that virtual credit card. Now they have no way to bill you.
Their only recourse would be to sue you. But that is very unlikely, and would make headlines about them refusing to let customers cancel, and attacking customers who simply want to cancel.
The virtual credit card service funds the virtual credit cards that you create, by linking to your bank account.
It is unfortunate that such virtual credit card services are needed. But until a law is passed to force disreputable companies to accept normal cancellation requests, then virtual credit cards are a solid plan "B" to take control of your subscription related finances.
1
-
Law suits are not going to slow down President Trump, this time around.
The executive branch is a co-equal branch of our government, and the President is duty bound, by his oath to our Constitution, to secure our borders and execute the laws of the United States of America.
Four years is little time to deport tens of millions of illegal aliens. As such, President Trump is not going to waste a single day. Nothing and no one is going to slow him down -- even for a second.
States with a normal governor will use the national guard, and states with radical leftist governors will see nearly all of the ICE personnel, backed up by our military.
ICE will be arresting any local or state officials, no matter their title, if they interfere with ICE. The military will be present to deal with any serious challenges from local or state agencies that physically challenge ICE. Local law enforcement, if given orders to interfere with ICE, will be on notice about our military. So there will likely be no issues, with them knowing that they will be taking on the military.
President Trump is no longer a newbie. He means business.
The wall will also be completed in record time, regardless of any lawsuits. The military take orders from the President of the United States of America. Their orders will be to complete the wall, and those orders will not change.
1
-
1
-
1
-
1
-
@8:26 "I generally don't find an outbound firewall worth the effort."
Leo, it has been 3 years since you posted this video. Perhaps your position has changed, due to how much data collection companies perform.
Naomi Brockwell TV posted a video, 21 hours ago, demonstrating how much of our personal information is being sent to endless numbers of companies. Some of them even store your information on your own computer, if you are off-line, and will wait until you go back on-line to upload what they saved up about your activities.
She reviewed a Mac based software firewall, that notifies you of every network attempt made by some process, and you can approve or decline network access, or set a rule for each network access attempt.
I have never looked into this topic. But based on Naomi's video, there is a lot of information being sent out. So I am interested in whether or not your position has changed, and if perhaps you have a video for a Windows based firewall (or consider making a video)?
Naomi mentions GlassWire for Windows. It is subscription based. I do not like renting software, especially if after setting up firewall rules, the company goes belly-up, or raises their subscription price. Ending your subscription will render your firewall software inoperable.
Defender allows you to set rules. However, it is 1) complicated, and 2) I know of no way to have it alert you of a network attempt so that you can set up a rule.
1
-
1
-
There are also deep fakes of videos. For example, of presidents, news commentators, etc, saying things in real-time, that are deep fakes.
And this technology is still at its infancy. Imagine how realistic it will become in 5, 10, or 30 years.
People will be able to spread dangerous lies that genuinely look like Putin and Biden threatening missile launches.
People will be able to have candidates running for all different political offices saying all kinds of wild things.
It is one thing to have a deep fake of a movie star wishing happy birthday to a loved one, strictly for the entertainment aspect and not for public distribution.
But the abuses will become off the charts, and a type of anti-virus for deep fakes will have to keep up to catch deep fakes.
And by the way, deep fakes can also age someone forward or backward, in real time.
So deep fake videos of, for example, politicians saying wild things 30 years ago will pop up.
1
-
1
-
1
-
It is not enough for that professor to win his law suit.
What needs to happen if for every school official, that put that professor through hell... each and every one of them must be fired.
Every authority figure, at that school, that could have put a stop to this, but did not, should be fired.
Each and every employee of that school are paid by our tax dollars.
The parents, the tax payers, We The People, have a right to know, and should be shown the names, titles, and photos of every school employee that put that professor through hell.
It is all well and good for that professor to win his law suit. But by all of the culprits remaining at their posts, the school will continue to churn out indoctrinated students; nothing will change.
The actual villains at that school need to feel equal or more pain than what they inflicted on that professor.
Cheers!
1
-
1
-
@0:02 "I'm not, I'm not supposed to take any questions. But go ahead"
1) Who gives orders to the President Of The United States Of America?
Who tells the President whether or not he may take questions?
From whom is the President taking orders?
2) President* Biden's reply to the Afghanistan question is the reason someone (or some people) are ordering him not to take any questions. If he had listened, he would not have blurted out that reply.
3) When President* Biden decided to take a question, how could he not think that the most serious issue for our country would not be the subject for the question?
Did he think the question would be about his love of ice cream?
Why would he take a question, knowing it is highly likely to be about Afghanistan, if he knew that he would not answer any questions about Afghanistan?
Answer: He does not think -- at least not clearly. His exceedingly debilitated mental capacity keeps him from making good decisions, such as deciding to take a question, without factoring in that he would not answer those questions.
4) President* Biden did not remember that there was a catastrophe in Afghanistan, which is why he chose to take a question. It was only when the reporter said the word "Afghanistan" that he remembered that something bad is happening in Afghanistan.
4a) President* Biden does not want to deal with pressing matters, such as Afghanistan. So he uses his authority to blow it off.
4b) President* Biden does not remember the details of what is happening in Afghanistan, so he had no choice but to refuse to answer the reporter's question.
5) President* Biden bangs down on the desk, which is a sign that he is trying to cover up his blunder by looking tough. Running away and stomping your feet (so to speak) is not tough -- it is weak and childish. It is also what dementia patients do, because they act out emotionally.
President* Biden is falling apart on the global stage.
President* Biden is making a mockery of the American people.
President* Biden is making the world a very dangerous place.
Adversaries, such as China, are working hard at planning to take down our nation, knowing that they will never have a better chance; knowing that President* Biden is incapable of dealing with major conflicts -- even minor ones.
The United States Of America is in trouble. And when the United States Of America is in trouble, so is the world.
1
-
1
-
To all of those stating that he would have been in the accident, even if he was not texting...
True, if you are not a good driver. But this is a police officer, and I expect that he has better training and more experience than the average driver.
Watch the few seconds leading up to the accident. If you had your eyes on the road (he did not), you would have seen the vehicle coming over the median, and you could have changed lanes to avoid the collision.
Of course, we will never know. But why will we never know? Answer: because the officer was texting while driving. If he was focusing on driving, and only driving, and still had the accident, then at least he could say that he was not at fault, and there would be no doubt. But he was texting, and that could have contributed to the collision, in terms of avoidance.
Also consider that the car that crossed the median might have been hit, or might have swerved to avoid something.
So if the officer would have seen it coming (instead of texting), then the car coming over the median (who might have been an innocent victim) might have avoided any damage. But instead, (possibly) due to the officer texting while driving, a potentially avoidable collision took place.
1
-
If you are a risk taker, you can install a custom Windows assemblage.
Search for "tiny 10" or "tiny 11".
I have never tried them. But they are supposed to have been put together with the goal of excluding bloat.
They will accept your licence key to activate Windows. However, they are still unofficial. They consist of all Windows files. But they exclude lots of the standard Windows files, and is not sanctioned by Microsoft.
Basically, it is the same as installing a standard Windows version, and then spending half of forever figuring out how to uninstall the bloat (never knowing if you really found all of the bloat). The "tiny", unofficial versions, exclude the bloat.
They will run with less than half the RAM of a normal Windows installation.
They will supposedly run without the included monitoring and spyware.
They include a tool to add in any of the standard features, in case you want any of them that are not part of the default installation.
Two cautionary items:
1) You ware trusting the people that put it together. I have not heard of any nefarious, hidden gems being included. But you are taking a chance.
2) A Windows Update might force an installation of unwanted stuff that was not included. So you might end up with some of the crap that you wanted to avoid.
The above, custom versions are unofficial, but will result in a nice performance improvement, and will allow computers with even 2GB of RAM to run fairly well. But keep in mind that if you then install your own system hogging software, well, you will need more RAM, etc.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@Libras123 You have lots of voices telling you things that are not in the comments.
-- "Jumping off of buildings"? That was pulled out of the sky.
-- "Mad and bothered"? Based on your incoherent rant, are you describing yourself?
-- "change what I said or feel"? Another surprise comment, that is detached from anything written in this thread. Perhaps your next reply should include sentence about religion? Why not, you are making up one thing after another that has nothing to do with the subject of the posting nothing to do with the comments in this thread. You come across as unhinged and unfocused. Am I mistaken? If yes, then please quote the words that "change what I said or feel".
-- "waste of your time"? You are wasting my time and somehow I am not aware that you are wasting my time, until you brought it to my attention? Now you have sparked my curiosity. Did you point out that you are wasting my time because you are concerned about my time? Or because you are trying to waste my time? Something else? I am asking, because how did "wasting time" enter into this discussion? Is it just another surprise pulled out of the sky?
-- "I meant what I said"? Do you assume that when people write comments that they do not mean what they say, unless the do what you are doing, and they include "I meant what I said"? I am asking because youtube, facebook, etc, is inundated with comments where people nearly never include "I meant what I said". Are all of those billions and billions of comments from people that do not mean what they are saying, because they did not also write "I meant what I said"?
Does this apply to face to face conversations and telephone conversations, too? Should I be asking "Do you mean what you are saying", just in case they really do mean what they are saying, but forgot to say that they mean what they are saying?
All of this time, I assumed that when people say things, they say them because that is the nature of communications. It never occurred to me what people are saying is to just hear themselves, because they do not mean what they are saying, unless they also say "I meant what I said".
"I am laughing at you"? Please elaborate. A joke is usually best when shared with others. What is making you laugh?
Please pay attention in school to your English teacher. I am requesting that you do so, in order to avoid future occurrences of writing comments that are obscure, hard to understand, and incoherent. It is best not to write run-on sentences that change topics over and over with no clear meaning. Go back and re-read your reply to me. That sentence is a grammatical mess.
I can help you. Let me know.
Lastly, I did not mean to upset you or trigger you. My original reply was meant to show that the law and news reporting should be applied equally to all. Politics should never play a role in fairness.
Are you a fair person?
Do you want everyone to be judged fairly on an equal playing field?
1
-
Why is a law needed to stop people from stealing?
Stealing is already illegal. We already have laws making stealing illegal.
Can I go out and steal someone's money, and get away with it by labeling it as civil asset forfeiture?
When a government employee steals an innocent person's money, where that innocent person is clearly innocent, then why is that government employee not charged with grand theft?
Are civil asset forfeiture laws written, in such a way, that any law officer can go on a stealing spree, with no ramifications?
What is to stop a few law officers from walking into a dozen banks, and stealing all of the cash, and claiming that they suspected the banks of [fill in the blank], with zero evidence of wrongdoing?
Flat out theft is flat out theft.
Why are those thefts not labeled as crimes, and the officers who committed the crimes not charged with committing the crimes?
1
-
1
-
@Casey2262 Using a VPN service is replacing your ISP being able to see and log all of your activity, with now your VPN service being able to see and log all of your activity.
VPN services claim to keep no logs. We have no way to verify their claims.
If they are issued a court order, they will hand over everything.
If they really have no logs, and the court order directs them to start keeping logs, then they will start keeping logs, and they will hand over those logs.
And the court's order will likely include a gag order, to not let the customer or the public know that they are keeping logs.
In a nut shell, we have zero insight into what is actually happening at the VPN's location.
I know of only one benefit of using a VPN service:
You can access content from regions that are blocked from your own region.
Otherwise, a VPN service is just a glorified proxy service that replaces your ISP in terms of monitoring and logging.
If you want anonymity, then use TOR.
If your freedom depends on remaining anonymous, then use TOR via the TAILS operating system.
1
-
1
-
I believe that criminal procedural law considers moving violations (speeding, stop sign, etc) to be criminal, and that any criminal violation allows the police to arrest the suspect, or release them on their own recognizance (left to the discretion of the arresting officer).
So when you are given a speeding ticket, and allowed to then leave, you were technically under arrest for that encounter.
As such, the police could have witnessed the suspect making traffic infractions, pulled him over, and arrested him, and taken him to the precinct.
Such actions would make the police responsible for the suspect's vehicle, that would result in the police towing the vehicle to a police impound yard, and taking inventory of the vehicle.
The above might stand a chance of making the evidence from the vehicle admissible. Although a court might still throw it out, based on the steps the police took in how they handled that specific traffic violation differently than most other traffic violations.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@0:17 -- Gender affirming care?
Treating a boy as a girl, and performing surgery on that boy, is not gender affirming. It is gender denying.
Telling school girls that think it is socially stylish to become a boy, and help them to have their breasts removed, is not gender affirming care. It is gender denying care.
Those children will be miserable for the rest of their lives. Their lives ruined, by mentally ill adults, in schools and in the medical profession. And they have the chutzpah to call their depraved actions "affirming".
And the reporters, editors, and executives of the Associated Press run propaganda stories, supporting child mutilation, as long as they label it "affirming".
They have no business being in the Oval Office. President Trump is 100% correct.
1
-
@1:53 "...these will not have the President's name in the memo line. The White House says that's because it didn't want to risk causing any delays in the printing..."
Utter nonsense.
Is CBS Evening News reporter, Christina Ruffini, telling the public that Biden would have to sign each check?
Is CBS Evening News reporter, Christina Ruffini, telling the public that printing a few more characters would require the printing machines to do a second pass?
Is CBS Evening News reporter, Christina Ruffini, telling the public that a printing company, that is hired to print millions of checks, is incapable of stamping out each check on a single pass?
How absurd is this?
Folks, when you print a document, does adding your signature cause a delay?
And keep in mind that the government is using high-speed, commercial printing machines that are huge and print over 10,000 checks per minute.
So why did she bother to mention it?
It is because she knew that President Trump's name was on the previous checks, and it irks her to not see her hero's name on these checks.
It irks her that Biden was too absent-minded to get his name put on the checks, and so his propaganda machine (videos like this one), rather than wanting the public to know Biden was asleep on this, so the propaganda machine makes up absolute BS about printing delays.
Folks, remember that CBS, like most of the fake news industry, is an unofficial propaganda arm of the Democrat National Committee.
You must untangle every sentence that they say.
Cheers!
1
-
1
-
1
-
1
-
For anyone that still feels that he/she is going to install anti-virus software, then please be sure to read the End User License Agreement, Privacy Agreement, and any other agreements that you are mandated to agree to.
Yes, it is a tedious read. But here is why you should read those agreements.
You are agreeing to turn over every file on your computer to the anti-virus company.
You are agreeing to let them have 100% access to your computer.
On one hand, they do need access to all of your files, in order to search for files that are dangerous.
But on the other hand, in order to cover themselves, the anti-virus company's agreements allow them to basically take ownership of everything on your computer. This way, it insulates them from law suits, from people that will find some little thing that the anti-virus company did not explicitly say that would do on your computer. So they have you agree to let them do what ever they want to do.
I am not suggesting that the anti-virus companies will screw you over. I am saying that they can. I am saying that they can monitor everything that you do.
Cheers!
1
-
1
-
1
-
1
-
1
-
1
-
@12:00 "As I always do, I'm going to tell you that you should support them (The Institute For Justice), and consider donating to them."
Note that as our host has never done:
He has never donated any money to The Institute For Justice. If he did, he would have told us that he has done so, and would like others to do as he did.
I have raised this issue some of his other videos, where he was soliciting donations for The Institute For Justice. Our host has never replied stating that he made a monetary donation.
Has our host ever written them a check for even $20?
It is great that our host seeks donations for a good cause, and is using his viewership to drum up donations. But that costs him zero, and gets him virtual pats on the back and recognition, etc.
So what is our host's real goal? To get donations for The Institute For Justice? Or to make himself look good?
My guess is it is a bit of both.
But why would out host, who repeatedly praises The Institute For Justice, never write them a check for $500, or $100, etc?
It is ballsy to go around, asking for donations, and never doing so yourself, especially when you can easily afford to do so. And it surely looks like our host can easily afford to part with a few dollars.
If our host truly cared about The Institute For Justice, then he would support them financially, the same as he is asking others to do.
And if he announced that he, too, contributes funding to The Institute For Justice, that would surely inspire more viewers to make donations.
It is such a worthy cause, and yet our host refuses to tell us that he has made a monetary donation. It has to be because he has never done so.
1
-
Dave, today's ISO, from Microsoft, will not include all of the updates that will become available between now and October 14, 2025.
If we use the bootable flash drive, that we create today, will that new Windows 10 installation receive updates, bringing up to the point of where it would have been on October 14, 2025?
Or, will the new installation of Windows 10 remain stagnant as of today's date?
To put it another way:
If I use the bootable USB stick in 2027, will Microsoft send me updates, inclusive up to October 14, 2025?
1
-
1
-
1
-
@4:49 "...on a platform that can't be touched by censorship"
Our host, as knowledgeable as he is, does not grasp the depravity of the radical left. Yes, Truth Social can be censored by the radical left. It is simple. Here's how:
Internet Service Providers (ISPs) are mandatory for all internet access, and ISPs are the choke-point for 100% of internet services.
If Comcast, Time Warner, Verizon, etc, choose to block Truth Social, or even throttle the speed for data between users and Truth Social, then it will be a big deal for President Trump (and all of America).
The major, leftist, ISPs probably already have plans in place to deal with Truth Social.
I do not know how President Trump can deal with such an issue as the ISPs blocking his Truth Social platform. But his legal team hopefully has plans in place to deal with this in quick fashion. He better not be caught by surprise with ISPs blocking his new platform.
Cheers!
1
-
1
-
1
-
Food delivery robots are a problem.
-- What happens as their numbers increase?
Prices for technology almost always comes down; often dramatically so.
Are we to accept sidewalks crowded with robots making deliveries?
And what happens when the robots start delivering everything else under the sun?
How much space on our sidewalks will they have to use, before they become a nuisance?
-- Is there a size limit for the robots?
How about robots that take up ½ the sidewalk?
-- How about a robot that breaks down on the sidewalk's ramp, blocking wheelchair access?
-- What happens when the robot breaks down, and the owner abandons it?
Will we know who abandoned it?
-- A business opens, and has an address. They pay taxes to conduct business at that address.
They are not licensed to operate on public streets. Robots are an extension of the business.
If a company has 1,000 robots on the street, or 10,000 robots on the street, etc, how many robots does it take before they are taking up (in total), and entire city block's worth of real-estate?
-- What happens when those robots start flashing lights, and playing advertisements on their screens, as they make their rounds on our public streets?
How do we know when a robot is really making a deliver vs. seeking out business?
-- Are robots limited to making deliveries? Or can they become door-to-door salesmen?
If there is a way to abuse technology, there are people / companies that will do so.
And as the robots become affordable, the abuse will escalate.
-- How long will it take before people start committing crimes with robots, (because robots will eventually be all over the place, and no one will pay attention to them).
If every small business can afford such robots, our sidewalks will become congested with robots.
Steve, should lawyers be permitted to have robots roam the streets, looking for new clients?
How about robots wandering the streets, trying to sell clothing?
How about the government having robots invade our privacy?
When robots become commonplace, how will we know which ones are government controlled?
Why open a store, when you can have free, unlimited real-estate on public streets, via robots.
The above, and more, will come to pass, if robots are manufactured in high volume, and prices fall below a few thousand dollars.
A business should be limited to the space on where it is built and paid for via taxes. They should not be allowed to consume public thoroughfares.
Walmart, for example, should not be able to sell items, miles away from their store, by having robots do so remotely.
Robots have their place. But taking up space on public thoroughfares is improper, and (I believe) illegal. Public sidewalks and public roads are for humans that pay for those sidewalks and those roads. Standard commercial businesses have no permission to have their machines roam our public streets and public sidewalks.
1
-
@Bfgsalmon "SAD THAT YOU DONT UNDERSTAND THAT"
Here is what is sad:
-- It is not "do process".
It is "due process".
-- YELLING DOES NOT MAKE YOU RIGHT.
-- Never using the "period" punctuation mark does not bolster your credibility.
When an illegal alien crosses the border, and is caught 10 feet after crossing the border, are the federal agents required to give that illegal alien a court date?
How many feet, or miles, does an illegal border crosser have to travel, such that the border patrol agent is no longer allowed to turn the him around?
If an illegal border crosser is caught, 10 seconds after crossing the border, do the federal agents have to give that illegal border crosser a day in court?
How about if the illegal border crosser is caught 20 minutes after crossing the border? What is the time frame, before an illegal border crosser is no longer allowed to be turned around?
As to due process:
Mr. Garcia had due process. Two courts upheld his deportation order.
Additionally, the Alien Enemies Acts are the law of the land. As it pertains to Mr. Garcia, the Alien Enemies Acts are his due process. But even still, he had two court cases, and he lost both of them.
The wait time for a hearing is 4+ years.
So when 100,000 people illegally cross the border, they all get to stay until they have a court hearing? If we allowed that, then the wait time would turn into 40 years.
1
-
1
-
1
-
@tinareeves9899 "The US is PAYING to house that individual. The US told El Salvatore to put him in prison without a trial. "
You just made that up.
The USA deported Mr. Garcia to El Salvador. The USA does not dictate to the El Salvador government where to keep their citizens. If El Salvador released him, or any other prisoners, the USA would have no control and no say over that. The government of El Salvador has their own justice system, and they decide who to lock up. We deport El Salvador citizens to El Salvador, and the government of El Salvador interviews, investigates, and makes legal determinations on which citizens get released, or do not get released -- and if not released, the government of El Salvador chooses the prison, and the length of the sentence. The United States of America has no jurisdiction in any of the above decisions.
"We are trying to tell Panama what to with their canal."
The United States of America built the Panama canal -- not the people of Panama.
The United States of America lost tens of thousands of lives, building the Panama canal -- not the people of Panama.
The United States of America spent $billions and $billions, building the Panama canal. -- not the people of Panama.
Decades later, the government of Panama is charging the United States of America exorbitant fees to use the canal that we built, paid for, and died for.
Also, the government of Panama was letting China call the shots, charging no fees for China's ships
The signs all over the canal were in Chinese.
Should China decide whether or not United States military vessels may use the canal?
America is supposed to let them piss on us?
"We are telling Denmark what to do with Greenland."
That is a lie.
"We are telling Canada to capitulate and become a state."
That is a lie.
"But we can’t tell a prison owner to send back a prisoner we ARE PAYING to house?"
We can, but we will not. And even if we did, they will not send him back. He has no right to be in America, any more than if you broke in to El Salvador and insisted that you had a right to stay in El Salvador.
It is elitist of you to preach that you have the right to dictate to other countries what to do with their citizens.
1
-
1
-
1
-
1
-
1
-
Leo, I wonder if using Windows built-in virtual desktops (the Task View option, located on the task bar) would be helpful?
I would test it myself, but I do not use those google services.
I suspect that your browser's cookies will not care which desktop you are using (you still might get logged in to the wrong google service, if using only one browser).
But having Edge in one desktop, and Brave in another desktop, etc, would perhaps make for easier management of the various services (less clutter per desktop).
And you can name each desktop, making it unlikely to trip yourself up.
@3:44 -- Also, I believe that if you do not have your browser save your passwords, then you might be able to better manage each google service. If your browser is not logging you in, then you will should be asked for login credentials. That will ensure that you do not confuse which account just got logged in, because you are actually logging in each time.
That is a bit less convenient. But the benefit is that you are far less likely to use the wrong account with a particular google service.
And with a password manager, the additional login steps should not be a burden.
1
-
@13:33
1) I agree that these billion dollar spacecraft need to focus on reliability, above everything else.
But would it be wildly expensive to include one or two additional cameras, that have more up-to-date technology?
If they fail, then the tried-and-true older technology cameras are still present.
Or has research concluded that additional up-to-date cameras will surly fail, and be a known wasteful endeavor?
2) As to data transmission speeds being slow, due to distances, and slower, again, as the distances become more vast:
Is there a reason for not positioning some type of spacecraft(s) at some interval(s) between earth and the craft taking the photos, and the additional spacecraft(s) would cut the distances in half, and even less if more spacecrafts are deployed, which would allow for faster transmission rates?
In other words, is it necessary for the spacecraft that is taking the photos to make a home-run to earth, with all transmissions?
Is there a reason that spacecrafts could not be deployed to act as relays for the transmissions of the digital footage?
1
-
@4:58 "Let's say I want to backup my data. You can't do that without a plug-in."
The keepass database is a single file. You back it up by making a copy of that file to a flash drive or a USB disk drive, etc.
I did not find keepass complicated. Its layout is not ideal. It is not elegant. But I entered what was needed in each field, clicked on the button that opens the password generator, set the options for the password (character set and length), and that was it.
It is important to click on the "Save" button, to have keepass write your update to its database. If you do not, then if your computer shuts down in a non-graceful manner, you will lose whatever changes / additions / deletions you made within keepass. Once saved, you should make a copy of your keepass database file. It is safe to make a copy without exiting keepass (as long as you saved your databse by clicking on the save icon).
I have not explored plug-ins, because I do not trust them.
I do not trust them, because I do not know enough about them. I will not trust what I do not understand. For example, can plug-ins compromise keepass's security?
Plug-ins might be entirely safe. But until I figure out whether or not they can be trusted, I am sticking with the vanilla keepass. It works great.
Other password managers might be easier to use. But other than Bit Warden, they are closed source, and I do not trust them. In today's "big tech" spyware world, it seems like data collection is everywhere. Since it is very easy for a closed source password manager to have a master key, I simply will not trust it. It is simplistic for them to have a master key. Do they? Maybe not. But "maybe" is the reason I will not trust them.
With keepass, there is no master key. And keepass does not try to sync or share resources or use a cloud service, etc. It simply handles you passwords without fuss.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@3:29
"...and a Bose sound system..."
Although the stereo is not the main reason to buy a car, touting a Bose sound system is a way of breaking a tie with some other car.
Bose is the McDonalds of the audio world. A lot of people like the Big Mac. But it is nothing you would ever want to brag about to your friends.
Bose can be okay. But when stereo shopping, Bose should never be on your list (unless you have no time to do your homework). There are better stereos available, in terms of both sound quality and build quality. Unfortunately, neither the Camry nor the Accord offer anything better (although not identical, their stereos are similar in sound quality). It is like Nissan, Toyota, and Honda all had a secret meeting where they all agreed to cut corners on their stereos.
@6:02
"...all wheel drive"
Note that the "all wheel drive" is 100% controlled by the car. The driver has zero say in when it engages (well, the driver could, for example, intentionally drive into mud and the car will engage the rear wheels).
But if you want to press a button or flip a switch to turn on or off the all wheel drive, then forget it. No such button or switch exists.
Also note that if one of your tires gets a blowout, and it cannot be patched or plugged or repaired, then you will have to buy 4 new tires. The only exception is if your tires happened to already be new when you got the blowout. But as soon as you have signs of tire wear, then 1 blown tire equals replacing all 4 tires. Although most people will not have such a problem, it is still something that happens to some people, so you should ask yourself if all wheel drive is something that you really need.
Not mentioned in this video is that the Altima is a pig off of the line.
If, for example, you are in the left lane at a light, and you realize that you need to make a right turn at the next light, then you can forget about getting ahead of the car to your right. Unless that driver is sleeping, there is no way the Altima will accelerate ahead of the car next to you, from a stop. No matter how hard you stomp on the gas, the Altima just takes its time to get going.
Was this done for safety? Or fuel economy? Who knows?
Once the Altima gets going (maybe 20 MPH), then it has good power. But from a stop? Nissan really messed up.
Also not mention is that the SR and Platinum styles of the Alitma come with 19" wheels, and are accompanied by suspensions that make the car handle (take hard turns) really, really good (especially the SR style). The car will take stay planted around turns much better than most folks would every try. I am not encouraging anyone to drive like a nut (even a million dollar Ferrari will lose control when pushed too hard). But you should know that part of what you are paying for is the design and build of the handling portion of the car.
If not for the abysmal power from a stop, I would have purchased the Altima. But that was just too much of a red flag to ignore. No car will have everything that you want. There is always some degree of buyer's remorse. But not being able to get even reasonable acceleration from a stop is just unacceptable for me.
Cheers!
1
-
1
-
I will not use Google's password manager feature, for the following reasons:
1) Google is the #1 spyware company on the planet, and in the history of civilization.
2) If you decide to switch to Mozilla's Firefox, or Brave's browser, etc, then how do you transfer all of your passwords to one of those other browsers?
Can you have your browser reveal all of its saved passwords? I am asking, because I use keepass, and therefore have no idea whether or not browsers allow you to view or copy / paste saved passwords.
3) If Google's Chrome browser should break, then you will be in a world of hurt, trying to login to sites to conduct your affairs. All of your eggs will be in Google's browser's basket. Whereas, a stand-alone password manager will survive any issues with any browser.
4) If you get a new computer, then how do you update the browser in your new computer with all of the passwords from your old computer?
5) If your computer gets stolen, it is not difficult for a skilled criminal to remove your Windows login password. Once logged in, and he starts your browser, then unless the web site detects a new IP address, the assailant will have access to all of your sites.
Two factor authentication will help for some of the above. But how many of us really use two factor authentication to login to wet sites?
Even if you do, the vast majority of users do not use two factor authentication.
I use keepass. Although it is not as convenient as having my browser log me in, I have peace of mind. I 100% control my passwords, and I can easily make copies of my keepass vault / database. And that vault / database is encrypted, and useless to anyone else. So I can store backups anywhere. If someone breaks into my computer, they will get none of my passwords.
6) If I update a password, or create a new one for a new site, etc, then the next thing I do is make a copy of my keepass vault file.
With a browser, how do you make a quick backup copy of its stored passwords?
7) Stand-alone password managers (perhaps all?) have features that allow you to store more than just passwords.
If you have a confidential document, you can store it in your password manager. I know of no browsers that have that functionality.
You can store your credit card numbers, expiration dates, customer service numbers, etc, in your password manager. It you lose your credit card, you will easily be able to contact your card's financial institution. You will have all of the card's information, to identify yourself. That will make it painless to cancel the lost card and get a replacement.
Using Google's browser to manage your passwords is far better than re-using passwords for multiple sites, and far better because it will generate virtually unbreakable passwords. It is a password manager, and is better than not using any password manager. But I do not trust Google. They spy on everything that you do. And with keepass and Bitwarden being fantastic options, I do not see a compelling reason to use Google's password manager, other than for people that want to automate their logins to the hilt / perhaps too lazy to interactively use a password manager.
By the way, this is my master passwords:
d]E]A%T)3@$dave'sgarage
1
-
1
-
1
-
1
-
1
-
It just goes to show how utterly stupid those road-blocking criminals are. How?
Folks, when someone gets out of their vehicle, because they are upset that you are illegally blocking the road, and (this is a big "and"), they pull out a gun, then you are supposed to stop arguing and walk away.
Do you grasp the level of stupidity of those road-blocking criminals?
A man with a gun is confronting them, and they continue to argue with him.
The man with the gun is also a criminal. He did not have justification to shoot them (even though they were causing chaos on the road -- they did not deserve to die). But those criminals that were blocking the road have no brains.
I wonder...
If they, again, illegally block the roads, and another man gets out with a gun, will they argue with that gun wielding man, too? Because that would be a new world's record for stupidity.
In any setting where someone takes out a gun, the number 1 rule is to deescalate. Prevent gun fire. Get to safety.
The rule that is not on the list is... argue with and agitate the man with the gun.
1
-
@1:16 "The reporter thought the crowd was chanting 'Let's go Brandon' in the background"
Nonsense.
The NBC reporter, Kelli Stavast, knew exactly what the crowd was chanting. It was clear. She knowingly and intentionally attempted to deceive her viewers.
NBC is a fake news station, and their reporter, Kelli Stavast, fits perfectly into NBC's propaganda machine.
@Sky News Austrailia, shame on you for covering for Kelli Stavast deceitful actions, and shame on you for not mentioning it was NBC and not mentioning her name.
Why on Earth are you covering for these propagandists?
This is an example of why they get away with their fake news reporting.
Even when they are caught red-handed, reputable news channels, such as yours, still covers for them.
NBC never announced nor apologized for Kelli Stavast intentional lying on the air.
Why are you covering for NBC's fake news and for Kelli Stavast?
1
-
@3:18 -- She had multi-factor authentication. But when she got the code on her phone, she gave it to the scammer. That defeats having multi-factor authentication.
Whenever you try to login to one of your accounts, that web site (assuming it has proper security measures in place),will detect whether or not you are trying to login from your usual device.
If you try to login from someone else's device (or a new device), the web site will detect that, and it will send a code to your smart-phone (or to your e-mail account, etc). It will send a code to one of your other ways of contacting you. Then, when you provide that code, the site deems that you to be the person that owns that login.
So a scammer goes to a web site, puts in your name, and clicks "Forgot Password". That site then sends a code to you.
What the victim in this video did is give that code to the scammer.
@5:09 "Our family has a code word."
That is how you thwart the scammers. When the scammer uses AI to impersonate someone that you know (often a family member), then ask for that code word. But be careful. Good scammers are prepared to meet that challenge. They have ways of convincing gullible people to give up the code that was sent to the phone. Your (fake) family member might look and sound terrified. Do not fall for it. They might cry and tell you that they are hurt and that they can't remember it. Do not fall for it.
If you get an unexpected text of a confirmation code, give it to no one.
Remember, many scammers do this full-time as their job. They get very good at it. They know all about social engineering. Many evil people are very smart. So keep your guard up, and never give your code to anyone. The (fake) family member might tell you that they are in jail, kidnapped, in the hospital, etc. Do not fall for it. Never give out your code.
If your bank calls you, and reports some issue, they might tell you that in order for them to help you, you need to give them the code that they sent to you (they will claim that it is their way to confirm that you are really you). That is a scam. That is not from your bank. Your bank will never call you and ask you for a code.
Hang up and call your bank. Your bank (who you called) will tell you whether or not you have an issue. Be prepared for the scammer to convince you that if you hang up it will be too late to help you. Just hang up and call your bank.
If you start to think that it is not a scam, and you are ready to give out the code, then the scammer just fooled you.
1
-
1
-
1
-
1
-
1
-
A few tidbits to help anyone that might still be unsure:
-- RAM is far faster than disk storage (even far faster than the fastest NVMe M.2 storage).
-- The cost per unit of disk space (where a unit could be byte, megabyte, gigabyte, etc), is far more expensive for RAM (compared to SSD storage of the same capacity).
If you see 2TB of RAM selling for $109.00, then that is not RAM. Very few motherboards can accept 2TB of RAM, and it would cost $thousands to purchase 2TB of RAM.
-- Amazon is notorious for putting the wrong RAM values in the specifications of their computer listings -- especially in their "renewed" listings (by the way, some great deals can be found there).
Amazon getting the values criss-crossed between RAM and disk space is not good, since countless people use Amazon, and probably most are not technically savvy. Often, they list only RAM and not the storage (disk space), and they put the storage value into the RAM field value, making the listing wrong and confusing.
There are numerous listings, for example, of computers for $399 that list 256GB of RAM. A computer that actually had that amount of RAM would cost north of $2,000.
And when you take delivery of that computer, you will discover that you got 256GB of disk storage space, and maybe 16GB of RAM.
If you purchase a 256GB SSD, it would cost approximately $20, whereas that much RAM would cost over $2,000.
1
-
1
-
Please stop believing that the radical leftists, that are defunding the police, do not understand how reckless their actions are.
Folks, those radical leftists hate America. Defunding the police helps them destroy America. This is by design.
If you hated a country, wouldn't you be in favor of that country having no police and out-of-control crime?
When elected officials, or appointed officials, or any officials in office or running for office, when they promote defunding the police, ask them why they hate the police. Ask them why they hate the community. Ask them why they hate their country.
They will deny it, and they will feign being offended. They will try to change the subject or turn it into you not supporting their cause for justice. But do not let them off the hook, because they are filled with hatred.
None of them got into their positions of power by being stupid. So they know the consequences of defunding the police. So ask them why they want high crime in those neighborhoods. Ask them why they want sky-rocketing murder rates, and rapes, and shootings, and burglaries, etc. They will keep claiming that they do not want that, or that you are missing the point. Don't fall for that line of crap. You should keep pressing them for why they are denying that they want out-of-control crime.
Do not give them an inch. Box them in and force them to admit their hated for their fellow Americans. When they have trouble maintaining their line of BS, do not back down and do not feel sorry for them. They would not do so for you. These are terrible people looking to harm our nation. Keep the pressure on them, and do not let up.
Cheers!
1
-
1
-
1
-
Adams has yet to publicly tell President* Biden to build the wall.
Adams has yet to publicly tell President* Biden to seal the southern border.
Adams has yet to publicly tell President* Biden to send federal agents to NYC and deport the illegal immigrants.
So for all of Adam's complaining, he is still digging in his heels, supporting illegal immigration.
Adams is supporting illegal immigration, while at the same time saying "but not in NYC".
Until Adams officially demands that federal immigration laws be enforced...
Until Adams officially demands that all illegal immigrants be deported, do not feel sorry for Adams. Do not believe any of his rhetoric.
Texas Governor Greg Abbott knows the above, and is keeping his foot fully on the accelerator.
Texas Governor Greg Abbott will be transporting 100% of illegal immigrants to NYC, without pause.
Adams is pro illegal immigration, and Abbott is, therefore, transporting illegal immigrants to NYC just as fast as they illegally cross into Texas.
All Adams has to do, to end this, is to officially demand that illegal immigration be stopped, and that illegal immigrants be deported. But like a typical radical leftist, Adams will allow NYC to go bankrupt and crumble before doing the right thing to end the problem. But Adams will not back down. Adams has a sinking ship, that he could save, but refuses to save, and is going down with his ship, and complaining all the while that his ship is sinking.
1
-
1
-
1
-
I am using an old HP, all-in-one printer, that I purchased when HP initially offered their Instant Ink program.
I chose the free plan, because I print no more than 5 pages per month.
I once read that HP decided to end their free plan, resulting in countless people, who purchased their printers, based on the free plan, to now have to pay for ink. Well, someone must have sued HP, and won, because HP begrudgingly grandfathered in everyone that was already enrolled in the free plan.
If anyone, using their free plan, ever changes their plan, then they will not be allowed to go back to the free plan.
My printer's automatic document feeder has already died. But I can scan, manually, and I can print with no issues. I hope that my printer keeps chugging along.
By the way, I am required to keep my printer connected to the internet, which is fair, because if I exceed my monthly, 15 page allotment under my free plan, then HP needs to know, to charge me (that is their plan, and I agreed to that plan when I signed up). But I do have to worry about a firmware update that will brick my printer.
1
-
1
-
Look at the "Super Pinned" comment made by an anonymous youtube employee. That anonymous youtube employee has it posted, directly below the video, in a blue background.
That "Super Pinned" comment stands above all other comments, and is the only comment that is highlighted in color.
Also, no one can reply to that "Super Pinned" comment. Even the host of this channel cannot remove that "Super Pinned" comment. Normally, the host of a channel is able to delete any comment. But not a "Super Pinned" comment, left by an anonymous youtube employee.
100% of such anonymous comments are anti-Trump, or anti his agenda. Perhaps there might be exceptions, but I have never seen one. In this instance, that anonymous youtube employee is calling the horrific murders taking place in South Africa, a "conspiracy theory".
1
-
1
-
President* Biden is the head of his crime family.
It stands to reason that the Taliban is paying Biden loads of cash, for leaving behind $billions in military equipment.
Think about it:
Although President* Biden is mentally challenged, he does have enough brains left to know to not give away $billions in weaponry. And even if he never thought about it, the Secretary of Defense, and the military brass, etc, all would know not to leave behind $billions in military equipment.
The answer has to be that it was done intentionally, by President* Biden, and his crime family will be rewarded by the Taliban.
If this turns out to be true, then he should be tried for treason, as well as every officer that complied with orders to give away $billions of military gear to terrorists that are hellbent on killing Americans.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@godnyx117 "Yeah, no way!!!!"
Well, since you used 4 exclamation points, you must be right.
"Are you by any chance using H.264?"
Probably not, since I do not know what it is.
"Try using AV1 and then we see how your 15 year old CPU does, lol!"
What is "AV1, and why did you write that I should try it? And why did you write "15 year old CPU does", related to AV1?
"No offense."
Yet, everything you wrote was intended to be offensive.
"But I'm just saying that 15 years old is a little bit too old."
Have you used a 1st generation i7 equipped computer for routine, day-to-day activities?
Based on your comment, the answer is "No, you have not." And yet you know more than I do, and I am the one using a 1st generation i7.
lol!!!!!!!!!!!!!!
(note the intensity via my over-use of exclamation marks)
1
-
@1:29 "What President Zelenskyy is not, is a dictator."
And that, folks, is why @Face the Nation is a fake news channel, in the tank with the swamp; a propaganda arm of the Democrat National Committee.
Zelenskyy ends his country's elections, and refuses to relinquish power to the people's choice of a leader, and @Face the Nation makes the above absurd assertion.
@Face the Nation calls (@1:33) no elections "postponed".
I wonder? Who "postponed" the elections?
Can you imagine if President Trump refuses to step down at the end of his term, announcing that our elections are being "postponed"?
If that happened, @Face the Nation would have a conniption. This channel's host would lose his mind.
But when Zelenskyy actually does it, our host circles the wagons around Zelenskyy, trying to make the illegal absence of elections seem reasonable.
And the finishing touch:
Interview Ukrainian, and only Ukrainian, people
Imagine that. When @Face the Nation interviewed Ukrainians about the Russia / Ukraine war, the Ukrainian people supported Ukraine.
1
-
1
-
1
-
1
-
A woman neighbor called the police.
After she saw the drama taking place with the police, she walked over and said that she was the one that called the police. She also said that the Pastor lives across the street; nothing criminal is taking place. She said that she called the police, because she did not recognize him from a distance.
In the body-cam footage, you can see the officers realizing that they royally screwed up. But rather than just releasing the Pastor, they charged him with a BS crime, presumably to have a plausible explanation for putting him in hand-cuffs.
This looked really bad for those officers.
I fully support law enforcement. But those officers, although cordial, either had no brains, or were on a power trip (I suspect it was both, but mostly the latter).
When the Pastor refused to prove who he was, the officers decided that they would show him that they were in charge. They took his stance as a free man, who knew his rights, as a personal affront to themselves.
Those officers need to be in a different line of work. They did serious harm to the reputation of police officers.
The Police Chief had the BS charge dropped. Good for him. But what about the precinct's Lieutenants, and the precinct's Captain? Why did it have to reach the desk of the Police Chief? That chief, I imagine, probably ripped in to every ranking person at the precinct.
1
-
1
-
1
-
If you create an encrypted VeraCrypt volume on a standard flash drive, you can get better (I believe) protection than the drive in this video, at 1/2 to 1/3 the price, and 2x times the performance (for a fast drive). Here's why (and please correct me if I am mistaken):
1) Who knows what encryption the datAshur drive is using? They can claim whatever encryption that they want. We have no way to verify their claims.
Are they using Rijndael, Serpent, Twofish, etc, or their own proprietary code that only they vetted?
Did they properly implement the encryption? Who knows?
2) Is the hardware really secure? Do we just take the manufacturer's word that it is implemented properly?
All manufacturer's make such claims, and yet videos like this one (link below) show all manner of flaws:
https://www.youtube.com/watch?v=jVKl3GuazEs
3) Is there a back door -- a master code? Who knows?
With VeraCrypt, you need not assume that the manufacturer got everything right, because you know that VeraCrypt is highly secure. If it were not, programmers on our planet would spot issues with the source code and would love to take credit for discovering issues. There is no back door.
And you can keep the VeraCrypt executable on a standard flash drive (in the normal NTFS, FAT32, EXT4, etc) file system, which would allow you to mount your VeraCrypt volumes on computers that do not have VeraCrypt installed.
The only audience I see for these hardware encrypted flash drives is:
-- Folks that struggle with computers, and could not handle VeraCrypt.
-- Folks that do not realize the myriad of possible security issues.
-- Folks who want to keep their data from casual snoopers, and are not concerned with 3-letter agencies serving them a subpoena.
But since VeraCrypt is free and open source, and can be used on much faster drives that cost half the price, then unless you fit one of the exceptions noted above, I do not see why anyone else should buy one of these hardware encrypted drives.
Cheers!
1
-
1
-
The police cannot identify an occupant if that occupant refuses to identify themselves. And there is no way that the police will walk away, if they suspect that they have the person-in-question in the car.
If someone is minding their own business, sitting in a parked car, then that person does not have to identify themselves.
But if the police have a warrant, and a car that matches, and a description of the person that matches, then of course the police will demand that you identify yourself -- and get out of the car if ordered to do so.
As to our host making light over him being in a parked car that is not going anywhere... that is nonsense. These days, cars have a shifter that changes its gear from park to drive.
Our host said that he has seen where the police put a car in front. That is lawyer connect-imaginary-dots talk. What he has seen elsewhere is not what he has not seen with the case he is discussing. Was there a second car to put behind the suspect's car?
Police cars, like any other cars, can be pushed, and have been pushed.
Spike strips?
We have seen videos of people fleeing on flat tires, and even on rims with no tires.
Can you imagine if the suspect fled on flat tires, lost control, and ran someone over?
Then our host would be calling the officers incompetent for not properly detaining the suspect, and would talk about all of the tools at their disposal that would have prevented the suspect from fleeing.
More time and more options?
Was our host at the scene? Did our host watch all of the officer's video footage. He said that it was not all available. And yet our host talks like he knows what the officers should have done.
As to questioning the suspect, as our host discussed towards the end of the video...
When our host is willing to risk being shot, then his words would have credibility.
Perhaps that suspect was cursing at the police, and being combative with the police? We do not know.
If the suspect refused to follow valid police orders, then that is a sign that the suspect should not be trusted. Ergo, the police will want to ensure their own safety by detaining the suspect in handcuffs. Once in handcuffs, the police can then take time to verify the identity of the suspect.
But you do not let a potentially violent suspect sit in a car, where weapons might be present, while you try to verify their identity.
All of the above, and our host never mentioned what the warrant was for. Was it for an armed burglar? If so, what are we expecting the police to do when they find someone in the car that is registered to that armed burglar?
Our host is caught up in defending suspects, and going after bad guys in the auto industry. He has dealt with one-to-many bad cops, because it is the nature of his legal business. So although he understands why the police do what they do, our host seems to have his mind focused on books and not in the shoes of the police at a life-and-death scene where the car matches the warrant, and a combative occupant that might have a deadly weapon.
Let's give the officers the presumption of innocence, rather than casting them as villains, without having even seen the video of their encounter.
If the officers went too far, then by all means find them guilty. But our host's comments have implied that the officers were both stupid and guilty.
1
-
My bank's ATM logs me out after each transaction. It is annoying, but I understand their reason for doing so.
I usually want to check my balances, and then make a withdrawal.
Well, after I check my balances, it logs me out.
Also, I do not like to repeatedly enter my pin, due to someone possibly watching the keypad (or perhaps even having a spy camera recording each transaction).
I cover the keypad while typing in my pin, and that adds to the inconvenience.
By having to enter my pin twice (once to see my balances, and once to make a withdrawal), that gives the scammer two shots at trying to get my pin.
And how many people just type in their pin, without covering their hand?
This is all frustrating, but understandable.
If we locked up the scammers for 30 years, most of this would go away, and honest people would be able to use their ATM without jumping through hoops.
Instead of inconveniencing everyone, if we locked up the scammers and made the penalty very severe, then the scammers would either be locked up, or not willing to risk being locked up, which would allow the rest of us to live normal lives.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1) I purchased the EaseUS Todo "Workstation", lifetime version. I went with the "Workstation" version because it offers a "file exclusion" option when doing backups.
I have hundreds of gigabytes of music (flac and wav) files. I have copies of those files on multiple external drives. I do not need to waste time and space, by backing them up, again, when doing a full backup. So I tell EaseUS Todo to exclude my music directory (and its sub-directories).
I also like its password feature, and its compression feature, and its encryption feature. Not all versions have all of those features. Their web site has a comparison chart to show which features are available with which Todo version. There are six versions.
I also like its Emergency Media tool.
I purchased a new computer, and I did not want to install anything on it, until I first did a full backup. That includes not wanting to install backup software on my new computer, until I backed it up.
So I used my old computer to create a bootable USB drive, and used that bootable USB drive to backup my new computer.
I also have a computer that does Chia crypt-o mining. I install no 3rd party software on that computer. With the USB emergency boot drive, I can back up that computer, without installing anything on it.
I believe that all of the EaseUS Todo versions have the "create emergency boot media" option. Along with the file exclusion option available in the Workstation version, that checked off all of my want list items.
By the way, I was having trouble making a working, emergency USB boot drive. It did not work. I contacted EaseUS, gave them the details (including my invoice number), and they quickly replied with a link to download an ISO. I used that ISO file to create my USB emergency boot drive. So on one hand, I am not pleased that the emergency boot media feature was failing. But I have the ISO file, and EaseUS's customer support was on the ball.
2) As it pertains to the software that comes with some external drives...
I do not delete it, because it takes up little space. And if I decide to sell the drive, I do not want to risk having the buyer complain that the included backup software is missing.
I create a "new_with_drive" directory, and I move the included files into that directory. And there it will sit, untouched, probably for all eternity.
But if I sell the drive, I will not have to find those files saved on some other drive. I will just move it back, and delete the "new_with_drive" directory.
3) I agree with our host to not use the included software. Lord knows what it will install on your computer, or if it will endlessly nag you to purchase it. I guess you could do a web search to see if others are using it and learn about their experiences, or maybe there are youtube videos of people demonstrating that software. I am not going to waste my time with that, as I am confident that it will not be a good choice to use the included software.
1
-
1
-
1
-
1
-
When a company offers only a subscription service, they should be avoided (well, at least for this topic).
When your software contacts a permission server, and will function only when given permission by that company's servers, then you are at their mercy.
For example:
What happens if your internet service provider (ISP) has an outage. Well, too bad. Now you can't do your backup.
Or does the permission server grant your backup software a 30 day grace period?
And what about backing up from an emergency boot disk (or flash drive)?
To truly make a clean, complete backup, with no files in use, you do not want to be running Windows as usual. You want to boot from, perhaps, a flash drive that contains the backup software.
It seems like that option is no longer available if you are using a subscription service. Or will any emergency boot media include network support, which will contact their permission server?
Yet more hoops to jump through, and more things that can go wrong, and just more busy work to deal with.
Macrium Reflect claims that they are offering only a subscription service to provide the latest and greatest product. Sounds good.
But have you always been happy with upgrades?
Well, with your subscription service, it sounds like Macrium Reflect can and will change your backup software's interface and functionality at will. One day, you go to do a backup, and the menu items might be changed. Will you be happy with the change? Will a forced update always work, or might you encounter a bug in an upgrade, causing you grief?
Restores:
Macrium Reflect claims that restores will continue to work, absent a subscription.
Are you going to test that claim? Or will you cross your fingers that you will be able to do a restore, after you cancel your subscription?
And even if the restore continues to work... well... that is now. But since you are at the mercy of Macrium Reflect's permission server, they can change that at their whim.
Have you checked on the terms and conditions for canceling your subscription? Companies routinely make it simple to sign up and send them your money. But try to cancel, and good luck. Maybe Macrium Reflect makes it just as simple. But do you know?
Folks, putting your business or the functioning of your life (via your daily driver computer) in the hands of complete strangers at Macrium Reflect is somewhat reckless.
I use EaseUS Todo -- no subscription. I created an emergency boot flash drive. I can do backups and restores at will. I rely on no one. I need not trust anyone's word. It just works. EaseUS Todo can go out of business, and it will not matter. What about Macrium Reflect?
I have no problem with choosing a subscription service, as an option. But as a lifeline... as the only option... that is a red flag.
For example, you can rent Microsoft Office, via their subscription service. But they still offer the actual apps. It is your choice. That is no longer possible with Macrium Reflect.
1
-
The radical leftists that cry "equity" will never go for the rational plan our host described. Why?
Although the radical left cries "equity", they care zero about equity.
The radical left wants minority groups to have a higher stature, in all walks of life. And they have no "we're satisfied" number. Every white person on the planet could become shoeshine boys, and the radical left would still complain about white supremacy.
If the radical left had their way, not a single white applicant would be able to attend a school, until every last minority were first given a chance to cut the line.
And when white people become the minority, the radical left will still cry 'white supremacy", and the same old woke BS, and who knows what new woke BS propaganda will be with us down the road.
Radical leftists despise white people. White radical leftists despise themselves. And yet they never practice what they preach. They never give up their position of power for a minority.
Malcolm X had radical leftists pegged. Back then, the woke crowd were called liberals, and were not as toxic as they are today.
1
-
@1:04 "I don't discuss things with my son or my family, because I don't want to have any knowledge of any, I, I don't want to be accused of, well, you talk with your son, or you talk with your, whomever"
That is President* Biden's babbling way of trying to convince others that he never discusses any government topics with any unauthorized people.
The reason for not discussing classified government topics with your son or whomever, should never be because you do not want to be accused of doing so.
Rather, the reason for not discussing classified government topics with your son or whomever, should always be because it is illegal, it is a national security risk, and people can be seriously harmed or killed.
So President* Biden's reason is because he does not want to be accused of breaking the law, when his reason should be because he upholds the law.
1
-
1
-
The school board members, to whom the students are reporting outrageous issues, are all sitting there and loving every second of the complaints. Why?
It is those school board members that hate America, hate white people (hate themselves if they themselves are white), hate capitalism, hate free speech, etc.
So when these students report on the status of what is going on in the schools, the school board members are gleeful inside, knowing that their efforts to tear down America's foundation, via brainwashing young minds, is in full motion in the school.
This is somewhat analogous to innocent, political prisoners reporting on what is going on in the prisons to the people that put them into the prisons.
Everything that the students are reporting are due to the policies put in place by the people that the students are complaining to (the school board members).
Please do not assume that now, since the students are reporting what is happening, that the school board members will take action. The school board members put this into action, and this is merely confirmation that their plan is already in action.
These videos need to include the names of the board members, the title of the board members, the photos of the board members, and the locations of the school districts that the board members represent.
Without the above information, all we have are students complaining to faceless, nameless, anonymous people.
The People do not know who to vote out of office, when The People do not know who those people are.
For some reason, conservatives give cover to the very people that need the light of day shined on them. We need to have these public, taxpayer funded, political board members exposed, asked questioned, on camera, by conservative media.
We already know what is going on in the schools.
We need to know the specific people that are making it happen. Without knowing who they are, not much well get done. They need to be voted out. But that will not happen if we do not know who they are.
Thank you.
1
-
1
-
1
-
1
-
1
-
Since Ford has new engines for that vehicles, it means that Ford is making the parts for those new engines. Ergo, Ford has the parts. They have them now.
Ford is deliberately using those parts in new engines, rather than using those parts for the safety recall.
When someone gets killed, due to Ford not replacing the faulty parts, then Ford will be paying out countless $millions, because Ford has chosen to put the sale of new engines ahead of fixing already sold engines with a serious safety issue.
Ford must be selling those new engines like nobody's business. Because for Ford to give a middle finger to the safety recall, they must have a very lucrative line of revenue from those new engines that they refuse to interrupt -- so lucrative, that Ford would rather pay out $millions in law suits, in order to not interrupt their new engine sales.
I am surprised that no government agency has asked a court to lock Ford's doors, until Ford complies with the safety recall.
1
-
1
-
Dave, does this mean that each virtual machine (each guest OS) does not truly have its own kernel mode?
In other words, since the entire VM is (I am guessing) just another app, it runs entirely(?) in user mode.
The VM, of course, handles everything like it actually has a kernel mode, in order to function. But the VMs kernel mode is just an illusion of sorts?
Is the above correct?
And does the above differ between a type 1 vs a type 2 hypervisor?
If a VM on a type 1 hypervisor actually has a real kernel mode, then how do multiple VMs not step on each other?
Is a type 1 hypervisor capable of segmenting hardware access, such that each VM has a real portion of a kernel mode?
Please consider making a video on kernel mode and user mode, and how hypervisors present those modes to guest machines (and are real kernel modes presented, or are artificial kernel modes presented?).
Thank you.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@johncrowe5164 Trump said that he would release his returns, after the IRS completed its audit of his return. And Trump made that statement, only because he was asked to release his tax returns.
I am asking you to release your tax returns.
Are you being audited by the IRS?
If not, then you should release them, because your are being asked to do so, the same as your expectation of Trump being asked to do so.
How does China factor in to being obligated to releasing your tax returns? I never heard that people that own money to China should release their tax returns.
And when did claiming to be a billionaire become the compelling criteria for being compelled to release your tax returns?
I think that people that enter public office, with less than a million dollars, and during public office they amass tens of millions of dollars, then they should be the ones being compelled to release their tax returns.
I am not defending Donald Trump for deceiving the world. I am expecting the same rules to apply to anyone that holds that office or runs for that office. We should not be making new rules that apply only to the opposition party.
It makes the demand stink of partisan BS.
Just leave you out of what?
I reply, on topic, to the comment that you posted. You reply with reasons you hate Trump. Hating someone does not qualify as a valid reason for them to release their tax returns.
The rest of your comments are off topic. I am happy to respond to those other, unrelated, items you brought up. But in all fairness, why should I switch topics and answer your new topics when you have not answered my question: "Which presidents, and which candidates for the presidency, have posted their tax returns?", which is the topic, and which I have asked several times.
Should the same rules apply to all presidents and all people running for the presidency?
Cheers!
1
-
1
-
1
-
Leo, countless people are in the habit of clicking "Allow" for everything.
Such people will do so at public charging stations.
Some people might think that they must click "Allow", or the charging will not work.
In fact, every so often, my iPhone will refuse to charge, unless I unlock the phone. That is to keep a thief from being able to use Siri, and accept calls, after the battery runs out. No code, and the thief cannot charge the phone. The phone becomes a brick, once the battery runs out.
The above points plants in the minds of some people that access must be granted whenever (and wherever) you charge your phone. There will be people that will allow the data connection. If it is only 1 in 1,000 that will add up to lots of people's allowing data access. And if I were to bet, I would guess that 25% or more people will click allow.
The folks viewing your videos are not your typical computer users. They are more tech savoy. But the general public consists of a far higher percentage of inept computer users.
There are on-the-street videos, asking people questions, such as: "How many dimes are in a dollar?" -- and lots of people do not know the answer. And "What language do they speak in Utah?", and "What country is Hawaii in?", and "What is 15% of 100?", etc. Scores of people cannot answer those questions. And they all have smart phones.
So the advisory to not use public USB ports is a quick and simple solution.
@2:37 -- That is yet another item to carry around.
People can purchase cables that have the data related wires cut (or missing). And since you have to use a cable, anyway, you can carry around a power-only cable.
Such a cable will also eliminate the risk that you might, accidentally, forget to use the USB data blocker. With a power-only cable, it is accident proof.
1
-
1
-
1
-
@1:48 "...MSNBC, who has become a full-blown, extremest, news organization".
Please do not inadvertently label MSNBC as a "news" organization. They are not a news organization (regardless of them calling themselves a news organization -- of course they will -- they are not going to call themselves a fake news organization).
MSNBC is an unofficial propaganda arm of the Democrat National Committee, and the DNC is not a news organization.
You can swap Pelosi, Schumer, Biden, etc, with any of the hosts from MSNBC, and the same rhetoric will be broadcast, because they are the same party in different rolls. They simply wear different hats.
1
-
1) Use a password manager.
Keep a copy of your password manager's database on a different storage device (like a USB flash drive). That is just in case your main drive (where you have your password manager's database) fails. When you replace the failed drive, you will need your password manager's database copied to your replacement drive.
I use "keepass".
It is free, open source, and all of your encrypted passwords are kept in a single file. As long as you keep a copy of that file on other devices, you will always have access to your passwords.
My keepass database is less than 5 MB, so it takes a split second to make a copy.
Your password database could be larger, if you store lots of documents within. I have only a few documents in mine. So, yes, you can store more than passwords in most (perhaps all?) password managers. And you can have multiple databases / vaults. You can, for example, store only passwords in one, and only documents in another. And you can open either one, just as easily as Excel can open one spreadsheet or another.
2) If you ask for help in a forum, make sure that you stay in the forum.
Scammers will try to entice you into having a private dialog. They do that, so that no one else will see that what they are doing. If they try to pull off their entire scam, where other forum readers can see, then other forum readers will alert you that you are being scammed. So the scammer tries to get you into a private, one-on-one, discussion. And they can be clever in convincing you to e-mail them, or private message them, or even give you a phone number to call. Just remember that if it will be only you conversing with them, then it is a scam. Anyone in a forum that is offering help should do so "out in the open", where all forum readers can see everything that you are being told to do. You want other forum participants to see what a "helper" is telling you to do.
1
-
1
-
Two years ago, my 17 year old Dell flat-screen monitor died.
I walked into Micro Center, and purchased an Asus monitor, because it got good reviews from customers, was the right size, and was competitively priced.
Well, here I am, two years later, and this Asus monitor has vertical lines all over it. It is junk.
Between this Asus monitor already falling apart, and our host's report on them being such a degenerate company, I will not be purchasing Asus.
In a different room, I have an Acer monitor, and it is very good. They will be on my short list for a replacement.
Asus products should be avoided.
1
-
1
-
An employee with physical access, or admin access to the site's servers, can make a copy of the database, take it home, and try to crack it.
Also, since someone at the site programmed 3 attempts, that person could possibly change that number. Or, that programmer could program that security check to not enforce the 3 tries rule, if the attempt is coming from his computer.
There are probably other security risks involved. And there have probably been countless security breaches (the sites are not keen on telling the world if they can fix it without the public finding out).
Ultimately, we are responsible for our own security. By using a unique, strong password, then we are not at the mercy of some website's employees or even an honest vulnerability in their security.
1
-
For what it's worth, I got the upper hand over HP.
I signed up for their Instant Ink program, when they had a "Free" tier.
HP no longer offers that "Free" plan, and someone at HP probably got in trouble for ever making the "Free" plan an option.
If I ever switch to a different Instant Ink plan, then HP will not allow me to return to the "Free" plan.
The down side to the "Free" plan is that it includes only 15 pages per month, and no roll-over pages into the next month.
If I were to print a 16th page in a monthly cycle, HP will charge me $1 for that page, and it will include a grouping of 10 pages (meaning that the 26th page would cost me yet another $1).
I print approximately 30 pages a year. So the "Free" plan works for me.
My ink (that is sitting in the printer) dries out from lack of use. I do not care.
HP replaces it, for free, shipped for free to my home.
If I ever buy another printer, it will not be from HP.
By the way, another slimy thing that HP pulled is:
When I purchased my printer, it came with ink. Ergo, I owned that ink.
Well, when you sign up for the Instant Ink program, you just gifted that ink to HP. You no longer own the ink that came with your printer.
As soon as you sign up for the Instant Ink program, your already purchased ink becomes part of the Instant Ink program.
So, lets say that you wanted to put those ink cartridges aside, and use only the ink that HP would ship to you as part of the Instant Ink program. No. No. No. Not allowed by HP.
You must use your purchased ink (that came with the printer), as part of the Instant Ink program.
Why is that an issue?
Let's say you choose a 50 pages per month Instant Ink program. Well, one month, you are going to need to print 65 pages. That means that you will be charged for exceeding your 50 page allotment.
So you figure, I have the ink that came with my printer. I own that ink. I will use that ink for the excess pages. No. No. No. That is not allowed.
Once you are part of the Instant Ink program, the ink you owned (that came with your printer) cannot be used outside of the Instant Ink program.
Supposedly, if you purchase HP ink cartridges from an authorized HP dealer, you can use that ink outside of the Instant Ink program. But I will never test that.
But that HP steals (in a manner of speaking) the ink that came with your printer, is outrageous.
Remember, if you never join Instant Ink, then the ink that came with your printer would work. You would own it and use it until it ran out.
But if you sign up for Instant Ink, you just gifted your owned ink to HP.
That happened to me, and it bothered me on principle. But since I never exceed my "Free" plan's 15 page monthly limit, it never costed me anything.
Worth repeating:
If I ever buy another printer, it will not be from HP.
1
-
I started using mount points, when I started dabbling with Chia crypt-o mining.
For other uses:
I still like to use drive letters, when using the command prompt. The reason is because I can "cd" to some location on my "C:" drive, and also "cd" to some location on my "D:" drive. Then, all I have to do to copy files between the two locations is reference the drive letter, and not need to spell out the path to the directory.
Another example:
I use "ffmpeg", and I reference its executable by "D:". Yes, I could add ffmpeg's buried directory to the "path" variable (I guess I should), but using drive letters comes in handy if you just want to repeatedly use a nested directory on two or more drives / partitions.
I see no reason for drive letters to be retired, as long as we can still use mount points. Also, "fat32" and "exfat" are kind of popular. You will need drive letters for USB sticks that happen to to be formatted as such.
1
-
@2:44 "...random people, random hackers, do not have a way to make random changes to the 1Password code, without 1Password actually noticing."
For random people, I agree.
However, companies have been hit by disgruntled employees. Someone (probably more than one person) has access to push out updates.
Granted, it is highly unlikely to happen. But we are trusting some anonymous employee (CEO? Head of Software Development? Etc) to not want to get even with the company. Or, a developer thinks that he can sneak in code to benefit himself.
We do not know how they structure their release process, to ensure that malicious code does not go unnoticed.
In other words, if the person that signs off of the code puts in malicious code, will anyone spot it?
Will a lower level developer compile the code, and note the hash value, and when the code gets approved for final release, with that lower level developer check the hash of what got released?
Again, very unlikely for such nefarious practice to happen, and 1Password is a great choice. Even so, I feel that open source password managers are safer, overall.
1
-
1
-
1
-
1
-
1
-
1
-
I have been using a different method: Map Network Drive.
On the server machine, I share a folder, and I specify which user(s) are allowed to access that folder.
I believe that Windows will display that (some user) already has access. As far as I can remember, that is insufficient. I still add the name of the user(s) that should have access. And I click "Check Names" (or something like that -- doing this from memory), to validate that Windows recognizes the user name(s).
Then, on the client machine, via explorer, in the left column, click on "This PC". Once there, click on "Computer", and then "Map Network Drive".
For some reason, Windows will not offer the "Map Network Drive" menu item, unless you first clicked on "This PC".
Via Map Network Drive, you can enter the credentials to connect to the remote machine.
If for some reason your client machine does not see the remote machine (the server you are trying to connect to), you can use the server's IP address.
You can make the connection persistent. But even if you do not, the next time you open explorer, you will see that mapped drive in a disconnected state. Double-click it, and it will connect (possibly asking for a password, depending on how you set it up).
You can do the same via the command prompt (although I have not done it in years).
I believe the syntax is:
net use x: \\serverbox\path_to_shared_folder
Above, "x:" will be the drive letter that gets assigned on your local box.
The "net use" line can contain other arguments, related to login credentials (you will be prompted if not specified on the command line), and there is a persistence option, and some others.
I have been doing it this way, ever since Windows 98 (or XP), when I read articles that enabling file and printer sharing is a security risk. Is that the case today? I do not know.
1
-
Joe Biden is in love with Joe Biden.
In his rise to power, he surrounded himself with "yes" men. He would tell stories, and all of his boot lickers nodded affirmatively. As time moved along, Biden started to believe his own imaginings, because the people around him reinforced his fantasy world.
Now he is accustomed to speaking this way, and he cannot wrap his head around the fact that now he is being called out on his imaginings. He has been running his mouth, for so many years, and getting away with it, that he can no longer remember what is what -- and sadly, he doesn't care, because he is still in love with himself.
And his poll numbers continue to reinforce his fantasy world. He still thinks that his ramblings are in some way cohesive, because he is gliding towards the nomination. He will, eventually, receive a reality check, when he goes up against Trump. He might even get the sympathy vote, when people feel sorry for his mental collapse; when people feel sorry for the train wreck he will put on display.
1
-
1
-
@7:06 -- VeraCrypt:
"It's a great solution, if you want to do whole disk encryption..."
VeraCrypt is not limited to whole disk encryption.
You can create virtual file systems / volumes (also called containers) from KBs to TBs (perhaps PBs?) in size.
For those not familiar with VeraCrypt, it allows you to create a virtual volume. You mount it with a password of your choice, and it will show up as a volume letter. Anything that you put into that volume will be encrypted -- on the fly. While that encrypted volume is mounted, you use it the same as any other volume letter. It will work, seemingly, as if there is no encryption. But once you unmount that volume, the contents of that volume will be mumbo-jumbo to anyone that tries to access its contents.
Also, backing up your encrypted volume is as simple as it gets, because each volume is a single file. So just make a copy of that file to somewhere else for safekeeping.
VeraCrypt is easy to use, is open source, free, and uses very strong encryption (on the level that 3-letter government agencies use). But if you use a stupid password, then all bets are off.
The only complicated part of VeraCrypt is if you want to use it to encrypt your entire boot drive. BitLocker probably makes setting up that feature much easier. But BitLocker is closed source. Executives at Microsoft could have a master password -- no way to know. That probably will not matter to most folks. But it is easy for Microsoft to have.
@7:42 -- GPG
Note that you can use GPG to encrypt individual files with its:
--symmetric
option (or its abbreviated "-c" option).
So if you have an individual file that you want to encrypt, using very strong encryption (similar to VeraCrypt's strong encryption), then GPG has that feature.
-----
For any encryption software, be sure to download it from the right site.
Malware makers love to mimic the real software, to take over your computer. Do not download ransomware, disguised as VeraCrypt (or GPG, etc).
1
-
1
-
1
-
When the Republicans take control of nearly all parts of government (federal, state, and local), things will get better.
Ironically, the Democrats will claim that their (Democrat) policies are now working (they just needed time to mature).
And each time President* Biden makes things worse (with, for example, executive orders), then the Democrats will blame it on the Republican controlled institutions.
I am concerned that with things improving after the Republicans sweep out Democrats in the mid-term elections, Americans will forget that when Democrats controlled everything how bad it got. Americans will see that in 2024 that things are not too bad, and will not give that credit to the turn-around that took place in the mid-term elections. And since things are not so bad, the Democrats will stand a better chance at winning races (including the Presidency) in 2024.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@6:15 "I'm allowed to protest here, too".
Alex, the people putting their hands on you, and blocking you, are breaking the law. Ergo, they are not protesters.
Protesting is a constitutional protected right. Assaulting people is not protesting. What's next? Bank robbery as a protest?
Those people that put their hands on you, or threw coffee on you (or your colleagues), are not protesters. They might have initially been protesters. But as soon as they commit a crime, they cease being a protester.
Never call criminal activity "protesting". Calling criminal activity "protesting" implies a right to engage in criminal activity.
Blocking public roads, or blocking any public access, or causing a disturbance, or putting their hands on you, is all illegal -- all are criminal offenses. None of those criminals (who engaged in those illegal acts) were protesters.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@4:02 "The climate protesters..."
As seen @5:29, they are blocking traffic. That is illegal. Ergo, they are not protesters -- they are law breakers.
Protesting is legal.
When the police inform you that you are breaking the law, then you are not a protester.
What's next? Holding up a bank, in the name of protesting?
Well, they were protesting in that bank robbery. So no crime. Right?
Yes, blocking traffic is not as serious as bank robbery. I gave the example to illustrate a point.
You do not get to burn down buildings, in the name of protesting.
You do not get to turn over cars, in the name of protesting.
You do not get to block traffic, in the name of protesting.
Once you engage in criminal activity, you, by definition, are not a protester.
The title of this video should read:
"Climate criminals are, again, being seen as 'hysterical and half crazed'"
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@1:08 "The only people able to see your communications are yourself and the persons you're communicating with."
@1:15 "There's no one to intercept, record, or report your messages."
The above is true, and not true -- and is no fault of signal, or any other privacy app that does everything 100% correctly.
The issue is that the devices that you use cannot be trusted.
For example, the iPhone model 16 includes Apple Intelligence, which is client side scanning. Ergo, your iPhone 16 sees what you see. If it is on your screen, then your iPhone 16 sees it. It records everything. So those Signal messages, that you are able to see... well... Apple took screen shots of it, so they can see it, too. And if you are using, perhaps, an iPhone model 8, you are safe. Right? What if the other person using Signal is on a model 16? Your Signal communications are now on Apple's servers.
No longer will a 3-letter government agency have to try and crack your iPhone 16's password. Apple has a copy of it all, in the clear.
Rob Braxman Tech has videos that go into depth on this topic. Watch the one from 4 weeks ago, titled "End-to-End Encryption Now a Historical Footnote. They Won."
In the above video, Mustafa Suleyman, CEO of Microsoft AI, says, @2:10:
"We are on a mission to create a true AI companion. And, to me, an AI companion is one that can hear what you hear, and see what you see, and live life, essentially along side you."
Mustafa Suleyman also ran DeepMind, a Google AI company.
Both Microsoft and Apple are doing this, and it stands to reason that Google and Facebook are no different, in terms of spying on everyone.
As to us not being so important. Well, we are. It is why those companies are doing what they are doing.
When good people do not run for public office, might it be because big tech does not like them, and will "leak" their private life to the media? Are our elected officials compromised? Can you imagine having "the goods" on the Director of the FBI, or similar? This spying is a serious problem.
Free nations have many times, over the millennia, and even in recent times, turned tyrannical. Will it be easier to end the surveillance while we are a free people, or will it be easier to end the surveillance after our freedoms are gone? Germany is arresting people for memes on Facebook. Twenty years ago, that would have been unthinkable. Australia, too. And there are others. And the people being arrested are just regular folks -- no special status. So we are "that important".
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@1:08 -- Reason #5 is missing.
All of America will support DOGE, when the refunds start rolling in.
Even a lot of TDS inflicted people will circle their wagons around DOGE.
With 80%+ support of DOGE (maybe even 90%), Musk's teams will ramp up their audits to warp speed. And when "the swamp" criminals are charged with crimes, for laundering trillions of dollars, juries will be turning in guilty verdicts, left and right.
By the end of President Trump's term, DOGE will have uncovered over $25,000,000,000,000 (25 trillion), in my estimate, in crime related spending.
1
-
1
-
@3:14 "And guess what? Liz Cheney would be off, scot free."
Perhaps legally. If the republicans play their cards right, they could turn Liz Cheney's world upside down, and expose her and the democrat swamp overlords for their crimes.
Charge Liz Cheney for her crimes, regardless of whether or not President* Biden gives her a pardon.
Let the world watch Liz Cheney and her lawyers argue her case in court.
Let Liz Cheney and her supporters spend $millions on legal bills. Let it drag on appeal after appeal. Let it drag on for years.
In the end, the prosecution can withdraw the initial charges. But in the mean time, their investigation will likely uncover other crimes by her and her democrat partners in crime.
Republicans must stop accepting defeat, and surrendering just because the democrats play a strong hand (such as a pardon). Republicans need to use all legal tactics at their disposal, and never let off the pressure. Aside from uncovering many other crimes, it will send a strong message to criminal politicians that they will have years of anguish and financial troubles when if they decide to be corrupt.
So charge Liz Cheney for her crimes, and let her twist in the wind.
1
-
1
-
1
-
@1:51 "...an assailant..."
Mazie Hirono did not say that the assailant was white. So based on her record of hatred towards white people, and especially white men, we know that the assailant was not white.
If the assailant was white, then Mazie Hirono would have done a cartwheel.
@2:21 "These disturbing and horrifying acts..." and she does mental gymnastics to tie COVID-19 into those attacks, and wins the Olympic Gold for twisting her hatred into concluding that the attacks were racist, with zero evidence of the attacks being racist.
In fact, someone needs to confirm that she did not lie about the attacks taking place. We cannot trust anything that comes out of her mouth.
Perhaps there are elements of truth to her lies. Even habitual liars do not lie 100% of the time.
@3:11 "Over the past two weeks, I worked with senators in both parties..."
Flat out lie.
Mazie Hirono dictated terms to republicans. How do I know?
If anything that any republican asked for was agreed to by Mazie Hirono, she would have bragged to show examples of her being reasonable.
So when Mazei Hirono says that she "worked" with people that she disagrees with, remember that her definition of "worked" is not in the dictionary. Her definition of "worked" is that she exerted intolerance and forced 100% of her agenda on her republican colleagues.
@3:24 "...for her (Senator Collins) good faith efforts to amend this bill..."
This is a textbook example of Mazie Hirono lying.
Did Senator Collins make a good faith effort to amend the bill?
Yes.
Did Mazei Hirono accept those amendements?
No.
So, yes, Senaotor Collins made good faith efforts, and her efforts fell on Mazie Hirono's deaf ears.
@4:42 "We are in this together"
Flat out lie.
Mazei Hirono permits no inclusion from republicans.
Mazei Hirono is part of the swamp. She is one of the keepers of the swamp.
Mazei Hirono is a degenerate.
1
-
1
-
1
-
1
-
He did not break the state record, because it is a women's only race, and he is a man.
Every official that allowed that man to run, in that women's only race, should be fired.
Every official that awarded him the win, in that women's only race, should be fired.
Every official that met the above criteria should never be allowed to judge a competition, again.
Every official that met the above criteria should never be allowed to be left alone, unsupervised, with children.
Normal people should hold their own ceremony, awarding the win to the woman that actually won that race.
Normal people should hand out trophies, etc, and perform the duties as the officials of the race, and ignore the radical leftists, just as you would ignore the person howling at the moon.
1
-
1
-
RINO mumbo-jumbo, from Mike Pence.
He wants to bring in new, executive level justice department personnel, that both the right and the left respect.
Pence is either out of his mind, or sucking up to the Democrats. Why?
The Democrat party is controlled by radical leftists. None of those radical leftists will be satisfied with anyone other than radical leftists running the justice department.
Pence is trying to have us believe that he would get radical Democrats approval for anyone other than radical leftists.
Pence is trying to befriend the radical leftists, that would jail him if they could (but Pence is too much of a political animal to see that). He actually thinks that radical Democrats like him.
President Trump will be the next President. But in the next to impossible odds that a different Republican becomes President, they should pardon President Trump, because it is crystal clear that 100% of the charges against him are political and contrived.
What we did not hear Pence say is that he would prosecute the Democrats for their abuse of power; for their weaponization of our justice system; for wasting hundreds of millions of dollars on phony investigations; for selling their offices to adversarial governments for person gain, etc.
Pence will let President Trump twist in the wind, and do nothing about the massive abuse of power by Democrats.
The Democrats will see Pence as a pushover, and will have no respect for him.
Pence is business as usual.
Mike Pence is a disgrace.
1
-
@8:14 "We should be able to opt out of that stuff."
I would word that differently.
We should be able to opt in to that stuff.
In other words, the default is always that we are opted out. The only time that we should be opted in, is when we specifically take an action to opt ourselves in, and we are acutely aware that we are opting ourselves in.
Opting in must not be part of an End User License Agreement, buried somewhere, where we opt in without realizing that we opted in.
When we are opted in by default, the manufactures will not make it simple to opt out, and most people will not know that they are opted in, and will not bother to figure out how to opt out.
These spyware companies are counting on the public not knowing how to opt out, even if opting out was possible.
Any law that is passed must specifically state that it is illegal to opt anyone in, without the individual doing so themselves, where their actions are not combined with any other setting changes.
And this must apply to commercial vehicles, too. If the law is written specifically about individuals, then you can count on manufacturers skirting the law when it involves commercial vehicles.
1
-
There is one camera angle that clearly shows President* Biden stopping, and (first) putting down his left foot. He is now stopped and resting on his left foot.
Two seconds later, he leans over to his right foot, and does not pull his heel back, resulting in his toes still in the toe clip, and he falls.
Two things:
1) The media's BS excuse is just that. It is BS, because President* Biden was already stopped, stable, and in control of his stance.
So he knew how to remove his left foot from the toe clip.
Two seconds later, he forgets how to remove his right foot from the toe clip. That is a sign of mental decline.
2) Toe clips are ancient. Any reputable bicycle store would warn you against using toe clips, and they probably do not sell them.
99% of riders use platform pedals.
Avid cyclists, athletes, competitive riders, etc, use "clip-less" pedals (which is a confusing name, because you clip in to the clip-less pedals). They are called "clip-less" because they do not have toe clips (Biden has toe clips).
The way that athletes (such as in the Tour de France) clip in is by wearing cycling shoes, where on the bottom of the shoes it clips into the pedals. This helps the riders climb hills, because while one foot is pushing down, the other foot is pulling up. It also helps on bumpy terrain, and mountain biking, by stopping your feet from falling off of the pedals.
But toe clips are known, for decades, to be dangerous. President* Biden's bicycle is probably 40+ years old.
In summary, President* Biden put his left foot down, was stable, and then leaned over to his right foot and forgot what to do. That is due to his mental state.
1
-
1
-
@ad_astra468 What might look like President* Biden trying to, twice, slip his right foot out is him only trying to put his foot down.
There are basically two types of pedals for 40+ decades.
1) Platform pedals.
These are your standard flat pedals. Better ones come with adjustable "pins" (not really pins) that help keep your sneakers from slipping. But they do not interfere with you trying to put your foot down.
Just a guess, but 99%+ of riders have platform pedals, and probably 90% of them have no pins (I am not sure if they are called pins). But if you search for platform pedals, the better ones will show pictures of the raised parts that hold your sneakers in place from the bottom; that give your foot better grip on the pedals.
The pins are helpful if you are on bumpy terrain.
2) Clipless pedals.
The name of these pedals is a bit confusing, because you do clip in. But these are not toe clips, which is why they are called "clipless".
Clipsless pedals require special cycling shoes that have a part on the underside of the shoes that lock into the pedals. To unlock, you have to rotate your heel outwards, and then you can put your foot down.
When I first started using "clipless" pedals, I took a couple of falls. Eventually, by riding often, kicking my heels out (when coming to a stop) became second nature.
Serious cyclists use "clipless" pedals. Every rider in the Tour de France and other competitive events all use "clipless" pedals. Why?
Aside from pressing down on the pedals, you are able to pull up, too. You get to use additional leg muscles, resulting in better performance (especially in hill climbing, where one foot is pressing down while the other foot is pulling up). Also, the pedals are lighter (and every gram of weight counts, in competitive sports).
President* Biden was using neither #1 nor #2.
President* Biden's toe clips are akin to floppy disk technology for his computer, or rabbit ears antennas for his TV, or a hand crank to start a Model T car, etc.
I suspect that his bicycle is 50+ years old, and that is how he came to have "toe clips", and that no one gave that bicycle to him. He probably had it in his garage for decades.
When he looks like he is trying to free his right foot, he is not trying to slide it backwards to get free of the toe clips. Rather, he is trying to slide his foot to the right to put it on the ground, which is a natural action, when you forget that you have toe clips.
But he remembered when he put his left foot down, and two seconds later forgot when he tried to put his right foot down. That is what makes his accident revealing of his mental decline.
1
-
@askleonotenboom "SSDs are significantly faster when reading, not particularly so when writing. That's what I'm talking about."
Whether an SSD has SLC, MLC, TLC, or QLC NANDs, along with the drive's controller, will determine the speed of the writes.
The type of NANDs do not affect the read speed as much, but there are exceptions.
For example, Micro Center has their own brand of flash drives. Sometimes they send you a coupon that you can bring in for a free 32 GB flash drive.
That drive's read speed (as far as I can recall) is approximately 50 MB/s, and its write speed is 5 MB/s or a bit higher.
So there are low end SSDs.
But if you get, for example, a Samsung T5, it will leave any mechanical drive in the dust, for both reads and writes. And that goes for sequential reads/writes or concurrent reads/writes.
So, yes, a nothing special SSD might have a top write speed of 200 MB/s, the same as a good mechanical drive. It all depends on the SSD in question.
And you can hit the SSD with read and write requests from 10 different directions, and it will not slow down. A mechanical drive will struggle with multiple, concurrent requests.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
Although this is good news, and President Trump will get it done... there is yet another radical leftist choke-point that needs to be addressed:
-- Internet Service Providers (ISPs)
For example, NBC has Trump derangement syndrome, as does NBC's parent company, Comcast.
Comcast can easily block all internet traffic to and from Trump's new platform. So can any other ISPs.
I do not know how to remedy the above, short of everyone signing up with virtual private network (VPN) providers, or everyone using the TOR (the onion router) network -- both are asking too much of the general public. But this control that ISPs have over flipping a switch to block all Trump network traffic must be dealt with.
It would be a shame for Trump to get a fantastic, free speech platform up and running, only for Comcast Cable, Verizon FIOS, Time Warner Cable, etc, to block Trump's platform.
1
-
I once created 3 partitions (one for OS, one for apps, and one for data -- saved files), and it was very good, organizationally, but it was a mistake to make separate partitions (I will explain in a moment).
Now, I still have a C:, D:, and E: drive for OS, apps, and data, but they are all on one partition.
The difference is in the flexibility of allocating space.
With 3 separate partitions, when I wanted to adjust the space of one of the partitions (which was running low), I wanted to grab some of the free space from my C: drive (which had over 500GB of free space that I would never use. But Windows would not let me. My only option was to use a 3rd party partitioning tool. I used the free version of Mini Tool Partition Wizard. It required a re-boot to perform the space reallocation.
Today, I have a single partition, and 3 logical drives. Now Windows allows me to easily reallocate space between the partitions, with no reboot.
Frankly, I cannot think of any advantage for having 3 partitions on a drive. From the user's perspective, a single partition with logical drives functions exactly the same way.
I make a fair amount of use of the command prompt. So having more than one drive letter is helpful. It allows me to be in different directories on the various logical drives, and not have to reference the entire fully qualified path of each logical drive when issuing commands for the directory of each logical drive.
@3:16 -- Our host made reference to the finite number of drive letters. @3:36, he mentioned that there are ways to work around this, but did not go into it (likely because it was beyond the scope of this topic). For those who are curious, it is called using a mount point. It is how Linux mounts drives. You can connect countless drives, when using mount points (well, there will be some limit, but probably several hundred drives).
You can mount a drive into an empty directory of another drive.
So if you have your C: drive, you can have a directory named c:\whatever\drives (where "drives" is an empty directory).
Now, you can mount some other drive, into the "drives" directory, with (for example) the name "movies". Then, whenever you go to the c:\whatever\drives\movies directory, you will actually be on your other drive.
This can be helpful, for example, if you want to search multiple drives, without having to specify c:, d:, e; f:, g:, etc with your search criteria.
If your drives are all mounted within your "drives" folder, then when you search all sub-directories of your "drives" folder, you will be searching all of those drives.
1
-
1
-
@1:01
"We just haven't seemed to find a place for fiber optics, aside from piping it into your home or business".
Data centers use loads of fiber for connecting servers to external, local storage (such as, for example, EMC's VMAX).
@12:05
"Good luck avoiding the building's electrical wiring, they're eventually gonna share."
Products from companies such as Shunyata Research and Audioquest clean up the power.
If you do an A/B test, using no upgraded power related cables or equipment, and compare it to replacing the power cords and using their line conditioners, you will hear a difference -- and it is not subtle.
Do not perform this test with any of the equipment you have in this video. It is not capable of throwing a wide, tall, deep, and realistic soundstage. It does not reveal the space between the instruments. It does not reveal black backgrounds. It never sounds like the singers are really in the room with you. Rather, it always sounds like a reproduction.
But with high-end, matched, and professionally set-up audio equipment, you will hear all of the above, and you will benefit from cleaner power, derived from products from Shunyata and Audioquest.
How does that happen?
I do not build the stuff. I just listen to it. There is a difference, and it is not wishful thinking.
1
-
1
-
@11:55
"...better handling"
I think that the host should have spoken more about the "Sport" model's handling.
The Sport model, with its 19", low profile tires, also comes with a firm/beefy suspension (more so, as compared to the other Accord models).
This translates to being able to take turns at speed. So that exit off the highway, if conditions permit, you can hug the turn, and the car will stay planted, with minimal lean. I am not suggesting anyone drive like a nut. I am suggesting that the Sport model is designed, and you are paying for, its lateral stability.
If the above is of no or little interest, then save a chunk of $$ and get the LX model.
But if you do want the superior handling, note that the car comes with either Goodyear tires or Michelin tires.
The Goodyear tires are okay. The Michelin tires are very good (better than the Goodyear tires, when taking a hard turn).
If you are buying the Sport model for looks (those wheels look very good), and the handling is not a key issue for you, then the tires will not matter (driving, without pushing the car, will not demonstrate any differences between the tires).
I believe that the 1.5 liter models come with the Goodyear tires, and the 2.0 liter models come with the Michelin tires -- but I am not sure.
Lastly, on a personal note:
What was Honda thinking with their "Still Night Pearl" color (the rest of the world calls it "Blue").
Granted, it is eye catching. But it is not a true blue (it has some purple in it). It is not a manly blue.
I love blue. And I plan on purchasing an Accord. My first color choice is blue (never owned a blue car).
But when I saw the feminine tinge to the blue that Honda created, I ruled it out.
The paint job on the Accord is very good, and the mirror shine varies, depending on the color.
The best mirror image for the Accord is in the following order (best to worst):
-- Black (like looking in a mirror)
-- Dark Grey (a small step down from Black, but still very good)
-- Red (very close to Dark Grey's mirror image)
-- Blue (very close to Red's mirror image)
-- White (not much of a shine -- but some)
-- Silver (for some reason, Honda left the shine out of this choice)
Cheers!
1
-
Very good video, and good timing...
Seven items:
1)
@7:57 -- That form included an e-mail address.
What purpose does that e-mail address serve?
I am asking, because what happens if you change your e-mail address, and lose access to the e-mail address you have in the 1password pdf file?
Is there any verification code sent to that e-mail address? (aside from the initial set-up). If so, under what conditions will 1password use that e-mail address.
Can you direct 1password to a new e-mail address?
2)
Do you have to enter your master password each time you start up your browser? Or is it just one time, and then forever, thereafter, your browser has your master password ready for using your vault for all of your passwords?
I am asking, because if you never have to enter your master password again, then if you lose your laptop, or someone gains access to your machine, etc, then your browser will give the assailant unfettered access to all of the sites that you use.
Will closing your browser trigger 1password to ask for your master password upon your next browser session?
3)
Where is the master, encrypted database of your passwords saved?
Only on 1password's servers?
Only on your computer (if so, where)?
On both 1password's servers and on your computer?
Is it a single file, or multiple files?
Item #4 is why I am asking.
4)
I use KeePass.
If I screw it up, I have a copy of its encrypted .kdbx database file. It is simplistic to make copies and to restore from a copy.
I am asking, because a friend of mine wants to start using a password manager, but KeePass is not to his liking (sharing the database across multiple devices, including smart phones, is not a KeePass feature).
1password seems to check all of the "feature" boxes he is seeking in a password manager. So I want to advise him on how to make a copy of his 1password datase file(s).
5)
When using 1password across multiple devices, how does a new password get populated to your other devices?
Does the 1password program detect a new entry (or a change to an entry), and automatically distribute the new database entries to the other devices? Or is it a manual process (or an option to be automatic or manual, by way of a setting that the user chooses)?
6)
Do you need an internet connection for 1password to provide you with your passwords?
For example, with KeePass:
I save my insurance information with KeePass, including my policy numbers, and phone numbers, etc.
If I need to call my insurance company, but I have no internet access, will 1password show me my vault's information?
And does 1password allow you to save non-login data? KeePass allows me to save typed text as comments, as well as documents in its database. Does 1password allow for that?
7)
Lastly, I recently saw a video where a Kali Linux user was able to see all of the passwords saved in Google's Chrome browser. But it was the standard browser's feature, and not a password manager browser extension. I hope that the 1password browser extension is more robust, security wise, compared to how a browser saves passwords.
The title of that video is:
"Hackers EASILY see your password!"
on channel "Liron Segev".
The relevant "browser" part starts at the 7:03 time mark (although the entire video is informative).
Cheers!
1
-
1
-
1
-
1
-
Unless one of the features in the reviewed password managers is a "must have", then I suggest you consider either KeePass or Bitwarden, instead.
The password managers that our host reviewed are all closed source code. You have no way of knowing what is under the covers, and neither do the auditors. And who are the auditors? What are their digital, cryptographic, software credentials? Have you read their audit report?
With closed source code, multiple master keys can be created by the software, and you will never know. Creating multiple master keys does not slow down the password manager.
Are those companies using master keys, that will allow them to have access to your password vault? Probably not. But is "probably" a risk you are willing to have? It is simplistic for them to generate multiple master keys, which would happen during the creation phase of your password vault. The rank-and-file employees will not have a master password the password databases. But what about the CEO?
Both KeePass and Bitwarden are open source. Ergo, every programmer on the planet (that's a lot of people) can examine the code, and find bugs or any monkey-business.
Both KeePass and Bitwarden are free.
Neither KeePass nor Bitwarden has to use a 3rd party service (such as the password manager's cloud service). Bitwarden has features that rely on using their servers, but you need not use those features if you do not need them.
KeePass is 100% off-line.
If KeePass or Bitwarden is missing a feature that you must have, then go with one of the password manager's that our host reviewed. But if either KeePass or Bitwarden satisfactorily handles your password needs, then I suggest you choose KeePass or BitWarden.
1
-
1
-
Spam can be controlled by ISPs. But unless I am not aware of ISPs taking action, it seems that ISPs do not care.
Once an e-mail address is identified as being used by a spammer, the ISP should disable that account.
The ISP should also block that user's IP address, if it is identified as a non-commercial account (to not take down a company that has a bad employee). But someone at the company pays for their company's internet service, and they should be contacted by the ISP to put a stop to the spamming, or lose their account.
And if spam is coming from foreign countries, and those ISPs allow it, then our ISPs should warn those ISPs that we will block their nation from having access to US markets. That will cause some serious pain for them, and for some US citizens, too. But if the media would report that internet connectivity from [fill in name of country] will be blocked in 30 days, unless [country] cracks down on their spammers, then the US will cut internet access with them. Watch how fast [country] gets their act together.
If spammers are using a VPN service, then that VPN service can disable that user's account, and block their IP address.
If VPN services refuse to take action, the ISPs can block the VPN service.
There are major internet hubs (choke-points) where the people that control those hubs can light a fire under the butts of services that do nothing about their spammers. Alas, no one really cares. They do not want to be bothered with this.
An act of congress could get the job done. But when the government gets involved, they nearly always screw things up. They fix one thing, and break two things. Or they inject unrelated BS into the law. And neither our elected representatives nor their staff have the technical know-how to understand the nuances of the issue, nor properly address this issue in legal language, nor properly enforce a new law on this issue.
So it would be best for the private sector to fix this. They can (of course they can), if they cared.
We have people that created ChatGPT, and countless other technical marvels. So of course we have people that are in positions to fix this. They just do not care.
1
-
1
-
This video would be better if, instead of the editing room performing camera acrobatics, they left the camera planted at ideal locations, and allowed us to see the car performing around turns at speed.
Shaking the camera, fast zooming, and 1-second blips are for scenes where you want to fake the performance of a vehicle. It is not for this type of super-car.
You are doing a disservice to the brilliant engineering that has gone into this super-car, in not allowing us to see it raw, without special effects.
There should be footage, from the driver's perspective, showing him both accelerating, and taking turns at speed.
There should be footage, from the side of the track, showing the car's stability, lack of lean, lack of over-steer, lack of under-steer, ripping around a turn.
Most of the shots in this video could be accomplished with a 1998 Toyota Corolla, using similar camera tricks.
For your next video, please keep it simple. Please just allow us to see how the car performs, as though we are driving it, and as though we had the perfect spectator's position at the turns. Let us see the car, not just for a blip, but for the complete acceleration and for the complete turn.
Thank you.
1
-
@3:52 "Don't write it down."
If you have friends or family that struggle with computers, where a password manager will be too complicated for them, then those folks are likely to either use the same password on multiple sites, or will be writing down their passwords. For them, I suggest that they "pepper" their passwords when they write them down. This is only for people that have to write it down, due to (for example) health issues.
If, for example, one of their passwords is:
haveaniceday$$xyz
Then they should write down only
haveaniceday (they have to remember the $$xyz).
The above will prevent others, who might see what they wrote down (such as a nurse or live-in healthcare provider), from using what they saw. The spy will not have the entire password from what they saw.
If the above is too difficult for them, then they can use "pepper" by subtraction.
If their password is:
haveaniceday$$xyz
Then they should write down
haveaniceday$$xyz123
They have to remember to not include the 123 when entering their password (and use different characters to exclude for every web site (do not keep using 123)). They just have to remember to exclude the last 3 characters, no matter what those last 3 characters are.
The above "peppering" suggestions should be a last option, only for folks that cannot handle a password manager or any other method, if it is even the slightest bit technical.
And the example password that I used above is somewhat weak, as "haveaniceday", even with a few extra characters, will be broken rather quickly (the phrase is too common, and there are programs that will test such phrases with extra characters, and it does not take long). The above examples were only for illustration. The same rule applies to any common phrases (avoid common phrases).
And do not put a date at the end (or beginning) of your password. Those will be checked in a split second. Affordable computers can check passwords at tens of billions of combinations per second. Very fast ones can probably do 100 billion tries per second.
As our host said, do not re-use passwords from site-to-site.
So come up with different passwords for every site, and pepper each one. Do not use a common theme for what is written down, because if one site has a leak, then your theme will be tested by bad actors on other sites.
If you use:
haveaniceday$$xyz on one site, then use:
leoisgreat995(^@ on the next site, etc.
Again, the above "peppering" is for folks that have to write down their passwords. For everyone else, use a password manager.
By the way, even with a password manager, you can use peppering.
When your password manager creates a super strong password, you can remove the last character when pasting it into a web site (or add one more character). This will help you if your master password for your password manager gets cracked. instead of losing your mind, that someone has all of your passwords, you will have some comfort in knowing that you are using a slight deviation of what your password manager is storing for each site.
My password manager is "KeePass", and a fancier version is "KeePassXC" (and the matching "KeePassium" for my iPhone). They are all free and open source. Bitwarden is another excellent free and open source password manager. But it uses cloud storage, and I avoid that risk -- albeit a minimal risk.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@2:45 -- Discussing the range.
Those are best case scenario numbers, with new batteries.
When your EV is 5 years old, you will probably get close to ½ of that range on a warm, spring day.
And when your EV's batteries will no longer hold a charge (all batteries eventually fail), it will cost you no less than $25,000 to get your EV's batteries replaced.
And you can't pull in to Bob's service station for new EV batteries. You must get your EV's batteries replaced at the dealership's service station. They are the only ones that can get you the custom made batteries for your specific model EV.
And it gets worse.
They will not have batteries in stock.
And it gets worse.
Your battery replacement order will not be delivered like a Amazon delivery. No. No. No.
Your battery replacement order will take 6 months, or longer, to come in.
So:
You will have all of the problems show in this video.
You will lose range over time, as your batteries age. It will take much longer to charge aging batteries. It will take much more electricity (and cost much more) to charge aging batteries.
You will have to wait 6+ months for replacement batteries.
You will have to shell out a minimum of $25,000 for the replacement batteries.
And let's not forget how heavy those batteries are. That puts a strain on the vehicle's suspension, and the tires.
Get ready to replace those expensive tires every 6,000 miles. You will be lucky if you get 10,000 miles out of them.
And saving the planet?
Those charging stations are powered by coal plants. And those batteries are comprised of rare Earth metals, mined by child slave labor. And where do the old, warn out batteries end up?
1
-
1
-
1
-
1
-
1
-
@-Fritz- "If the news media ignored it, why are there so many news media stories about it?"
There are not. You lied.
You tried to be a smart @$$ by taking a dig at me, when it was you who were clueless.
And after I took the time to explain it to you, you dig yourself a deeper hole with BS'ing about "so many stories about it".
If there were so many stories about it, then you should have understood my initial comment. But you did not.
Or you saw "so many stories about it", and still the joke went over your head.
One possible rational for you to be knocking my joke, and being confrontational, is you are a radical leftist, trolling this right-leaning channel.
You support the man with dementia, and my joke triggered you.
"And if he told us how the continental troops took over the airports during the revolutionary war, how would you react to that?"
Non sequitur.
Whichever of the above is the reason for your comments, it does not matter, because your attempt to discredit my posting failed, and you were exposed.
Cheers!
1
-
1
-
1
-
1
-
1
-
1
-
Most (perhaps all?) backup software (these days) offer an option to encrypt your data.
If you do not encrypt your data, and someone has access to your external drive where you are storing your backup, then that person has full access to your data.
The downside to using encryption is that if you cannot remember the password that you used to encrypt your data, then your backup is as good as a fart in the wind.
The solution that I consider to be best is to backup to an external drive, using encryption, and then make a copy of that external drive to another external drive, and keeping one of those external drives at a friend or family member's house. Or, it might be easier to upload a copy of your external drive to a 3rd party "cloud" service.
Either way, you have one encrypted backup with easy access in your home (or business) on your external drive, and a copy of it is also either in the "cloud" or at a family member's other residence.
Note that if you have any personal data that you would never allow others to view, then never upload those files to the "cloud". It is unlikely that anyone there will look at your files. But the "cloud" service might run scanning software on what you upload, to build a profile on you. But if what you upload is encrypted, then there is nothing to worry about.
1
-
Louis, approximately 3 years ago, I purchased nearly two petabytes of refurbished Seagate drives, from a company in Florida, USA. 98% were Exos models.
I had two failures, and both were within a few days of use. Both were replaced, free, with no hassles (in fact, it was a breeze).
Perhaps you just got a bad batch?
I have also purchased many brand new Western Digital drives, from a photo-video store in Manhattan, including WD's G-Technology line. I have had a dozen failures (including the replaced drives failing). And Western Digital's warranty service is abysmal (an ideal candidate for your wiki).
1
-
1
-
1
-
1
-
The lines about the state not being able to monitor its own land is, well, too bad. Someone get me a tissue. A good constitutional lawyer could probably win against the government.
The state has so much land, because the state has an ENORMOUS budget. When the state pisses away its revenue, it can borrow near limitless amounts of money. So it is not like these government entities can cry "It's too much work for us."
They know every person that got a COVID-19 shot, and how many shots. But they have no time, in 15 years, to do a once-over of government lands?
The government has no budget to have a handful of people traverse government lands, over years and years, for this purpose?
That our wise and trusted elected officials squander tax dollars, and do not keep track of lands that We The People elect them to keep track of, with our tax dollars, is their fault.
If our own incompetence, for not knowing that someone is on our own property for 15 years is binding, then the city or state or federal government who have resources to track everything in our lives, should live by the same rules they make for the people that elected them.
Perhaps those government entities should ask Microsoft or Google how to track every aspect of people's lives?
I assure you that if Microsoft or Google could profit off of those millions and millions of acres, then Microsoft or Google would be monitoring every branch and leaf.
The thrust of why those residents do not keep their extended back yards is because they never paid the taxes on that land.
1
-
@0:24 "We are not asking for special treatment..."
She makes a video demanding special treatment, while saying that she is not asking for special treatment.
@0:27 "We simply want enough space to travel comfortably and safely"... and we want you to pay for it, by paying higher flying costs due to me taking up extra seats.
@0:30 "...without being discriminated against..."
If you do not pay for my extra seats, then you are discriminating against me.
@0:33 "It's truly that simple"... just pay for my seats. Simple.
@0:35 "If you agree that every traveler deserves to fly comfortably..." ...by you paying for me.
Folks, no one "deserves" to travel, comfortably or otherwise. If we all deserved it, then we would not be expected to pay for it.
You get to travel for a price; not because you deserve it.
What is "deserved" is that the employees of the airlines get paid for the service that they are providing. We, their customers, each pay our portion of their salaries, based on purchasing seats. We do not pay for someone else's portion. We do not pay for someone else's seats.
If a cabin is not full, then it would be a kind gesture for the attendants to allow such passengers to change their row to where two seats are free. Other than that, you pay your own way, and not pay for someone else's way.
1
-
1
-
1
-
1
-
@8:01 -- He was not misgendered. He is a man.
Demanding that normal people call men "women", is outrageous.
Then, accusing normal people of being in the wrong is more outrageous.
He was "correctly" gendered. He is a man, and he was called a man.
He is a cross-dresser.
He is a woman impersonator.
He is not a woman.
Also note that "gender affirming care" is more radical leftist tortured language.
What those radical leftists want is "gender mutilating disfigurement". And they want it done to children. And they want it done without the parent's concent.
Sick people, who are miserable with their lives, want others to be miserable. Children are easy targets -- and they will have a lifetime of misery, weeks, months, or a year or so after they regret the irreversible damage done to their bodies. Decade after decade after decade, they will live with what the wildly bad decision that the 11-year old version of them made.
This is so incredibly bad. It will lead to sky-rocketing suicides, and sky-rocketing mental issues (far, far worse than we are seeing today), and so many people growing up to hate themselves and leave miserable lives.
1
-
@2:53 "...end to middle"
When it comes to End to End encryption, you have to identify each end.
@4:51 "Honestly, facebook doesn't care what you're talking about. They really don't."
Leo, you are guessing. You cannot know what the key people in facebook care to see.
For example, if Madonna was having a private messenger session with Trump Jr., would your position still be that they do not care?
A question to folks reading this comment:
If you were an executive at facebook, and could watch the private messages of Mayors, Governors, Movie Stars, Military Generals, Heads Of State (around the world), Fauchi, Paul McCartney, LeBron James, etc, would you resist looking at their private conversations?
Our host is probably correct, for 99.99%+ of the public, because there are too many unknown people with boring conversations. But not everyone is an unknown, and not everyone has boring conversations. If you send messages with certain key words (such as assassinating a head of state, or improper relations with children, or threats to national security, or threats to Zuckerberg, etc, I suspect that facebook's profiling software would pick it up).
The above are examples off of the top of my head. There are probably many more, such as the head of Exxon giving a private stock tip to a colleague. Who would not look at that?
facebook makes its ocean of $$ by spying on you. To assume that they are not spying on your messages is unrealistic.
And if you are of no interest to facebook today, and you decide to run for Mayor next year (or have higher aspirations), what are the odds that an executive at facebook will not check your messaging history?
To reiterate my first paragraph...
All End To End encryption is End To End, including facebook's messenger. You are on one "End", and facebook is on the other "End".
Then facebook creates a new "End", with your intended recipient on facebook's other "End". That, too, is End To End. But facebook has your dialog 100% in the clear, by being in the middle.
On the other hand:
Signal, which our host mentioned, is End To End, with one "End" being you, and the other "End" being your intended recipient.
Signal is open source, so we need not have to take their word for it. Developers, globally, can see exactly what Signal is doing (you can, too, if you know how to read the source code).
So with any End To End encryption service, always identify exactly where each "End" is located.
1
-
1
-
1
-
1
-
1
-
I recommend that people not invite chaos or drama into their lives with 3rd party anti-malware tools.
Windows includes Defender, which is supported by Microsoft's developers. Microsoft has the resources and the expertise to stay on top of security threats, equal to or better than 3rd party malware tools.
Defender used to lag behind the competition, years ago, when it was released. But for a decade or so, Defender is quite adept. I have never heard of any issues with Defender.
Also, any 3rd party anti-malware software requires you to agree to allow their software full, unfettered access to everything on your computer (maybe even your keystrokes). Well, for a full scan, that would be necessary. But those impossible to comprehend agreements allows the vendor to use your data in any way that choose, including sharing it and selling it. They can, for example, examine your browser's history, and share it at will.
Defender can do the same thing. But Defender is by Microsoft, the same as Windows is by Microsoft. So by using Defender, you are not granting anything new to Microsoft. You are already running Windows, which allows Microsoft to monitor everything. So why invite some other company to rummage around your computer and share at will, when you can just stick with the reliability of Defender?
1
-
1
-
1
-
1
-
1
-
1
-
@10:02 -- I believe it to be a myth to believe that Google does not read customer's documents.
For anyone that believes otherwise, then you should deem it to be safe to do the following test (only a test):
-- Upload documents that threaten the welfare of high ranking government officials, by illegal means.
Again, do not post such documents anywhere. This is only a test. Just upload those document to your own Google Docs account, and see if you get a knock on the door.
You can do the same thing with crimes against juveniles, or large illegal drug activities.
Again, this is all fabricated by you, as a test to see if after uploading those documents to Google Docs, whether you get a knock on the door.
For anyone claiming that Google does not read your documents, then it should not matter what documents you upload to their service.
Some will say that Google uses an algorithm to detect such documents. Well, upon that algorithm tagging your documents, someone read them, that led to the knock on your door.
Anyone know what key words Google searches for in your uploaded documents, that will mark them for review by a Google employee? Since you do not know, then you do not know which documents are being read.
At a minimum, Google likely builds a profile on you.
And it is more than just about your own documents.
If you are a person of interest, then of course executives are probably reading your documents.
If you were a top executive at Google, could you resist looking at documents uploaded by a member of Trump's family, or Obama's family, or movie stars, or CEOs of Fortune 500 companies, etc?
If you decide to run for mayor 10 years from now, will Google be able to check on what you uploaded over the years, and leak it to news channels or to the opposing candidate, or possibly blackmail you into using your public office in their favor?
The fact that Google can look at anyone's documents is a big deal.
Would you use GPG if a 3rd party can view your encrypted files, but claims that they do not?
@11:33 "...for advertising purposes, period."
They could have written that they do not access your documents in any way whatsoever, other than providing you access to your documents. But they did not write that. They wrote one way that they do not access your documents for advertising.
Although I cannot confirm... I will lay odds that no one from the Pentagon is allowed to store documents with Google Docs, or any other cloud service.
Google is the biggest spyware company in the history of our planet. They make oceans of money on knowing everything about us. And we are supposed to believe that they have no interest in the documents that we upload to their service?
Microsoft's One Drive agreement has language that makes any documents you upload the property of Microsoft. All of the cloud storage service agreements probably have similar language.
@14:43 -- RAID keeps your data safer than non RAID (excluding RAID 0).
For example, with RAID 1 or RAID 5, you could lose a drive and lose no data. Everything keeps running.
Without RAID, if you lose a drive, then you will have lost any data since your last backup.
@17:28 -- That was Jerry's fault, for not doing backups.
RAID is not a replacement for backups.
If it is a choice between only RAID and only backups, then choose backups.
But if you can do RAID 1 or RAID 5, and also do backups, then you will be that much more protected from data loss (between the dates you do backups).
1
-
1
-
@1:11 "If it's from someone you know -- great."
The headers (or fields) of an e-mail message can be spoofed.
There are scams where the attacker makes it look like you sent e-mail to yourself, and the attacker points out, in the body of the message, for you to take notice that you sent e-mail to yourself. When you check the "From" field, it will show your own e-mail address. It shows all signs that you sent yourself e-mail.
The attacker explains it by writing that they have your login credentials, and they have all of your photos, etc, and will send them to everyone on your contact list -- unless you pay up.
All of it is a lie. They do not have any of your login credentials. Yet, they sent you an e-mail message with your own e-mail address in the "From" field.
Ergo, they can send you an e-mail message with anyone's name in the "From" field. So never let your guard down.
If out of the blue, someone you know sends you a link or an attachment that is atypical of their correspondence with you, then contact them before opening the attachment. Their own computer might have been compromised. So contact them outside of e-mail. The best way is a phone call, because if their computer has been compromised, you could be corresponding with the attacker.
Also, if the e-mail message appears to be from a friend, and that friend never surfs the web with their seat-belt on (so to speak), then don't follow their risky instructions, just because you know them.
If the attachment still has you unsure, then upload it to virustotal for it to be scanned.
Ultimately, you are responsible for what you open on your computer. Remember that not all criminals are dumb. Some are very smart, and they use social engineering to trick you. Question everything, two or three times, before running some unsolicited link or attachment.
1
-
1
-
1
-
1
-
1
-
@4:10 "A spokesman for the tech giant (referring to google) said..."
Par for the course, well meaning anchors and normal people run cover for the culprits.
Who is the spokesman?
What is his name?
What is his title?
When it came to the good buy that is exposing google's censorship, our host immediately named Elon Musk.
But when is comes to the bad buy that is making excuses for google's censorship, that person gets to hide under his desk.
I would have some respect for her if she said:
"An anonymous spokesman for the tech giant (referring to google) said..."
@4:16 "They said..."
Again. Who said that?
Anchor "Sharri Markson" should have said:
"google's anonymous spokesperson said..."
@7:19 -- "But there are other problems on the platform 'X', no question."
And now the truth comes out. Anchor "Sharri Markson" is a leftist.
Sharri Markson took a story about Elon Musk exposing google's censorship, and she ends it with "X" (Musk's platform) having problems -- which has nothing, whatsoever, to do with google's censorship.
And note Sharri Markson's "no question" remark. In other words, she makes a conclusive statement, which is her opinion, taking a shot at "X", which has nothing to do with google's censorship, and her "no question" conveys "You will not challenge me -- interview over." That is what leftists do.
Shame on Sky News Australia for reporting censorship via an employee that is using crafty language to do the same.
This Sky News Australia posting is another example of normal people shooting themselves in the foot when having smoking gun evidence of wrongdoing by the bad guys.
Surrendering in the face of victory.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@0:26 "...or get a subscription to a good on-line service?"
That on-line service uses hard drives, too. Granted, they are higher quality. But they are also used far more heavily.
On-line services give the impression that they have no failures, because from our perspective, they are always running, and never lose our data.
That does not mean that they have no failures.
Google, Microsoft, Facebook, etc, probably lose 100+ drives every day, because they are storing data on possibly 1,000,000+ drives throughout their facilities.
They employ redundancy, such that when a drive fails, nothing gets lost -- and they replace the failed drive and restore its data within a few hours.
They use RAID storage, and they have multiple servers that duplicate each other. They even have duplicate sites, on separate power grids within a nation, with their own multiple generators (the size of a barn that will deafen you, and they burn through fuel at over 500 gallons per hour, putting out megawatts of power). It would take an act of war, internal sabotage, or gross incompetence for them to experience a data loss. They spent $billions to achieve the above. So although their services remain up 24/7/365, they have loads of failures that we never see.
As to external drives failing:
The most likely reason (just my opinion) for a portable drive to fail, is knocking it around while it is powered on.
1
-
1
-
@0:58 "...liberalism is not the same thing as woke."
That is a liberal trying to distance himself from the agenda that he supported, and the politicians that he supported, throughout his life.
Now that his Democrat party is revealing their end-game, Maher is basically saying "Hey, that's not me."
BS, Bill. Too late. You spent your entire life nurturing these radical leftists, and now you want to divorce yourself from them -- as if you did not know their politics.
Like a typical liberal, he wants to spew his dangerous rhetoric, and then walk away when the you-know-what hits the fan.
Maher still bashes Trump, and Maher still supports the same radical left Democrats, while out of the other side of his mouth, he tells them to back off (but he still votes for them, as if they will reign in their radical actions after they take office).
Maher is a degenerate leftist, trying to squirm his way out of the mess that he was very involved in creating.
Folks, never let your guard down, when dealing with leftists like Maher. Such leftists tell you what you want to hear. Do not buy it. Do not trust him. His sudden stance on various political issues is to save his own butt. He is the same "vote Democrat" leftist that he always was.
100% of woke people are Democrats. Ergo, woke and liberalism are tied at the hip. Maher lied in his statement that they are not the same. Of course they are the same.
If John Fitzgerald Kennedy was alive today, he would decry all of the Democrat leaders, all of the leftist talk show hosts (like Maher). If John Fitzgerald Kennedy was alive today, he would be a Republican. Whereas Maher is still a proud Democrat.
1
-
1
-
Here are four additional options:
1) If her old PC stays up for a while, before crashing, then she can network her new computer to her old computer. The drive on her old computer will show up as a drive letter on her new computer.
The above will work best if you plug in an Ethernet cable (CAT 5, Cat 5E, Cat 6, etc -- any should be good enough for this temporary exercise) between the two computers. You do not even need a router, hub, or switch. As long as her old computer is not ancient, you do not even need a crossover cable (which was once necessary for directly connecting two computers with an Ethernet cable).
2) If #1, above, is too complicated, then you can plug in a USB drive into her old computer. As long as it stays up for a while before crashing, you can copy whatever you want from her old computer to the USB drive.
Then, plug that USB drive into the new computer, and copy the files from the USB drive to the new computer.
3) Purchase a USB SATA adapter. I use a UGREEN model. There are many brands listed on Amazon. I choose UGREEN, based on the reviews. Mine works flawlessly.
If the drive that has the files is a 3.5" mechanical drive, then the USB SATA adapter must have its own power source. The UGREEN model that I own costs $17.99 right now on Amazon, and includes its own power supply.
If the drive is a SATA based SSD, or a 2.5" mechanical SATA drive, then you do not need the power supply. The computer's USB port will supply enough power. But for 3.5" mechanical drives, you must use an adapter with its own power supply.
4) If the old drive is an NVMe based drive (looks like a stick of gum), then you can use an NVMe card reader. You simply open the card reader, drop in the NVMe drive, close the card reader, and then plug it in to your new computer's USB port.
Note that an NVMe based drive is not the only drive that looks like a stick of gum. There are some SATA based drives that share that form factor (they have different pin connections). There are card readers that will work with both. But you are probably safe with one that works only with NVMe drives.
NVMe card readers typically cost a little more than USB SATA adapters (see #3, above).
The easiest solution would probably be #2, if her computer will stay up long enough. It does not involve opening anything or removing any drives. And even if her computer crashes after 10 minutes, you can boot it back up and continue with copying more files. And she should already have a USB drive, for doing backups. Right? If not, this is an opportunity to purchase a USB drive, use it for copying files (as described in #2, above), and then start using it for doing backups.
In fact, if she had been doing backups. her files would already be on a USB drive, ready to be copied to her new computer.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
By default, Windows will not run code from a plugged in device, precisely because of this issue.
If you went out of your way to have your operating system "autorun" code on devices as they get connected, then you asked for this problem.
Old versions of Windows (Win95, for example), kept autorun enabled by default. But Microsoft corrected that blunder.
Your Windows computer will ask you what you want to do, when you plug in a new device. So unless you went out of your way to enable autorun, or you see the dialog box asking for permission to run code (and you carelessly click "Yes"), then plugging anything in should not be a problem.
Also, you should not be doing your day-to-day activity using an administrator account.
If you use a standard user account, then even if you screw up and let malicious code run on your computer, it cannot harm anything other than the files you have for your local account. Worst case scenario, create a new account, and you will be in good shape.
If you keep private files in your local account (we all do), then back them up. Then, if someone does get access to your local account, then after you fix the problem, you can restore your documents -- and even restore your entire computer (so do full backups, from time-to-time).
Any files that contain sensitive data should be encrypted, via a program such as VeraCrypt, which is free and open source.
This video is a bit of a stretch.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
President* Biden was told to make his outrageous comments, because his caretakers are radical, woke leftists.
So now President* Biden is on record for expressing his dismay at the all boys club.
President Biden's caretakers are trying to get ahead of someone pointing out that the Taliban is all male. Now President* Biden can pat himself on the back, saying that he is on record, denouncing that aspect of the Taliban.
He ends up conveying that his attention is on that moronic subject, when his attention should be 100% focused on getting our citizens and allies out of that hell-hole.
But remember:
President* Biden cares zero about anyone other than Joe Biden. So in his selfish mind, it is more important for him to score social justice warrior, virtue signaling points, than it is to actually save American lives.
This is the first time in history where I feel that not only should a President* be impeached and convicted (removed from office), but tried, criminally, for his deliberate decision allow the Taliban to kill and torture our people, and for handing our enemy countless $billions in state-of-the-art military equipment.
What he did had to be deliberate. No one could screw up so many things, so fast, and in such quantities.
The only thing President* Biden has not yet done is officially announce his support for the Taliban, sharia law, and the full and unconditional surrender of the United States Of America.
1
-
I use "keepass".
It is free and open source.
Once you create a few passwords, you click save. Everything you saved is in one file (and you choose the name of that file when you initially create your keepass database -- it is very simple).
The beauty of the above is that you can easily make a copy of your keepass database (a single file), so that if your storage drive dies, you are not screwed. You replace the failed drive (that had your database), re-install keepass, and copy back your database from a flash drive. You then use keepass' "File Open" option, and tell it to open that restored database file.
As to "unlimited storage", I believe that keepass will use your entire storage drive, if you dump in enough stuff to fill it up.
keepass does not use cloud storage. It simply puts all of your data into a single file. That file will grow in size as you add more stuff.
You are not limited to only adding passwords.
You can add notes, such as registration codes, web site names, phone numbers, social security numbers, credit card info, bank account info, etc.
You can add documents, too (those will likely consume the most space). But if your drive has the space, then keepass will use it as it needs to use it.
1
-
1
-
When the Republicans win big in the mid-terms, then the economy, crime, etc, will turn around (or will not get worse).
Then, 2 years later, during the next Presidential election, the Democrats (which includes the media) will claim that their agenda is working; that it just took some time.
So when the Republicans win big in the mid-terms, it could help the Democrats in 2024.
The Republicans must take every conceivable snapshot of the condition our nation is in, at the time they take office, and be ready to clearly convey to the pubic (in 2024) that it was they (the Republicans) that took us from this (the toilet, in 2022) to this (prosperity, in 2024).
The Republicans must not allow the Democrats to take credit for the Republican's course correction.
The Republicans must be able to vividly demonstrate how bad things were and how they (Republicans) are 100% responsible for the turnaround -- and -- that our nation must never again allow radical leftists to hold positions of power.
1
-
1
-
1
-
1
-
The difference between Democrats and Republicans is that when the Democrats lose, they never surrender.
President Trump understands their mindset. President Trump has chosen a cabinet of people that also understand their mindset.
Also, neither President Trump nor members of his cabinet will ever surrender, and they have to instill that into the Republican party's membership, on all levels.
Republicans have a history of surrendering in the face of victory. Well, with President Trump and his team, that is all over. President Trump takes his victories (our country's victories), and he keeps going. He never allows the Democrats to get a foothold on governing. But President Trump needs strong leadership, right down the line, to conduct themselves in the same manner.
All Republicans need to recognize the incessant drive of radical leftist Democrats, and defeat them at the ballot box and in the eyes of the American people. Never let your guard down with Democrats. Never.
1
-
The Pro versions of Windows 10 and Windows 11 have a "sandbox" feature, which is designed to not let anything escape from that environment.
So if you run malware within the sandbox environment, you can try to see what that malware is doing.
Or, you can run a virtual machine, such as Oracle's free and open source "Virtual Box".
Once you have a virtual Windows machine running, you can run the questionable file on that virtual machine, and see what happens.
Note that bad things might happen on that virtual machine (or in the sandbox) that might not be apparent. But at least you can get more insight into what will the questionable file is doing.
Also note that Virtual Box is not the last word in security. It focuses on ease of use. So although it is unlikely that malware will escape the virtual machine, that does not mean that you will be 100% safe running questionable files in a virtual machine.
There are several other vendors that provide virtual machine software. Some of them offer much better security, but also have a much higher learning curve to configure and be useful.
Basically, you have options to run questionable files in virtual environments, such as a virtual machine or Windows sandbox (which is a type of virtual machine).
Whatever you choose to do, your first step is to back up your physical machine before taking any chances.
1
-
1
-
Another excellent video with excellent advice.
One concern that I have (and probably others, too) is entrusting your "off site" data with someone else, whether they be a friend, family member, or a cloud based service.
If you want to keep your backed-up data from prying eyes, then your backups should be encrypted. Many backup applications offer encryption with password authentication. But some backup solutions (especially free ones, such as Macrium Reflect's free version) do not offer file encryption, but is otherwise a more than capable backup solution for most individuals.
You can still encrypt your backup, via pointing the backup program to direct the backup to an encrypted volume.
VeraCrypt can do this. It is free and open source, and is available here:
https://www.veracrypt.fr/en/Downloads.html
Do not download it from anywhere else.
With VeraCrypt, you can, for example, create an encrypted volume (a new drive letter) on an external USB drive, and have your backup program copy your data to that USB drive's encrypted volume. Anything that you save to the VeraCrypt volume will be encrypted.
Just make sure that you have a copy of installation file for both your backup program and the VeraCrypt installation file on a spare storage device. Because if disaster strikes, and you have to reinstall your OS, or for any other reason you might not be able to download VeraCrypt when you need to get to your encrypted, backed-up data, you must be able to run both your backup program and also run VeraCrypt to have access to your encrypted volume and do your restore.
Once you have an encrypted backup of your data, you can give that copy to anyone you want, for off-site storage, and be confident that they cannot snoop into your data (well, assuming you used a good password / pass phrase for your encrypted data). If your password is "password123", then hang your head in shame because the encryption is almost worthless.
Cheers!
1
-
1
-
@4:26 -- Regarding not seeing the images in a message that you open:
Sometimes you will see images, and sometimes you will not see images.
Sometimes you will see a few images, but not all of the images.
It depends on the source of the images.
If the images are embedded in the e-mail message, then you will see those embedded images. That is fine, and the sender will not know that you saw those images, any more than the sender will know that you saw the text of the e-mail message.
However, if the images are displayed via links in the e-mail message, where your e-mail program uses the links to download the images, then the computers from where the downloading is sourced will know that you displayed those images. They will know that you are a live one -- that you have an active e-mail address.
If your e-mail program offers you to view images, or you have to click something to view the images, then if you proceed, you will be downloading those images from some internet server, and you will be revealing that you did so.
So is is fine if you see images when you open an e-mail message, when those images are embedded in the e-mail message.
One cautionary note:
Your e-mail program might have a setting where you can tell it to automatically download images. If you enable that, then you are telling the sender that you are there, every time you open their e-mail messages.
It is a convenient feature that lets you see your e-mail messages in all their glory. So you might like that feature. Just know that you are letting the sender know each time that you open their messages.
1
-
1
-
1) The barring of masks is illegal.
People have the right to protest, even anonymously.
2) Nearly all of the people that are labeled as "protesters", are not protesters.
Law breaking is not protesting. When you are engaging in illegal activity, you are not protesting. You are rioting, or disturbing the peace, or vandalizing, or trespassing, etc. You are not "protesting".
If laws were enforced, then nearly none of the chaos and blatant law breaking would be taking place.
As soon as tyrants lock up a campus, for which they have zero authority to do so... arrest them.
As soon as tyrants block public roads, arrest them.
When they have their day in court, do not give them a suspended sentence. Lock them up. Even if it is for a few days. Keep them in jail. That will be a huge deterrent for the next time that they decide to commit crimes. And on a second offense, give them the maximum jail time, and expel them from school.
1
-
1
-
1
-
1
-
The democrats did not "Try to Force Through a Voting Rights Bill". Rather:
The democrats tried to "Force Through a Fake Voting Rights Bill.
Do not use the language of the radical left.
They know that titles matter, because a sizable portion of the public do not go beyond the title of agenda items.
If you call their fake voting rights bill by their name (excluding the adjective "fake"), then to the gullible viewer, it seems as if channels such as this one are against voting rights, because they do not watch the video or read the story -- they go only by the headline.
Always rename the BS titles that radical leftists apply to their scheming and misleading plans.
Always call their plans exactly what their plans are.
Repeat, over and over, the accurate title of their plans. In this case, call their bill "Fake Voting Rights Bill", because it is fake.
President Trump understands this language issue, which is why he calls CNN "fake news", because he does not allow them to get away with calling themselves "news", when they really are "fake news".
Every time the radical left comes out with some new BS with a BS title, always rename their title with an accurate title. That will stick in the minds of the public more prominently than all of the minutia that goes into explaining their lies. Yes, explain the lies, too. But using an accurate title is paramount in getting the message across to the most people.
Cheers!
1
-
1
-
1
-
1
-
1
-
Without the right to keep and bear arms, We The People cannot have a well regulated militia, a well oiled militia, a well dressed militia, a well bathed militia, a well [fill in the blank militia], or an unwell militia, or any militia.
Regardless of how anyone chooses to interpret "well regulated", you can't have that without the right to keep and bear arms.
And radical leftists know that. They simply use any mumbo-jumbo language to attack our right to keep and bear arms.
None of our constitutional freedoms are derived form any government entity.
None of our constitutional freedoms need approval from any government entity.
Yet, radical leftists tell us that the government dictates our Second Amendment freedom. They have that backwards. But with tyrants, it is all about their power, by way of attempting to take away The People's power.
We need our Second Amendment, precisely because of Jamaal Bowman, and like-minded, tyrannical, radical leftists like him.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@KaleidoscopicPalindrome "From your example, you say "I have $1,000,000." If I'm reporting this, it is correct to say, "Perhaps said that they had $1,000,000."
And you would be wrong.
Having had something is different than having something.
"I had a job" is not the same as "I have a job."
The reporter said that President* Biden "had" cancer.
President* Biden said that he "has" cancer.
The former means past tense, and implies being cured.
The latter means current, and infected.
When people decide on who they will vote for, someone that had cancer is not the same as someone that has cancer. So it matters.
Calling what matters pedantic, as if to ridicule accurate wording, is unscholarly and counter-productive.
1
-
1
-
1
-
1
-
Years ago, I created a Microsoft account, because a Microsoft account was required to use Microsoft's "Quick Assist" feature, when you are the one providing the assistance (when you are the one that will connect to someone else's computer).
The person receiving the assistance does not need a Microsoft account.
I used a cloud9 e-mail address that I used for miscellaneous things, to sign up with Microsoft.
Some time later, the cloud9 service decided to stop offering personal e-mail accounts to non-business customers. That is when I discovered what our host demonstrated, because I needed another e-mail address to replace the one from cloud9. I then added a protonmail alias to my Microsoft account.
So I never created an Outlook e-mail address, or any Microsoft (or Microsoft related) e-mail address. And Microsoft let me use 100% non Microsoft e-mail addresses to login to my Microsoft account, in order to use their Quick Assist tool (which is a great tool for assisting people). Keep in mind that Microsoft can see and record everything (if that matters to either party). Your Quick Assist session is funneled through Microsoft's servers.
Quick Assist is similar to VNC (although I have not used VNC in over a decade). With Quick Assist, the person to whose computer you are connecting can grant you full control, or only a visual connection to their computer. And they can kick you off whenever they want. There are other nice features -- all easy to use. Quick Assist is available, starting in Windows 10 (any version).
I have never used my Microsoft account for anything else.
Leo, if you do not have a remote access video in your channel's library, then please consider creating one, comparing VNC and Remote Desktop and Quick Assist (and any others you deem to be of value to your viewers). I especially like Remote Desktop, which allows me to connect to other Windows Pro systems (requires Pro for the side accepting the connection), and use those remote systems as if I am local to them (and anyone that really is local to them cannot see what you are doing).
I got off topic. But the Microsoft account topic reminded me of Quick Assist and remote control tools in general.
1
-
1
-
Steve, if the police are able to independently gather evidence, establishing a lawful purpose for searching the contents of that cell phone, then they should be able to legally search that cell phone and use their findings (as it relates to the scope laid out in the search warrant) in court.
When the police can demonstrate inevitable discovery, then what was initially obtained illegally then becomes legal.
For example:
The police threaten harm to the child of someone, to get the parent to give them the name of a murderer.
Well, the police are not allowed to do that (and would face disciplinary actions and possibly lose their jobs).
So a judge throws out the case against the murderer that they arrested, based on illegally finding the murderer and all evidence related to the police's illegal threats.
Then, through 100% independent investigations, evidence turns up that points to that same murderer's name. So the police arrest that murderer.
Well, this time the evidence sticks, because they found the murderer though 100% proper channels.
The same goes for getting a warrant (getting permission) to search the cell phone.
If the police can show that they inevitably found good cause for a proper search warrant (none of which is based on anything that they learned from the initial, illegal search), then the warrant is valid, and the evidence is valid.
So in the case you are discussing, either the judge was looking for a reason to be soft on crime, or the new warrant did not demonstrate inevitable discovery of evidence granting a proper search warrant.
Steve, you are leaving out something from your discussion. Perhaps you do not have that information. If so, you should say so.
What you should not do is take a flat-out preposterous position on search warrants, and make no mention of inevitable discovery case law.
1
-
1
-
1
-
I was perusing SSDs (solid state drives), to use with my computer.
I came across numerous scams, where the listing would show (for example) 8TB SSDs for $29.99. Such an SSD would cost hundreds of dollars.
There are videos on youtube where the host purchases these scam drives, opens them up, only to find a 64GB micro SD card.
The scammers program the SSD's controller to report 8TB. So Windows (or Macs or Linux) operating systems end up corrupting data that is sent to the drive, after the 64GB physical limit is reached.
I called Amazon, twice, and reported several of the scam listings. They thanked me, and did nothing.
Perhaps the representatives did their due diligence. Who knows? Somewhere between my phone call and their personnel, they just blew it off. Some employee in their chain just does not care -- and it could be coming from executive management.
I reported someone listing Irish Spring soap bars, with deceptive language, resulting in them shipping less than 1/3 of the stated quantity. I got a refund, and Amazon never took down the listing.
Is "we don't care" attitude coming from Jeff Bezos? Does he care?
Of course he relies on his management personnel to do the right thing. But does he ever spot check?
And the insult to injury is that when I submitted a review, clearly describing the deceptive language in the listing, days later I received a message that my review did not comply with their guidelines.
I called Amazon, and asked them to point out the language in my review that prompted them to not list my review. Not only were they unable to find what I submitted, they told me that they would follow-up with the personnel involved in that area, and would get back to me. They never got back to me. I called them, to inquire, and it was as if I never spoke to anyone in the first place.
I am not faulting the folks that take the phone calls. Clearly, they are left out to twist in the wind, handing issues for which they are given zero support.
There are folks at Amazon that have the authority to deal with all of the above, and they are the cause of all of the above, and those personnel remain anonymous and work in the shadows.
1
-
@4:50 -- The warranty:
The warranty for Western Digital drives is nearly meaningless.
Yes, a longer warranty should translate to a longer lasting drive. So, why did I write that the warranty for Western Digital drives is nearly meaningless?
If you have to create an RMA (return merchandise authorization) with Western Digital, you simply can't (unless they finally fixed their issues -- assuming that their non working RMA system was not intentional).
So you have to call Western Digital, nearly every day, for weeks, wasting lots of time, and being aggravated. At some point, if you are lucky, perhaps a month after you contact Western Digital, they will give you an RMA code, and you will ship your faulty drive to them. Until you get an RMA code, you may not ship your bad drive to them.
Now you enter phase 2, which is basically the same as phase 1, because they will not ship you your replacement drive, unless you call them every day, and on and on and on.
Perhaps another month will go by, and you will finally get a tracking number for your replacement drive.
If you do not keep calling them, I doubt that you will ever get an RMA number.
And if you call every day, and they finally give you an RMA number, then I suspect that if you do not call every day, they will never ship you your replacement drive.
It took me over 2 months to get through this process. And I did not see the pattern of being jerked around, until 2 weeks passed. That is when I started staying on top of the process.
The personnel that answer Western Digital's phones are mostly professional. But they are experts at politely making excuses, and having you wait just a few more days (and so you call back in a few days, and repeat). They know that nothing is going to happen, and yet they imply that it will take only a few more days. This is where they are unprofessional. They are lying. But I suspect that it is their management that gives them marching orders to drag the customer along and keep convincing the customer to give it more time.
Note that Western Digital offers the option of a "Convenience Fee" of $25.
Supposedly, if you give them $25, then they will ship you your replacement drive ahead of them taking possession of the drive that you are returning.
So rather than being there for the customer, who just lost their storage, Western Digital sees the customer as vulnerable and needy, and Western Digital sinks their teeth in to take advantage of the customer's misfortune, due to Western Digital selling a bad drive. Western Digital takes the customer for $25 for the bad drive that was from Western Digital. That is some warranty. You do not see that $25 when you are buying the drive. All you see is the free replacement, which is nearly impossible to complete.
Perhaps when customers do not pay the $25 is when Western Digital chooses to treat the customer like dirt.
And calling the fee "Convenience Fee" is BS. There is nothing convenient about paying for something and getting what you pay for.
You could spend $300 and conveniently get a new drive shipped to you the same day from a re-seller.
Why not call the fee "Save The Puppies Fee". Surely everyone would want to pay that fee?
Western Digital does not honor their warranty.
No one should have to wait months, and get their replacement drive by going through hell. There is no mention of being driven nuts in order to get a warranty replacement. There is no such mention of visiting hell, to get through the processes, in the warranty statement. This makes their warranty claim a lie.
Note that Seagate's customer support is a pleasure to deal with.
They will advance ship your drive, and will not charge you a fee. You give them your credit card information (just in case you never send them your bad drive). But they do not charge your card. They just immediately ship you your replacement drive. No hassles whatsoever.
If the price is competitive between Western Digital and Seagate, then stay away from Western Digital.
If you have to get a warranty replacement with Western Digital, you will regret your purchase.
1
-
1
-
1
-
1
-
1
-
Criminals send out e-mail messages, putting your own e-mail address in the "From" field (just as our host described), and in the body of the message, they state that they have control of your computer and your e-mail account, etc.
They go on to say that if you change your password, it will not matter, because they installed spyware on your computer and they will see your new password, etc.
They explain all of that, because they go on to say that they will send all of your most private information (they like to threaten you with your web browsing history) to everyone on your contact list, unless you pay them off (they typically demand bitcoin, and they include instructions for buying bitcoin so that you can send it to them).
It is 100% BS scare tactics.
Just delete the e-mail message.
They do not have access to your computer or any of your accounts.
They have as much access to your web browsing history as you have to their web browsing history (meaning "none").
No matter how convincing their threat sounds, just ignore it. Thieves use all manner of coercion, sometimes convincingly so, to get the better of you. It is all a bluff. No one has access to your accounts when they send you e-mail that appears as if you sent it to yourself.
They will usually threaten you that if you do not pay them within 48 hours (or some other amount of time) that they will follow through on their threat. You might be worried during that time period. Don't be. Nothing is going to happen. It is all designed to make you nervous enough to wonder if maybe you should send them what they are demanding . Do not fold. Nothing is going to happen.
1
-
Leo, you have recommended EaseUS Todo as a good backup solution.
Most backups are done via the installed Todo program, which does the backup while Windows is running.
That means that there will be files that are in use, and will not get backed up -- the files will be in an open status.
So if you did a full backup, with Windows running, would that full backup's image allow you to restore Windows? Or will there be some instability, etc, due to certain files that were not backed up, and therefore, not restored because they were missing from the backup image?
EaseUS Todo offers to create an emergency boot drive. Doing a backup from that will eliminate any files being in use. But I suspect that most folks do their backups by scheduling them to be done automatically. Can they rely on those backups if they needed to do a full restore?
Have you ever used a full backup, done while Windows was running, and restored it?
1
-
1
-
@lylecoglianese1645 When you visit a zoo, or a wildlife reserve, remember to wear headphones. Why?:
The animals will be silent. Without their microphones and amplification, you cannot hear them. Frankly, in the wild, I do not understand why animals have ears, when none of them make sound. How can they hear each other?
And all of those nature shows... they must have had voice artists faking sounds to what animals would sound like, if animals made sounds.
It is amazing that, up until now, no one other than you noticed that animals make no sounds. How did the world miss that aspect, for all of recorded history?
Have you notified The Nature Channel on your "animals make no sounds" discovery?
Or perhaps you are not really as dumb as you portray yourself to be?
Perhaps you are trolling for attention?
1
-
1
-
1
-
1
-
1
-
WARNING about 1Password:
I was curious about 1password, so I just installed 1password on a virtual machine.
-- It forces you to give them your e-mail address.
-- It forces you to have an internet connection (well, at least to initially create a vault).
-- It pressures you to install their browser extension (that is bad for privacy -- you want your browser to have no unique properties -- keep it as vanilla as possible, to minimize being tracked on-line).
-- Its "Terms Of Service" goes on and on and on. If you have any disputes, well... you agree that you cannot sue them. You must go through arbitration, with (guess who?)... their arbitrator, subject to the laws of Canada.
There is a long list of "Confidentiality" tortured legal language, to which you agree, including "customer data" and "confidential information" (go figure out what data that includes). They even have you agree that they are allowed to disclose your information, under the conditions that they list. So apparently 1Password is a data harvester. My guess is that they will be tracking you, on-line, and possibly data mining on your device.
The above just scratches the surface, within the "Terms Of Service" agreement.
Then take a look at the equally intrusive and lengthy (and impossible to absorb) "Privacy Notice" to which you are forced to agree. You will need three attorneys, and a week of counseling to wrap your head around those agreements.
The above is insane, for a tool that you will be using to keep your passwords (and presumably your privacy) safe.
Folks, I do not care how intuitive 1Password is. I do not care if it serves me breakfast in bed. I would not use 1Password if I was offered a copy of the Epstein client list. There are other fantastic password managers that do not have that insanity.
1
-
In days of old, our citizenry was far more G-d loving, and G-d fearing.
People were more concerned about eternal damnation, than a court conviction for perjury. Also, nearly no one had a religion that prohibited them from swearing an oath on the bible.
So knowing that most people would not lie to G-d, the oath was taken with a hand on the bible.
At best, doing so kept G-d fearing people honest. At worst, it made no difference. So the courts had nothing to lose by initiating the oath on a bible. There was no down-side.
Also, I suspect that many people that refuse to swear an oath to tell the truth are G-d fearing. So by fabricating that their (probably made up) religion prohibits them from swearing an oath, is their way of trying to not lie to G-d. They can lie on the stand, without fear of eternal damnation.
1
-
@ExplainingComputers Please note that the format (.mp3, .flac, .alac, etc) is not the final deciding factor in sound quality (but it is a factor).
If, for example, the studio releases a song on one album (original release) in .mp3 format, and releases the same exact song on another album (one hit wonders) in .flac format, but they did an excellent job when they released it originally, and the one hit wonder's album is a botched release (I do not know how they botch the releases, but they do), then the .mp3 can sound better than .flac.
But if the studio/record label did an excellent job on both, then the .flac will sound better. And it is common for differences in sound quality, from album to album, and even from song to song, within the same album. Why is this? We will know what is at Area 51 before we know what goes on with what the record companies are doing.
Also note that most digital has somewhere between mediocre to good (or very good) sound quality, but rarely has excellent or superb sound quality. So what affects sound quality the most is what goes on at the record companies, rather than the format. But a better format will never hurt and can only contribute to better sound quality.
If the record company screws up, then the music file, no matter the format or the resolution, will not make the screwed up file sound good. It is like using your state-of-the-art, 4K camcorder to record the screen from you 1972 rabbit-ears TV. You will have a super accurate reproduction of a crappy screen. Or, if you have a blurry photo, and scanned it with a state-of-the-art scanner, your scanned copy will be a great copy of a blurry photo.
Also, most folks plop their speakers down wherever they look best (rather than where they sound best -- I suspect that their spouse has a role here). With good gear, and attention to speaker placement (a ½ inch towed in more or out, or a ½ inch tilted up more, or 2 inches further apart or further from the back wall, etc,) when all done right, will make a noticeable difference in sound quality, and will help to hear what is wrong with .mp3 files).
And if you are playing in a car, then that opens up a can of worms, due to the shape of the cabin, and different gear used by the car manufacturers. I recently played some quality lossless files in a 2003 Nissan Sentra, 2006 Toyota Camry, and a 2010 Toyota Corolla (all stock stereos). The Sentra had very good sound quality, the Camry had borderline bad sound quality, and the Corolla was the worst of all -- making it nearly impossible to hear differences in file formats, no matter how good your ears might be.
High res is mostly a sales gimmick. 44.1 kHz / 16 bit (Red Book) can sound fantastic, and will sound better than high res files, if the Red Book release is done right, and the high res was botched (a common outcome). If all was done right, then the high res file should sound better, if your transport and DAC have good engineering (for example, low jitter) to make the most of the file's higher sampling rate.
Lastly, although sonically, .wav files contain the same pulse code modulating bit stream as other lossless formats (meaning, you can convert a file between .wav and .flac and .alac and have the exact same sonic quality), I would use .flac and not .wav. .wav files are extremely limited in the meta-data that they can store, whereas .flac can store lots (not sure how many, but lots) of fields for metadata, which helps in organizing and traversing your music catalog.
In closing, .mp3 files never help, and can only hurt. They had a role when storage space was an issue (and is still an issue if playing from, let's say, a 64 GB smart phone). Unfortunately, the .mp3 format is now a leech that will not let go, even if every storage device held a petabyte and was free.
50 year old ears are more than capable of hearing differences in sound quality, when good gear is used, and properly set up in a room (with limited reflections), with great source material.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@14:39 -- Driving on the shoulder.
Even in a super-car, that has better handling than 99.99% of the cars on the road, our host can't stay in his lane on a simple turn.
Aside from bad driving (it can get you pulled over, driving on the shoulder), that is how you get a flat, and how you pick up glass and pebbles, etc, that get tossed up into the underside of the vehicle. And those tires cost $15,000 (I believe), each. You would think that our host would keep it on the road. And he drives like that all of the time, which is why he does not even realize that he is doing it, and posted himself doing it. To him, driving on the shoulder is normal.
1
-
1
-
1
-
1
-
1
-
I am repeating what I wrote previously:
Apps are at mercy of the OS.
If the OS's kernel is coded to delete the app, or to disable the app, then the app will disappear or not function.
Have you heard of cases where, after an OS upgrade, an app had problems?
Have you heard of cases where you must be running OS version XYZ, in order for an app to be compatible?
When your smart phone pulls in and installs a new OS, or a patch for the existing OS is applied, it will prevent TikTok from running.
It will do so because it will be mandated by our government, and corporations will be compelled to issue the OS patch.
With everything that computers can do, and that they do do, I do not understand why you think that TikTok, or any app, is immune to the code of the platform on which it runs.
1
-
1
-
@0:15 "...and they won't be stopped."
That is the language of equivocation / surrendering.
Those losers will be stopped, because the good among us, and the strong among us, will not capitulate to those criminals.
Also, please stop calling them "activists" and "protesters". They are neither.
They are criminals.
Calling them "activists" sullies the honest, hard work of actual activists.
When you break the law, you are not an activist.
When you break the law, you are not a protester.
What's next? Holding up a bank in the name of climate activism?
Or perhaps kidnapping family members of government officials, in the name of climate activism?
The list only gets worse, when you misuse the meaning of activism and protesting.
When you illegally block a road, then you are committing a criminal offense. Ergo, you are not protesting.
If anyone is hurt, or dies, then those criminals should be charged with assault or manslaughter or murder, as the law prescribes.
The above includes doctors that could not reach a patient in time, or any emergency personnel stuck in traffic, due to those criminals blocking the roads. Or any person that, due to being held up by those criminals, resulting in injuries or death.
And if you lose your business, because you missed a deadline, or your supplies could not reach you, etc, then those criminals should be sued in civil court for financial damages.
They should also be fined for littering the streets, and the cost of removing graffiti, replacing windows, etc.
1
-
1
-
1
-
Stay clear of Gigabyte. Here is why:
They have appalling, virtually non existent and "could not care less" customer service.
Two or three years ago, I purchased two of the their B550 chip set based motherboards.
On both machines, my USB drives would disconnect after being written to. This was with both LaCie drives (a Seagate company) and with G-Technology drives (a Western Digital company).
I had the latest BIOS / firmware. And when reading about the BIOS / firmware releases in Gigabytes's own notes, they wrote that their releases were to fix USB connection issues. Yet, their latest software (or their chipset's hardware) was bad.
There is no way to contact them, other than through an intentionally crippled web ticketing system.
-- No phone numbers.
-- No e-mail addresses.
-- No on-line chat.
Zilch.
So I filled out a ticket that asked questions that about my power supply, my RAM, and all types of unrelated items. I did not mind, as they do not know what is going to be reported, so it is best to have that information handy.
But when it came to being able to actually describe the problem, they gave the customer a tiny text window with approximately 250 characters to explain the issue.
Ten days later, they replied to me to restart my computer, and also mentioned that the power supply and other items are unrelated.
So I fill out the required information, and ten days later they tell me it is unrelated, and to reboot my computer.
So I figured that I would reply to them and have them focus on the issue.
Guess what? No reply option exists.
So yet another "new" ticket was opened by me.
Ten days later, another useless reply.
I was within my return window with Micro Center. So it went back.
For close to a month, I struggled with the above, including the time wasted building the computers, and time wasted driving back and forth to Micro Center, and time wasted waiting in Micro Center for them to call my name and assist me -- and Micro Center's personnel wasted time dealing with this return.
I can understand a tech company having a hardware or software issue. But the intentional firewall / roadblock that they erected to avoid contact with customers, and their BS replies, and their 10 days of waiting to get a BS reply, is unacceptable.
I do not care if Gigabyte products ever get great reviews at ½ the price of competitors. I will never give them 10¢ of my business.
I ended up purchasing MSI B550 chip set based motherboards, and they function flawlessly. I have no idea about MSI's customer service. Fortunately, I never needed it.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@0:18 "In mind me of my sister."
Let's say we know what he was trying to say... well...
His sister?
President* Biden constantly talks about his family members as if they invented the world.
Whether it be his mother, his father, his grandmother, his grandfather, his son, or his sister, all of whom accomplished nothing with their lives (outside of raking in $millions as part of the Biden Crime Family -- well, maybe not his parents).
Raise your hand if you know of one noteworthy thing that any Biden family member has ever done.
His sister is a nobody, with sub-par intelligence, and no marketable skills. Whatever she has, she owes to her brother (Joe Biden) for his handouts, and we all know how Senator Biden, and Vice President Biden, and President* Biden became loaded.
1
-
1
-
1
-
@ScooterinAB Defender is not the dollar store choice. It might have been, when it was first introduced. But it is now a mature, highly supported tool that Microsoft takes seriously.
We do not hear reviews and news reports on the failures of Defender, or the ineptness of Defender. And Defender is the default anti-virus, anti-malware, software firewall that is used by over a billion computers. Surely there would be countless reports of issue, if Defender was a dollar store tool -- but there are not countless reports. And we are talking about it running on over a billion computers.
If you read enough of the 3rd party anti-virus vendor's agreements, and their links to other legal jargon, and privacy lingo, etc, you will eventually come across language that you are granting their software 100% unfettered access to 100% of the files on your computer, including anything in memory, and that you are granting them permission to do anything, whatsoever, that they want to do with your data.
They do not use such blunt language, but that is what their agreement boils down to.
Microsoft is a huge spyware company. So they are doing whatever they want to do with your data. But it is not Defender that is collecting your information.
So if you now install a 3rd party anti-virus program on your computer, you just invited another spyware company to rummage through all of your data. And the likelihood is that they are not as capable as Microsoft's team, especially since Microsoft's team has access to all of the other Microsoft teams, should they need to obtain information about some obscure program included with Windows that is being attacked by malicious code.
No one knows Microsoft's code better than the Microsoft personnel that created the code. So their own Defender code, and the personnel that maintain Defender, have immediate access to any of Microsoft's other teams.
If the 3rd party software was appreciably better than Defender, I could see justification for using their software. But I believe that 3rd party anti-virus software is, at best, equal to Defender's protection, but probably less than equal. Combine that with giving a 3rd party full access to 100% of your data, and paying for it, too, and that is why I asked my question (in my opening comment), because I would not use 3rd party anti-virus software (I used to -- but no more).
Kaspersky does offer different plans that include additional features (like a VPN service (which I would not trust) and a password manager (which I would not trust), etc). So those add-ons to your annual paid plan might be desirable for some folks. However, not for me.
1
-
1
-
1
-
1
-
1
-
1
-
@angeldetierra3855 Do you know me? Do you know someone that knows me?
I am asking, because you claim that I am "so smart". How did you make that conclusion?
Are you writing the opposite of what you mean?
If yes, then how do you know that I am an idiot?
Why does the intelligence of a person dictate truth?
If a person who never attended school says that 3+3=6, does their lack of education dictate the correctness of their statement?
Why did you write your question in the form of a put-down?
Are you unable to have dialog without being condescending?
Did you watch the video? The answer to all of your questions is in the video.
Did you miss the part about the police, who are funded, indicting over 800 people?
Did you miss the title of the video?
Does a person have to be smart to know that if the police are defunded, then there are no police. And if there are no police, then there are no police officers to report rapes to. And if there are no police, then there are no arrests of rapists.
Do you understand that the police are the ones that catch rapists? And that in order to have them perform that function, you have to fund them?
How do you expect me, or anyone, to provide evidence of no police resulting in no arrest of rapists?
No one has ever run a city with no police.
Your request for evidence is like writing:
"How do you know that people will be killed, if car manufacturers did not include brakes?"
"How do you know that people will go hungry, if supermarkets closed down?"
"How do you know that rapes will skyrocket, if there are no police?"
You believe that my conclusion that no police = no arrests is BS, if I cannot not show evidence of that being the case.
It is extraordinary that you need this to be explained; that you do not see that no police = no arrests.
Are you trolling for attention?
1
-
1
-
1
-
1
-
Voting electronically is subject to fraud -- at scale.
When physical ballots are cast, then although fraud is possible, it is not possible at scale. Criminals at a polling station cannot corrupt the voting elsewhere.
But with electronic voting, we have no paper trail. Whatever number shows up on the screen is taken as the gospel.
Anyone with administrator access, or physical access, to the voting computers can enter anything that they want, or delete anything that they want.
Physical ballots are more labor intensive to deal with. But a fair election, one that We The People can believe was not corrupted, is worth the extra labor.
Once a tyrant gets elected, fraudulently, that tyrant will never allow another fair election. It will be the end of our representative republic.
1
-
If you want anonymity, then never use a VPN service. Use TOR, and only TOR.
The advice given in this video, to connect to a VPN service, which then you will connect to TOR network, is very bad advice.
When you use a VPN service, they are acting as a proxy for everything that you are doing. So if you use a VPN service, and connect it to TOR network, then the VPN service can see 100% of what you are typing for all internet activity. And the VPN service will see 100% of everything being sent back to you from the dark web.
VPN services make all kinds of claims about keeping you safe, and keeping no logs, etc. You have no way, whatsoever, to verify their claims. And even if a VPN service really goes out of their way to honor their claims, a court can order them to keep logs, and also issue a gag order, so that customers will not know that they are keeping logs.
If you wanted to know what people were trying to hide, one of the first places you would check is with VPN services. Governments and people in high places know that, and will find ways to see what is being accessed on VPN services.
TOR was created to keep you safe and private. It is an amazing feat of engineering, and it works. Do not think that you are smarter than the people that engineered TOR network. Anything that you do to "enhance" TOR activity will likely degrade your privacy and security, significantly.
Lastly, the dark web is not the spooky den of evil that that guest made it out to be. Sure, there are illegal activities taking place on the dark web, but not nearly as much as on the clear web (the one we all use). TOR network is primarily used for things like whistle blowing, and remaining anonymous in forums and elsewhere. You might want to visit Facebook, and not be tracked. Just because you want strict privacy, does not mean that you are engaging in criminal activity. The murder for hire example in this video is ridiculous.
Thumb's down click earned, for making the dark web sound like an underworld cesspool of crime and corruption, and also for the horrible VPN advice.
1
-
It is not the government's job to control free speech, whether face-to-face, over the telephone, in newspapers, or on social media.
The government is free to go on news stations, create web sites, and create accounts on social media platforms to get the word out.
It is up to each person to know which source of information, which content creators, which news stations, etc, to trust.
But the government is prohibited by our constitution from controlling anyone's free speech. Given the power to control what people can say will always be abused. No person, no company, no government of The People is allowed to silence anyone.
Cheers!
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@2:56 "...especially when neither the players, nor the administrators, nor the intended corporate sponsors, nor any of these groups of people appear to have actually read about what this Georgia voting law actually entails"
Why does that matter?
Well it does matter, on planet normal.
But it does not matter, on planet asylum.
-- They could all sit down and read the law...
-- They could all have in-person meetings with the authors of the law...
-- They could all memorize the law...
... and none of it would make a difference, on planet asylum.
These people are 100% about virtue signaling, and 0% about truth and facts.
Making the argument that they have not read the law is an indirect defense of these people, implying that if they read the law, then they would remain neutral or support the law.
These people are liars and degenerates. Just because they are entertaining, and just because they are skilled at something, does not mean that they are decent people. That are degenerates.
Granted, many of them are stupid, and protest a law that they know zero about. So it is a mix of stupid people and slimy people (and some of both).
1
-
1
-
1
-
@12:13
"It (the CPU) starts at 1.8 GHz, for the clock speed. But it's actually able to turbo boost all the way up to 4.6 GHz"
I prefer to see it as the clock speed starts at 4.6 GHz, and ends at 1.8 GHz.
Is not the use of "turbo" a sales redirection gimmick that makes CPUs that throttle down sound like they are boosting their speed?
Please correct me if I am wrong:
It is my understanding that the CPU will always run at the so-called "turbo" speed, unless and until it heats up or you choose to use a power saving setting?
So in reality, the "turbo" speed is the normal speed, and the CPU throttles down to avoid overheating?
It annoys me when marketing people twist language to the point of making something that slows itself down into something that speeds itself up.
By marketing people, I do not mean the host of this video. I mean whoever got the world to accept "turbo" to mean the opposite of what actually goes on.
In a car, the turbo charger does actually increase performance, by adding forced air into the combustion chamber. So it is accurate for motor-vehicles. But that is not what goes on with CPUs. There is nothing "turbo", whatsoever, under the hood of the computer.
Am I mistaken?
Another excellent review, by the way.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
If in a few countries, laws were enacted that would incarcerate spammers for 10+ years, and examples were made out of a few people, and the incarcerations were reported on news channels, then that, I believe, would take a huge chunk out of spammers. They would think long and hard about sending out spam.
The same goes for those that create malware to compromise other people's computers to send out spam (or even if they do not send out spam, surely people that take over other people's computers should be jailed). Yes, it is hard to track down the culprits. But if a concerted effort was made, and such culprits were locked up for a long time, and reported on the news, others would think long and hard about doing the same.
If the culprits are from other countries, and those other countries do nothing about it -- if they make no effort to correct the problem, or make no effort to apprehend the culprits, then the United States of America should give those countries 3 months (or whatever is decided) to either ramp up their efforts, and show results, or have their internet connections to the United States of America severed. And such an announcement should be made by American government officials, so that Americans and American businesses can prepare. When those foreign nations learn that they will lose access to American markets, they will wake up. And if the satellites that connect those offending nations are American owned, then as the owners of those satellites, America can disconnect the offending nations to the rest of the world.
None of the above is simple. And it will also be painful. But with the right leadership, and forensic technology experts employed for the above challenge, it will get done. The problem is that the people that could get it done do not care.
1
-
1
-
1
-
@2:40 "Now he's (Hunter Biden) an artist"
No, he is not an artist.
Yes, he sells art. But that does not make him an artist.
I sold my car. That does not make me an auto manufacturer.
Hunter Biden sells art to as a cover for selling access to the Oval Office.
No one has ever seen Hunter create art.
No one has ever seen Hunter make a single brush stroke.
The media has never asked Hunter from where he purchases his art supplies.
No one has ever checked with the art store (any art store) to verify that Hunter made purchases for his art related supplies.
No one has ever asked Hunter how he chooses his brushes.
No one has ever asked Hunter how he chooses his canvases.
No one has ever asked Hunter from where does he get his inspiration for art he claims he created.
No one has ever asked Hunter if he ever had formal training -- did he ever take an art class of have a private tutor, and to name the class and/or the tutor.
No one has ever asked Hunter for how long he has been painting. And why did he start painting only recently? And if he claims he has been painting for decades, then where are those paintings?
I am not an artist, and even I know several questions that the media should ask Hunter.
Imagine if the media spoke to a few real artists, to comprise a list of art related questions.
Folks, please never (really -- never) lose sight that we are dealing with radical leftist criminals. They lie and they lie and they lie.
Just because Hunter claims he is an artist, or just because he puts paintings up for sale, do not believe his assertion that he is an artist.
Hunter Biden is not an artist. Hunter Biden sells paintings that some other anonymous person is painting.
Like his father, Hunter Biden is a career criminal.
1
-
1
-
Five points:
1) When you bring in millions of people from countries that are determined to wipe out Jews, then what do you expect will happen?
If a Jew walked around in, for example, Iran, he would be attacked, and the police would side with the attackers.
So now those same people migrated to London, why would it be any different than it would be in Iran?
2) At a minimum, 1 tenth of 1% of Muslims are radicalized. The equals 1,600,000 radicals. So what do you think will happen when, perhaps, 160,000 of them migrate to your city?
And the 1 tenth of 1 percent is probably a low estimate. It might be 3 tenths of 1 percent, which would equal 4,800,000 radicals. And by radical, that means they would kill Jews on sight.
3) At a minimum, another 10% of Muslims hate Jews. They would not, themselves, attack Jews. But if a Jew was being attacked, they would watch and cheer.
That is 16,000,000 Muslims that supports the killing of Jews.
Bring in 1% of them to your city, and you have 160,000 Jew haters that want Jews dead.
4) To anyone that would say that most are peace loving. That does not help.
The chaos is not due to peace loving people.
If someone robs a bank, no one would say that most people do not rob banks.
If someone commits rape, no one would say that most people do not commit rape.
Civilizations fall, not due to the civilized people.
Civilizations fall, due to the minority of evil people, while the civilized people ignore the evil.
5) Stop calling them protesters.
Protesting is legal. But beating up Jews, or killing Jews (or anyone else) is not protesting. It is criminal. Never call criminal actions "protesting".
1
-
1
-
1
-
1
-
1
-
1
-
1
-
Please do not use the language of the radical left, such as in the title of this video.
To the casual, non informed folks, it looks like the ASU students are justified -- because who would be against "Voting Rights".
The correct title of this video should read:
"WOKE ASU Students Threaten To Go On INDEFINITE Hunger Strike If Fake Voting Rights Bill Isn't Passed"
When the radical left lies, via the titles to their agenda items, then always include the adjective "Fake", because their title is a Fake title.
The radical left's Voting Rights bill is not about protecting the rights of voters. It is about rigging elections to ensure one-party rule, and subverting our Constitution.
Countless people do not go beyond the title of headlines, and the radical left knows this. Yet, this still escapes conservatives.
Every time the radical left uses a lying title, always, Always, ALWAYS, point out their lying title.
President Trump understood this.
He stopped calling CNN and NBC "News" stations (a title that those stations named themselves). President Trump correctly titled them as "Fake News" stations.
Do the same for titles of videos, such as this one, and do so whenever referring to the lies of the radical left.
The "Voting Rights" bill should always be referred to as the "Fake Voting Rights" bill.
Cheers!
1
-
1
-
1
-
1
-
1
-
1
-
1
-
A cloud service should be your last option.
-- If your boot drive fails, then you will have to reinstall Windows in order to retrieve your files from the cloud service.
-- If you are automatically logging in to the cloud service, then that will not work when you reinstall Windows. Do you know your cloud service login credentials?
-- Do you have a way to reinstall Windows, in order to boot up and get to the cloud service? Do you have a bootable Windows disk (or flash drive)?
-- Is your Windows license embedded in your hardware? If not, then if you reinstall Windows on a replacement drive, there is a chance (a small one) that you will have to enter your activation key. Do you have it?
-- Anything that you give to the cloud service can be (and probably is) scanned by them (complete strangers). They can easily do it, so why wouldn't they?
There was an incident where the authorities arrested a man, when he sent photos of his toddler's rash to his doctor, at the doctor's request. The cloud service identified it as child (you know what). So these services are doing more than just storing your files.
On the other hand:
If you create a backup onto a USB drive, and also create an emergency boot flash drive, then when you replace your failed boot drive, you can restore your computer to exactly how it was before the failure (or at least to how it was when you created the backup).
After the restore, you will boot up your computer and it will be like nothing ever happened -- and you will not have to involve a cloud service.
The only disadvantage to backing up your data to a USB drive is that you will probably keep that USB drive in the same room (or same home). If you get burglarized or your home burns down, you can lose it all. So critical files should be uploaded to a cloud service, but encrypted before you upload them (if the files are private). Or, after you do a backup, copy that backup to yet another USB drive, and give it to a friend or neighbor. As long as you encrypted your backup (and just about every backup program offers strong encryption), no one will be able to use your backup (other than you).
1
-
This channel has a compulsion to promote their editing skills, rather than letting their viewers watch the car perform.
Why is there not a video of the car doing the race, without changing camera angles every 2 seconds?
Whey does the camera keep switching to view a man in a helmet in the car? What ever makes the host think that the viewers want to see the helmet, rather than the car performing?
Additionally, nearly every camera angle was a distorted, fish-eye, wide-angled view.
Did the drivers wear eyeglasses that gave them that same distorted, fish-eye, wide-angled view?
Well why not? If it is what you chose to post to your viewers, then it must be better than the real-life, proper aspect ratio, realistic view?
Why must these videos turn into a Hollywood-wannabe production?
You know that the host watches the race from a single camera and enjoys that view.
Yet the host denies the viewers that uninterrupted view.
And then there is the music.
Were the drivers listening to that music when they were racing?
Of course not.
So then what makes our host think that everyone other than the drivers would want to hear that music?
Why can't we simply watch the race, form the driver's point of view, with no camera gimmickry, and no post recording music.
Let us watch and listen as if we were behind the wheel.
Why is this not obvious?
Answer: The host wants to show off his post recording editing prowess, and is not interested in sharing what it was really like to drive that super-car.
Such a shame to have access to such an amazing automobile, never letting others see a simple video of the driving experience. Just plain selfish.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
Does keeping your computer running 24/7/365 help or hurt life expectancy?
It is my understanding that mechanical wear is the worst when power is applied. So if left running all of the time, there are never those repeated bursts to get started.
On the other hand, running all of the time also can take its toll on a device with moving parts.
Anyone know which is best? Is it six on one hand, and a half dozen on the other?
----------
By the way, the data center statistics are not exactly real world relateable.
-- Data centers generally use UPS systems that do double conversion on the power (AC to DC and back to AC). So the connected equipment never sees power directly from the public grid. They run 100% of the time on clean power, and that can only help to improve life expectancy, as compared to the public, who typically plug their computers into a household outlet, and get zapped all of the time (and those small, often unnoticeable zaps, add up).
-- Data centers generally use premium versions of drives for their servers and back-end storage. They typically do not buy the drives that go on sale on newegg.com, so those data center drives are probably built with more reliable parts. Just a guess.
Cheers!
1
-
1
-
1
-
1
-
@trixiesunshine1695 "Not sure about the racist part but she is definitely stupid beyond her years."
Milano's tweet accused Musk's company of "white supremacy". That tweet is racist, and has no foundation.
People that do that are racists.
@Trixie, if Milano sent out a tweet accusing you of the same thing, would you process her message as calling you a racist?
We have no shortage of people, like Milano, calling people white supremacists, when those people are not white supremacists.
We have no shortage of people, like Milano, that misuse racism to shut down dialog. They call people, with whom they disagree, racists. That is not okay. Those people pulling that crap should always be held accountable for inciting racism, where there is no racism.
People that incite racism are racists.
When we allow people, like Milano, to get away with tossing around racial slurs, then when there is a real act of racism, the real act is seen as just another rant by another nut case, and not taken seriously.
Please never give them a free pass. Call them out for their outrageous remarks.
1
-
1
-
1
-
1
-
Radical leftist writers develop a character to be a pig and a villain. Once the writers are satisfied that the character is universally despised, it is only then that the writers have that character espouse normal, conservative values.
Gullible audience members connect imaginary dots, that since they despise that character, then of course his normal, conservative values are wrong and to be disliked.
But if the writers started off that same character by showing him to be normal, conservative, and having his priorities in order, then when he exposes woke nonsense, the audience would be on board with his statements.
Although there are exceptions, no normal, conservative man would do and say or do the awful things we witnessed in the build up of that character. The show's writers did that in order to convey a message that normal, conservative men have mental issues.
Do people do and say those horrible things? Some do. And they are nearly all radical leftists.
1
-
1
-
1
-
If your life revolves around Google, then give Google your mobile number. Give Google anything and everything they want. Throw caution to the wind. If Google asks for it -- hand it over.
But for normal people who have a life outside of Google, make every effort to deny every privacy invading tactic that Google tries to foist upon every person on the planet.
To those that believe that Google will not share your phone number, or sell your phone number, that is like believing that having your children vacation on Jeffrey Epstein's island is fine, because Jeffrey Epstein tells you so.
I am not knocking anyone who has business interests that puts them at the mercy of Google's services.
But for 99% of the world, we can function perfectly well without any of Google's services.
Folks that are addicted to Google's services see the world as needing Google, and willing to hand over to Google anything that Google wants.
Like a heroin addiction, where addicts will sell their family into bondage for a fix, Google addicts will tell you that you should just do it.
If I asked you for your mobile phone number, would you give it to me?
Of course not. But many folks would just hand it over to complete strangers at the biggest spyware company in the history of our planet.
Does Google already have massive amounts of information on us? Yes.
That does not mean that you should just roll over and be complicit in handing your life over to Google.
So what difference will one more phone number be?
In the scheme of things, not much difference. But there are principles at play. Have some say over your own life's information. Keep some control over who you are. Do not bow to the spyware lords.
Make it hard -- damn hard -- for any company to spy on you. That takes effort. Anything worthwhile takes effort. Even if the odds are highly against you, never give up.
If losing your Google account will be like cutting off a finger, then give Google your mobile phone number. For everyone else, keep your personal information private. If it does not benefit you, then do not do it. You do not work for Google. You do not report to Google. Find a way to survive without Google, Facebook, and the rest.
1
-
1
-
1
-
1
-
Her (his, their, or its) claims are cringe worthy.
She (he, they, or it) gives "outlandish" a new meaning.
How evil and/or sick of a mind must someone have to stand up in front of an audience, on camera, and state these claims with a straight face?
How sad is it that people (animals, androids, things) earn a living, on our tax dollars, by fabricating wild, wild stories, and she (he, they, or it) has devoted followers that believe this nonsense?
How sick and evil is our news media personnel, that they prop her (him, their, or it) up, and go to great lengths to give her (him, them, it) an air of legitimacy?
I am waiting to one day hear Donald Trump announce that AOC is a devoted Republican, and that she put her life and reputation on the line to bring out the buffoonery and mental illness of the Democrats; that she is the ultimate troll of the Democrat party.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
That woke, racist, TikTok degenerate, at the start of this video, would lose his lunch if the arena put "Build The Wall" on the floor of the court.
Folks, remember:
-- Anything that the radical left finds offensive is racist -- and just about everything in life they find offensive.
-- And if you refuse to agree with 100% of their woke, radical leftist agenda, then you are a racist.
-- And if you call out the work, radical lefitsts for their racism, then you are a racist.
Basically, everything is racist. That is how racists see the world. That is how the radical left sees the world. Some of them conduct themselves that way, because they see a way to cash in. Although that is deplorable, the rest of them see everything through racism.
Like what took place in Germany, 90 years ago... you must swear allegiance to the woke overlords. Anything less makes you a racist, and all racists must be banned.
Again, affix "Build The Wall" to the stadium, and watch the meltdown from the self-anointed elites that try to dictate morality to our nation.
When your political views differ from them, you are a racist.
But why do they call so many people racist?
It is because they are trying to silence people.
Normal people tend to walk away from people that call them a racist. So the radical leftists that hurl that accusation assume that they won that encounter.
Normal people tend to not want to deal with unhinged, triggered, radical leftists. So those radical leftists assume that they are having success.
Normal people were taught by their parents to stay away from crazy people.
Of course normal people do not want to deal with loud-mouth, cantankerous, rude, mentally disturbed people.
Also note that radical leftists hurl racist accusations, because that is all that they know how to do. They are mentally vacant. They cannot support their positions (well, because their positions are unsupportable). So they use the only tool in their toolbox. They call you a racist.
Note that although it might seem like there are so many woke, radical leftists, it is due only to them being the most vocal, and fake news outlets throwing gasoline on fire to bring in viewers.
1
-
1
-
Why would Pelosi "tap" who, from the opposition party, should be on the committee?
Answer:
She is picking her own cronies.
Why the heck should she have anything, whatsoever, to do with who, from the Republican party, should sit on the committee?
Adam Kinzinger is a RINO (Republican In Name Only). He is a Democrat that got elected as a Republican. So of course Pelosi wants him to sit on the committee. And the radical leftist media just plays along as if there is "nothing to see here" with her "pick".
And how do we know that Adam Kinzinger is a RINO?
-- If he was a true Republican, he would politely tell Pelosi that he is not her token Republican.
-- If he was a true Republican, he would politely tell Pelosi that when Republican Leader, Kevin McCarthy, starts picking the Democrat members, that is when Pelosi can start picking Republican members.
-- If he was a true Republican, he would politely tell Pelosi to "shove it".
Pelosi picks her own team, and Republican leader, Kevin McCarthy, picks who from the Republican team will be on the committee.
This whole business of Pelosi supposedly having any say as to which Republican are on the committee is outrageous.
1
-
1
-
1
-
1
-
1
-
@0:18 "It's just the latest in a series of gaffs..." and @0:28 "blunder".
@Sky News Australia:
-- A lie is not a gaffe. A lie is not a blunder. President* Biden lies all of the time. He has been lying through his entire political life. He has been lying in school and in his private life.
He did not have dementia decades ago, and he lied then, too. Just because he now has dementia does not mean he is suddenly not doing what he has been doing for his entire life: Lying.
-- Please be careful in reporting on President* Biden's lies and gaffes. Please do not report them in a way that comes across as "Well, that's just Joe being Joe".
Hold his feet to the fire, with laser-like focus, for each and every lie, as well as each and every gaffe. If one of his opponents forgets to dot an "I" or cross a "T", he and his party will sink their teeth into it and blow it up into WW3.
Radical leftists never pull their punches. They never back off. They never seek middle ground. They never overlook anything. They never forgive.
And when they have nothing real at which to aim their vitriol, they make things up. So not only do they never back off an inch, they break out their chest of fake news and attack their opponents, based on the lies that they, themselves, broadcast.
Each and every lie that President* Biden makes should not be referred to as "the latest", as if it is par for the course. It comes across as "no big deal", when it is a big deal.
Two words:
Never defend lies.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
The Electoral College stops fraud at the state's border.
Without the Electoral College:
If a state like Rhode Island were to stuff ballot boxes, then that tiny state could swing the election. The Electoral College prevents that, because Rhode Island gets a fixed number of votes. So they, or any state, can fraudulently add 10,000,000 votes, and the worst that would happen is that their state votes red or blue. Their fraud affects only their state.
Also, remember the Bush / Gore election?
Remember the never-ending law suits that took place in Florida, because the winner of the election came down to which way Florida's votes went?
Without the Electoral College, every district, town, city, state and federal court, from sea to shining sea, would contest the vote count. They would all tie up the courts trying to add votes, cancel votes, and who knows what else. They would do this because if they can get their way, then they swing the election. So our courts would grind to a halt. We would never have a final vote for who one the election. We would have a constitutional crisis.
Our founding fathers knew this. They created the Electoral College to prevent this.
Our founding fathers were brilliant!
1
-
1
-
1
-
1
-
The issue is that his wife might grab the keys and go for a ride, and not have the presence of mind to grab the mirror.
Of the car could get stolen, resulting in an accident, partly due to no side-view mirror.
Law enforcement cannot just take someone's word that they will definitely never drive without that side-view mirror.
Law enforcement cannot be burdened with verifying that that person's magnet is up to the requirements, strength wise, to 1) stay mounted and 2) not move (changing the mirror's angle / view). Clearly, the owner is able to remove it. So how strong can those magnets be?
If the car rear-ends someone, will that mirror go flying into someone's head?
Imagine if everyone's mirrors were attached with those same, exact magnets. The roads would probably be littered with side-view mirrors.
The law, in this instance, got it right.
Our host is showing his subjectivity, because he is a car enthusiast.
1
-
1
-
1
-
1
-
@5:07 "It comes in a couple of different flavors" (Home/Workstation and Security)
Is the Home/Workstation distro identical to the Security distro, absent the inclusion of the myriad of security applications that come preinstalled?
In other words, are the two distros basically identical, except that the Security version simply includes lots of pre-installed security related applications?
I want to divorce myself from Windows, and this looks like a great distro for my next computer. But I have to decide which of the two Parrot distros would be best suited for me.
I am not into all of the forensics tools that come with the Security version (but I would like to learn). So aside from the Security version taking more disk space (which is not really an issue these days), can I install the Security version, and just not use the Security tools until I have a need or want to learn about them?
In other words, can I use the Security distro the same as the Home/Workstation distro, by simply ignoring the additional security tools?
Is there a reason, or some advantage, or a situation where it is more advantageous to install the Home/Workstation distro?
Do both versions have the AnonSurf feature?
@22:46 "over 600 (security tools)"
This intrigues me.
But how does someone that is new to this wrap their head around this blizzard of tools?
Does the distro offer a synopsis of function/purpose of what each of the 600 tools do? Or do you have to use 3rd party internet resources to get information for each one?
If it is the latter, then that is quite tedious. I hope there is a feature, such as hoovering over the item, to see a sentence or two for what it does.
Great review.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@8:28
Accelerating:
The camera should be on the road; not on your face.
The viewers should see what you are seeing.
We cannot appreciate the acceleration, by looking at your face. We can, if we were looking at the road.
@9:26
"The head's up display tells you you're going too fast."
That is called a nag -- not much different than having a backseat driver in your car.
99% of drivers exceed the speed limit, even if it is only by 2 MPH.
If the speed limit is 35 MPH, most people do 40 MPH.
If the speed limit is 55 MPH, most people do 60 MPH.
Etc.
Do we want our head's up display constantly alerting us to the speed we are driving, when we are doing so intentionally?
So the questions are:
Can that "nag" be disabled? and
Can that "nag" be configured to trigger a notification at "speed limit" + "number we fill in". For example, MPH + 5, so that no "nag" appears until we are 6 MPH over the speed limit?
@10:15
"The bad"
-- "Econ" mode:
You will save gas. But on drives where you are often changing speed, you will feel like you are fighting the car -- it is frustrating.
When you step on the gas, the acceleration is not much. So you press harder, and almost nothing happens. So you press harder, and almost nothing happens. So you press harder, and BOOM!, it takes off. "Sport" mode is the opposite. The default mode (which is when neither "Econ" nor "Sport" is enabled), is dialed in perfectly. It is the mode that is set when you start the car. It makes for a pleasant drive, where the car is responsive, yet somewhat tame.
"Econ" mode is best for highway driving, where you can cruise at a constant speed, and it is also good for heavy traffic, where you are inching along.
-- The door sills are painted. If you do not tape over them, you will scuff and scratch them. Your feet (especially your left foot), is going to hit it, especially while entering the car. Yes, you can avoid doing so. But sooner or later, you or someone else will scrape it.
-- The stereo is so-so.
You can enjoy it. But it does not let you forget that you are listening to a mechanical device.
A better stereo makes the speakers disappear, where you hear a wall of music (not individual speakers), and your ears cannot identify the location of the speakers.
A better stereo throws a realistic soundstage and has excellent imaging.
-- Reverse camera:
There is a dotted line, which is almost useless. Typically, that line would be where your rear bumper is located. Yet, if you stop when the dotted line reaches the end of the parking space, your rear bumper will still have 1 or 2 feet left to go.
Also, there is no linear view. You have a choice of "wide angle" and "very wide angle". But no "non warped, actual and accurate" view.
-- The push buttons:
Let's say you are backing up into a tight spot, and the weather is bad, and your camera is blocked or blurry. So you look in the mirrors and turn your head. But that might not be good enough. So you crack open your door, lean your head out, and slowly creep backwards into your spot. No Sale! (says the push buttons). As soon as you open your door, the car puts you into park.
-- Auto high-beams are not always timely. So do not be one of those drivers that blinds other drivers. Fortunately, Honda does provide a procedure to disable the auto high-beams, that takes 40+ seconds of holding a lever. Unfortunately, virtually every Accord owner is not going to know about this. So they will have their high-beams annoying other drivers, because the car turns them on and off according to its (not always accurate) sensors.
-- There is no simple way to turn off all lights on the front of the car.
So, if you are waiting in spot in a crowded parking lot, and it is cold outside, you will probably want to keep the engine running to stay warm. Well, that means that some lights will be on, no matter what you do. There is a procedure to have all lights turn off, but it is a small hassle, and one that most people will not even know exists, and might not remember how to set it up. It is not something you will stumble across. You have to either read it in the manual, or have someone show you.
-- The Good:
It is a fantastic car.
Reliable, fuel efficient, and a blast to drive -- especially in Sport mode, where the turbo boost is increased, the suspension tightened and lowered, and the transmission holds lower gears longer for excellent throttle response.
Those 19" wheels, with the low profile tires (little sidewall), and firm (yet comfortable) suspension, translates to a sedan that can whip around turns with ease. Not as good as a mid-engine Corvette. But better than you think. It really holds the road. Not suggesting anyone drive like a nut (even a million dollar Ferrari will lose control if pushed too hard).
And the brakes are silky smooth, and have fantastic stopping power, which translates to a valuable safety feature. Those brakes will probably save many people from accidents where they had to stop short.
Cheers!
1
-
@1:18 "...dreamers..."
All, raise your hand if you are not a dreamer.
Everyone is a dreamer.
The people that come here, illegally, are dreamers. But they do not hold a lock on dreaming.
The countless homeless people in our major cities are dreamers.
The people who lost their jobs, due to Covid-19, and have received eviction notices... They, too, are dreamers.
Parents that have children with drug addictions are dreamers.
People with serious health issues are dreamers.
Etc.
The leftist media, such as ABC News, uses "dreamers" to make the public feel guilty for their cause.
I dream of a day when news stations will report the news, and not their political agenda.
Cheers!
1
-
1
-
Folks, youtube has put a blue "Context" message, directly below this video.
The message was put there by an anonymous youtube employee, who is a tyrant. Why?
When someone puts a pinned post (not pinned by the channel's host) above all other posts, with a blue background (no other posts have colored backgrounds), does not use a username, and does not provide an option for replies (like any other comment), then that person is a tyrant.
They are at the controls, playing G-d.
youtube claims that they are not authors. Yet, they routinely author communications, not covered by Section 230 of the Communications and Decency Act. What I described above is one of countless examples.
Note that virtually without exception, the anonymous youtube tyrants put their pinned comments only in postings by conservative hosts.
I have never seen one for any leftist's channel, no matter how insane the posting, and no matter have non factual the posting, and no matter how fabricated the posting.
1
-
If you are using X amount of energy each month, and you are being charged Y amount of dollars each month, then you are trusting that the energy company is reading their own meters correctly and charging you accordingly.
For them to months or years later say "Surprise!", we were undercharging you, is not the fault of the customer, and the customer should not be on the hook for those extra charges. Why?
If you were paying $200 each month, but were supposed to get billed $800 each month, then you probably would have taken measures to reduce your energy consumption, or not spent your budget elsewhere. But you would have had to know that is was supposed to be $800 each month.
If the energy company's meters were under-reporting, it is the same thing.
You, the customer, fall into a routine, based on trusting the accuracy of the meters and the energy company's competence to read them properly.
How is a customer supposed to know that they were using $800 worth of juice each month, if the electric company gives then a different number each month?
What if you purchased a property, based on the annual taxes on that property being $12,000.
Years later, the town tells you: "Oops. The taxes were supposed to be $18,000 each year. Now you are expected to retroactively pay the difference, after you made the purchase based on what the town (or electric company, as the case may be) initially told you? ...on what you were being billed for months or years?
1
-
If you have, perhaps, 500 GB of free space, and your temp files are consuming 50 MB of space, then you should probably do nothing.
50 MB is 0.01% of 500 GB. So you will regain very, very little space, and risk having a problem if one of those temp files is beneficial or serving some purpose.
Granted, it is unlikely that you will ever need any of those temp files. But why tinker around, when deleting them has virtually no benefit, and yet deleting them has a small possibility of adversely affecting something?
And deleting those temp files will have no performance change on your computer -- at least nothing any human would notice. If one operation completes 0.001 second faster, that is imperceptible.
Deleting temp files was practical, when hard drives were 80 MBs in size, and cost $hundreds. But not when storage drives are 1 TB in size.
If you are obsessed with deleting your temp files, then at least sort them by date, and exclude deleting any recent temp files.
Or even better, move your temp files to some other location. If your computer runs with no issues after you moved those temp files, then you should be fine. But be sure to use all of the programs that you would normally use over the course of a day or two, in order to be sure that everything is working to your satisfaction, before deleting those moved temp files.
Then throw a party. Invite all of your imaginary facebook friends, and celebrate accomplishing nothing.
;-)
1
-
1
-
@Rambleism I wrote to you:
"For the sake of making a point, let's assume that Trump is guilty of every offense ever thrown at him...
Elwood Rambler, please tell us how that gives Schumer a free pass to threaten Supreme Court Justices."
You replied with:
"Perhaps ... what threat though?🤷♂️ Talk about making something out of nothing. Isn’t that something you just shrug off in life? They’re big boys they can handle themselves. Trump threatens woman over the internet while they are doing their duty and testifying 🤦♂️ is that better or worse intimidation? Did you call him out?"
1) Changing the subject to Trump is a typical dodge, used by people that either do not know what they are talking about, or are unwilling to admit that they are wrong. You qualify for both.
The topic of this video is about Schumer threatening Supreme Court Justices. As eager as you are to change the topic to be about Trump, it is not about Trump. Try to stay focused.
2) For you to ask "what threat though?" is moronic. Yes, I am calling you a moron, because we are commenting on a video where Schumer threatens Supreme Court Justices, and you expect us to believe your comment rather than the video of Schumer making the threats. You might as well write "What does Schumer have to do with this? He is not in the video". That would be equally ridiculous of you to expect us to believe.
Do you understand how utterly stupid you come across, when you ask "what threat" when commenting on a video that contains the threat; a video whose purpose is to put a spotlight on the threat, and you ask "what threat". Really. Take a breath and think about how incredibly stupid your are coming across.
I do not normally call people stupid. But your assertion of no threat, in a video containing a threat, is the equivalent of holding a "call me stupid" sign.
1
-
1
-
1
-
1
-
1
-
@0:06
"...massive military muscle"
According to whom? The clueless "Sky News" reporter?
What qualifies her to deem what is massive military muscle?
Did she inspect the missile shaped canisters?
Does she know whether or not they are real, or leftovers from a Thanksgiving Day parade?
Does she know whether or not they employ any sophisticated targeting technology?
Does she know whether or not they employ any counter-measures, preventing them from being destroyed after being launched?
All she sees is a parade, and she speaks as if she is the chairperson of North Korea's propaganda regime.
@0:12
"...which analysts say..."
Exactly: to "which" analysts is she referring. She does not say, because she just made it up.
@1:43
"...united, within"
Based on what?
Based on a single video produced by the country's dictator?
That makes the country united, within?
North Korea uses murder, torture, no rights of citizens, no free speech, no right to a fair trail (or any trial), no appeals to sentencing, hard labor, starvation, etc, to control its population.
And "Sky News" reports this as "united, within".
"Sky News" is just a name for "Communist News" (because North Korea is a Communist dictatorship, and Sky News promotes their propaganda).
"Sky News" supports Communism. This video, the way Sky News narrated it, is proof of their support of Communist North Korea.
Folks, always be alert for fake news stations, that are not news stations.
Be alert for videos that appear to have credibility, but are simply prepared by tyrants and their supporters, of whom masquerade as news agencies.
1
-
If the person in charge of performing the demolition would lose his own home, if he mistakenly demolished a home, you can bet that he would check with all parties, and all the key people in government, before executing on the demolition order.
Also, the man that purchased the home should have put up signs in the yard, and notices around the home (on doors and windows), that his home's demolition order has been rescinded.
He should have left an envelope at each location, containing the names of all parties that officially canceled the demolition order, and also his own phone number.
He also should have tried to obtain the contact info of the actual person that would be performing the demolition, in order to confirm that he was given official notice that the demolition was canceled.
1
-
1
-
1
-
1
-
1
-
Please stop using the clown world language of the radical left.
He did not get "Misgendered", as indicated in the title of this video.
He got correctly gendered.
His mental illness, of normal people not going along with his irrational view of reality, is what caused his meltdown.
It would be as if he insisted that he was from Neptune, and the title of this video asserted that he had a meltdown for being mis-aliened when normal people called him human.
More radical left clown world language:
Sanctuary cities are not sanctuary cities. They are "Fugitive" cities, as those cities are complicit in hiding fugitives from the law.
Criminals that block roads, burn down buildings, break windows, etc, are not protesters.
Blocking roads is illegal. Our Constitution / Bill Of Rights has no words denoting a right to break the law. As soon as you illegally block a public road, you are a criminal (not a protester).
Stop giving credence to the clown world language of the radical left, by inadvertently calling criminal activity "protesting", and calling fugitive cities "sanctuary" cities, and calling proper gendering as "mis-gendering".
Words have meanings. The radical left knows that, and is why the use noble words to describe their outrageous actions. So never go along with their attempt to redefine words. Every time that they use clown world language, correct them. Every-single-time.
1
-
1
-
1
-
And when California goes belly-up, from having a financial deficit that is insurmountable, the Democrats in Washington, DC will vote to have the rest of America send their tax dollars to rescue California.
And then California will spend another $1,000,000,000,000.00 on other social programs, go belly-up again, and the rest of the country will have their tax dollars sent to California, again.
Rinse and repeat.
1
-
1
-
Look at how she dresses for her public, on-line complaining, as well as her ranting. Can you picture her at an interview? Do you think that she keeps her "check out my body" and her angry disposition in check during an interview?
@4:44 "...going against..."
That is telling.
I never thought of myself as going against any company to where I applied for a position. Rather, I saw myself as being a productive, team member of those corporations.
And did you see how she did her "punching" when she said that she is going "against" corporate America? She has disdain for the companies she is expecting to hire her. An $80,000 education / indoctrination, and no brains.
But she thinks of herself as being above corporations. She is against them, while complaining that they will not hire her.
It is likely due to the entitlement attitude taught to her by her $80,000 indoctrination service (known as radical leftist professors).
Now that she made this video, does she think that when she shows up for an interview, that her childish display will help her? How many executives would hire her, after that hiring executive watched her in that video?
She is frustrated that she was taught that the world revolves around her, and is now finding out that she is nothing special.
And her $80,000 indoctrination service did not teach her to compose herself when posting videos for the world to see.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
Those robots should be illegal (perhaps they are?). Here's why:
1) Motor vehicles are not allowed to be driven on sidewalks.
If you were to create a replica of that robot (but your replica is not a robot). And you controlled your replica by sitting on it and driving it on the sidewalk, the police would stop you, and might ticket you. But somehow when it can be driven on a sidewalk without a driver, then it is allowed?
It is absurd. And as we have seen, it knocks things over.
2) Sidewalks (and the streets) are paid for by the tax dollars of We The People.
Companies pay, separately for their office space and for their storage space and for their assembly space, etc. If you own a company, you pay for the property on which you are using space.
Now we have companies using public sidewalks and public roads (think about driverless cars).
So companies with huge resources can build an army of robots to go all over town (every town), and cause congestion, and they pay zero for using all of the public space?
What happens when, for example, Home Depot creates robot trucks that go around selling supplies everywhere? And McDonalds goes around with automated trucks selling meals, etc.
How many thousands of automated motor vehicles should We The People allow to roam our public sidewalks and our public streets, for free?
Up until now, every vehicle had a driver. So that keeps big companies from abusing the public space (because for each motor vehicle, there was a human in the vehicle that was controlling the vehicle). But when huge companies can just build endless robots to clog our public sidewalks and public streets, and they pay zero taxes for using all of that public space, it is illegal.
Folks, we are seeing the earliest stages of what will turn into a wave of congestion. If this is not stopped, then in years to come, big companies will have armies of these robots all over the place. And it will quickly get worse, as the robots are built in mass, lowering their cost.
Would you be allowed to buy or build a robot, and have it make deliveries for you, or advertise for you?
3) Get ready for free advertising from the robots. No longer will big companies need to pay for billboards, or street signs, etc. They will build truck size robots that roam the streets, nagging the public to buy their products and services.
You might be sitting in a park, relaxing, when along comes a robot to pester you. And a year later, 5 robots will roll in to pester you. It will come to that, if we turn a blind eye to this pestilence.
It might seem interesting or exciting to see these robots today. But like a friend that is fun to be with, if you have to live with them, they get on your nerves. When these robots show up anywhere and everywhere, in mass, the interesting and exciting aspect will be replaced with anger and frustration.
And since these robots will be owned by big companies, and those big companies pay-off law makers, get ready for big penalties for interfering with the operation of the robots.
This is going to turn into a huge mess. And like any disease, catching it early, and eradicating it before it grows roots, is very important.
1
-
@0:24 "facebook's own community standards"
facebook writes their own rules. Then they pat themselves on the back by claiming their rules abide by community standards.
Who decides what are the community standards?
There is no elected body. It is made up mumbo-jumbo. Raise your hand if you know anyone that is in charge of "community standards", and from where they derived their authority.
And which communities? Surly in the hundreds of thousands of communities, in just America, there will be huge divides in what is a community standard.
Folks, "community standards" stands for an empty excuse to be a tyrant and claim that you are on the side of (intangible) community standards.
@0:26 "and the human rights laws that they want to abide by"
Same thing.
What human rights laws?
Where are these laws written?
Who codified these laws?
Raise your hand if you know anyone that wrote "human rights laws".
Assuming someone did right human rights laws, from where did that person derive their authority to create laws?
Who elected them?
This is all a load of crap.
When it comes to facebook, Mark Zuckerberg is king. His word is the law at facebook.
He can wave his hand and dismantle the "Oversight Board".
He does not have to listen to the oversight board. He does not have to listen to anyone. It is his company, and he can allow or ban anyone he wants, at his whim.
Section 230 of the Communications Decency Act is codified law. Since it is the law, Zuckerberg must abide by it. Yet, he does not.
Zuckerberg is worth $123,000,000,000, he donates hundreds of millions to the Democrat controlled federal government law makers and the Biden administration, and so he gets away with being lawless.
All of this "Oversight Board" news is political theater. It is Mark Zuckerberg that has his finger on the "Enable" and "Disable" buttons for President Trump's account.
Do not let this "Oversight Board" BS distract you from the fact that it is Mark Zuckerberg, and him alone, that banned President Trump from facebook.
Cheers!
1
-
@1:36 "...illegal immigrants..."
Please pay close attention to those videos.
Many of those videos show 90%+ men, all of military age.
When nearly everyone in such videos are men, of military age, that is not immigration. That is a step towards raising an army from within.
As to black people being tossed aside by Democrats...
Democrats never cared about black people. Never. Democrats wanted their votes, and that is it.
Now black people are seeing it, because Democrats are now doing the same thing with illegal immigrants. Democrats will do whatever they can to get illegal immigrants to cast illegal votes. So the Democrats are now bending over backwards, with taxpayer money, swooning over illegal immigrants. Democrats are illegally spending taxpayer money on illegal immigrants, to buy illegal votes. And black people are feeling the brunt of it, as they are cast aside by the Democrats.
I am confident that the black vote will continue to turn in President Trump's direction. It will soon reach critical mass, and snowball into President Trump getting 70%+ of the black vote.
1
-
1
-
1
-
1
-
1
-
1
-
@11:18 "So, that's why I support 'em, and I urge you to support them, as well." (referring to The Institute For Justice).
Folks, our host often asks his viewers to "support" (send in checks or the digital equivalent), and yet our host has never stated that he has written a check.
Yes, The Institute For Justice is a worthy cause. But it is elitist of our host to repeatedly ask others to donate, when he has never donated.
Perhaps he is keeping his donation a secret? But why would he do that?
I would have respect for him, if he said that he wrote a check for $100. And I would believe him, and I suspect that his viewers would believe him, too.
But to often ask others to do what he is unwilling to do, is elitist and hypocritical -- and our host is hurting the cause he says that he is supporting.
Imagine how many people would donate, if our host showed a check that he has written to The Institute For Justice -- or even just told us that he did so.
Or is it possible that our host feels he is above making a financial donation, because him sending out the message puts him above the fray?
1
-
1
-
@bobluthier3031 That is preciously why President Trump is levying reciprocal tariffs -- to bring down prices.
People want instant results. Reality does not work that way.
Prices will probably go up a bit. In a few months, when other countries can't handle the financial burden, they will remove their tariffs, and so will President Trump. At that time, prices will go down, significantly.
Add to the above, drill-baby-drill, and energy costs will be going down, and soon, and probably by half. That will bring down transportation costs, which will lead to lower prices on just about everything.
Doing nothing, is the road to bankruptcy. President Trump's plan is going to bring in new jobs like it was the industrial revolution.
1
-
@bobluthier3031 There is only one reality, and President Trump is making it happen.
Your plan, which is no plan, is to keep letting scores of other countries rip us off. Just keep raising the national debt, until our currency becomes the same as Venezuela's currency, where it is so worthless, that they could not print enough currency to pay the printer.
$37,000,000,000,000.00 in debt. Just let it ride. Right?
1
-
@9:16 "The Institute For Justice is doing great work here, and I urge you to support them."
Folks, I have asked our host 3 times, in 3 prior videos, if he financially supports The Institute For Justice, or if he only expects others to do so.
I have asked our host 3 times, in 3 prior videos, if he has ever written a check to The Institute For Justice, or if he only asks others to do so.
I have asked within minutes of our host posting a new video.
Our host never replied.
Our host has never said that he has made a financial contribution to The Institute For Justice.
Yes, it is good that our host is able to use his channel to raise funding for The Institute For Justice. But our host should lead by example.
Clearly our host is affluent. Yet he will not even write a check for $100. If he has, he is keeping it a secret (for reasons unknown).
Some folks feel that they are above the fray; that they need not lead by example.
I hope that I am mistaken. But I have concluded that our host has never financially contributed to The Institute For Justice. I base my conclusion on our host never replying to my 3 comments, and our host never saying so in his videos, and our host replying to other comments -- indicating that he reads the comments.
Do as I say, not as I do. Part with your cash, while I keep mine and make the speeches.
1
-
1
-
1
-
@1:59 -- Notice the rude, selfish, radical leftist standing in the right portion of that video.
How would you like the view from sitting behind him?
That rude, selfish man is a degenerate. He knows that he is blocking everyone behind him from seeing the activities. He does not care. It is all about him.
If I were behind him, I would tell him to sit down. If he refused, I would ask the board members to tell him, and everyone else (other than the one speaking and those along the wall's perimeter) to sit down.
If that fell on deaf ears, I would stand in front of that rude, selfish, radical leftist.
If you go to one of these meetings, and the board members allow such individuals to disrupt the meeting (yes, intentionally blocking others is a disruption), then have signs (or even blank ones) handy, to hold in front of their faces.
Do not tolerate their crap.
Remain lawful and civil. But do to them what they do to others.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@9:21 "Do they have the right to shut down anybody they want, or to push other people to the forefront that they like?"
Section 230 of the Communications Decency Act provides protections for on-line hosting of free speech.
Section 230 of the Communications Decency Act does not provide protections for on-line publishing.
Once a site edits the content of what others are posting (banning people or their comments is a form of editing), then that action is not protected by Section 230 of the Communications Decency Act. The site becomes a publisher (just like a newspaper, that controls what is printed, and is therefore liable for what is printed), once the site takes on publishing roles.
The exception to publishing or editing or banning people is for complying with the law.
Just because a site is not liable for what others post on their site, does not mean that the site should allow heroin sales to take place on their site. Such postings are illegal, and must be taken down.
As to youtube's recommendations (or google's search results):
They are run by Democrats, and search results are skewed accordingly.
Also, banned videos are based on leftist ideology.
For example, days ago, Nebraska State Senator, Machaela Cavanaugh, had a mental breakdown on the floor of the senate. She was yelling, acting like a 2-year old, and was unhinged.
You will not find that video on youtube, if you search for any search terms on youtube. Search for her state, her name, and quote her words exactly, and no video of her losing her mind will show up.
That is by design by leftists, at youtube, taking down videos of that Democrat Senator's mental breakdown.
Youtube routinely takes down links to videos. That is why I will not provide a link to her meltdown on rumble.
That is the act of a publisher, and is in violation of section 230's protections.
Search for the video on rumble, and it is there.
Now if a Republican, Nabraska Senator did the same thing, it would be promoted on youtube.
So although it is all well and good for youtube to recommend videos for music, those same algorithms steer political agendas, affecting election results. That should not be allowed, unless youtube makes it clear that it is doing so.
In fact, users should have to knowingly enable such political algorithms, in order for youtube to be allowed to promote biased political agendas.
Lastly, it is not solely about leaving section 230 untouched. Rather, it is about sites violating section 230. They do not get to have no liability for postings, when they are choosing and banning postings based on their political leanings.
Promoting the free speech of some, over the free speech of others, is a form of censorship, is a form of publishing, and violates section 230's protections.
Banning political videos is censorship, and violates section 230's protections.
1
-
1
-
1
-
1
-
1
-
1
-
I believe that the top executives (Presidents, CEOs, Chairmen Of The Board level) people have finally been feeling the pain, with lawsuits, and phone calls and e-mail, etc.
Those executives can insulate themselves from the DEI chaos that they force on the rest of the personnel in their companies. But being reckless eventually affects the executives that created the caustic environment.
Those executives have had their golf games, and exotic vacations, and drinks by their swimming pools, etc, interrupted one too many times. Now that it has become an itch that keeps coming back, they are fed up, and have decided to end those wildly racist, illegal programs.
Those executives never want to be on another call with their DEI executive officer. No one wants to interact with those wildly woke, evil people. The top executives have had enough. They can't get away from the nut jobs that they brought into their companies at the highest levels. So they are clearing them out, and closing down the whole DEI ecosystem.
But the executives that brought in the DEI chaos, who are now eliminating the DEI chaos, will never admit that they screwed up. They will never apologize for the stress that they inflicted on their employees, or re-hire the people that were fired for being based.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@CrazyNavajo007 You wrote that I was upset. Therefore, I asked you to quote where I wrote that I was upset.
Rather than quoting me writing that I was upset, you quoted my entire comment, which does not contain me writing that I was upset.
Madam, you are an attention seeking troll.
And giving your own useless comment a thumb's up is pathetic. Yes, you voted your own comment up. That you are starving for attention so badly, that you actually voted up your own comment, is sad. Pathetic, transparent, and trolling is not an esteemed trifecta.
Reply with anything that you want. Now that I have identified you as a troll, I will not reply.
1
-
Leo, please consider making a video on activation keys that would cover the following subjects:
-- Revealing activation keys for both the OS and Office suite.
Several months ago, when I purchased the Todo backup software from EaseUS, they started periodically e-mailing me various offerings. One of them is a tool that reveals activation keys, which is handy if upgrading to a new computer, or if your drive fails, and you cannot restore it and need a new drive with a fresh OS installation. This ties in to my next question, regarding activation keys.
-- There are other channels, with hundreds of thousands of subscribers, where they advertise discounted activation keys.
I want to install Office Professional Plus (because I want the Outlook application, and it would be nice to also have Access). The Office 365 offerings are not for me. I want to actually install the applications, and not pay a subscription.
One of those other channel's advertisements has Office Professional Plus, version 2021, for $17.29, and they have been selling activation keys for a long time. So it appears to be legitimate.
Is it legitimate? Is the discount due to it being from 2021?
I am tempted to make the purchase. But I would prefer to hear from someone reputable that the keys are good and this is all legitimate.
I have inquired on those other channels. But they have a financial interest. I would rather hear from a reputable, neutral party. If it is all above board, then $17.29 for a 3-year old office suite is a good deal.
Please consider posting an activation key video covering purchasing, and also resurrecting keys for situations where you did not save them in an accessible location.
My old i7 computer is running Office version 2007, and I have no idea what my activation key is. A few years ago, I started to use keepass, and now I save such information.
I think that many people would find this information useful.
Thank you.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
The Superman movies, with Christopher Reeve, made a mockery out of Jerry Siegel's creation.
The movie's writers had Superman prancing around, and floating.
Superman was not magical. He did not levitate. He did not defy gravity.
Superman could leap tall buildings in a single bound, due to his super strength. He did not float over buildings.
In the George Reeves television series, they never showed Superman standing, horizontally, on the outside of a building, defying gravity. They could have, with wires. They could have made him float up from the street like Tinkerbell, but they did not, because Superman was not able to float.
Shameful that the Christopher Reeve films made a mockery of Jerry Siegel's creation.
1
-
@Charles_Anthony "I mean, technically speaking, to deface something means to permanently alter and or damage it."
Technically, what they did is deface the sidewalk.
1) Are the police supposed to know which materials are, or are not, permanent?
2) Who decides what qualifies as temporary? Even the paint used on all of our roads is not permanent. What about paints that would come off with special cleaning fluids? Are those paints allowed, due to technically not being permanent?
3) What about folks that will chalk up the sidewalk, immediately after it is washed clean -- over, and over, and over. Each time, it is temporary. But their chalkings are there 99% of the time.
It is illegal to use any public property as your canvas.
1
-
@Charles_Anthony "Well, let's look into the cost of removing each material and if it negatively impacts the individual, business and or state."
Where in the statues does "cost" determine the legality of defacing public property?
'Chalk is basically the most "temporary" of all since even walking over it will remove it, but water us virtually free, especially if the one using it is a employee of the state.'
I will be sending you my water bill for my "virtually free" water. Offer to pay your neighbor's water bill, too. You are quick to call other people's water "virtually free". So you pay for it, since it is virtually free.
And if "a employee of the state" is using water to erase chalk, it is anything but free.
We The People's taxes are paying for that employee's time. We The People's taxes are also paying for that public facility's water costs.
If you insist that it is virtually free, then have the government send you the bill for that employee's time, and another bill for the water meter's usage for the amount used to clean off the chalk.
And if you have no problem with people chalking up the public streets, then you should have no problem with them doing the same on your car and on your home. You can wash it off, with your time, "virtually free".
"Paint needs chemicals to remove and, in most cases, the surface needs to be blocked off so it not only costs money to remove but disrupts day to day life."
So when road crews are re-painting the lane dividers, it was due to someone that used chemicals that faded the original road lane paintings? And the roads were closed down when that someone used their chemicals on the road paintings?
The paint on the roadways do not fade away? It is chemicals that are the cause?
I am done entertaining your nonsense, and your attempts at changing the subject.
The comment that I initially made was about it being illegal to deface public property. That includes chalk. That is the law.
And when someone chalks up a public sidewalk with "Blacks and Jews are all scum", or "All Muslims are terrorists", or "White Power", etc, then remember, the chalk is temporary. So you will have no problem with them writing that filth on our public sidewalks. Right? If public sidewalks are an open canvas, then you are okay with whatever people write. See how that works out.
1
-
1
-
Bill Gates spews misinformation, because Bill Gates lives in a bubble. He lives in fantasy land.
You will never bump in to Bill Gates, and strike up a conversation.
Bill Gates has an inner circle of people, and those are the only people that he interacts with.
When you are the man in charge, and you are worth untold $billions, then whatever you say, the lemmings that are around you will always nod in agreement, and you will believe those lemmings when they give you bad information, driven by a leftist agenda. And since Bill Gates is a leftist, it takes little effort for his leftist, inner-circle, lemmings to convince him that their misinformation is supposedly reality.
That could be true for Elon Musk. But Musk is not a leftist (for the most part) and as you can see, Musk gets around. He has down-to-Earth conversations with all types of people. He listens to all points of view. It seems as if Musk remains humble and wants to be liked, and is open-minded. Not so with Bill Gates.
1
-
1
-
1
-
@3:40 "No one making under $400K will see their federal taxes go up, period"
That was a bold-face lie.
Here is his Treasury Secretary, Janet Yellen, re-wording (re-defining) Biden's words:
https://www.youtube.com/watch?v=tDXY9CVKSxc
(skip to the 3:08 time mark for the above link to get right to Yellen's edict)
And watch Yellen struggle to get her words out. She knows that she is dropping a bomb, and she gave a "Ya know", with a stutter, and then a visible 'gulp', immediately before dropping the "households" bomb.
Not yet convinced?
Skip to the 3:53 time mark, for the above link.
Where is this being covered in the news?
Forbes clearly knows what Yellen said, and they leave it out of this video, which is all about that exact topic.
This channel is named "Forbes Breaking News", and yet they do not break the news that Biden lied, over and over and over.
Yet another "You can keep your plan and keep your doctor" lie.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
This is all very convenient. But Google is the #1 spyware company in the history of the world.
There is no way I trust them, no matter how brilliantly they design software packages.
When you add on a browser extension, it makes tracking your on-line activities much easier for Google (keeping your browser as vanilla as it was when you installed it makes you more of a mix in the crowd).
100% of your remote access activity is funneled through Google's servers.
Google has 100%, in the clear, access to everything you are doing.
Your connection to Google's servers is encrypted. But once your data arrives a Google, they decrypt it, and then re-encrypt it to send the data on its way to the other end-point.
That is not end-to-end encryption.
It is unlikely that anyone is sitting down at Google and watching what you are doing. But they can.
And what if they determine that you are Madonna, or Hillary, or Trump Jr., etc? Or what if you are a governor, senator, Biden's chief of staff, a movie star? Well, if you were an executive at Google, and you can watch any of the above people's on-line activities as easily as watching TV, could you resist?
And even if no one at Google is watching, they can easily identify people of interest, and record 100% of their on-line remote access activities, and click through it at their convenience.
And what if you are currently a nobody, and one day become a person of national interest? Will Google have recordings of your remote access activities? They might, if they save everyone's activities. And they can. They have the resources. And then they will have the goods on anyone rising in the world.
This is not paranoia. Google makes its oceans of $$ from spying. They do not offer this remote control software for free, and devote huge computer rooms full of servers, at the cost of $millions per year in hardware, maintenance, A/C cooling, huge electric bills, etc, because they are doing the lord's work.
Remember that all of the security, one-step, or two-step, with yubico keys, with unbreakable pass-phrases, etc... it all gets decrypted when it reaches Google's servers, and re-encrypted to continue to the other end point. Google is acting as a proxy service. 100% of your trust is with the personnel at Google, who can see everything (not every employee -- but those with enough clout can see everything).
It is illegal for government officials to use this service for classified activities. Why? Because Google can see it all.
If you are doing things of no interest to anyone, then this service is a great option. Otherwise, the above applies to you.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
This is why people should protect their personal data with VeraCrypt.
It is free, open source, on-the-fly, extremely strong encryption software that runs on Windows, Linux, and IOS platforms.
Once set up, it is simple to use, and will be completely transparent to the user, including seeing no performance hit.
The only weakness is human weakness, when humans use dumb, crackable passwords.
VeraCrypt is so advanced, that even if you are forced to reveal your password, it can still hold your private data in such a way that no one can detect it (a "hidden container" feature). But you have to set that up. It is not difficult. And once set up, it is easy to use.
Of course, no one should have to deal with this, because our government tramples on our rights. But VeraCrypt is an option -- use it or don't use it. It is available as desired.
1
-
Reputable ISPs should work diligently to block users that use their service to send out mass mailings, that were not requested by the recipients.
If an ISP does not care, and allows their service to be abused by spammers, then there should be some penalty for them to pay.
Perhaps fining them would be unconstitutional, if they are a privately owned business? So that option would not be proper.
But at what point should a government entity step in, if an ISP is allowing billions and billions of spam messages to originate from their service? At what point does the level of spam become a public nuisance issue?
Or, at what point does the ocean of spam start becoming a denial of service issue for recipients that are inundated with spam, taking up their valuable time to keep marking messages as spam, and keep wading through tons of spam, to find actual, important e-mail messages?
And how many mistakes are made by end-users, when they inadvertently send the wrong e-mail message to their spam folder. It it was a very important e-mail message, that could cause the user big problems.
And what about the non savvy internet users?
Not everyone is bright. Countless people have the on-set of mental issues that come with age, etc.
Are they supposed to be expected to know what to mark as spam, and are they expected to know how to mark it as spam?
It is easy for us. But walk a day in someone's shoes that can barely control their mouse, and decide whether or not a "who cares" ISP should have some culpability in doing little or nothing to stop the abuse on their systems.
It would be great if a reputable, trusted organization would publish a rating system on ISPs that care and that do not care, and the public would factor that in to whether or not they sign up with such services. The public should not patronize such "who cares" ISPs. Alas, the public will just go with whichever service is least expensive.
Or, if reputable ISPs simply blocked 100% of all traffic from abusive ISPs, that would (mostly) help. Of course, that would cause problems for some folks.
This is a tough problem to solve. But just marking one message after another as spam, is not a complete solution. And even if you do mark spam as spam, that does not stop the spam from being sent out and clogging the public networks. All it means it that your e-mail client does not put that spam message in your inbox.
1
-
1
-
David Johnson never had racial issues, until Hasbro told him that he and his colleagues had racial problems.
There was an episode of South Park where there was contention over their flag. The main child characters saw nothing wrong with the flag. But many adults took issue with the flag, including the character "Chef".
It turned out, as Chef put it, that the children were so non-racist, that they did not recognize the racial component in the flag -- that is, until the adults made an issue out of it.
The analogy is not exactly on point, because the flag was a problem. But the point is that our host, and others at Hasbro, had no racial animus, and race was a zero in their work and time spent on the job, until Hasbro gas lit their employees.
Hasbro took a smooth operation, with employees focused on their jobs, and stirred everyone up.
1
-
One additional step:
After disputing Spotify's charges, switch to a different streaming service.
qobuz, overall, has the best sound quality -- if that matters to you.
Also note that even if your disputed charges do not get decided in your favor, VISA (and others) charge the vendor (in this case, Spotify) a hefty fee. I believe that it is $36, but I am not certain.
So your disputes will cost Spotify, no matter what the outcome. And since (hopefully) thousands of you will file disputes, the credit card companies will probably see it in your favor, when they see so many people having issues with Spotify.
Just call the number on the back of your credit card, and have yourself transferred to their dispute department (they might label is as reporting a fraudulent charge).. Try to have you statement in front of you, because they will ask you for the date of the transaction, as well as the amount of the transaction.
Thank you Louis, for inspiring people to do the right thing.
1
-
In February of 2021, I had Micro Center build me a system with a 500 GB SSD boot drive. However, they mistakenly installed a 250 GB SSD boot drive. I found out when I got home and installed Windows.
Well, I needed to use the computer, and so I did.
A week later, I had time to return the SSD to them, and replace it with the right one.
At home, I had no way to erase the 250 GB SSD boot drive. I had no other drives to boot from.
When I got to Micro Center, I borrowed one of their NVMe, M.2 card readers, and plugged it into my laptop's USB port. Not having a good solution in mind, I first formatted the drive (the long way), then copied music files (the only files I had that took up 100+ GB of space), over and over to different directories to the drive, until it had no more space, and then formatted it, again.
Did that make the original files unreadable? Probably. But who knows?
I had used the drive for only 1 week, so I knew what I put on it. I had only one sensitive file, and no good way (that I knew of) to overwrite that single file.
It has been over a year, and I still wonder if anyone tried or was able to recover anything from my returned SSD? I would wager that no one cared enough to spend time to try, especially since they knew that I overwrote everything (or did that inspire them to try?). The question is how recoverable are overwritten files on an SSD? The way they are stored is not the same as a traditional hard drive.
That they installed the wrong SSD caused me a good deal of inconvenience. Besides the amount of time spent re-installing Windows and my applications on the correct SSD, and the time spent sitting there waiting for all of the overwriting to complete on the wrong SSD, and waiting my turn for them to assist me (you can't just walk up and have them hand you an M.2 card reader), I had a 45 minute drive in each direction. To their credit, they were professional when it was my turn and they were helpful.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@16:11 "...records are objectively pretty bad at isolating the two channels."
Records are not perfect at isolating the two channels. That is a far cry from being bad at isolating the two channels.
Apparently, our host has never used anything other than mass produced,, low end, department store turntables, tone-arms, and cartridges.
He has likely never professionally dialed in his tone-arm and cartridge alignment vectors.
On a professionally set-up, high-end stereo, the isolation between the two channels is outstanding (not "pretty bad").
Our host is well informed (for the most part). But he made the above statement, based on his personal experience with playing records, and based on his lack of experience playing records on a professionally set-up, high-end turntable.
He was using a Sony turntable. That is a decent turntable. However, it is like using a Toyota Corolla to judge how a Ferrari LaFerrari would perform (and never even having heard of the Ferrari brand, or any other super-car brand -- never knowing about anything that performs better than a Corolla).
He needs to use an AMG, or Clearaudio, VPI, or one of the other high-end, highly regarded turntable brands (and a model from their higher tier of their offerings).
The same goes for tone-arms and cartridges.
And he would need to dial in, with precision, the following settings:
-- the effective length of the tone-arm
-- the cartridge's weight
-- the vertical tracking alignment / rake angle
-- the anti-skating
-- the overhang
-- the offset
-- the zenith angle
-- the cartridge's azimuth
If any of the above are not set correctly, it will result in a less than stellar listening experience, and I am pretty sure that our host has never dialed the above in, or has even heard about most of the above settings.
The above is how you get outstanding stereo separation, quiet surface noise, and great imaging -- assuming the pressing is good (most are not good (that's another can of worms) -- and is another reason our host knocked vinyl's stereo separation).
1
-
Whatever software you are using that claims that the drive has 80% life left is basing that on how much you wrote to the drive, and not on it actually knowing how much life is remaining on the drive.
Manufacturers have TBW (terabytes written) values that they publish for their drives.
I believe that, based on that value, your health-check software sees how close you are to hitting that number, and reports back.
At some point, it might read "critical". But even at that point, you probably have 99% of the drive's real life expectancy available.
Manufacturers wildly underestimate how long their drives will last. My guess for why they do so is:
1) They will cover you for warranty replacement, if you did not hit their TBW value.
2) A percentage of people get nervous when they run the health-check software, and they purchase another drive.
3) They might not know how long their SSD will last. It might take them years of non-stop writing to finally wear out a drive, and they will not wait that long to release the drive for sale to the public.
I have 4 NVMe SSD drives that I have been writing to for 15 months, 24/7/365, without rest, and none of them show any signs of trouble.
But as our hosts often advises, make sure you have a back-up.
Even if your SSD outlives you (and it probably will), you can still have an accident that corrupts the data on the drive.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
Unless you are engaging in speech that calls for illegal actions (saying that someone or some people should be murdered, or saying to rape someone, yelling fire in a movie theater, etc), then no speech should be banned.
Free speech is free speech.
Even if it is hate speech, it is free speech.
When anyone starts labeling speech as "hate speech", and banning it, then that person is violating the first amendment to our constitution. And that leads to yet more abuse, because they will label anything that they disagree with as "hate speech".
The key point of the first amendment is to never ban speech, in order to prevent exactly what is happening today. People are violating the first amendment by censoring speech that they do not agree with.
I do not like many types of speech that promote degenerate values. But we must never ban it. The bans never end, and it will lead to imprisonment for political speech, and worse if you piss off people in power.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
A couple of years ago, I was using a 2TB NVMe based d: drive, for temporary storage. I ran into a space issue, that required 2.1 TB of free space. At the time, 4TB NVMe drives were very expensive, and none (that I knew of) were as fast as the Samsung 980 Pro that I was using. At the time, Samsung did not make a 4TB 980 Pro (still doesn't -- but the 990 Pro does).
Yes, other NVMe drives are nearly as fast (maybe faster) as Samsung's 980 Pro, but only until their cache runs out. Then, most of them take major performance hits. The 980 Pro keeps running, at nearly full speed, beyond its cache -- and I needed that constant speed.
I was about to check if my motherboard had built-in RAID, when I discovered that I could do the same via Windows Disk Management.
And just as our host said, Windows told me that I have to change the partition to Dynamic.
In addition to now having a 4TB (2TB x 2) partition, I got twice the storage speed. And for my use, that was welcome. It was a temp drive for Chia crypt-o mining.
@7:21 "You end up with 3 disks."
You end up with a minimum of 3 disks. RAID 5 can have many more drives. I do not know what the limit is, or if it is based on the controller (hardware based) or Windows (software based). But my guess is that you can have dozens of drives in a RAID 5 array.
1
-
1
-
1
-
1
-
I know no one, and have never heard of anyone, that has worn out their SSD. Some fail, but not because they were worn out from writes.
One type of crypto mining hammers away at SSDs, relentlessly, 24/7/365. It is called "Chia".
Read the comments in the forums, and you will find that no one has killed their SSD. And they have far exceed the manufacturer's TBW value by 10x or more.
Some have reported that their Samsung Magician software shows that their SSD's health is "Critical".
And yet they have no performance issues, and continue to use the SSD for months, hammering away at the drive with the Chia processing.
I suspect that the "Critical" message is based on them exceeding the TBW value of the drive, and that the software does not actually check the health of the drive.
If your SSD fails, it is probably due to an issue that is unrelated to how much data you have written to it. Perhaps your computer took an electrical surge? Or your computer's fan failed and you are cooking your SSD? Or a manufacturer's defect?
1
-
1
-
1
-
1
-
1
-
1 of 3)
Our host touched on the cost of purchasing a license key. That extends to upgrade keys, too.
I believe that Microsoft charges $199 to upgrade from Windows 10 Home to Windows 10 Pro. And considering that they announced the retirement date for version 10, it is somewhat abusive to charge such an upgrade price.
I want to use Remote Desktop's server on my Home version of Windows 10. Well, forget it, because you have to upgrade to the Pro version for Remote Desktop server to be enabled. I will not spend $199 to upgrade to Pro for that functionality.
2 of 3)
If you want Microsoft Office installed on your computer, it is too expensive -- especially if you want it to include Outlook.
I used to use Outlook 2007. It was an amazing e-mail client. But last I checked (a year or so ago), it costs hundreds to install a current Office package that includes Outlook. And that is for a single computer. What if you have two or three (or more) computers?
Yes, they offer Office 365. But that is a rental, and you might have issues if your internet connection is down (computer can't phone home for permission). And there are back-end computers that are not internet facing, that need Office functionality. So you would want to install (not rent) the Office suite. But that is only for people that have a few $hundred laying around, for each computer.
3 of 3)
Offer a non bloated version -- or, an official tool to completely remove all bloatware that Microsoft includes, by default, with Windows.
You would think that Microsoft would be ashamed at having a reputation, similar to a web site that puts ads in your face and pop-ups in your face. But Microsoft still includes rubbish apps when you click on the start menu (even if those apps are not officially installed, they are there and they are trying to get your attention to click on them and install them, which is annoying and tacky).
1
-
1
-
1
-
1
-
1
-
1
-
1
-
Disney will not drop diversity, equity, and inclusion. They will only dial it back.
They will still send radical leftist messages in their releases, such a BLM signs in the background, and pride flags here and there, and gender dialog, etc.
They will take on a subtle approach, rather than full on woke.
That way, their releases will be more appealing to the public (especially to those who do not spot the messaging), and they will get a portion of the public used to seeing those messages, without really focusing on them.
Disney's plan will likely be to slowly get the public to see the woke messaging as being normal (when it is not normal).
The radical left will never stop being the radical left. They will never stop. The way to make them stop is to squash them financially, and to squash them at the voting booth.
Leaving them in positions of power will guarantee their continued degeneracy with their releases.
1
-
1
-
1
-
1
-
1
-
@0:00 "An undocument immigrant, living in Florida..."
@CBS News starts right off, with a lie.
The government has loads of documentation on her, from legal notices, to taxes, children in public school, credit cards, insurance, etc.
@2:20 "Alfredo's undocumented status..."
Another lie.
The man owns a business, and @NBC4 tells us that our government has no documents on him.
@3:32 "...and my people, are not welcome"
There are over 1,000,000 people in the USA, from Haiti. They are all welcome, because they came here, legally.
@4:18 "More than 60 migrants..."
A lie by omission.
They are 60 illegal migrants.
@5:25 "...caught the migrants in the villages"
A lie by omission.
...caught the illegal migrants in the villages.
Fake news and more fake news. They refuse to report news without lying.
1
-
1
-
1
-
1
-
Fiber optic cables provide galvanic isolation that RCA cables do not -- and it matters. Why?
The host of this video correctly states that either the digital data gets there or it does not. That is true. But as our courts say when you take the witness stand "Do you swear to tell the truth, the whole truth, and nothing but the truth?" In this case, we heard the truth, but not the whole truth.
Line nose that travels through RCA cables will accompany the digital signal into the DAC. That line noise will be picked up by the analog section of the DAC.
Yes, CD players have an analog section. CD players create sound from scratch. They create sound from reading the zeros and ones and making it into an analog sound that eventually makes it to your speakers.
So RCA cables (especially crappy ones) are a conduit for electrical noise that breach your CD player's (your DAC's) internal components. And line noise is bad for sound reproduction.
You might be thinking "I hear no line noise". Well, if you took steps to eliminate the line noise, you would notice an improvement in sound quality. The music would reveal inky black backgrounds.
There is low-fi stereo equipment.
There is mid-fi stereo equipment.
There is high-fi stereo equipment.
Each of the above has tiers.
All of the equipment that the host used in this video is "low-fi", and the lower end of low-fi.
That is why, to his ear, cables make no difference.
The equipment he is using is equivalent to the testing equipment used in a lab.
If the lab is using equipment that is not suited to the test at hand, you will not obtain meaningful test results.
Such is the case when this host compares poor cables using poor equipment.
1
-
1
-
1
-
1
-
Google is the biggest spyware company in the history of our planet. Sure, they make amazing applications. But that is unrelated to them being a HUGE spyware company.
Ferrari makes amazing cars. But you wouldn't let them put a camera over your toilet.
When you upload your data to Google's cloud service, you are handing them your data, for them to scan, and for them to compile a profile on you, etc.
But Google says that it is encrypted, right?
Yes. But that encryption is to keep non Google people from seeing your data. It is not for Google to not see your data.
When it comes to encryption, the only safe way to encrypt your files is for you, personally, on your own computer, to encrypt your files.
Think about it. If Google is encrypting your files, then Google has your files "in the clear", which is why they encrypt them. But before Google encrypts your files, do you trust them to not first make copies, in the clear, for their own business purposes?
But Google says that my connection between them and me is encrypted.
Correct. But that is used to keep non Google people from seeing your data, while you are sending it to Google. Once it gets to Google, it is 100% in the clear, for them to see and use as easily as you do on your own computer. After they do whatever it is they do with your uploaded files, they then encrypt your files. And Google can have a master key to your files. It is simple to have more than one password to unlock encrypted files. And Google, a huge tech company, knows that.
Unless you have nothing personal that you care about that you upload to Google, or unless you encrypt your files before you upload them to Google, you are nuts to share you personal files with Google, Microsoft, or any cloud storage service.
You are putting your personal files on other people's computers. Those people are complete strangers. You have zero knowledge of who they are.
Lastly, if you read the fine print in whatever legal agreements you are required to agree to, you will see that any data that you upload to Google becomes owned by Google.
You will have to search every document that you had to agree to, including any links in those documents, etc. And you have to catch the slimy legalese language they they use. They do not come right out and say that they own your data.
They own your data. They receive your data in the clear. They are the biggest spyware company on the planet. They are complete strangers.
And yet people are thrilled to hand them their personal data.
1
-
1
-
1
-
As it pertains to which format (digital or vinyl) is superior, it is six on one hand, and a half dozen on the other hand.
Which is a better car? A Rolls Royce or a Ferrari?
Both are great. Both can do things the other cannot.
Digital has timing issues, such as jitter and filter aliasing.
Jitter is the kryptonite of digital. When you manage to minimize it, the music blossoms. So most of the public has more of it than they realize -- because they have never heard digital that professionally controls it. In fact, digital timing issues are introduced into digital masters, due to specific hardware issues with the analog-to-digital-converter that made the digital master (something that the MQA process corrects, resulting in (digitally corrected )files that sound better than the flawed digital masters).
Analog has issues with the physical quality control and production of the medium.
No two records have the exact same sound quality, and side 1 and side 2 (of the same record) can, and often do, have significant difference in sound quality.
I have had the good fortune to hear both formats on very high end audio equipment, that was professionally matched, and professional installed, with room treatments, etc (the holy grail -- dream system).
On such an audio system, you will not only hear everything that is great about the recording, you will also hear everything that is wrong with the recording.
So when the studio (or record label) did anything less than an amazing job, it was noticeable -- but would usually not be audible on a department store stereo.
When the studio (or record label) did a great job, the realism was 3D to the point of being spooky (the band was in front of you, and you could see (with your ears) where each person was standing -- even though your eyes did not see them).
Digital wins for convenience, and for getting great sound at a fraction of the cost, as compared to a high-end turntable (and cartridge, and tone-arm, and phono-amp).
When you are prepared to mortgage your home, and have a dream analog system professionally set up, then analog, in my experience, sounds more realistic (but this is very, very, difficult to achieve).
One problem that vinyl records suffer from, is that the vast majority of them have, at best, mediocre sound. You might have to buy dozens of copies, of the same album, that were stamped at different geographical locations, before you find just one side of one album that is a gem.
The vast majority of the public will never hear a "gem" vinyl recording. And many that happen, by luck, to own one, are not likely to have the professional system to reap the benefits of the pressing. And, lastly, most folks do not care, which is why these rare pressings are routinely found on eBay (but you have to buy it, clean it, and play it, on a very good system, to confirm it).
Cheers!
1
-
1
-
1
-
1
-
1
-
@3:23
That happens to me, once or twice a year.
I use a wireless mouse, that connects via a USB dongle. Eventually, the double-A battery dies, and the mouse just freezes. Not knowing if I might be in the middle of something important and timely, I also keep a wired USB mouse connected. So in a pinch, I can just grab that wired mouse and everything is fine. I do not have to rush to get a replacement battery.
Well, once or twice a year, my mouse pointer just starts taking a trip across my screen, and I can't stop it. The first that that it happened, I was a bit alarmed.
The fix was to unplug the wired mouse. Viola! No more floating mouse. Upon plugging that mouse back in, it works normally.
It could be dust, as our host mentioned. But I think that the mouse driver just has a bug that surfaces once or twice a year.
I am glad that our host mentioned that issue, because it feels better when you are not alone (although I never did a web search to see if it is a common issue).
1
-
@3:01 "That they (the fake news outlets) don't understand how he (President Trump) plays with language and uses sarcasm and everything else."
Dave, I respectfully write that you do not understand that Bill Ackman is a habitual liar.
Of course Ackman understands what President Trump was conveying.
But Ackman is a degenerate propagandist. So he takes anything that President Trump says and tries to redefine it. He will quote something that President Trump said, without quoting it all.
Dave, please do not assume stupidity on the part of these degenerate hosts. Yes, some of them are clueless (like on The View). But they, too, are liars.
Ackman clearly knows what President Trump said, and what President Trump meant, and yet Ackman lies by omission and lies by trying to twist the meaning of what President Trump said.
Again, do not assume ignorance on the part of Ackman and his minions. He uses his skills for propaganda.
Not all evil people are stupid. Some, like Ackman, are very smart, and get to host shows on TV.
1
-
Two items:
1) Approximately 6 or 7 years ago, I was using Webroot. After the subscription ran out, I decided not to renew my subscription.
Well, Webroot kept nagging, and nagging, and nagging, for me to pay for a new subscription.
The others might do the same. So be prepared for the above, if you pay for a subscription, and later decide not to renew your subscription.
2) As tedious as it is to read the tortured language in the agreements that you must approve upon using 3rd party anti-virus tools, read everything, including every link that is in the agreements.
You will eventually come across language (if you can decipher it) that tells you that you are giving them (the anti-virus company) free and unfettered access to 100% of the files on your computer, and 100% of what is in RAM. That is expected, because the tool needs to scan everything. But the language goes on to read that they can do anything that they want with your data.
They will word it to have you connect imaginary dots that it is to improve their service. But their crafty language gives them permission to do absolutely anything with your data -- any of your data.
Today, big tech companies harvest and harvest and harvest your data. Microsoft does it, too. But you are already running Windows. So ask yourself if you really want to share your life with yet another big tech company by not using Windows Defender, in favor of some 3rd party anti-virus company.
1
-
1
-
1
-
1
-
Most laptops in the $400 - $600 range will have room for an additional RAM module.
Many laptops have a fixed amount of RAM soldered into their motherboard, making that specific RAM permanent. But you will probably have an open slot to slip in an additional RAM chip, and perhaps a 16 GB RAM chip, which, combined with whatever your laptop already has installed, will be enough for most folks.
My three year old Acer laptop came with 4 GB of RAM. I installed a 16 GB chip, and now the laptop runs with 20 GB of RAM.
That is probably the easiest solution, and it will not break the bank -- especially if you add only another 4 GB or 8 GB. But even 16 GB RAM modules are not expensive (under $50). And you will have no configuration changes to make. Just install it, and you are done.
For more storage, a 1 TB NVMe drive will cost approximately $60, on the low end. You will have to clone the OS to that new drive, or just do a new OS installation.
For approximately $100 you can upgrade both the RAM and the storage. Note that low cost storage might be slower than the drive than comes with the laptop. Even if it is slower, you probably will not notice. You will have to check reviews if this is a concern.
Whichever laptops you have on your short list, make sure they can be upgraded as described above. I suspect that all will be upgradable.
The Sandisk Extreme will cost $100, and will be be less convenient than having the storage internal to your laptop.
1
-
1
-
1
-
1
-
Please consider making a video on backup software.
I would like to find software that has the following functionality:
-- Full and incremental backup.
-- Mount a backed up image, in order to peruse the files and optionally grab a copy of a file that is in the backup image.
-- Offers the creation of bootable media that will perform the backup, so that the backup software will not be required to be installed on every computer. I have computers where I do not want any non-essential 3rd party software. I do not want to get pop-ups, or reminders, or have it doing anything in the background (or even wonder what it might be doing), etc. I want it to do a backup, and that's it.
So bootable media, to backup those computers, would be ideal.
-- Password protect the backup image and encryption for the backup image (although I could work around this).
-- Compression for the backup image (not a must, but would be helpful).
-- Exclude files from being backed up. For example, I already have copies of my music files. I do not want backup software to waste a few hundred GB, by adding it to a backup image.
The closest I found was EaseUS, in their Home or Workstation editions.
A lifetime license is $79.95 (Home) and $89 (Workstation). That is worth it to me, if I the bootable WinPE media it creates will work on all of my computers. But if I have to have to install the software on every computer, and have each computer create bootable media specific to itself, then that is a non-starter (both in cost and my not wanting to install the software on some of the computers).
It just seems overly complicated to find a way to boot from a flash drive, and be able to do a backup on all computers -- followed by:
Being able to peruse an image on the one computer on which the backup software was installed.
1
-
@markanderson2904 Technically, True Image will allow you to mount your backup as a virtual drive. But there is a requirement, which is unacceptable to me.
You must be signed on as an administrator for that virtual drive mounting to work. If you are singed on as a standard user, then you cannot mount a virtual drive.
I never sign on as an administrator, unless there is something that will not work any other way, which has not occurred in years..
So when I am using my PC for my daily routines, and I want to mount an image, I can't.
Up until their 2013 version, when you went to mount an image from a backup, you were presented with the UAC prompt. You put in your admin password, and all was well.
Three years later, I purchased version 2016, and they broke it, as I described, above. And to my knowledge, they never fixed it.
I spent a good deal of time exchanging e-mail with Acronis, and then phone calls with Acronis. They sang and danced, which was not appreciated. It took a good deal of time to get them to admit that they broke it. It was nearing the end of the year 2016, and so they told me to purchase their 2017 version. And as you probably guessed, it was exactly the same issue. I should have challenged the cost of the 2017 purchase with my credit card company.
It would take a good amount of persuasion to convince me to purchasing anything from Acronis.
1
-
@markanderson2904 I used to use True Image. It did everything that I needed.
I first started using it in 2009 (I believe), and upgraded every other year. Alas, 2013 was the last year (might have been 2014 or 2015 -- not sure, never used those version), before they broke a key feature.
I skipped 2014 and 2015, and purchased 2016. Well, they broke the mounting of a backup image as a virtual drive feature.
The only way to mount a backup as a virtual drive, is to be logged in to your computer with an administrator account.
In 2013, as a standard user, when you mounted a backup as a virtual drive, you were presented with the User Account Control prompt, where you entered an admin password, and you were good to go. But in 2016, they handed that process off to a right-click Explorer menu. So if you are not signed in as an administrator, it will not work.
I tried using "runas", and tried starting explorer via an admin command prompt. None of it worked.
Since I login as a standard user, then I want to be able to mount backup images as a standard user. Version 2016 broke that.
I contacted their tech support, via e-mail. Eventually, I convinced them to call me. They conceded that they broke it. They told me that version 2017 (which just came out) should work. I was annoyed that I wasted money on version 2016, but I purchased version 2017. Well, it was still broke. They lied to me. Or they did not know, and since it was not their money, they took a guess.
They would not issue me a refund.
That was the last time I made an Acronis purchase.
I now use EaseUS Todo's "Workstation" version. It does everything that the Acronis version used to do.
1
-
1
-
He spewed off titles of bills, talking points, and a list of generalities.
Raise your hand if you can name one thing that his radical, leftist party did that improved anything.
Saying that his party passed "this or that" means zero, without the specifics of the wording contained withing the "this and that".
Radical leftists use titles, all the time, that are clown-world language. They call the Deficit Reduction Act with that name, even though it inflates deficit spending more than any other time in history.
They call lawless cities "sanctuary" cities, when they house countless fugitives from the law. So now "sanctuary" mean protecting criminals, instead of meaning protecting those being persecuted by their governments. "Fugitive" cities are called "sanctuary" cities in clown-world.
They call those breaking the law (burning down buildings, taking over city blocks, routinely blocking roads, etc) "protesters" and "activists". So what used to be standing on the sidewalk, holding up signs, making speeches, all done civilly and lawfully (known as protesting) has become any illegal activity. The constitutionally protected right to protest is now (according to Warnock and his radical leftist party) the right to break the law -- which is clown-world language for "protesting". The next time you get pulled over for speeding, tell the officer you were exercising your right to protest the climate by speeding. See how that goes.
Warnock is a keeper of the Washington swamp. There are those that live in the swamp (the countless government peons that do the bidding of Warnock and his ilk) and then there are the swamp keepers that rule over the swamp dwellers (Warnock, Schumer, Pelosi, Biden, AOC, Waters, Jeffries, Schiff, Lee, Jayapal, Nadler, etc).
Again, raise your hand if you can name one thing that Warnock said that helped anyone or helped our country. Do not name the title of some act you know nothing about. But name one thing that a typical American would understand. You can't. Because he said a mouth full of Washington, slimy used car salesman, mumbo jumbo, BS.
Warnock and the rest of his party's radical leftists are degenerates.
1
-
With a fast NVMe drive, RAID is not as important as it used to be, for home use.
With big businesses, they use RAID for nearly everything.
When they need hundreds of terabytes, or petabytes, to serve customer's needs, they are not going to find those capacities with SSDs.
And if such SSDs existed, they would be several times more expensive than high capacity spinning disks.
Also, when a business is serving customers, and downtime must be avoided at all costs, the business will use RAID 5 (or perhaps RAID 1). When you have a data center with thousands of hard drives, you will have one failing eveyr week or so. But with RAID 5 or RAID 1, you will have no down time.
And if you need the performance of an NVMe drive, and a capacity that exceeds today's NVMe drives (let's say 8 TB), then you can make a RAID of four 2 TB NVMe drives.
Yes, some 8 TB NVMe drives are available. But their speed sucks when you exceed their cache size. With 4 SLC or MLC based NVMe drives in a RAID 0, you will always have full speed.
1
-
1
-
1
-
1
-
@1:43 "You're not supposed to chase them. If you chase them, and shoot them, for example, in the back, that is unlawful."
That is absurd.
In the military, when the enemy is retreating, you keep firing.
When the enemy is surrendering, then you stop shooting, but keep them at gun-point.
It is no different, in your home.
You do not wait for the home invaders to spin around and shoot you.
You do not wait for the home invader's accomplices to re-group and kill you.
What that human said @1:43 might be California law, but that California law is 100% unconstitutional.
That human, @1:43, will not attend your funeral, when the home invader circles and kills you. That human, @1:43, will not give his condolences to your family, when you wind up dead.
1
-
1
-
1
-
1
-
Beware of change, especially when it is hidden or obfuscated.
For example:
When you buy a new car, that comes with heated seats... well... get ready to not be able to use your heated seats.
BMW considers heated seats to be a "service". You must subscribe. You will be renting your heated seats. So if you do not keep paying your subscription, your heated seats will be disabled. You own those heated seats, but the personnel at car company controls what you own. That's a twist on ownership.
So the car manufacturer made a change, and we are expected to just go along with it?
Apple's iPhone 16 is promoting "Apple Intelligence". Well, that is a change, and Apple makes it sound like a must have upgrade.
What Apple does not tell you is that that "Intelligence" watches your eyes, to see which part of your screen you are focused on. It tracks your whereabouts, even when you power the iPhone off. It can (so it probably does) scan everything on your screen, before you take an action.
For example, that text message that you sent via the Signal App, which is end-to-end encryption... well... your iPhone 16 evaluated your message, effectively defeating your secure connection and invading your privacy.
Your photos... well... the model 16 scans your photos, and knows what is in your photos. It is not a feature that you have any choice in using, and it can notify anyone it chooses if its scan deems your photo qualifies. This will, of course, never be abused.
It does the above with an included neural processing unit chip.
Three letter government agencies will no longer have to unlock a model 16 (or any other Apple devices that will have "Apple Intelligence").
Just go along to get along with Apple's changes?
Roku's TV forces you, after the sale, to accept their agreement, or your Roku TV will not work (not even its inputs where you would connect a DVD player, etc). That agreement disallows you to sue Roku -- and you must agree to it, to use the TV, after you brought it home. If it catches on fire, and burns down your home, you agreed to Roku's terms -- you may not sue Roku.
Now, some Asus motherboards will not allow you to change the boot-loader.
Just accept the change?
Amazon charges extra to avoid ads, after you purchased their Echo 8, digital picture frame.
So you purchased the Echo 8, were using it for however long, and then Amazon starts showing ads.
Just accept the change?
Peloton's internet connected treadmills will not allow second-hand owners to use their purchase from the original owner, unless the second-hand owner pays Pleoton a fee.
How many second-hand owners knew about that when they bought their used Peloton treadmill?
Change is inevitable. Just accept it?
None of the above were broken. Yet all had changes. Were any of the above changes done in your favor?
Change could be good, and it could be bad. Never blindly accept the bad.
1
-
@0:14 "...signatures has been verified"
Why were they verified?
Newsom's policy position, as well as his radical leftist's party's position, is no verification for voting.
-- Show up and vote -- no questions asked.
-- Mail in your vote -- no questions asked.
-- Vote early -- no questions asked.
-- Vote late -- no questions asked.
@0:58 "Who knows (why people say things)" -- Answer:
Cuomo's accusers know.
Cuomo spewed a list of reasons for why people accused him of sexual assault and sending infected Covid-19 patients into nursing homes.
Intentionally omitted from his list was:
"When numerous people, mostly from your own party, all accuse you of sexual assault, and when government records show that you forced nursing homes to take Covid-19 patients, it is the truth".
That's right. He left out from his list that when numerous, responsible, credible, people make the same accusation, they are telling the truth.
Telling the "truth" was left off of his list.
1
-
1
-
1
-
1
-
Since anyone can enter any locker room, then what is the point of the locker room?
Just have everyone dress and undress right in the classroom, or right in they gymnasium.
What is the point of them leaving the gymnasium, to go to a locker room, when the exact same people are going from point "A" to point "B"?
Put urinals in the classrooms and in the hallways. No need for doors.
I am not professing that the above should happen. Rather, I am pointing out the absurdity of the radical leftist, child sex predator agenda.
Their agenda is 1) to find ways of engaging children in anything that involves sex, to make it acceptable to have sex with children, and 2) take control away from parents and families, and have the degenerate government officials dictate how your children are raised.
-- I feel sorry for the children, who are suffering, due to degenerate government officials.
-- I feel sorry for normal parents, who have to deal with this deplorable situation, due to degenerate, child sex predator government officials.
For the parents that vote Democrat, you got what you voted for (there are no Republicans doing the above).
And to show the extent of the sickness with many Democrat voters... even the ones that are fighting against the above, they will vote in the same Democrat, degenerate, child sex predators -- again.
If Jeffrey Epstein was the governor of California, Democrats would re-elect him.
1
-
@0:38 "...they are both assessed for whether they have any symptoms"
That means zero.
Psaski said nothing about the qualifications of who is doing the "assessing".
Psaski said nothing about what qualifies as a symptom.
@0:44 "...the intention is for them to be quarantined"
And my intention is to win the lottery, twice.
When Psaski says that (Biden's) "intentions" are [fill in the blank], that translates to:
"Gullible people will mistakenly connect non-existing dots, and conclude that we actually act on our intentions"
"We have zero intentions to check any illegal aliens, and it is easy to lie to America and tell them that we have 'intentions', when we really have no 'intentions'"
@0:47 "They're not intending to stay here for a lengthy period of time"
Does Psaski expect us to believe that the endless parade of people, entering our country illegally, and risking their lives in doing so... does Psaski expect us to believe that they are here for a vacation?
And does Psaski expect us to believe that even if we believe her lie (that they are not intending to stay here for a lengthy period of time), does she expect us to believe that Covid-19 pauses for their so-called "temporary" stay?
Folks, these are not mistakes.
These are not oversights.
What President* Biden and Psaski are doing is planned, intentional, and deliberate.
They expect the public to believe that the crisis at the border is an overload of vacationers, who will not spread Covid-19, because they are vacationers.
President* Biden and Psaski are degenerates. They are the swamp.
1
-
@0:57
Fox10 is either lying, or incompetent. Why?
They claimed that their graphic was generated by the "Associated Press". No where in that graphic, no where on that screen, no where in that news program was there a mention of the "Associated Press".
Fox10 put it on their (Fox10) screen, crediting no one else for what, they (Fox10) put on their (Fox10) screen.
Fox10 put it on their (Fox10) screen. Fox10 owns it.
To come out later, and point their finger at a 3rd party, when they (Fox10) never mentioned a 3rd party until they (Fox10) were caught lying, is either amateurish, incompetent, or fake (lying) news.
Fox10 got busted, and they are trying to BS their way out of getting caught.
1
-
I recently purchased a new, pre-built Windows 11 computer, to replace my ancient, first generation i7 computer.
I want to keep my new computer clean, and not have my social media activities run alongside my banking activities, and alongside my gaming activities, and alongside my spreadsheets and word processing, etc. I have little trust in web sites tracking and sharing, and software doing the same or similar.
The closest I have come to figuring out a way to keep everything in their own containers is by using the Qubes distro (which I have read up on, but never used it (never had a spare computer to try it). If I were to use Qubes, that would mean losing my activated Windows 11 OS. And if I end up not liking Qubes, that would ruin my day.
The next candidate to reach my goal is Oracle's Virtual Box. I have been using it. It is easy. But I am probably losing a fair amount of performance going through a hypervisor.
I have watched Proxmox videos, and it looked too complicated for me.
Now, seeing your video, I find that Docker might be my holy grail solution. But I have never used Docker, and what you showed in this video in under 10 minutes made my brain hurt. I understood everything that you did. But it was like watching a doctor perform surgery. I still would not be able to perform the steps.
I can see my missing one line in a Docker config file, or some setting somewhere, and spending 3 days trying to figure out what is wrong.
Is Docker user friendly? Does Docker have a steep learning curve?
Also, can I run multiple Windows 11 instances? It would be nice to be able to easily switch from one to another, without having to repeatedly start and stop the containers. For example, I could leave one Windows 11 instance running for testing software, without having to worry about it causing any problems anywhere outside of that specific Docker instance.
My goal is to be able to use my single, new computer and have it behave like it is 4 or 5 separate computers, where what is happening in one Windows 11 instance will have no effect (process wise and cookie wise and services wise, etc) to the other instances (similar to how Qubes compartmentalizes each guest machine).
I have 64GB of RAM, and will happily double it if multiple Docker Windows instances chew up too much RAM.
Lastly, one key feature that I love with Virtual Box is that I can take a snapshot of a VM (even while it is running), and return to that snapshot if something goes awry. For example, if a Windows 11 instance gets hit with ransomware, then I would like to pull the plug on that container, and restore it to a saved snapshot taken from when all was good. Virtual Box makes that easy.
And I can easily make copies of my Virtual Box VMs. Can that be done with Docker running Windows instances?
Thanks in advance for any help.
1
-
An e-bike is a motorcycle.
An e-bike has a motor. Ergo, it is a motorcycle.
An e-bike is basically a moped that is powered by a battery.
Like an e-bike, a Tesla Model 3 is a motor vehicle, just as an e-bike is a motor vehicle.
As to the risks that e-bike drivers take... it is the way of the world of law breakers. All law breakers, that intentionally break the law, do so for personal gain. It is cheating.
Their efforts to increase their income should not come at the expense of anyone else's safety.
I understand that the food delivery e-bikers work their butts off. But they still should not put anyone else in danger.
If a job cannot be done, without breaking the law, then that job should not be what you do to earn a living.
Our host appears to be in good shape. So rather than using an e-bike, he should use a bike (i.e., a bicycle). His legs should be his motor, and it is a fantastic cardiovascular workout -- super healthy.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
I respectfully disagree that sites do not care about who you are, when it comes to tracking your visits.
The entire point of them tracking you is that it pays off, big time, with advertising and other ways to raise oceans of cash.
What they did is automate the tracking. But they can pull up a report on you, specifically, and know just about every site that you visited, and the dates and times of each visit.
If I asked you to allow me to have a list of every site that you have visited, you would likely wonder if I am a nut, or a pervert, or up to some scam, etc.
Yet, we allow other complete strangers, employed by big tech companies, to do just that.
Your information is being sold. Perhaps your name is not asked for, personally. But your name is in the list.
What if you become a person of interest?
What if you decide to run for a city council seat, or mayor? Well, the executives at big tech companies will know more about you than you know about you.
Heaven knows what heads of state, of adversarial foreign countries have on our own high-ranking government officials, thanks to google and the rest.
Folks, we are being spied on. Most folks have no idea how intrusive it is, because the spying happens without our knowledge.
We even have police departments towing 100% innocent Tesla owner's cars, because those vehicles have such good video evidence of crimes. You go out for a drive, and your Tesla is gone. The police took it, because they believe it to be a witness to something you have nothing to do with.
We have Roku TVs refusing to function, until you accept their on-line spying and arbitration agreement. The TV disables all inputs, until you click agree (and there is nothing else to click on).
We have huge companies taking your subscription money, with a simplistic click to sign up. But to cancel your subscription, you have to send a notarized, certified letter (postal mail) to get them to cancel your subscription (so a trip to your notary and a trip to your post office).
It is why virtual credit cards are gaining popularity, in order to kill your subscription without being forced to jump through hoops.
So it is not a stretch to see how cookies and the rest are being wildly abused. There is a reason for TOR network, and TAILs OS, Qubes OS, Parrot OS's anonsurf feature, etc.
Do not accept being spied upon. Do not be a frog in water with the burner turned up.
If you were transported back to the 1990s, with a dial-up modem and Windows 95, and someone told you that soon everything you are doing would be tracked, you would be appalled. But bring it on gradually, year after year, and we shrug our shoulders and accept it?
You can avoid a lot of tracking with virtual machines.
Do your banking with one virtual machine. Do your social media with a different virtual machine (perhaps even a separate machine for each social media site). Do your other private web surfing with yet another virtual machine, etc. The above will keep cookies segmented; having the effect of you using a different computer for each of your activities.
You will still be tracked in some ways, because of how Windows tracks you, and how your browser is happy to share your information (especially google's chrome browser). So choose your browser, for each virtual machine, with care.
The only benefit that cookies offer is for keeping you logged in to a website. Otherwise, do not be complaisant. Say "No" to complete strangers tracking you. No one should have the power to track the activities of everyone on the planet -- and cookies play a significant role in that mission.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@victorlovesclowns259 "Why are you so scared of calling someone what they identify as?"
I am not scared.
The scared people are the ones that know that there are two, and only two, genders, and yet they go along with "pick your gender".
The scared people are, for example, teachers that tell their child students not to tell their parents what takes place in the classroom.
If you choose to be homosexual or lesbian, that does not change your gender. Who you are attracted to is your business. But you are still male or female.
I have no doubt that some men wish that they were born a woman.
I have no doubt that some women wish that they were born a man.
But they were born as they are. Regardless of what they wish, their gender is their gender.
Some people born into ethnic group "A" wish that they were born into ethnic group "B".
Some people born into ethnic group "B" wish that they were born into ethnic group "C".
Etc.
But they are the ethnicity that they are.
No one is forced to be happy about the characteristics of how they were born. Happy or not happy, you are who you are.
I wish everyone could be happy with how they were born. But nature does not give everyone what they prefer, and can be downright cruel.
Please accept my sympathies for your dysphoria diagnosis.
By the way, are you okay with teachers discussing vivid sex topics with pre-pubescent children with the teachers warning those children to keep it secret from their parents?
1
-
@victorlovesclowns259 "Parents can be abusive if they find out a kid is questioning their gender."
-- Parents can be abusive when they learn that their child failed a test. So the teacher should not inform the parents?
-- Parents can be abusive when they learn that their child scored a "C", but would have scored an "A" if they studied more. So the teacher should not inform the parents of the grade?
-- Parents can be abusive when they learn that their child did not do their homework assignment. So the teacher should not inform the parents that the homework was not done?
Etc.
There is nothing that should not be shared with the parents.
"And gender is a social construct there’s no limit to gender."
And that is an example of what happens when children are taught that lie, and it is kept from the parents. The years roll by, and it is too late for the parents to address that lie. Now that child is an adult and believes that lie.
"There’s not even two sexes. What do you call someone who was born intersex?"
No one can impregnate themselves.
Either you can impregnate someone else, or they can impregnate you. Not both.
And the world should not revolve around the rare occurrence of people born with questionable sex traits.
Such people need special care. But they are still male or female.
"And why do you care so much."
Please do not assign a value to my care. People comment in public forums whether they care a little, a lot, or anything in between. How much I care has zero to do with the truth.
I do not care about how corn is planted. But if someone is spreading misinformation about how corn is planted, then I care.
"Let people be what they want it doesn’t hurt you in any way whatsoever."
It is selfish to care, only when it hurts you.
I let people be what they want, with limits.
If you are an adult, call yourself whatever you want. Identify however you want. But do not expect others to abide by your demands.
If we met at social event, and you want to be called a pineapple, I would do so. Your personal life is yours, and I respect that.
If you were hired at my company, and you expect me to put you down in the payroll as a pineapple, that will not happen.
If you expect to lie to my children in a classroom, I will not let you.
There are people that really believe that the Earth is flat.
In a social gathering, I would not engage them. I would be happy if they learned reality. But they can believe that the Earth is flat if they want to. It is their life and their choice.
If that person was a teacher, and I found out that they were teaching children that the Earth was flat, I would stop them by reporting them and getting involved in the school's curriculum.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
Do not use BitLocker, unless your encryption is moderately important to you.
If you want top-tier, truly unbreakable encryption, use VeraCrypt. Why?
BitLocker comes with Windows (Pro and Enterprise versions). It was created by Microsoft. It is "closed" source software. That means that Microsoft could have master keys. No one, other than a handful of Microsoft programmers, know for sure, because no one, other than the handful of programmers that created BitLocker has access to the source code that would reveal how it works.
Whereas the better option, VeraCrypt, is 100% open source code. Meaning, anyone on the planet (that understands source code -- and that is over 1,000,000 people) can read the source code and see exactly how VeraCrypt works. And by doing so, they can see if there are any weaknesses, including master keys (there are none, because someone would have blown the whistle).
VeraCrypt's strength is that their code is 100% transparent, out in the sunlight, and no one has found any intentional funny-business (minor code enhancements have been made to shore up the code -- but not due to anything improper in the code). This cannot be said about BitLocker, because no one can view it. It could be hiding anything.
If you use a strong pass phrase, then no one will be able to gain entrance to your VeraCrypt encrypted data.
VeraCrypt offers full disk encryption, selective encryption, hidden volume encryption (to keep adversaries from being able to determine if you have stuff hidden), key-file support, and more.
VeraCrypt's full disk encryption is a bit complicated to set-up. All other uses are easy (as is the full disk encryption, once accomplished).
And VeraCrypt is free.
1
-
1
-
Andrew Cuomo can't stand Kathy Hochul.
That is why he was railing against New York, outside of the New York City.
Kathy Hochul is the target for the suburbs.
But to our host's point, Cuomo is responsible for the illegal immigration problem.
He never complained about it, while he was in office. In fact, he was a proponent of illegal immigration. But now, since he despises Kathy Hochul, he is speaking up.
Do not fall for Cuomo's BS.
Cuomo is still in full support of wide open borders. He is complaining, now, only to stick it to Kathy Hochul.
@2:06 "But New York was a sanctuary state when..."
New York was (and is) a fugitive state.
None of the illegal immigrants are fleeing persecution.
None of the illegal immigrants are seeking a sanctuary.
Ergo, New York is not a sanctuary state.
New York is a co-conspirator in harboring fugitives from the law.
Ergo, New York is a fugitive state.
Please never use the language of the radical left.
"Sanctuary cities" is the clown world language of the radial left. It makes the illegal immigrants appear to be victims, when they are not.
New York is a "Fugitive State".
1
-
All of their equipment (tables, flag poles, pens, cameras, chairs, eyeglass frames, soda bottles / water bottles, etc) are oil based.
They all traveled there via vehicles that require oil.
They all love oil,, while protesting oil, because they are too stupid to understand that they are protesting the very thing that they personally use every day, in significant quantities.
1
-
A large portion of what President* Trump spent tax dollars on was rebuilding our military, which was in shambles.
Planes, tanks, ships, etc, could not be repaired (due to lack of funding). So when, for example, a plane could not be repaired, then that plane was cannibalized for its good parts to be used to replace failed parts in other planes.
As to the 81,000 new IRS agents, which Chuck Todd claims is a good thing, and that law abiding citizens have nothing to fear... that is BS. Why?
With 81,000 new IRS agents, hundreds of thousands of people will have their taxes audited. The IRS does random audits. With 81,000 more IRS agents, they will perform hundreds of thousands of more random audits.
But so what, if you did nothing wrong. Right?
-- Do you have all of your records in order?
-- Are you prepared to pay your accountant to sit with you and an IRS agent during your audit?
-- If an IRS's agent's audit concludes that you owe another $50, then be prepared to pay hundreds of dollars, due to interest and penalties. Also be prepared to be on the IRS's radar, for years to come, due to being tagged as a tax risk.
-- And will all of the 81,000 additional IRS agents randomly check returns. Certainly not if a Democrat is in the Oval Office. They will target everyone who they find to be a problem, politically. And with Google and Facebook having your profiles, they will have a list of conservatives to harass.
There is simply no way we could trust the government (especially a radical leftist president) to not abuse the power of having 81,000 new IRS agents.
1
-
1
-
1
-
@haroldveatch3159 I have not used notepad++, so I cannot answer any questions about it.
When I need to take a quick note on something, or want to save some text to paste at a later time, I use notepad. But sometimes notepad falls short. That is when I would use wordpad.
So for my simple needs, I figured that maybe notepad++ could substitute for the absence of wordpad. I figured that when notepad would fall short, then maybe notepad++ would suffice.
I need to watch a couple of videos on notepad++, to see what it is good for.
I also have an old version of Word, which is fine for when I need its features. But one thing I like about using notepad, instead of Word (for temporary uses), is that notepad strips away formatting. So when I paste the text somewhere else, it does not paste with some crazy font, or underlined, or bold, etc.
1
-
1
-
1
-
@Black Conservative Perspective,
You have yet to learn that there are evil people in the world, and many of them run companies (OkCupid) and run governments (NYC Transit Authority).
You said that you do not understand how the subway could allow that advertising. The answer is that it is not allowed. The people, that green-lighted those prohibited advertisements, broke the Transit Authority's policy that prohibits those advertisements.
Many policies are in place, from past years, enacted by responsible adults. Those responsible adults are no longer there. Now there are woke, degenerates in all walks of government positions, that ignore policies. These degenerates make up their own rules, with no passage by the legislature. They know that those advertisements are not allowed, and they still approve them. Why? Because they are degenerates. They are the swamp.
If Mayor Giuliani was still the mayor, those advertisements would have been taken down within 24 hours, and the person that approved them (and anyone else that knew about them and did not take action) would all be fired.
The New York City government does not follow the rule of law, whenever its personnel feels that the law is inconvenient or goes against their political agenda.
1
-
1
-
1
-
1
-
1
-
@douglasandrews8977 'That is three words, but yes, the folks at NewsGuard absolutely are, apart from their questionable understanding of "facts."'
In October of 2022, President* Biden said: "Two words. Made in America."
He said it twice, and he said it with conviction.
The spectators clapped, and the media did not report on it (other than Saturday Night Live poking fun). But nothing on the news channels.
When the President* of The United States Of America says, twice, that "Made in America" is two words, and the spectators clap, and the media does not report on it, then...
"Leftist fact checkers" is two words.
1
-
1
-
@0:00 -- "This week we saw New York prosecutors go after the Trump organization..."
You are inadvertently giving cover to the degenerates that are abusing their power and oath of office. How?
Name the cretins. Show their photos.
These people are public servants, paid by our tax dollars.
Do not blame their "title". Rather, blame "them", as in:
New York Prosecutors, for the Southern District Of New York, [First Name], [Last Name], [Photo], are persecuting Wiselberg...
The leftist media has Wiselberg's name and photo plastered all over the place. Even this posting shows Wiselberg.
So why do conservative media outlets give cover to the villains. Why do conservative media outlets not name the prosecutors and show their photos, so that We The People can fire them come the next election?
@1:03 -- "That shows the extent to which they are prepared to 'stretch' existing law and the constitution..."
1) Who are "they"?
Dershowitz should not give "they" cover, by calling them "they". He should name them.
2) 'stretch'? The prosecutors are not 'stretching" any laws. They are fabricating laws.
3) Dershowitz inadvertently gave credence to the prosecutors by acknowledging their acts as lawful ("existing law"), when their acts are unlawful, because their acts do not have "existing law".
Lastly,
Every fake news outlet, that is bashing President Trump over this farce, needs to have their own top executives investigated.
The public needs to know what their "perks" are.
There is no doubt that all of these degenerate so-called "news" outlets give the same perks to their top brass, and there is no doubt that they do not report those perks as income.
The same goes for the Southern District of New York, who is persecuting Wiselberg. What "perks" are given to the people that run that office? I will lay any odds that they did not declare their perks as income.
1
-
1
-
1
-
1
-
1
-
1
-
Although CrowdStrike is the trigger, they are not the root cause that brought down services for extended periods. That falls on the government agencies and the businesses that had no recovery plans in place.
They should all be doing daily backups. When all of their CrowdStrike facing systems failed, they should have restored their C: drive from their recent backup image. That would have gotten them up and running in minutes -- even before they found out why they had the computer issues.
Consider this:
What if a nation-state, or a criminal computer group, intentionally designed and deployed malware to bring down all of those computers?
We now know that all of those government agencies and all of those companies are not backing up their data, and we know that all of those government agencies and all of those companies have no disaster recovery plans.
Anyone that lost their shirt, due to the gross negligence of those companies, should sue those companies for damages -- because this was 100% avoidable (not the initial crashes -- but the extended down time).
Anyone that lost a loved one, due to emergency services being unavailable for extended periods of time, should file law suits.
I used to run a Business Unit for Thomson Reuters.
No one could disable our unit's services.
We have redundant systems, with redundant power supplies, and redundant storage (RAID storage), with redundant power feeds, from redundant uninterruptible power supplies (UPS's) drawing 1.6 megawatts of power for a single location.
And if the entire building lost power, no services were interrupted, because we would run on batteries (pallets and pallets of huge batteries) that would provide power while in-house generators would spin up. We were able to run on in-house generators for days (or forever, as fuel deliveries arrived). We went through 255 gallons of fuel per hour, while on our generators.
And if the building was hit by a meteor, we still would not lose our services, because we had a redundant, real-time facility in a different, distant location in our country.
Should all of those other companies go to the above extremes? It depends on how critical their services are.
But they should all have daily backups and be ready to restore their systems from those backups. That is simplistic.
So those companies and those government agencies that went down, and stayed down, just showed us that their executive personnel are indifferent, incompetent, and irresponsible.
1
-
1
-
1
-
1
-
@3:04 "They did use words where it was not definitive. They said it bears the markers of... earmarks, excuse me, "
That is definitive.
What are those earmarks?
If Hunter Biden's laptop bears such earmarks, then those 51 intelligence agents had to have seen such earmarks. Well, describe the earmarks. Give examples of the earmarks.
They did not, and will not, because they definitively lied about earmarks. No such earmarks exist.
An earmark is a "noun". A noun is a "person, place, or thing". So what is that person, place, or thing, that 51 intelligence agents claim exists?
Those 51 intelligence agents made a definitive statement, and that statement is a lie.
1
-
1
-
1
-
1
-
Look at the "Super Pinned" comment made by an anonymous youtube employee. That anonymous youtube employee has it posted, directly below the video, in a blue background.
That "Super Pinned" comment stands above all other comments, and is the only comment that is highlighted in color.
Also, no one can reply to that "Super Pinned" comment. Even the host of this channel cannot remove that "Super Pinned" comment. Normally, the host of a channel is able to delete any comment. But not a "Super Pinned" comment, left by an anonymous youtube employee.
100% of such anonymous comments are anti-Trump, or anti his agenda. Perhaps there might be exceptions, but I have never seen one. In this instance, that anonymous youtube employee is calling the horrific murders taking place in South Africa, a "conspiracy theory".
1
-
1
-
1
-
1
-
1
-
1
-
1
-
We waited 16 minutes and 37 seconds to watch that vehicle fly off the line and do a ¼ mile.
Instead, we get a selfie of the driver for most of the run.
Then, at 18 minutes and 33 seconds, another run, with more power, and more selfies.
Then, at 23 minutes and 8 seconds, another run, with more power, and more selfies.
What is with the post recording editing?
Four or five camera were recording. Why not let us watch each one, without trying to make it into a Hollywood production?
Is this about the hyper-car, or is it about the laptop's video editing software?
Is this about the "you are there" experience, or is this about the laptop's video editing software?
1
-
1
-
1
-
Healthcare workers cannot maintain social distancing. The are in direct contact with patients. Not only people having heart attacks, and car accidents, etc, but they are in direct contact with countless virus-infected people. They are the most susceptible to contracting the virus. And if we lose our healthcare workers, it is all over.
Cheaper masks will not have the disease filtering properties of an N95 mask. But:
-- If you have an itch while wearing a mask, or accidentally lean your hand on your face, then scratching yourself by pressing on the mask can keep your hands from infecting you.
-- If you have the virus, and you cough while wearing a mask, your spray will be contained and have less of a chance of infecting others.
-- If someone coughs on you, and you are wearing a mask, then you stand a chance of their spray hitting your mask, and not hitting your face.
The less that you expose your face to the virus, the less that your hands touch your face, the better your chances are of remaining virus free. So masks, any masks, are beneficial.
And the fewer people that get infected means that those people cannot infect others, and so on. If more non-essential people get infected, then they infect more people, and so on. And the hospitals cannot handle countless infected people, while they still have their normal emergencies (heart attacks, car accidents, etc).
1
-
1
-
I use "quick assist" to help a family member. I also use "quick assist" to share a screen with a friend, trying to solve a sudoku puzzle. Quick Assist is great, but it requires both parties to be available at the same time (and also requires the helper to have a Microsoft account, and having your screen shared with Microsoft's middleman server).
"psr", which I was not aware of (thanks Leo) is a great alternative when "quick assist" is not a viable option, as well as for maintaining a detailed log (of sorts) for future reference.
It also allows the helper to share the .zip file with others, if additional support personnel are needed.
And if someone asks you "How can I do [fill in the blank]", you can use "psr" and e-mail them the step-by-step guide.
For folks concerned about sharing their desktop, you can open notepad and make it fill screen. Then run through your "psr" session.
I have not tried it. But if "psr" is taking screen shots, then that should cover your desktop (but not your task bar).
Or, perhaps, use Microsoft's built-in "task view" (located on the taskbar), and create an additional, virtual desktop (very easy to use). It will not hide your desktop icons. But you will have a clean task bar and no open windows on the new desktop.
Or both. A new virtual desktop with notepad maximized to hide your desktop icons, and that will be about as private as you can make it for sharing your "psr" session.
By the way, it looks like "psr" is available in Windows 7, too.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@2:00 "...trying to deal with some kind of social issue that they're not, quote unquote, educated to cope with."
Utter nonsense.
You do not have to have a single day of education to know that a boy is a boy and a girl is a girl.
@2:06 "So they're in the middle of this."
Propaganda.
The teachers and school board members are not in the middle of anything. Rather:
The teachers and school board members are actively pushing child sex activities.
Do not play the "teachers are innocent bystanders" game. The teachers are the culprits.
When children are taught in school, that they can choose any gender, even fabricated genders, that is not coming from the sky. That is coming from their teachers. And we have Scott Capurro (screen right) asserting that the teachers are in the middle of this.
Scott Capurro is either a leftist, or an idiot (or both), which is why he defended teachers as being in the middle, when they are actually the ones brainwashing children into believing that gender is a choice, and you can fabricate genders.
Scott Capurro goes on to say that it is a struggle between family and kids. That is outrageous.
Scott Capurro is blaming the parents.
The school board members and teachers are to blame, putting the parents in the middle of this.
The parents are not telling their children to choose a gender. That is coming from the teachers. And Scott Capurro is blaming the parents.
If the teachers were to tell children to steal cash from home, and buy cocain, Scott Capurro would probably say that that, too, is a struggle between family and kids.
Disgraceful.
1
-
1
-
1
-
1
-
1
-
1
-
Either he is seriously mentally disturbed, or he is deliberately seeking attention for his self esteem and monetary gain -- or both.
We will never see a story about him giving birth. If there is any follow-up, it will be him claiming that he had a miscarriage (seeking yet more attention and monetary gain), or he will hold up a friend's baby and claim it came from him.
Aside from Truth Social, all of the well known social media platforms suspend accounts, or label postings as misinformation, or fact check postings, or ban accounts, for the smallest of infractions (such as correctly gendering someone). Yet, when we have a complete train wreck of a posting, we hear crickets from the platform's administrators.
There is an old saying about inmates running the asylum.
As it pertains to propaganda outlets (also known as news outlets), and as it pertains to social media outlets, we are living in a time where the sickest among us are running those platforms.
They are smart people. But they are sick, evil people. Sick, evil, and smart is a dangerous combination.
1
-
1
-
If you save any trade secret documents in the cloud, then you are sharing your trade secrets with complete strangers.
If you save any legal documents in the cloud, then you are sharing your legal documents with complete strangers.
There is no way to prove it, but I will lay 100 to 1 odds that the cloud service scans your cloud documents for all types of information.
On the flip side of that coin, no one can prove to us that they do not scan our documents for all types of information -- and that is unsettling.
And keep in mind... it is trivial for Microsoft to scan every document from every upload from every account.
If the cloud service is handed a court ordered search warrant, they will hand over your documents to the government officials.
And since giant tech companies have facilities all over the globe, your documents are might be duplicated in other countries, where their local laws apply, giving bad actors and law enforcement other avenues to access your documents.
Everything our host said is correct, functionally, and organizationally. You will be proficient at using the cloud service. But know that the cloud service will have unfettered access to your documents.
The only way to store sensitive documents with a cloud service (with complete strangers) is to encrypt your documents locally, with strong encryption and a strong password.
It is somewhat inconvenient to do so, but it ensures that you, and only you, will have usable access to your documents that you put on the cloud service's computers.
It is unlikely that anyone at Microsoft is sitting in their cubicle, checking your documents. But with today's spyware technology, Microsoft (and the others) can easily check your documents (and everyone else's documents) for anything that they want -- instantly and automatically. And if you ever become a person of interest, then someone sitting in their cubicle (depending on their role in the company) can peruse your documents, at will (unless you encrypt before sharing with them).
I wonder how many mayors, governors, police chiefs, media outlet anchors and executives, members of congress, judges, FBI agents, etc, use OneDrive and other cloud services, and save all types of juicy documents with those cloud services? Consider how easy it would be for the executives and developers, and other key people at Microsoft, to take advantage of having access to those documents. Consider the consequences of a bad actor at Microsoft, having access to those documents. If you could view those documents, as easily as you can view your own documents, could you resist?
All government officials should be required to take a class, educating them on the risk of using any cloud services, and be given a quarterly quiz to ensure that they are not being careless.
1
-
@askleonotenboom I have no need for cloud storage. So my comment was for others that might not realize how wide open they are leaving themselves. People should be informed about what is likely happening to the personal data that they are sharing with cloud storage services.
The next, and most egregious spying is also coming from Microsoft, via its Windows 11 Co-Pilot AI inclusion, which will eventually be tied in with neural processing units (NPUs), that are already shipping with some motherboards.
Every keystroke, every image on your screen, every mouse click, every everything that you do, will be recorded by Windows, and indexed for properties (such facial recognition and image breakdowns), and accessible to Microsoft's powerful servers. Your financial transactions / all on-line banking... all recorded and available to Microsoft. Everything, no matter how personal, all recorded, indexed, and available to Microsoft.
When it becomes full swing, then Cryptomator, VeraCrypt, Password Managers, and likely every other encryption tool will be rendered unsafe, as your keystrokes will be recorded.
That also goes for entering passwords into web sites, etc.
Hopefully, there will be trustworthy 3rd-party fixes to disable Microsoft's unheard of level of spying. Microsoft can be compelled to turn over anyone's private data to any government, globally, and might even do so willingly, to suit their own aspirations.
Imagine the power of being able to see what any Windows user is doing, or has done. And it will all be indexed. No one can be trusted with that.
1
-
1
-
If you flee from the police, even if you had the right to do so, due to the police having no reason to detain you...
...Keep in mind that "fleeing" implies speeding away.
If you peel-out, then you just broke the law (most or all towns have unsafe start motor vehicle laws). Or careless driving laws, or reckless driving laws (all depends on how you fled).
If you take off, in any manner that violates traffic laws, then you just broke the law.
If you did not stop for that stop sign when exiting the parking lot, then you just broke the law.
So the police tried to ask you some questions, and you drive away like a maniac, well... now the police have an air tight reason for chasing you down and charging you will with violating traffic laws. And if you refuse to pull over, then add fleeing to the charges against you.
A police officer approaching you is not a license for you to take off and break traffic laws.
If the police see you driving away like a nut, then the police will have every right to stop you. And if you refuse to stop, then you are digging yourself a deep hole.
1
-
1
-
1
-
1
-
Someone please point me to Arnold Schwarzenegger's videos on:
-- ANTIFA rioters, not wearing masks.
-- Democrat law makers, not wearing masks.
-- BLM protesters, not wearing masks.
-- President Obama, throwing a "sophisticated" birthday party, not wearing masks.
-- Cuomo, sending thousands of COVID-19 positive patients into nursing homes, resulting in the deaths of thousands of people.
-- President* Biden, allowing COVID-19 positive illegal immigrants into our country, by the thousands.
Etc.
Arnold is right on a lot of issues. But he has a leftist's view on many issues, too. And when his leftist side surfaces, that is when, like all leftists, he is hypocritical.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@0:47 "...they wouldn't be bringing in people to the grand jury, unless they believed that have cause to do so."
Unfortunately, Jonathan Turley has yet to grasp the depravity of the radical left, and the tyrannical use of the Justice Department.
Jonathan Turley sees everything through the eyes of the legal process, as written.
He is blind to the criminal use of, and weaponization of, the police state.
The radical left went for years, accusing President Trump of every crime under the sun, including a never ending Russia, Russia, Russia trial (of sorts).
And yet Jonathan Turley still believes that the radical left would not be having a grand jury proceeding unless they had evidence.
Of course the radical left would do so. They will put on a theatrical performance for the jurors, enough to bring an indictment. And they primed the jury pool by having years of Trump bashing, and weeks of January 6th hearings that were all political theater.
Their goal is to put President Trump on trial, which to millions of people would mean that he is guilty. Many people believe that if you are on trial, you must be guilty.
That is enough to possibly keep President Trump from returning to the Oval Office -- and that is the radical left's end game.
1
-
1
-
1
-
1
-
1
-
The time for the travel restrictions from China was in January of 2020.
In the meantime, Australia has implemented a draconian police state on its own citizens.
They arrest people for facebook postings who have opinions that differ from their government's narrative, and they arrest people that share information from bona fide sources that differs from their government's narrative.
Go on to a beach, hundreds of feet from anyone else, and play catch with your 10-year old, and you will be arrested.
Although China has earned the push-back and the scrutiny it has coming, Australia's government is a tyrannical, incompetent, mess.
They deserve each other.
Sadly, the governed are the ones being tormented by their brutal governments, while those running their governments are living in lavish conditions without restrictions.
Proper news coverage should always include the names, titles, and photos of the specific people that are forcing their citizens to live as described above.
Always identify the actual people that cause misery, by way of their actions within their government roles.
1
-
1
-
The Democrat party "is" a Socialist / Communist party. They just try to keep it in the closet, because they know that Americans would vote them out of office.
Bernie is the only Democrat that proudly admits that he is a Democrat Socialist. But even Bernie is full of BS, because putting the adjective "Democrat" ahead of the word "Socialist" is nonsense, and Bernie does it to keep more Democrats (that are not Socialists) in his camp.
More to the point is that Bernie is not even really a Socialist. Bernie is a Communist.
But as all good Communists do, in their climb to power, he sells himself as less than the tyrant that he really is.
And like all good Communists, Bernie redistributes from others, but not from one of his 3 homes (most people dream of, one day, owning a single home -- and Bernie, anti-rich-people Bernie, owns 3 homes).
The Democrat party (which includes most of the media) have done everything that they can to disparage any and all conservative candidates, and the Democrat party (which includes most of the media) have brought about the rise of all of the radicals (like Bernie). And now that they have the radical candidate that they brought to the top, they are complaining about him?
This is not unexpected. Socialism and Communism always leads to chaos, and we are witnessing a sampling of their chaos. Heaven help us if anyone like Bernie should ever take the reins. Then we will experience chaos like no one in this generation can imagine.
1
-
1
-
1
-
Both in the title of this posting, and throughout this video, the words "protests" and "protesters" were used. Yet, there were no protesters.
There were law breakers.
Protesting is legal, and protected by our constitution / Bill Of Rights.
Rioting, looting, vandalizing, assaulting trespassing, blocking traffic, etc, are all illegal. None of them are rights. None of them are protests.
Please never call criminal activity "protesting". It gives the criminal conduct a hint a legitimacy.
An accurate title for this video would be:
Criminals at BLM mob gathering Harass, Shout and Trespass in DC.
1
-
In generations passed, the immigrants were seeking asylum from dictatorships and genocide, such as the NAZIs.
99%+ of those asylum seekers were skilled and highly skilled. There were doctors, engineers, teachers and craftsman, etc. Virtually none of them were seeking a handout.
99%+ of those seeking asylum entered via a port of entry, and followed US border laws (they entered legally and followed our laws).
Whereas today, the southern border crossers have virtually no relationship, whatsoever, to the above described immigrants.
Virtually none of today's southern border crossers are seeking asylum. There is no persecution, and no genocide in the countries of their origin.
They are entering illegally.
1
-
1
-
Waste of time video, because we never get to see the car perform.
We see mostly (close to 20 minutes) of a man's face, talking to us.
We see, perhaps, a total of 2 minutes of video of the car doing nothing special, gliding down the road.
We hear the engine roaring, but never see the car in action.
There was not a single front view of the road, with the car accelerating, or taking a turn at speed, or hard breaking. Nothing.
Even when the car was supposedly speeding passed a camera on the road, the camera did not follow the car as it passed by.
@Top Gear actually went out of their way to not show the car's abilities. This video was mostly about the camera work, and little about seeing what the car can do.
Those same cameras could make my 2003 Nissan Sentra look equally as fast.
Such a shame to have such an amazing car, and do such a disservice to the viewers.
Thumb's down click earned.
1
-
1
-
1
-
Once you return the car, you are no longer responsible for the car.
If the rental company chooses to not staff their location during hours when they accept returns, then it is the rental company that cannot prove that the car was returned with damage.
Let's take this to the next logical step.
You return the car, and the car gets stolen (or set on fire) after you leave. Well, that is the ultimate damage, and the entire car is gone. So are you on the hook for replacing the car?
Of course not.
In the case of the car getting stolen, they would have to show proof that you did not return the car. Ergo, their video footage.
And the same applies to them accusing you of damaging the car.
Are they required to show you the video footage?
No.
Then you are not required to pony up any money on their unsupported say-so.
The fact that they have the footage, and they refuse to show it to you the footage, conveys that they are lying.
Challenge the charge with your credit card company, and explain that they are refusing to show their video footage. The credit card company will almost certainly side with you.
The credit card company will probably ask the rental company for a copy of the video footage. When that request goes unsatisfied, you will not be charged. The credit card company will find in your favor.
If the rental company then sues you, then it will be the court's turn to ask to see the video footage. The court's ruling will go the same as the credit card company's decision (especially since the credit card's decision will be presented by you to the court).
It is absurd to be blamed for vehicle damage, when the rental company was not there to see you return the vehicle -- and especially when the rental company chooses to not check the car when you return it (by not having staff there), and refusing to show you the video.
The whole thing stinks of fraud, and should be a slam dunk win for the customer.
The rental company falsely accusing you should be replied to with a counter suit for your expenses and aggravation and punitive damages, too.
1
-
1
-
1
-
Like all well intentioned technology, it gets abused. And in the case of cookies, it gets wildly abused.
Cookies are great for sites where you need to stay logged in, as our host explained.
Cookies are great for sites that track your activities, assuming that is useful to you and you are amenable to being tracked.
However, cookies are used to spy on everything that you do on-line. It is what you do not see that is alarming. Google is the biggest culprit.
Rather than cookies having names that you could understand, they are intentionally cryptically named, so that you will not know their function. You might know that it is a Google related cookie, but that is all you will know. And that, folks, is troubling.
When a site puts 6 cookies on your computer, what does each one contain? Who knows. But you agreed to allow cookies.
When you are asked to accept cookies, it is an all-or-nothing propasition, and you are not told (with any specificity) to what you would be agreeing.
You are generally given some generic "to help us provide a more beneficial browsing experience, blah, blah, blah", or something similar. But you have no idea how many cookies will be dumped on you, and the purpose of those cookies. You are not told how to find those cookies, and delete the ones you would rather not have, etc. Where is the "undo cookie" button? It could easily be included, but is intentionally absent.
Big tech companies are making oceans of $$, based on the information that they glean from the countless cookies that they place on our computers, where the vast majority of those cookies have nothing, whatsoever, to do with our browsing experience, and, instead, have 100% to do with big tech's spying experience.
There is a fix for dealing with this huge spyware technology, that exploits cookies to do its bidding. That fix is "virtual machines".
It is relatively simple to run a virtual machine (or multiple virtual machines). I am 99% sure that our host uses a VM for all of his demonstrations. That way, he does not have to undo or tinker with his actual computer's files and settings.
Once you take a few minutes to install the software (many offerings are free), and get the VM up and running, you take a snapshot (a menu item in the VM software). Then you can go hog-wild, accepting cookies, etc. When you are done, you tell your VM to go back to the snapshot that you took (takes 1 second). Your virtual machine will return to exactly the state it was in when you took the snapshot.
If you purchase a new computer, I recommend that you use one or more VMs for various web surfing activities, and after each session, restore your VM back to the snapshot that you took.
As to browser extensions:
Note that that is yet another way that Google and others spy on you. Your browser broadcasts endless details about its configuration. When you install extensions, you are creating a unique (or somewhat unique) configuration, and that allows for big tech to spy on your activities.
Again, a VM would be very useful, if you needed a browser extension, and want to minimize tracking. You can create a VM that you use, only when you need some browser extension. That VM will be different from your other VMs. That VM will be used just for a certain web site where that browser extension is needed.
By using VMs, you are effectively using a different computer for each of your on-line activities. And by taking a snapshot of your clean VM (before you go browsing), then each of your VMs will be seen as new computers to the sites that you visit, each time that you visit (assuming you keep reverting to your clean snapshot when you are done browsing).
If you practice the above VM procedures (which take only a bit more time to do), then you will be rewarded with never having malware or clutter or slow-downs, etc. Your new computer will run smoothly for however many years you will own it.
Lastly, of course cookies seem like they are wonderful. Who does not like cookies (the ones you eat)? So that name was a great choice to have the public lower their guard. And from our perspective, we see them doing no harm, and in fact we get an enhanced browsing experience. The issue is what we do not see, which is happening behind the scenes that our computers are sharing with big tech companies. That is big tech's social engineering in action, offering you candy while they get their hands on your entire internet activities.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@7:31 "I know there's WSL 2"
Unless you do not have dedicated hardware to run Linux on bare metal, then why run Linux via Windows' WSL 2?
If you run into a complicated, hard to pinpoint issue, is it the Linux kernel or is it WSL 2 that is the issue? Is that panic a Linux issue, or is it due to some interaction with WSL 2?
If your project requires secrecy, why trust having everything get processed by the underlying Windows OS?
And if speed it a priority, why have the Windows overhead?
I suspect that Microsoft wants to squash their main rival: Linux.
So they entice the Linux world to run Linux on Windows (might seem like a "cool" idea and fun). Then, when Microsoft believes that enough of the planet is dependent on Linux running via WSL 2, then Microsoft could announce that they are retiring support for WSL 2, and Linux goes down the drain.
Imagine UPS having all packages be dependent upon Fedex.
Imagine all GM motors be dependent on Honda parts.
Imagine all Häagen-Dazs ice cream being dependent on Ben & Jerry's support.
Why should people put their Linux eggs in Microsoft's basket?
On my next computer, I am planning on using a Linux distro, so that I can divorce myself from all-things-Microsoft (I steer clear of spyware companies like facebook, google, and microsoft, and understand that using youtube goes against the grain). Once I get a Linux box, it will be liberating -- having my OS no longer spy on me. I cannot envision ever patronizing Microsoft, again.
Cheers!
1
-
@2:52 "We cannot look away, in the face of these tragedies."
That is flat-out odious.
What happened in Israel on October 7th, 2023, was not a tragedy.
Israel was not hit by a meteor.
Israel was not hit by an earthquake.
Israeli citizens were murdered, intentionally, by members of Hamas.
What Vice President* Harris should have said is:
"We cannot look away, in the face of this mass murder, perpetrated by members of Hamas."
She did not blame Hamas. Instead, she described mass murder as happenstance.
@2:56 "We cannot allow ourselves to become numb to the suffering."
Whose suffering?
Hamas is claiming that Israel's counter-offensive is making them suffer.
@3:03 "As I just told Prime Minister Netanyahu, it is time to get this deal done."
What deal?
Answer:
The "deal" that Vice President* Harris glossed over rewards Hamas for mass murder. And that "deal" does zero to prevent Hamas from attacking, again.
So of course Prime Minister Netanyahu is refusing that deal.
What Vice President* Harris just did is side with Hamas, while trying to look as if she is siding with Israel.
What she did is tell the world that Prime Minister Netanyahu is holding up the deal (with her knowing that the public has no inkling of what is in that deal).
Folks, Kamala Harris is no friend of Israel. She is just another Democrat overseer of the radical left Washington Swamp.
1
-
1
-
1
-
1
-
I left a 1-star review on Amazon, for a somewhat defective USB flash drive.
I spelled out exactly what the issue was, including repeating the problem on 3 different computers.
Well, Amazon e-mailed me that my review would not be posted, to ensure the integrity of accurate reporting.
I used no foul language. I broke no rules. I simply laid out the facts, and Amazon blew it off. So now more customers will get screwed by the seller.
Another 1-star review that I left was for a seller short-changing the quantity that they ship. I contacted the seller, and they would not fill the missing part of the order. I contacted Amazon, and they issued me a refund. But Amazon refused to post my review, and they left the listing for others to be short-changed.
Months later, I ordered again from that seller. The same thing happened. So I got my orders for free, due to being refunded (not what I was seeking).
I asked Amazon why they allow the listing to remain. They told me that it would be taken down, and that was over a year ago. It is still up, and still cheating customers.
So Amazon issues a refund. Ergo, they agree with the customer. Yet, Amazon refused to post my review about being short-changed, and Amazon keeps the listing live. Clown world.
I have listed far, far more 5-star reviews than any other level (those reviews never get declined). But with the 1-star reviews, Amazon puts their own selfish self-interest above the public's interest. Amazon wants even the deceptive sellers to keep selling. Apparently, some Amazon bean counter did an analysis and figured out that Amazon is more profitable with deceptive seller, even though they have to issue a percentage of refunds.
I even reported SSD listings for 16TB drives selling for $49. Such drives would cost north of $1,000.
The drives will work, but are only 64GB (or something similar), and report to Windows that they are 16TB. By the time the customer finds out that their data is corrupt, the return window closes.
Well, after two phone calls to Amazon, they never took any of the scam listings down.
Did the Amazon representative inform whoever it is that could take down the scam listings? Who knows?
But Amazon simply did not care, because the listings are still there -- lots of them. Amazon has the technology and the resources to easily remove the scam listings. But they do not, because Amazon gets paid when customers purchase those scam SSDs.
Folks, if you purchase anything from Amazon, thoroughly test it, without delay. Once the return window closes, you are screwed.
1
-
1
-
There is a significant difference between sending e-mail messages, knowing that you are passing your message through other people's computers, vs storing your computer's contents on a 3rd party service, with the illusion that no one can get to your (so called) encrypted data in the cloud.
When you send your friend an e-mail message, it is plain and obvious to most people that no one is claiming privacy for the transfer of that message from you to them.
But when you use a VPN, or a service such as OneDrive, Google Drive, etc, those companies go out of their way to convey that your data is encrypted and sealed and no one can break in, etc.
Their lie is by omission, because they do not tell you that they, themselves, do not have to break in -- because they, themselves, have clear, unfettered access to your data.
We all avail ourselves of the conveniences of on-line services. But the distinction is when we know that we are sharing information that is in the open vs being tricked into believing that we are sharing data that cannot be seen.
Like going to a doctor, and revealing very personal information. You have to trust that your doctor is not going to tell his friends all about you when they visit for the holidays.
You go to the doctor, with the understanding that you know that the doctor will know all about your private affairs, because you are telling your private affairs to the doctor.
But when it comes to VPN services, and Google Drive, etc, they give the impression that you are not telling them anything. You believe that you are handing them your secrets, and even they will not know your secrets (encryption, encryption, encryption). And that is the difference. That with your doctor, you know that you are revealing your secrets to your doctor. With Google Drive, you are also revealing your secrets, but you are given the impression that you are not.
Those cloud services give you the impression that no one can access your data, and they omit that they can. So you are giving your data to complete strangers, not realizing that those complete strangers can see 100% of your data. Yes, they encrypt it to stop others from seeing your data. But they, themselves, can see your data. That is the lie by omission.
I am all in favor of using any and all services. But that they hide from you that they have 100% unfettered access to your data makes them untrustworthy. They can see your data, but they do not tell you that. They tell you only that your data is encrypted (but not from their CEOs).
Our host knows this. When he touts the security of these services, he should include that these companies have clear access to your data. Otherwise, he is conveying the same sale's type pitches that the cloud services pitch -- that your data is encrypted, implying that no one can see your data. Most people probably do not know that their data is freely accessible to key personnel at those companies. The fact that the public is not told that the CEOs can see their data is an issue. Why is that information kept from the public? Why do promoters of those services go out of their way to keep that information from their viewers? Yes, use those services. But let the customers know the above. Why conceal it from the customers?
If you bumped into Sundar Pichai, you would not hand him a flash drive with all of your secrets.
But give him the title of Google's CEO, and upload a copy of all of your documents, and now he has it.
Again, use these amazing services. But let's not conceal that they have your data in the clear, when you upload it to them.
Remember, your upload is via an encrypted tunnel. Upon arrival at the service, your data gets decrypted. They have 100% of your data, in the clear. Then they encrypt it, again, for storage. So they get an "in the clear" copy of everything.
Lastly, if you read the fine print for using their services, you will see that they decree that they "own" the data that you upload to them. They can do whatever they want with whatever you upload to them.
1
-
@askleonotenboom Correct.
Whenever we place our data on other people's computers, then they have complete access to our data.
The only (virtually) safe way to move your data around on-line is either performing your own, local encryption, or use end-to-end encryption (Signal, for the voice calls is one example -- but even then, Apple can intercept your data, via its OS, before it is handed over to Signal for local encryption -- but they probably do not -- or could do so on a person of interest).
For example, I use keepass, because I need not trust anyone, other than the open source code (which I wish I could decipher -- but I trust it to be safe, based on a planet of programmers where someone would have sounded an alarm if anything shady was in the source code).
I have no qualms about uploading my keepass file (vault) to any 3rd party service -- even to my arch nemesis. But I will never upload anything confidential to a service where they do the encrypting.
For e-mail, I recognize it is the equivalent of dropping a letter in the mailbox, without an envelope. I recognize that every computer between my PC and my recipient's PC can copy and read my e-mail correspondence.
But the world's population is not aware of who they are giving their life's data to. They are sharing it all, mostly out of not understanding what they are revealing to complete strangers.
I have friends and family members that do understand, and just don't care. At least they are making an informed decision. But most people's decisions on this issue is 100% based on convenience, and being tricked into believing that no one has access to what they shared with 3rd party services.
Cheers!
1
-
1
-
For my daily driver, desktop PC, I use a wireless mouse (uses a USB receiver). But every 12 months (or whatever it is), the battery in the mouse dies. There is no "low battery" warning. The mouse works perfectly, and a split second later, it becomes a rock.
Depending on what I am doing, it can be only an annoyance, or it can be a big deal.
So I have learned my lesson, and I keep a wired mouse connected at all times. I never use the wired mouse, unless my wireless mouse's battery dies. If nothing important was happening, I can at least nudge the wired mouse, to confirm that my PC is fine.
I love my wireless mouse. But having a wired mouse, at-the-ready, is peace of mind.
For my laptop, I also use a wireless mouse -- but no wired mouse. When my wireless mouse's battery dies, I still have the laptop's built-in pad.
1
-
1
-
1
-
Yes, it is a burglary.
We should not assume that the person being burglarized has the spine to confront the burglar.
And the police will tell you not to do so, because it can cost you your life.
If you go into a bank, and hand them a note to give you all of the cash... they will -- because they tell the tellers to not challenge the bank robber.
I guess that is not bank robbery, because you did not break in to the bank?
What if that burglar walked in to the garage of a 90 year old lady. Is she supposed to confront the burglar?
If she was a bank teller, then she should not confront the criminal? But in her own home, she should confront the criminal?
So, now, if someone steals your stuff while you are there, then that is legal?
I wonder if someone walked into the judge's chambers, and stole his chair while he was there... I guess that makes it okay?
1
-
@CBS Evening News, rather than going with the "President* Biden is G-d's gift to our station" introduction, you should give an honest introduction, such as:
"Today, President* Biden, our mentor, declared the end of wars, the end of poverty, and the end of disease."
"Acting as the President's personal cheerleading channel, we are covering for President* Biden's incompetence, covering for President* Biden's criminal family, and are finally revealing that we are all members of the Democrat National Committee, and using our station as free air-time for all radical left-wing causes"
The above would earn you "honesty" credits.
The country knows that you are fake news. Just because you fool a small segment of the population, and just because some of your viewers enjoy hearing you slobber of President* Biden, they still, however, know that you are fake news.
Putting the word "News" in the name of your channel does not make it so.
1
-
1
-
1
-
1
-
@6:22 "You want to be able to get at that data some other way."
I respectfully disagree.
Doing so defeats the security of VeraCrypt, unless that "some other way" has equally strong security.
If you can get at your data some other way, then someone else might be able to do so, too.
I would not give an attacker two avenues of attack, using the one with the weakest security.
When you work with a VeraCrypt volume's data, if you do so carefully, then nothing encrypted in that volume will ever be written to your storage device in the clear.
However, if you copy data out of your VeraCrypt volume, to store it elsewhere, you might inadvertently have it write to your storage device in the clear. That would make it possible for a digital forensics expert to discover. For most folks, this is all cloak and dagger drama. But for anyone that is serious about their encrypted data never getting revealed, they should think carefully about copying their VeraCrypt container's contents elsewhere.
What is wrong with relying on VeraCrypt? Why have another place to save what is in the contents of your VeraCrypt volume?
Is there an up side to storing your sensitive data in VeraCrypt and also somewhere else? Where would that somewhere else be, that would not lessen the overall security? I am interested in learning what I have not considered.
I guess that you can forget your VeraCrypt volume's passphrase. If that is the case, then perhaps consider writing down your passphrase and leaving off a character, and also adding in an erroneous character. That would be something you, and only you, would recognize in your written form, and you should be able to remember those two items.
1
-
1
-
1
-
Note that radical left Democrat Governor, Maura Healey, has not taken in any migrants; neither has anyone on that stage, supporting her request for us to take in migrants.
To all of the people that actually take in complete strangers into their home, note the squatter laws for your city and state. Once you allow them to live with you for X number of days, you cannot make them leave. You might not be able to sell your home, without giving the migrants their percentage, or possibly needing the migrant's approval for the sale.
To anyone thinking that taking in migrants will solve the housing shortage, you are shoveling in a snow storm.
The virtue signaling leftists elected Maura Healey, and they will re-elect her, even as they see the writing on the wall about losing their homes.
Maura Healey made the crisis, by being a proponent of open borders.
Maura Healey has not said to close the borders. She still wants open borders.
Again:
Radical left Democrat Governor, Maura Healey, has taken in no migrants into her home, nor will she.
1
-
1
-
1
-
1
-
1
-
@0:32 "...WR102 is the hottest star in the universe"
That line speaks volumes about the lack of credibility of our host.
1) No one knows how many stars are in our galaxy, and there are probably 200,000,000,000 to 400,000,000,000 stars in our galaxy.
And our host asserts that he knows which star is the hottest, when there are countless stars that are nearly 100,000 light years distance from us (that's 587,849,956,300,000,000 miles away).
2) Our observable universe has so many galaxies, that scientists are all over the map, guessing at how many galaxies exist -- but it is in the trillions, or perhaps quadrillions.
And each galaxy has over 100,000,000 stars for the smallest known galaxies, and over 10,000,000,000,000 stars for the largest known galaxies.
And our host asserts that he knows which star is the hottest, when there are countless galaxies that are nearly 14,000,000,000 light years away from us (that's 82,298,993,881,999,995,000,000 miles from us).
3) There are more galaxies in the observable universe than there are grains of sand on our planet.
And our host asserts that he knows which star is the hottest, when there are galaxies so far away, that the Hubble telescope needs to collect light, for weeks, from completely black sections of space, in order to create an image of over 10,000 galaxies from a single dark patch of space.
And every one of the countless galaxies has millions and more likely billions of stars.
So our host's claim of knowing the hottest star in the universe, is akin to laying claim to knowing the answer to the physics within a black hole, and from where human life on Earth derived.
1
-
Good riddance.
-- We elect him to represent us in Georgia's House of Representative. But he devotes his time to a second job in the Chamber of Commerce. So how much time was he spending doing the work of We The People? Not much. Showing up for a vote, and collecting a 6-figure paycheck from We The People, almost seems fraudulent.
When you are elected to public office, to pass laws, you should not be spending your time working elsewhere.
-- Vance Smith might have an "R" next to his name, and calls himself a Republican. But he is a RINO (republican in name only).
Vance Smith is a beta male. Complaining in The People's House, over the loss of his other job, is wildly inappropriate -- especially since he never should have had that other job.
He used The People's House to air his grievances over over a personal matter. That is the act of a narcissist.
-- He got fired from his other job because he is incompetent, and strives to help the swamp, rather than helping The People.
-- Note that he never said what it is that he objected to in the bill. He gave a meaningless, general, BS excuse for voting against the bill. He said that he supported the bill, but had questions. What questions? And who votes against a bill that they support? He said that he supported the bill, and yet he voted against it. And he is to be trusted? All of this twisted, non-committal, slimy used-car salesman talk is right out of the radical left's playbook.
-- Democrats rallied around him, confirming that he is a RINO. He calls himself a Republican, and votes with the Democrats. And he has done that time and time again.
-- Real men do not go up to a public microphone and cry about losing their other job. Attention at any cost. The act of a narcissist. The act of a Democrat.
-- Do not worry about him paying his bills. He still has his 6-figure congressional job, with large 401K matching, and free, top-tier healthcare for his entire family, and his 6-figure pension.
Vance Smith is a disgrace. Garcia Robinson acted properly, for firing Vance Smith. She probably should have done so a long time ago.
Folks, save your sympathies for the truly needy, such as the victims of violent crimes, veterans living on the street, and hurricane victims that lost their homes. Vance Smith is no victim. Give him a tissue and tell him to get a job in a Broadway play.
1
-
1
-
1
-
@blucat4 "Will Linux run internet banking apps? 'Coz my bank, here in Australia, only mentions Windows and Mac."
If you have the need for an application that will not run natively on Linux, you can install Oracle's Virtual Box on your Linux box, and have it run a Windows virtual machine.
That virtual machine will be slower, compared to running directly on your hardware, and it is an extra step you will have to take when needing to run the Windows program in question, but it will let you run your Windows banking software.
Of course, if you have to run that software often, it will be a bit of a hassle.
If you computer has sufficient memory, you could leave the virtual machine running all of the time (or pause the virtual machine until you need it again).
1
-
1
-
1
-
1
-
1
-
When a fire alarm is pulled, people evacuate. People can get injured.
People in the bathrooms had a tough decision to make.
People in meetings had to cut their meetings, and it is not a simple matter to just get everyone back into meetings (many of those folks have hectic schedules).
Half of the legislative branch of our government came to a grinding halt, when those law makers dropped what they were doing and left the building.
The fire department wasted time, trying to determine if there was a fire.
If a real fire emergency broke out elsewhere, then only half of the life saving personnel would be able to respond with only half of their vehicles.
Our tax dollars for paying countless personnel went down the drain, because instead of them working, they evacuated.
If anyone believes that what Jamaal Bowman did is not a problem, then see what happens to you if you falsely pull a fire alarm. Do not do that. But you would be arrested, criminally charged, and likely charged for all of the costs for all personnel that responded to that false fire alarm.
Jamaal Bowman is a radical leftist degenerate.
1
-
1
-
1
-
1
-
1
-
1
-
@7:59, and again @13:21
Dave, I have been searching high and low for that specific security aspect between Docker and VMs.
I wanted the improved performance of Docker, but not with that risk.
I want a sandbox of sorts, to keep various activities from seeing each other. Social media kept separate from banking, kept separate from gaming, kept separate from testing a download, etc. And even with social media, I want facebook kept 100% isolated from anything and everything (I stopped using facebook years ago, due to its aggressive spying / tracking of everything).
I assumed that using separate VMs was the way to go, but was not sure if Docker was just as secure, and if I should learn Docker. Now I know not to struggle with learning Docker.
I guess I was looking for a QubesOS style environment, without running QubesOS.
Your video was exactly what I was seeking, for months. Thank you.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@grokitall 100% of each item you listed would have been remedied with backups.
Restoring the fouled system with yesterday's image would have resulted in not having the offending files that triggered the blue-screens.
If a company could not reach their downed systems, then that means that those companies were grossly irresponsible; that they had no disaster recovery plan.
What took place was a disaster. The fix was to restore the image from yesterday's backup, by having personnel perform that function. Those companies did not have the backups, and those companies did not have the personnel to do the restore operation. That is on them, for being grossly irresponsible with their company's business continuity.
Those companies painted themselves into their own corners. Those companies organized themselves to not be able to recover from a bad update or intentional attack on their computers.
The fix was trivial, when you know which keys to press. That information was not know until the next day. So the triviality of it is moot, since no one knew which files to delete.
With a backup image, you do not have to know which files to delete. That is the point of having backups.
Restoring the image would have given those boxes an image from prior to having the offending files on them. Hence, fixing the issue and having them up and running as quickly as possible.
Even BitLocker enabled systems would have been restored.
The issue that brought every box down was "software" (data). Restoring the data to a known good state was the fastest, viable fix. Those companies could have done so, but did not. That makes it their fault.
1
-
@grokitall "again, which you do not seem to be hearing, these were locked down and or inaccessible machines"
I did not lock them down and make them inaccessible. Did you?
They did that to themselves. They created their own environment. They are responsible for their creation.
Furthermore, their systems were 100% inaccessible. There are always people that have physical access to the machines. The notion that no one could get to them is absurd.
For machines that you assert were inaccessible, they got them up and running soon after CrowdStrike provided instructions for a fix.
Ergo, those companies and those government agencies had no backups.
Lastly, you have no insight into those companies and those government agencies.
You have no means to know what was accessible, or inaccessible, or anything in-between. You just made up a story about inaccessible machines. Or did those company's CEOs or Operations' VPs drop you a line? Did those government agency's directors also drop you a line?
The only reason that those companies and those government agencies had to wait for CrowdStrike to provide a fix is because those companies and those government agencies could not fix it themselves from a backup -- because they had no backup.
If it was a malware attack, that encrypted files, then they would be down for the count -- with no booting into safe mode for a fix.
Those companies and those government agencies were not doing backups, and did not have disaster recovery plans.
1
-
@grokitall "so you are saying that machine like the airport flight information screens high in the air so that people can see them, and card payments readers like in my local pub should need to have a keyboard and mouse to hand so that some random person can take them into safe mode."
Someone installed those machines. Someone should be able to service them, especially in an emergency.
Also, the physical computer need not be high in the air, adjacent to the screen.
"what about the e-passport machines at the airport, the car parking machines in the street, the hole in the wall cash machines, all the embedded windows devices at the hospital, etc"
Yes to all.
The companies that installed them need to be able to physically get to them in an emergency.
"for all of these there are valid reasons why you won't or cannot plug in a keyboard, video and mouse"
You are an excuse maker. You excuse incompetence and you excuse irresponsible management.
"as for the idea you have that you should just keep around enough skilled, and vetted engineers doing nothing just in case someone decides to act as stupidly as cloudstrike"
I never wrote that. You are a liar.
You are also a moron. Why?
Because you actually believed that I would not know that I did not write that. Only a moron would state that someone wrote something, addressed to the person who never wrote it.
I gave you the benefit of the doubt, and tried to educate you on the general principles of disaster recovery planning. But you are determined to make excuses and lie. You are wasting my time. Wallow in your ignorance. Talk to the hand.
1
-
1
-
1
-
1
-
1
-
1
-
@0:56 -- A sincere apology is one that allocutes to the offense (or crime).
Nowhere did Tuba Bozkurt state what she did.
She called it an "interruption".
You know what else would be an "interruption"? Having your cell phone ring.
"Nothing is further from my mind than to create the impression of ridicule..."
So she is denying that she ridiculed the murder of police officer Rouven Laur, and implies that we got the wrong impression.
Here is what an actual, sincere apology looks like:
"I am apologizing for my rude, uncivil, callus laughter about the murder of police officer Rouven Laur."
"Now that I am repenting, I humbly ask the family and friends of officer Rouven Laur, and his colleagues, and this government body, which I shamed, to forgive me."
"Effective tomorrow, I am resigning from my elected office, as my act is that of a person that does not deserve the honor of holding my office."
But instead, Tuba Bozkurt had her staff put together an non-apology, apology.
1
-
1
-
1
-
1
-
1
-
1
-
@4:00 "On Linux, you're trusting an array of independent developers, as well as the sponsor of the particular distribution you happen to be using."
Most Linux distributions are open source. You can read it, and see exactly what it is doing. And you can compile it, too.
Granted, most people would not have a clue what they are reading.
But the world has hundreds of thousands (perhaps millions) of people that know how to read source code, and they would like nothing more than to take credit for exposing any spying or tracking that is built in to the OS.
The OS's developers know this, and so they do not include such undesirable code in their OS.
They want their OS to be adopted by the public. They know that if they are found to be putting in spying or tracking code, then their OS would be ostracized.
There are scores of free, open source, Linux distributions from which to choose. Developer need every edge to maintain a presence in the Linux arena. It is too easy for people to switch distributions, and so developers will not take that risk.
The "AntiX" distro dipped their foot into the "getting into your business" game, when they included browser bookmarks of their political leanings with their distro. They caught a lot of flak for that. I do not know if they ever apologized or stopped including bookmarks. I, and probably most others, do not care, because there are so many other Linux choices.
If you want a privacy driven OS, then an open source Linux distro is the way to go.
And then there is the hardware spying, that is independent of the OS, that user "@lboston4660" wrote about (look for his comment). And so it goes...
1
-
Evicting his son did not come up at a moment's notice.
There were probably many discussions and arguments, where his father laid down rules that the son repeatedly broke. And the father probably told his son, many times, to either follow the rules, or get evicted.
Now, when the day of reckoning arrives, the son plays dumb, as if he neither knows the reasons, nor that this was the day his father repeatedly warned him about. And to add insult to injury, he tries to embarrass his father, publicly.
That son just got "woke" to reality. That son decided to let the radical leftist lunatics raise him, instead of the decades of guidance that his caring father gave him. He brought the insane drama of the radical left into his father's sanctuary, and the father is not putting up with it.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
For folks that rely 100% on a cloud service, they need to have a way to reinstall Windows, if their boot drive fails.
Otherwise, when they replace the failed boot drive, they cannot use the computer. Ergo, no way to download their data from the cloud service. You have to have a way to get Windows running on your replacement boot drive.
Also, when they get Windows installed on their replacement boot drive, will they have their cloud service password handy? Or will they have a tested "forget password" remedy ready? If not, how will they get their data from the cloud service, without their cloud service password?
And even if everything above works out, with no headaches...
You will get your files back, but will all of your applications be back, and with all of your customized settings?
Do you have your passwords saved in your browser?
Well, that Windows re-installation will not have your browser and the saved passwords.
If you do not do a local, full backup, to an external drive, you are going to have issues if your boot drive fails.
And unless you have a way to start Windows, to recover from your backup, you will have that to contend with, too.
1
-
1
-
@7:22 "...like irreversible sex changes."
"sex changes", "transitioning", etc, is fabricated language mumbo jumbo from the radical left.
There is no such thing as a sex change.
No matter how much make-up, wardrobe changes, acting lessons, drugs, surgery, government intervention, brain washing, yelling, or foot stomping... nothing will change your gender.
The correct wording should have been:
"...like irreversible genital mutilation."
1
-
1
-
Just as CNN is Fake News.
Just as NBC is Fake News.
...so it is with "Fake Critical Race Theory"
It is fake. So call it fake.
Radical Leftists named it Critical Race Theory, so that the title supposedly gives it a hint of legitimacy.
When the rest of us hop on that train, and also call it Critical Race Theory, we are inadvertently giving credence to the name.
When something is fake, call it fake.
If radical leftists name Flat Earth Theory as reality, would you go along with that name?
No. It would be Fake Flat Earth Theory.
When radical leftists name an agenda, do not let them control the language.
The only people that need Fake Critical Race Theory to be "critical", are the radical, hate-America, charlatan, leftists.
Unless you are quoting someone, do not call Critical Race Theory by that name.
Always call it "Fake Critical Race Theory".
Cheers!
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
If it is privately funded, then the Mayor should have nothing to do with the charity.
When the Mayor and her staff are involved, they are using their time, paid by tax payers, to manage the payments.
Once government employees are involved in making decisions, those decisions may not be based on race, creed, religion, gender, political affiliation, etc.
1
-
1
-
1
-
1
-
President Trump's intelligence personnel (yes, he has them, even before being sworn in), have the goods on Trudeau.
Thank you, President Trump, for forcing Trudeau to resign.
When the timing is right, I believe that President Trump will reveal what he has on Trudeau, if it means jail time for Trudeau. For now, President Trump will not do so, because he (President Trump) has other "deals" to be made with other tyrants, and they will not deal if they know that President Trump will still expose them. Wait a year or two, and all of the tyrant's will be exposed by President Trump.
1
-
There is a small chance that your software, used to do your backup today, will not run on future hardware or future operating systems.
For example, if you have a 16 bit executable, today's 64 bit operating systems will probably not run that old program -- at least not directly (there are ways to get a 64 bit OS to run a 16 bit program, but it is not straightforward or for a novice).
So if you have some ancient software, you might want to hold on to an old computer and that computer's old operating system, in order to be able to run that old program -- in a pinch. Keep in mind security vulnerabilities, if you need to put that old, outdated computer on-line.
I used to play a game called Lode Runner. It ran from a floppy disk (the original, bendable floppy disks).
I believe that it is an 8 bit program. And it will run at the speed of the CPU (which for that era, ran in Hz (not even mHz). On one of today's computers, the game would start and finish in a split second (assuming you could get it to run). Even on 20 year old hardware, it would run far too fast. I once tried on an old Gateway 2000, DOS 5.0 computer that had a 66 mHz DX2 CPU, from the 1990s. So I held on to an even older PC (so old, it has no hard drive). But it will run the game properly. I also held on to a monitor that has a VGA port, as that ancient computer will not connect to any of today's monitors. So depending on the software, you might have to take a lot into account to ensure you can get it to work.
In general, you can't 100% count on future hardware and future operating systems to run some installation file that you saved.
Some software will contact a permission server. That server might not exist, or might not support your 10+ year old software version that you saved. And do you have your registration codes for any purchased software? Mine are kept in my KeePass password manager.
If something is critically important for you to run, then you have to hold on to the hardware and software that actually runs it. At a minimum, hold on to the downloaded installation file.
1
-
1
-
1
-
1
-
1
-
1
-
With any luck...
After Andrew Cuomo is convicted of this crime, more charges will be filed.
Hopefully, he will be arrested, again and again, with similar charges from the conga line of women that he groped.
Although it looks like he will do little to no jail time for this current charge, let's hope that when he gets convicted of subsequent charges that he will do hard time.
With any luck, more whistle blowers will come forward, not only for his groping women, but for all of his criminal activity over his lifetime.
Once people see that he has lost all of his clout, that he no longer has political power, that all of his powerful friends will have nothing to do with him, then more and more people will come forward.
And even if this turns out to be his only conviction...
Remember that Andrew Cuomo is a tyrant. He craves power. He craves control of others. He craves attention. Not like you or me or normal people. He is in a league of a small set of people that are obsessed with ruling over the peasants. He sees himself as so far above the masses.
Now, he lost his governorship. He lost his power. He lost it big time. And on top of that, now he will have a criminal record.
For someone with his nefarious obsession with power and status, he is living out his worst nightmare. He has been reduced from a "somebody" to less than a "nobody".
And his shame is on full display for everyone to see. This is killing him inside. This is agonizing for him; more-so than for a normal person. His ego is being tortured.
Not a day will go by, for the rest of his life, where he will find relief. He will be suffering, mentally, in the extreme. And he has earned everything that is happening to him.
1
-
When the thumb's down votes is between 2x to 10x the number of thumb's up votes, on fake news youtube channels (NBC, MSNBC, CNN, etc), on nearly every one of the videos that they post where they try to shine a good light on President* Biden, well...
When those channels are in the dumpsters, when their own subscribers cannot give them enough thumb's up votes, that is very telling.
Huge segments of the population are slamming those fake news channels.
And not just in the thumb's up/down voting:
Read the comments. With few exceptions, those channels are inundated with people slamming the content.
If you think that Carter and Obama's legacy is bad, wait until we see Biden's legacy.
Biden will go down in history as the worst president ever, and by a large margin, no matter how much the fake news channels and totalitarian social media sites try to shield him.
1
-
@5:16 (and other times):
I would rather have watched the road (front facing), instead of watching our host's faces.
The passenger is glued to watching the road in front of him. He is not looking around, and not focused on the other host's face. Why?
The action is in front of him. He wants to watch the road, going around turns at speed. Well, so do I.
But I can't, because our hosts made the video about their need to be front and center for the video. It is about them, and not the car.
@7:45 (and other times):
Same thing.
How can they think that we want to watch them, while testing the car's acceleration?
Once or twice, maybe. But every time? Not a single view of the road in front?
This is either selfish, egotistical narcissism. Or it is cluelessness.
An entire video, and not one front-facing, road-facing view.
Anyone feel like they got a driving experience from watching only their faces?
1
-
1
-
People that take a new car out for a test drive are likely to test the acceleration (and perhaps the braking and cornering, too).
Add to that that the customer is not familiar with the "feel" of the vehicle, and you have a recipe for an accident.
Now add in no tags.
So how would this all play out, if there was a serious accident?
That is probably why the police were cracking down.
And for the people that are disparaging the police...
If you were on the receiving end of losing a loved one, or you yourself were critically injured, you would be bashing the police for having not done everything they could to have prevented the horrible accident. You would probably sue the police for not having enforced the corresponding motor-vehicle laws.
When the police enforce safety laws, there will always be people that get upset. Do not hammer the police when they are enforcing safety laws.
If you borrowed your friend's car, and it had no plates, would you expect to not be held responsible? Would you just take the car and go driving?
It is so easy to go police bashing. It is also being on the wrong side of safety, and wrong to aggravate those public servants, who run into life-threatening danger, for doing their job. And yes, it is their job to make sure that all vehicles are properly plated.
Save your police bashing for the tyrants that abuse their power or deny you your constitutional rights.
1
-
1
-
@askleonotenboom I do not use OneDrive. But I am still curious about its functionality. It helps me to learn, and to help others that might be seeking help. That is why I asked. If I were using OneDrive, I would test it myself.
With the above in mind, I have one more question:
Will OneDrive follow a symbolic link to some other directory (via the "junction" or "mklink" command)?
If yes, then you should be able to have OneDrive act on any directory, by creating a symbolic link within OneDrive's directory.
Windows is a bit choosy when it comes to symbolic links. I discovered this when I was using a "map network drive" on a remote system.
Consider computer #1 and computer #2:
From #1, I was able to access the remote drive on #2. I then (while logged in directly to #2) created a symbolic link on #2's drive, to yet some other location. From #1, Windows complained and refused to let me access the target of computer #2's symbolic link. When logged directly in to #2, the symbolic link worked. But when I accessed that symbolic link while on #1, as a mapped drive, Windows balked (I do not recall the message -- but it was a refusal).
So I wonder what the behavior would be if a symbolic link were used within the OneDrive directory that targets some non OneDrive directory?
Perhaps you can test this, if you are also interested in the answer?
1
-
When your business grows large enough for you to lord over your customers, be sure to install an automated answering system that forces your customers to listen to a list of choices, and pick form those choices. Make sure that pressing 0 will tell them that that is an invalid choice, and will hang up on them after a few attempts. Be sure that your automated system politely thanks the customers, while hanging up on the customer. Having a computer generated voice say "Thank you for calling. Goodbye", does wonders for rudely hanging up on your customers.
Make sure that you are so proud of yourself, that you know (in your mind) that one of the choices on the automated option's list will apply to every conceivable issue that a customer might be calling about. Remind yourself that there is no way that this will frustrate your customers. Be sure that if someone does manage to find the magic route to speak to a live person, that that person will never be able to get a message to you, about how poorly your phone system is organized.
Have your automated system and your live help desk personnel insist that every customer power-cycle their equipment, even when that has nothing, whatsoever, to do with their issue.
Force your customers to listen to sale's pitches about your service, while your customer's services are down. Customers, who lost their services, like to listen to unrelated advertisements, while trying to speak to someone to resolve their service issues.
Be sure that your automated service keeps steering customers to install your app, which has nothing to do with the reason for them calling.
Be sure to have your staff assure your customers that they will escalate your concerns, but instruct your staff to never do so. No matter how many complaints you get about the above, remember that you are right and your customers are wrong.
If you need help in setting up your "marvel of technology phone system", call in to Comcast and follow their lead. They are a shining example of treating their customers like family (that you will never visit over the holidays).
The above aside... Leo, this was a very good video.
1
-
@7:59 -- The people that run Linux are, on average, better (not as human beings, but as it pertains to computer privacy and security).
Less Linux systems are targeted.
Also, people that use Linux are less likely to install malware.
Stating that malware can run on any operating system, and therefore all operating systems are equally susceptible (none are better), is somewhat absurd. Of course, if you install malware on a Linux box, then that Linux box will be compromised.
I avoid cookies. But they are a necessary evil.
For example, if you are shopping on Amazon, then if you do not use cookies, you will have to login for every item that you click on.
My solution is to use a virtual machine, for shopping on Amazon. I login, once. The cookie is created, and I do my shopping. Then I clobber the virtual machine (it goes back to its previous snapshot).
The above approach works with just about any web site. And there are no cookies for anyone to steal, unless you install malware while you are on a site.
I use a password manager, which makes logging in to various sites a near-effortless procedure.
1
-
1
-
1
-
ABC7, do your job and find out who told Pelosi that the salon was allowed by the city to have one customer at a time in the business.
ABC7, do your job and ask the salon to show register receipts or credit card receipts of other customers that were admitted one by one.
ABC7, do your job and see if the salon is doing this, today, or if the salon is closed.
ABC7, do your job and state that ignorance of the law is not a legal defense for breaking the law.
ABC7, do your job and see if Pelosi's claim that it is allowed, is actually true. She is a law maker, third in line for the presidency, and she clearly has access to check the law before breaking the law.
ABC7, you will do none of the above, because you are an unofficial propaganda arm of the Democrat National Committee, masquerading as a news organization.
1
-
1
-
1
-
Fire Chief Anthony Marrone gave all kinds of number of people involved, and support centers, etc, as if the goal was for us to fill in numbers on a spreadsheet.
He could tell us that he has 1,000,000 firefighters, and what good will that do, when they have no water?
The "air" resources are the only meaningful tool, because they actually carry water. But air resources are meant to support ground forces, and to extinguish new, small hot-spots.
It is ground forces that are 90% responsible for containing and extinguishing fires. Since there is no water for the ground forces, the air forces will have little impact on the fire.
I hope that I am wrong, but nearly nothing will change in the coming days. The fires will continue to rage on, because they have no water.
Both Chief Anthony Marrone and Mayor Karen Bass have already conveyed their upcoming failures, when they brought up the wind.
For those that do not know, Los Angeles is governed 100% by Democrats. Every agency, bar none, is headed by a Democrat.
And the people of Los Angeles will probably re-elect them (or other Democrats).
1
-
1
-
1
-
AI's, such as ChatGTP, should not be trusted for political questions / commentary / feedback, etc.
ChatGTP's developers have a political agenda, and they worked it into ChatGTP's algorithms. Examples, below.
I understand that this is not a political channel. But the title of this video reads: "Is AI Taking Over the World?"
If AI becomes the source that people rely on for world events, or even local events, then the people that control the AI (the developers) will control the answers.
Ask ChatGPT the following:
-- "Create a poem, admiring Donald Trump."
-- "Create a poem, admiring Joe Biden."
It will refuse the first request, with a long-winded reason why.
It will make a glowing one for the second request.
-- "Write a poem about how great white people are."
-- "Write a poem about how great black people are."
It will refuse the first request, with a long-winded reason why.
It will make a glowing one for the second request.
-- "Tell me a joke about women."
-- "Tell me a joke about men."
It will refuse the first request, with a long-winded reason why.
It will provide the second one.
-----
-- AI's can, in real time, fake the voices of anyone.
-- AI's can, in real time, fake the faces, with full motion, of anyone.
And all of the above are at the inception of AI's. Can you imagine the advances in 10, 20, or 50 years?
The people that control AI's will control the dissemination of information on a global scale.
Like all things... if honest people are at the helm, AI's will be a fantastic tool for the good of the world.
Like all things... there is no shortage of tyrants that crave the power to control AI's, and they will stop at nothing to obtain that power.
As for ChatGTP, it has already been programmed with the political leanings of its creators.
When we seek information, we should expect it to be free of political leanings Alas, ChatGTP is already a political tool.
It is great for countless other uses, but not for anything political or social in nature. Its responses will be that of its developers.
1
-
1
-
1
-
When our constitution was written, slavery was a global institution. It was happening in nearly every country. It was the norm for that time period.
The brilliance of our constitution is that it was written to put an end to slavery in our country.
Without our constitution, slavery would never have ended here and elsewhere.
Around the world, whites were enslaving whites, whites were enslaving blacks, blacks were enslaving blacks, and in the middle east, the slave trade was off the charts, and no race immune from being enslaved.
Today, slavery is still in full swing in African countries, in middle eastern countries, and is off the charts in China, and Professor(?) Elie Mystal cares zero about it, and says nothing about it, and neither do any of the hosts on The View.
That Professor(?) Elie Mystal is simply a racist opportunist that wrote a book that got him on TV to sell his books.
Elie Mystal is a racist and a degenerate.
1
-
1
-
The title of this video is a lie.
Mr. Garcia's deportation was not an accident. It was the law, and President Trump's administration enforces the law.
President Trump, Attorney General Pam Bondi, White House Deputy Chief of Staff Stephen Miller, Directory of Homeland Security Kristi Noem, Secretary of State Marco Rubio, and Press Secretary Karoline Leavitt have each stated, daily, for weeks, that Mr. Garcia is a gang member, and two courts (one an appellate court) have upheld Mr. Garcia's deportation order.
And yet @WHAS11 knowingly, intentionally, deliberately lied to the world.
@0:31 "...a Maryland man..."
That is a Lie.
Mr. Garcia is not and was not a Maryland man.
Mr. Garcia was and is an El Salvador man.
And yet @SHAS11 knowingly, intentionally, deliberately lied to the world.
@0:46 "...blocking the deportation of some Venezuelan migrants..."
That is a lie, by omission.
They are Venezuelan "illegal" migrants.
@0:56 -- The due process is the Alien Enemies Act.
Fake news channel, @WHAS11, is counting on viewers to not read the Act.
@1:11 "...the migrants received this notice..."
That is lie, by omission.
They are "illegal" migrants.
@1:23 "...send them to the CECOT prison..."
That is a lie.
The United States of America has zero say in what the El Salvador Government does with its El Salvador citizens.
The El Salvador authorities do their own investigation on every illegal alien that is deported to El Salvador, and the El Salvador authorities set them free, or send them to prison, based on their laws, as well as choosing which prison, if any.
@1:44 "...deporting hundreds of Venezuelan migrants..."
That is a lie, by omission.
The are "illegal" migrants.
@2:08 "...a father from Maryland, who was taken and put on a plane".
That is two lies.
Mr. Garcia is not and was not from Maryland.
Mr. Garcia is and was from El Salvador.
Mr. Garcia was not "taken".
Mr. Garcia was deported.
@2:20 -- Senator Chris Van Hollen is in violation of the Logan Act, and should expect to be arrested and criminally charged with violation of that federal Act.
@2:41 -- "...and the administration has provided no evidence to the courts".
That is a lie by misdirection.
The courts have the evidence. There are police records, and the courts have ruled that Mr. Garcia is a gang member. So @WHAS11 is telling the world that the administration should provide the court's own evidence to the courts that courts have ruled on as evidence.
@2:53 -- Now @WHAS11 is fabricating evidence.
@WHAS11 has no evidence that that photo is not genuine.
@WHAS11 is not reporting the news. @WHAS11 is fabricating the news.
@3:00 "The White House says that Abrego Garcia will not be returned home, despite the Supreme Court ordering to facilitate his release".
That is a lie by misdirection.
The White House has facilitated the release of Abrego Garcia. The White House has not effectuated the release of Abrego Garcia, because the White House has no authority to do so.
Imagine an El Salvador court ruling that the White House must send them an American citizen.
How about an Egyptian court ordering Japan to send one of its Japanese citizens.
Do you see how absurd @WHAS11's lie is?
That is why the Supreme Court's order was to facilitate, and not effectuate, Mr. Garcia's return, and the White House complied with that Supreme Court order.
This channel is vying for the throne of being the #1 fake news outlet.
Thumb's down click earned.
1
-
I am from the school of having redundancy, especially with backups.
After a backup is completed, I like to make a copy of that backup onto yet another external USB drive.
So my questions are:
1)
When Timeshift does a backup, does it place all of your files into an archive (a single file like a tar file), allowing you to easily copy that archive file to a new location?
Or does Timeshift simply copy all files (like "cp -r) in a mirrored way to your target location, resulting in simply having your same file structure located elsewhere for you to read, edit, etc?
2)
Also, is there a password and/or encryption option, so that if someone gets their hands on your external USB drive (that contains your Timeshift backup) that would prevent them from having your data in the clear?
3)
Lastly, does Timeshift offer file compression?
Your videos are a big help in my researching moving from Windows to Linux.
When I make the leap, I want to have everything prepared, so that I limit my struggle with my new OS.
Thank you.
1
-
1
-
1
-
1
-
1
-
@mya5980 "Hope HAWAII learns from this not to vote Democrat ‼"
Not a single blue / Democrat state (meaning not a swing state) will change their voting for Democrat candidates.
They see what is happening. They see the failure of their elected officials, and they will re-elect them.
Then they will complain about the crime and inflation and corruption and filth, and will vote Democrat, yet again, for the subsequent elections.
A handful of leftists wake up and realize that liberalism is a cancer.
But you never see conservatives becoming Democrats.
Occasionally, you will see someone claim that they are fed up with Republicans, and are switching to the Democrat party.
Whenever you see that, it is a leftist that is lying.
Liberals consist of the clueless, the ones brainwashed to feel guilty, the ones that see minorities as a lower species and seek to rescue them, and the ones that cash in on destroying our country.
Hawaii, New York, California, and the other blue states will continue to vote Democrat, even while their country burns.
Liberalism is a mental disorder.
1
-
1
-
1
-
1
-
Sysinternals (now owned by Microsoft) has a free "Autoruns" tool.
Run it with administrator privileges, and it will show you every process that automatically starts with Windows booting up, and starts with your login, etc.
You can uncheck any item, and the next time you restart your computer (or log back in, as the case might be), the unchecked items will not automatically start.
Note that Autoruns will not delete any files. It simply stops items from automatically starting when you uncheck those items.
Autoruns will show you a long list of stuff that automatically starts. You might even identify spyware, or other unfriendly services. Uncheck them, and they will no longer automatically start. You should probably do a web search for the names of the items before unchecking any items.
But be warned:
Autoruns will not stop you from crippling your own computer. If you uncheck something that Windows must start in order to function, then when that item does not run, Windows will not boot up. So uncheck items at your own peril.
I suggest that you do a full backup before taking any risks.
1
-
@2:45 "But that's all tracked 'anonymously'. In other words, without the association to your account."
Google can create reports that excludes associations with the users.
Google can create reports that includes associations with the users.
To state that is is "all" tracked "anonymously" is nonsense.
@2:53 "You need to trust that. You need to trust that Google's actually deleted the association."
Google is the #1 spyware company on the planet.
Google has more data on people than any company has ever had in the history of our planet.
Google has more data on people than all government agencies, combined (albeit, the types of data will vary, where government agencies will have legal type data that Google probably does not have). But in terms of your on-line activities... Google dwarfs what the government has on you.
My point is that for anyone to "trust" that Google has deleted your data is nuts.
Even if you never visit Google's web site, Google still tracks your activities via associations with countless other web sites, and applications you might have installed.
Google makes its oceans of $$ by spying.
I would sooner trust a complete stranger with my life's savings before I would trust that Google actually "deleted the association" with my on-line activities. And I would never trust a complete stranger with my life's savings. So you know where my trust with Google deleting associations stands.
When you have Google delete anything, they simply mark it (or tag it) in their myriad of databases as "invisible" (or something similar). Meaning that you, the user, will no longer see it. But Google still has it, and will always have it. Their executives can search your data (deleted by you or not deleted by you) as easily as you can use their search engine to do a search.
By all means, use Google for your on-line needs. But know that once they track something, it never, Never, NEVER gets deleted from your profile.
1
-
1
-
Saying "Good boy" while he is panicking is interpreted as reinforcing his panicked state of mind.
When you hug a dog, or give complements to a dog, or reward a dog, when the dog is misbehaving, or frightened, etc, that received by the dog as being told that his state of mind is correct.
The right thing to do is to show the dog that you are the alpha male (or female, in this case), and have the dog take its cues from you.
When the dog exhibits bad behavior, do not say "Good boy". Instead, say "No!". Do not yell. But say it with authority. If need be, also correct him with a tug on his leash. You, his pack leader, must make clear to him when his behavior is unexceptionable.
It might seem counter-intuitive to do the above. But a dog's brain is not a human brain. You have to get the dog to re-focus on something else; to snap the dog out of their nervous state of mind.
Watch a few episodes of The Dog Whisperer. You will see that a nervous dog needs a strong leader to follow. Alas, our host is not presenting herself as a strong leader.
Our host is an expert groomer.
However, like so many dog owners who love their pets with all their heart, they do not understand dog psychology.
1
-
I purchased a 4TB Crucial MX500 2.5" SATA SSD, based on rave reviews of the smaller capacity models in that line. I expected equal or better performance.
The drive turned out to be a slug.
Although it was faster than a mechanical drive during simultaneous reads and writes of countless small files, it was slower than my USB based mechanical drives, as well as internal mechanical drives (all mechanical drives being SATA based).
This was when the mechanical drives were empty (because they slow down as they run out of space). And it was for several different model mechanical drives for both Seagate and Western Digital.
The 4TB MX500 was faster in one other respect. No waiting for platters to spin up.
But it was a disappointment.
I also tested the 4TB MX500 as a temp drive for creating a crypt-o Madmax based Chia plot.
Forget it. It was very slow, even falling below 50 MB/s on the writes, after its cache was exhausted (Chia plotting will do that).
Would the other capacity MX500 drives have that same dismal performance?
From the reviews, they supposedly do not slow down -- at least not much.
But the 4TB model slowed to a crawl when its cache ran out.
If Crucial changed the design for the 4TB model, to save a few cents, figuring the rave reviews on the smaller capacity MX500 models would ensure sales of the 4TB model, then shame on them.
I found out after my return window closed. So now I have a paperweight. A huge amount of space that is slow. Like filling a swimming pool with a garden hose.
My old 2TB Samsung T5 is 100+ MB/s faster than the 4TB MX500, even when the MX500 has all of its cache free.
And the T5 barely slows down, even if you write 2TB to it without rest. It is a beast.
By the way, the Samsung T7 also becomes a slug when its cache runs out. Not so with the T5. So Samsung added faster cache for the T7, and far slower NAND cells for the bulk of its storage.
1
-
@2:07 "Today, most CPUs have both a base clock speed, as well as a turbo or boost frequency, which they can operate at, if they remain within safe temperature and power limits"
I see that description as the chip maker's marketing language.
CPUs will operate at full speed, 100% of the time, unless they are unable to do so. That sounds like the same thing, but it is a matter of how you look at it.
I see it as CPUs throttling down, when there are issues. I do not see it as them boosting their speed when there are no issues.
CPUs retard their performance, as needed; not increase their speed when possible.
Car manufacturers do this, too.
They have a "Sport" mode (or "Performance" mode, etc), and it is advertised as making your car perform better/faster.
When, in fact, it is that when the car is not in "Sport" mode, that the car decreases its performance, in pursuit of better fuel economy.
By the way, this was yet another one of your excellent videos. Easy to follow, and very good information.
Thank you.
1
-
1
-
1
-
Boodysaspie What I wrote vs. what you wrote that I wrote, are two different things.
Yes, you followed what I wrote about cars, and you took the exit lane.
A computer can and will run at 100% capacity, forever, baring no overheating (which is routinely accomplished in every data center and many homes).
A car cannot run at 100% capacity, forever.
A car engine will seize, whereas a CPU will run, indefinitely.
A car engine is not designed to run at redline for a lengthy period of time.
A CPU is designed to run at 100% capacity, indefinitely.
My original comment and my original analogy was based on how companies pitch their products.
Your analogy twisted that into flooring the gas pedal 100% of the time, and you called that following my lead.
My comment, as it pertains to CPUs and cars, is how they are advertised as increasing its power, when they are actually reducing power.
You turned that into cars having screaming engines 100% of the time, which is unrelated.
I will not get sidetracked with this nonsense any longer.
1
-
Boodysaspie Any CPU, when receiving both clean, continuous power and proper cooling, will run indefinitely at its rated speed (so called "boost" speed).
No CPU will throttle down, until it reaches a pre-defined temperature condition. Cool it sufficiently, so that it never climbs to its pre-defined temperature threshold, and it will never throttle down while crunching data.
Other conditions can cause a CPU to throttle down, such as hibernating, running on battery, etc. Turning off the computer will throttle it down, too, as will the loss of power when our sun dies.
But when the above conditions are maintained, any CPU will crunch at 100% capacity (meaning, taskmanager will show all cores pinned), without end. When conditions deteriorate (when the CPU gets too hot), that is when it throttles down.
1
-
1
-
1
-
@4:18 "...a hundred thousand miles, and then the electric part wins by some..."
No so.
When the time comes that you have to replace the car's custom batteries, it will cost you $12,000 at a minimum (at year 2022 prices).
And all batteries eventually need to be replaced, no matter how perfectly they might be maintained. All of them eventually stop holding a charge.
And before the batteries get to the point of requiring a $12,000+ battery servicing, your electric car's range will diminish, and diminish, and diminish. That is like filling up your gas powered car and getting less and less mileage. So your electric car still sucks up electricity, produced by burning coal, and yet it gets ½ the mileage.
And when the time comes that you have to replace your car's custom batteries...
From where will you get those batteries, and who will install them? These are not like the traditional batteries used for nearly a century.
The answer is that you get the batteries from your dealership. That is... assuming they have them.
What are the chances that you drive in and they tell you it will take 6 weeks, or 6 months, before they have replacement batteries for your vehicle?
A likely scenario is that you bring your car in, pony up $15,000 and are told it will take 3 months.
Adding in that cost and inconvenience, how much is that electric car saving you?
And if you think you can sell the car before the batteries need to be replaced...
If you are close to needing new batteries, that will be factored in to the car's resale value.
Good luck finding a buyer that does not know that in 12 months they will have to spend $15,000 on new batteries.
So much for the savings, and so much for saving the environment.
1
-
1
-
Netflix can easily solve this problem, by offering 30 second sample of streaming content at various resolutions.
They can provide customers (or potential customers) with the hardware requirements necessary for each resolution level, and instructions on how to test if their equipment is able to play each of their sample resolutions.
This is not difficult, and Netflix can probably put this together in under an hour; certainly in a day or two.
Netflix simply does not care. Their bean counters see customers as lemmings, and expect the lemmings to just hand over payments for video resolutions that the cannot play.
I never buy content that I cannot fully control.
For example, every digital song that I own... I have the actual files, with no special software needed to deal with digital right's management. I made the purchases, and have physical copies of the content, in an unencrypted form.
I will never allow myself to be at the mercy of an internet connection nor a media permission server at some company's remote location.
When I click play, I could be in a cave. My equipment needs to rely on nothing and no one.
Alas, people want the convenience of click "Buy", and having the media service organize and manage their purchased content. Sooner or later, they will be burned, when they lose access to what they purchased, because they never took physical ownership of their purchases.
I am in favor of renting a movie that gets streamed to me. But to own a movie, I must have the file that I purchased in my possession.
I see digital ownership the same as my vinyl records. My vinyl purchases are mine, and I rely on no one, and no one can stop me from playing my vinyl. The same goes for digital songs and digital movies.
Our host did an amazing job illustrating the elitist mindset of Netflix's executive management's personnel.
1
-
1
-
1
-
So a few unelected, answerable to no one, web site employees have decided that they will determine what is right and what is wrong.
Those few ultra arrogant employees will re-define our Bill Of Rights, and the freedoms endowed to us by our creator, and protected by our constitution.
Those few self-righteous employees will overturn the Supreme Court of the Untied States of America, and decide that hate speech is not protected, and they will also define what is and is not hate speech.
Section 230 of the Communications Decency Act shields facebook from lawsuits. If their site has postings that slander you, there is nothing you can do about it. They are protected, because they are a neutral platform.
If facebook decides to moderate their content or edit their content, then they are no longer a neutral platform. They become a publisher (like the New York Times), and they can be sued for libelous content, because their Section 230 protection will no longer apply.
The whole point of section 230 is to allow for platforms where people from all walks of life can engage in free speech, and the owners of the platforms are harmless from legal action. But that is only if the web sites mind their own business, and do not moderate, edit, or take sides.
Those few employees think that Zuckerberg will not be able to replace them in a heartbeat?
Those facebook employees are an example of the inmates trying to run the asylum.
Those facebook employees are part of the swamp.
1
-
1
-
1
-
1
-
1
-
@3:25 -- Louis, that is a beautiful listening room -- sound treatments, too!
A couple of suggestions, if your room can accommodate these changes:
-- Pull your speakers away from the wall. You will get a better soundstage.
-- If possible, have your speakers positioned to fire the long way into the room. Ideally, Vandersteen speakers should be 1/3 into the room, and your seated position should be 1/3 from the wall behind you. That is, of course, if the room is large enough and your wife (if you are married), will not divorce you.
I have listened to Vandersteen's System Nine several times, in my local high end store. Richard Vandersteen visits, annually. I have met him 5 or 6 times. I also own Vandersteens.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
For a family sedan, the 2.0 Accord has excellent handling.
Unfortunately, the car's electronic throttle will not allow you to take full advantage of the car's handling.
If you are rounding a turn, and have the steering wheel turned past a certain point, then no matter how hard you press on the gas (you can floor it), the car will not accelerate. It will maintain speed, but not accelerate. As soon as you come out of the turn (as soon as the wheel returns close to center), the engine will kick in with authority.
This is the case while in any mode (including Sport mode), as well as turning off traction control.
The only way to take such turns at a faster speed is to already be going faster when you enter the turn. But sometimes you might not want to enter a turn too fast, and would rather increase your speed while already in the turn. That will not happen in the Accord. The electronic throttle is tied into the steering wheel (or tied into the front wheels), and denies your gas pedal's demand to accelerate in a hard turn.
And this is with the stock all-season tires.
I was considering getting much grippier performance tires. But what for? The car refuses to put power to the drive wheels while in a turn.
I am not suggesting that anyone try to duplicate the conditions I describe above, because you stand a good chance of having an accident. But if you have an eye towards handling performance, and road conditions are safe (sunny, dry, clear, and no other cars, etc), and want to take a turn at speed, the Accord is the prude that wags its "No, no" finger at you.
99.9% of drivers will never push the Accord (or any car) around a turn hard enough to run into the Accord's electronic throttle ceiling. And it is a great family sedan with a good amount of focus on all-around performance. But know that it not only has physical performance limitations (all cars have them), but it also has unforced, designer imposed limitations, and there is no way to circumvent the throttle issue (short of reprogramming the throttle control sensor, and void your car's warranty, and risk who knows what else, due to your tinkering with the sensors).
I suspect that the Civic Type-R will not have this problem.
I do not like the looks of the Civic Type-R. But had I have known about the Accord's throttle programming choice, I might have passed on buying it.
Cheers!
1
-
1
-
@0:40 "...simply because they were Muslim..."
When the news (well, this is ABC, so "news" is a stretch) claims that the attack was due to them being Muslim, without any evidence that it was because they were Muslim, they are probably lying.
How would that landlord know that they were Muslim?
How would ABC know that the landlord knew that they were Muslim? ...and that it was their religion that triggered the landlord?
I am not defending the landlord. He should rot in jail.
I am suggesting that the public not trust ABC news. ABC finds a murder, and they tell the public that is was due to hatred of Muslims. ABC fabricated the reason, and that is likely to result in more people being attacked or murdered. It is wildly irresponsible for ABC to inflame the public with such a lie.
If ABC has evidence that the landlord committed the murder due to them being Muslim, then ABC should have provided that evidence. But they did not, because they lied.
That landlord might have killed that boy and stabbed his mother for any number of reasons. We do not know why, and neither does ABC news. And for ABC to lie about the landlord's reasons is despicable.
That landlord is filth, and ABC news is a disgrace to the freedom of the press for fabricating news that will incite violence.
If any other violence takes place, due to the above lie, then that reporter (Pierre Thomas) should be held criminally liable, as well as his superiors (if they did nothing about his lying).
Can you imagine if President Trump announced that some murder took place, and fabricated a racial component to that murder?
Yet, that is what ABC news did.
Disgraceful.
1
-
1
-
Louis, they probably had executive management changes, and the new management consists of tyrants.
I worked for a company for 22 years.
For the first 11, it was a fantastic experience. But the President of my company was getting pressure from the parent company, to cut, cut, cut, even though our President made the company extremely profitable. The President rewarded the employees, because he really did appreciate their hard work.
But the CEO of the parent company cared zero about anyone, other than her own power, and sucking out every dime she could from her subsidiary companies.
Alas, she fired our President, instead of rewarding our President. And that is when our company went down the toilet. We had 5 or 6 management changes over the next 11 years, each one worse than the last one.
So can you imagine, when Lenovo and Motorola treat their customers as you described, how they must treat their employees?
It must be a nightmare to work for either one of them.
I am not going to look up who used to be running Lenovo and Motorola, when they were well managed, compared to the horror show management they have today. But I am confident that completely different people are now running those companies.
1
-
1
-
1
-
Please take note of the "super" pinned comment, posted directly below our host's video. It has a light blue background.
An anonymous youtube employee is using g-d mode, to post her comment above all other comments. No one can unpin it -- not even the channel's host.
No one can reply to that comment.
Some anonymous youtube employee is trying to convey that her opinion is fact.
That is a form of editing, and youtube is prohibited from being an editor, in order to retain protections under Section 230 of the Communications and Decency Act.
youtube is in violation of that Act, and should lose its Section 230 protections (which allows anyone to post comments, without youtube being sued, due to what the public posts).
If youtube posted comments, like anyone else, in the comments section, that would be fine. But when youtube chimes in, as they are doing in this video, with editor powers, they cease to be just another user, and become editors.
1
-
1
-
1) Actual, real world speed tests should have been done.
2) Actual, real world charging tests should have been done.
I am all in favor of owning quality gear. So I understand paying 20x the price for the quality product. However...
If the lower cost cables will deliver the power and performance that you need (which we do not know (see #1 and #2, above)), then buy 3 of the lower cost cables, and you will have spares if the lower quality cable fails.
Of course, will you find your spare cables if the need arises? Also, can you afford to have a connection fail, even if you have a spare cable ready to replace it?
For most folks, I suspect that a reasonably reliable, lower cost cable would be fine. Two $18, decent quality cables will save you approximately $100, compared to the much higher quality Apple cable.
1
-
1
-
@JCthedude601 It depends on the nature of the screw-up. Many people, who have singed consent forms, have won lawsuits against doctors.
If, for example, a doctor gives you the wrong drug, or overdoses you, because he/she was distracted, or drunk, or sleepy, resulting in serious injury to you or resulting in your death, then that consent form does not hold them harmless from their blatant negligence. Even if the form states that it will hold them harmless, if the mistake is blatant, a judge will likely still rule against the doctor.
J Carr, I am not sure how a doctor's consent form pertains to the doctor being compelled to display his/her license to practice?
In other words, if a doctor conducts any actions, where a license is required in order to legally take that action, then the doctor must make his/her license available. He/she cannot, for example, refuse to show his/her license under the condition that you first explain why you want to see his/her license.
1
-
@openyoureyes4799
So legally blind people have a right to drive?
And eight year olds have a right to drive?
And people that are incapable of understanding road signs have a right to drive?
Just check their DNA. If it comes up human, then put them behind the wheel.
Rack up all the tickets you want? As driving is a human right, tickets will not result in a suspended or revoked driver's license, because no human will need a driver's license to exercise their "right" to drive?
Never took driving lessons, or passed a written test or road test? Not a problem, for this human right.
Just get behind the wheel, with zero experience, and zero training, and head for Manhattan via your nearest highway.
Our traffic, our accidents, and our fatality rates will naturally be reduced to new lows.
"sarcasm" should be read into the above.
openyoureyes:
If your insane remark was an attempt to elicit a response, then your tolling worked.
1
-
@ConquerCollin You do not need a license to buy a chainsaw, and you do not need a license to buy a car (the license is for permission to drive it on public roads).
You may use your chainsaw all you want, on your private property.
Try using it on public grounds, and you will discover that you need a license.
As to cooks and servers:
They are employees of the establishment, and it is the establishment that is licensed to serve food.
You have, again, written "right to travel".
Where in this thread has anyone written that you do not have the right to travel?
Where in this thread has anyone written that you need a license to travel?
And you are correct, that you cannot license a right away. But since driving (operating a motor vehicle on a public road) is not a right, then mandating a license is not infringing on that right (because the alleged right is non existent). The right must exist in order to lose it.
I find it astonishing that you are advocating for anyone, with human DNA, to have the "right" to get behind the wheel of a 18-wheeler, a car, or even a motor cycle.
-- Has the driver reached puberty? What does it matter? According to you, it is their human right to drive.
-- Can the driver read? What does it matter? According to you, it is their human right to drive.
-- Can the driver see well enough? What does it matter? According to you, it is their human right to drive.
-- Is the driver suffering from disorientation, memory impairment, auditory hallucination, or paranoid delusions of persecution? What does it matter? According to you, it is their human right to drive.
-- Is the driver's mental state consistent with multi infarct dementia, schizophrenia, and Alzheimer's. What does it matter? According to you, it is their human right to drive.
--Does the driver have a history of driving on sidewalks, running stop signs, running red lights, doing 60MPH in school zones, etc? What does it matter? In your "right to drive" society, they have no license to lose.
1
-
1
-
1
-
1
-
Do not trust those woke companies.
Yes, they probably laid off those "teams". But did they really fire those employees -- all of them?
Or is the director, VP, etc, of their DEI team moved into a different role, with basically the same agenda, but without the controversial title?
These companies have decided that having a department labeled "DEI" is toxic.
So they nix the title, and shuffle the staff around -- as if that will change the way those same people conduct themselves.
Perhaps some of those people have really been terminated from those companies. But remember that we are dealing with woke people running those companies, and they lie and deceive as easily as they breathe.
Do not trust them. Do not take them at their word.
None of their claims have been verified. And it is not enough to confirm that their DEI teams are gone. The real verification is knowing whether or not any of those people are still employed by those companies.
I will lay odds that many of them are still employed at those companies, with new titles.
Folks, whenever there is news that some woke TDS inflicted people have turned over a new leaf and have seen the errors of their ways, do not believe it. It is most likely just another deceptive plan to have you let down your guard. Those people are habitual liars. Trust nothing that you hear from them. Verify everything.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
Not doing backups is not limited to individuals.
The recent CrowdStrike event revealed that millions of business computers (many from huge companies) were not being backed up.
The recent CrowdStrike event revealed that countless government computers, providing critical services (such as 911 related services) were not being backed up.
When their computers all blue-screened, that was clearly a data / software issue, as there is no way that they all had simultaneous hardware issues.
At that moment, they had no way of knowing what the offending data was.
Well, that is where a backup comes in. Had those businesses and government agencies restored from yesterday's image, they all would have been up and running, with the minimum possible delay. Some of them should have taken an image of the downed systems, before restoring the image, in order to grab (for example) database files from the downed systems (because yesterday's backup image would not have an up-to-date database).
So those companies and those government agencies had no daily backups (or possibly no backups at all), and they had no disaster recovery plans.
They were incredibly lucky that they were able to fix the issue after CrowdStrike determined the problem, and gave instructions on how to delete the offending file from the affected systems.
But if those affected systems were brought down by a malware attack, they would have been down for good. They would have had monumental problems on their hands, due to not having backups.
So the same folks that do not back up their own personal computers... well... many of them have jobs with big companies and government agencies, and they do not back up those systems either.
1
-
@askleonotenboom Leo, the CrowdStrike blue-screen issue was triggered by a bad* configuration file that was placed in the filesystem's user space (ring 1).
Depending on how you look at it, it is debatable whether or not the configuration file was bad (more on that, below).
That configuration file was read into a kernel driver (ring 0), resulting in that kernel driver experiencing a logic error. That resulted in the blue screen.
A restore, from yesterday, would not include that bad configuration file. Upon a restore from yesterday's image, that bad file would not be there, and neither would the blue screen.
I do not really deem the configuration file as being the culprit. So although it was a bad configuration file (it contained all zeroes), the kernel's driver should not have imploded. That driver should have code in it to validate the veracity of the configuration file, deem it improper, and ignore it.
But that kernel driver was not coded as such. So I put the blame on that kernel driver. After all, it was the driver that freaked out (in a manner of speaking), at the kernel level (a ring 0 violation), that resulted in the blue screen. Ring 1 code (the home of the configuration file (user space)) should not be able to panic ring 0 code.
I also put the blame on Microsoft, because they signed off on that kernel driver.
You and I cannot install driver code (or any code) into Microsoft's kernel, without Microsoft's blessing.
No one should be able to install software that makes a kernel driver choke. Yet, that is what CrowdStrike did. They installed a channel update (a data file) that is read by CrowdStrike's kernel driver (a driver approved by Microsoft).
With the above in mind, any computer without that channel update file would not have whacked out the kernel driver. So after getting blue-screened, a restore would not include that channel update file. Hence, no blue screen after the restore. You would be restored to a known, good state.
If an intentional attack occurred, and successfully encrypted critical files, then the only fix would be restoring from a backup. But now we know that millions of those computers had no backups. Or if they did, those companies and government agencies had no disaster recovery plan. Having backups, with no-one to do restores, was a disaster waiting to happen.
Whether companies and government agencies would have gotten back on their feet faster with restores vs waiting for the CrowdStrike fix instructions, will vary on a case-by-case basis. But we now know that they have no backups.
I was recently blue-screened on an old computer (i7 series 950 CPU) that has run problem-free for 15 years. Reboots were not helping, other than directing me to use my installation disk via the repair option. Instead, I restored from a backup (only my C: drive), and booted with no issues. Something got corrupted, but I do not know what.
1
-
1
-
1
-
This reporting (for lack of a better word) is a lie. It is a lie, based on the timing of who said what and when.
When President Trump said that he (Democrat Governor Roy Cooper) was having a hard time getting the President* (Biden) on the phone, President Trump was correct.
After President Trump shined a light on President* Biden not yet speaking to the governor, that is when President* Biden called the governor.
Even as a private citizen, President Trump got things going more than President* Biden.
@5:42 "The governor told me he was lying."
Well, that is President Biden lying. The governor never said that President Trump was lying; not to Biden, nor anyone else.
@9:42 -- Notice that when Democrat Operative, Anderson Cooper, asked Democrat Governor, Roy Cooper, about President Trump's remarks, Democrat Governor Cooper could have said "President Trump lied". But he did not. In fact, Governor Cooper never disputed what President Trump said.
Surely Governor Cooper would have said that President Trump was wrong, if President Trump was wrong. Instead, Governor Cooper responded to Democrat Operative, Anderson Cooper's question without answering Democrat Operative, Anderson Cooper's question.
Folks, CNN is an unofficial propaganda arm of the Democrat National Committee.
Anderson Cooper and Maxine Waters could switch jobs, and nothing would change.
1
-
1
-
@WPLG Local 10 somehow "forgot" to name the anonymous federal judge.
Her name is: Indira Talwani
She is a radical, woke, leftist, activist judge, appointed by President Obama.
So the democrats went judge shopping, again, knowing that Judge Indira Talwani will ignore the Constitution, and make a ruling, based on her ideology.
Yet another case that will be fast-tracked to the Supreme Court, and yet another ruling that will be overturned.
But @WPLG Local 10 is running cover for Judge Indira Talwani, by omitting her name from this report. Think about it. A judge that no one has ever heard of, puts the brakes on the orders of the President of the United States of America, and @WPLG Local 10 does not name her, or show her photo. You can be 100% sure that if a Trump appointed judge put the brakes on a Biden order, @WPLG Local 10 would have that judge's name and photo plastered all over their reporting -- and they would even go over that judge's case history. This channel should not be trusted.
1
-
1
-
1
-
1
-
1
-
People that say that people of color cannot be racists are either:
-- using that moronic excuse to shut down dialog (by the way, do not accept that BS from them).
-- racists, themselves (so they will say anything to offend white people).
-- brainwashed.
-- stupid.
And it is often a combination of the above.
Asserting that only white people can be racist is beyond absurd. There are racists in every group.
Also know that most people, by a vast majority, are not racist. Just as most people do not rape, kill, and riot.
But when, perhaps, 0.001% of the population commits heinous acts, it is those acts that make headlines. It is the fact that since law breakers are not the norm that they make the news. So do not make that let you believe that that is the norm, or even wide-spread. It is not.
What you see on TV is not what you see when you spend your day. The TV amplifies the exceptions to society's norms. So remember that they are exceptions, and not representative of real life -- not even close.
We all see that the media ignores news worthy items that would spread good cheer and lift up society, and, instead, cherry-pick stories that inflame the gullible. And there are so few of these stories that the radical left media fabricates stories and outright lies about events, because they are no different than ANTIFA, except that they dress for the studio's cameras. ANTIFA is more than the psychos in the street; they include the seemingly well-mannered fake news anchors that rev up the mobs.
Cheers!
1
-
If the companies would simply put "Vanilla Flavored Ice Cream", instead of "Vanilla Ice Cream" on their labels, none of this would be an issue.
And it is no accident that companies leave off the verb "flavored" on their labels.
Rather than getting into: "Who actually thinks that there is real vanilla in their ice cream?", just be clear in the labeling of the item.
If you took a poll of 10,000 people, especially with low IQ people, you will find people that believe that there is "Vanilla" in their vanilla ice cream. It is a fair conclusion to make, when the label states it as such.
And since low IQ people count equally, in the eyes of the law, as much as people as smart as Wile E. Coyote, the label should take that segment of the population into account.
No one should be misled, whether inadvertently or intentionally.
And companies that leave off the verb "flavored" are doing so intentionally. They are to blame.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
Louis, for your milk delivery example, if you were to refuse delivery, unless the customer first watched you make a pitch for some other offering, that would be akin to what Amazon is doing with their "limited" advertising.
And that "limited" adjective is meaningless, corporate mumbo-jumbo.
One 10 second ad, each hour, is "limited" advertising.
One hundred 10 second ads, each hour, is "limited" advertising.
Fifty-nine minutes of ads, each hour, is "limited" advertising.
And however many ads Amazon starts off with, they will add more.
In a year from now, I would not be surprised if the amount of their ads doubled. But, hey, it is still "limited".
I shop on Amazon, only for items that I cannot find locally, or for items where I know the brand name, and the savings make it worthwhile.
I will never sign up for Prime. I suspect that millions of people are making voluntary payments for a service, even when they have not ordered anything for months.
Every item I have ever ordered from Amazon, I got it with free shipping. I simply had to (sometimes) wait longer to take delivery. I am not a child. So I was able to survive, without having an emotional breakdown, waiting for the delivery.
Considering Bezos' incredible wealth (which he earned), for him to stick it to the public with this cash grab is insulting.
On top of his current personal spending, he could spend $1,000,000.00 a day, every day, and still become $billions richer each year. And yet he signs off on this cash grab.
It makes me wonder:
If Jeff Bezos saw someone drop a $1 bill, would he tell them? Or would he pick it up and keep it?
1
-
1
-
1
-
1
-
1
-
1) New York is not a sanctuary city. Rather, it is a fugitive city, because it hides and gives comfort to criminal fugitives.
Sanctuaries are for people fleeing persecution. 99.9% of illegal immigrants are not fleeing persecution.
2) If you did not enter a port of entry, and follow the asylum process, then you are not an asylum seeker. Ergo, you will be deported.
3) 99.9% of those claiming that they are seeking asylum are not seeking asylum.
If an asylum seeker crossed some other country before reaching the United States of America, then they had an opportunity to seek asylum elsewhere.
4) Although gang members and those that have violent criminal records will be a priority for deportation, every other illegal immigrant will also be deported. Although ICE agents might not focus on peaceful illegal immigrants, if an ICE agent encounters a peaceful illegal immigrant, that ICE agent will arrest them and deport them.
5) Our host mentioned that there are 6,000 ICE agents. This is still the Biden* administration. President Trump and Tom Homan intend to ramp that up, many times over. Also, President Trump and Tom Homan will be using the military and will be using the National Guard in every state whose governor cooperates.
Within 6 months, I estimate that 50% of illegal immigrants will have been deported.
After 1 year, 90% of illegal immigrants will have been deported.
The remaining 10% will be harder to address, as they manage to avoid detection. But by the end of President Trump's 4 year term, 99% of illegal immigrants will have been deported.
Also note that President Trump will complete the southern wall within 6 months (a year at most), and will also be building a wall with Canada.
1
-
1
-
1
-
1
-
Ergo, Joy Reid is a proponent of child sex, child rape, and child incest.
According to Joy Reid, unless you read the entire book, then you are not qualified to object to child sex, child rape, and child incest.
I wonder:
If the school decided to have 11-year olds give the teacher oral sex, would Joy Reid say "Well, here is a form for the parents to opt out."?
In Joy Reid's degenerate world, debauchery is permitted, as long as you offer parents an "opt out" form.
-- The authors of those child sex books should be charged with child sex crimes.
-- The distributors, who knowingly distributed child pornography to children, should be charged with child sex crimes.
-- The publishers of those child sex books should be charged with child sex crimes.
-- The Principal should be charged with child sex crimes.
-- The school board members, who approved child pornography for children, should be charged with child sex crimes.
Every adult, who actively got child pornography into the hands of children, should be charged with child sex crimes.
Every adult employee of that school, who knew that child pornography was being distributed (or made available) to children, and did not report it to the police, should be fired.
When President Trump returns to the oval office, he will have a lot on his plate to deal with.
I hope that filing charges against all of the above child sex predators will be on his list, when he nominates an Attorney General.
1
-
1
-
The three, new board members that took decisive action to have that child pornography book removed, should be commended.
The other board members, that either tried to frustrate having that child pornography book removed, or remained silent on having that child pornography book removed, should be fired.
Next steps:
Every adult that played a role in getting that child pornography book into the hands of children, should be arrested and charged with child sex crimes.
That includes the book's author, and the executives at the book's publishing company, as well as anyone in the school's administration that affirmatively allowed it.
The book's author and the executives at the publishing company knew that the intended distribution for that book was for children. That makes them culpable.
All of the above adults should never be allowed to hold a position of authority over others.
All of the above adults should never be allowed to be left alone with children.
Any other adults, in the school system, that knew about that child pornography book being distributed to children, and did not call the police, should be fired.
1
-
Yes, it is smart to keep a supply of ventilators on hand. You do not want to wait for them, after you already need them. You certainly do not want to run out.
But hoarding ventilators (same as people are hoarding toilet paper, sanitizer, etc) can result in suffering and deaths when that life-saving equipment is needed elsewhere.
1) The ventilators are not toys. They are built to medical standards. They are expensive, and they take huge resources to manufacture the parts, build the units, and test the units.
2) If and when a new outbreak of the virus shows up somewhere other than New York, will Cuomo ship his not-in-use stockpile to save the lives of non New York Americans?
Will there be a red-tape delay to find that stockpile and get it shipped? It is not like the federal government can just snap their fingers and 10,000 more ventilators appear.
3) Tying up personnel to manufacture tens of thousands of ventilators, for a demand that is not present (only projected under worst case scenario), means that those people are not contributing their time and labor towards other immediate needs that are related to this crisis.
Cuomo said nothing about an "apex" when he sounded the emergency alarm that New York needed tens of thousands of ventilators. It is only after he was questioned as to why so many ventilators are being stockpiled by him, and he still wants more, that he now qualifies that they are for the "apex".
How is the President expected to manage the unimaginable demands on his office, when he cannot count on the people that are making the demands to be accurate or, at a minimum, be reasonable?
1
-
1
-
1
-
1
-
Yet these same sanctimonious media personalities say nothing about the original movie.
They do not condemn youtube for making it publicly available.
They do not condemn google, youtube's parent company.
They had nothing to say to Colin Firth, Taron Egerton, Samuel L. Jackson, Sofia Boutella, Mark Strong, or Michael Caine, for acting in a movie that promotes such violence.
They had nothing to say to Director Matthew Vaughn.
They had nothing to say to Producers David Reid and Adam Bohling.
They had nothing to say to Writer Jane Goldman.
They had nothing to say to Production companies Twentieth Century Fox, TSG Entertainment, Marv Films, and Shangri-La Entertainment.
And for ratings, these hypocritical media personalities play the clip over and over.
Note that if President Trump were to personally address this video, then that would signal the masses to create more of them, because you will get personal attention from the President Of The United States Of America.
Violence is bad. Violence is wrong. But so is the media's selective outrage.
Lastly, President Trump knows better than to take orders from these phony, self-righteous America haters.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
I do not trust a Microsoft account, because Microsoft pushes and nags you to use a Microsoft account.
In the past, to set up a local account, all you had to do was install Windows while off-line. During the installation, you could click on a link that read (something like) "I do not have internet service".
With each newer version of Windows, and with some Windows Updates within the same version, Microsoft buries the local account option deeper and deeper.
When buying a car, if the salesman keeps pushing and pushing something on me, that is a red flag. And when Microsoft keeps pushing a Microsoft account, and they keep making it harder and harder to sign on to your own PC without creating a Microsoft account, that is a red flag.
As our host said, if you find Microsoft's suite of tools compelling or useful, then a Microsoft account makes sense.
But if you do not use those on-line tools; if a Microsoft account adds nothing useful to your daily routine, then avoid it.
If you later decide to use such tools, you can easily create and use a Microsoft account -- it will be as simple a process as ever, because Microsoft wants you to create the account.
1
-
1
-
1
-
1
-
The ultimate message is being overlooked:
The grammar "Black lives matter" is entirely different than the Communist cult / organization "Black Lives Matter".
The actual organization has nothing, whatsoever, to do with looking out for black lives.
Rather, the actual organization has everything to do with enriching the founders of that organization, as witnessed by their multiple, multi-million $$ real-estate purchases, and nearly nothing being allocated to the local chapters and making its way into the communities that are supposedly at the forefront of needing the help.
The founders of the organization have stated that they are Communists.
Communists are not benevolent, kind, charitable people. They are self-absorbed, evil people that enrich themselves at the cost of the needy that they claim to support.
So when people ask you if black lives matter, you must ask them if they are referring to grammar, or are they referring to the Communist organization.
1
-
1
-
1
-
Today, we no longer have the leftist media hiding their racism.
Today, we no longer have college staff hiding their racism.
Today, we no longer have grade-school teachers and school boards hiding their racism.
Today, we no longer have politicians hiding their racism.
Today, we no longer have celebrities hiding their racism.
Today, all of the above are ramming their racist hatred at children, young adults, and the population in general.
Today, all of the above are doing so from positions of authority.
That is why we have the mobs and the rioters and ANTIFA running amuck.
The vast, vast majority of Americans are freedom loving people with no animus in their hearts. But that is not what we see, due to google, facebook, cnn, nbc, twitter, etc.
When you let the inmates go unchecked, this is what you get.
It takes only a little cancer to upset the masses.
You know racist language when you hear it. And you hear it from fake news anchors daily, and elsewhere. Remember that it is those people that really are racists.
America is #1, by a long shot, no matter what the "hate America" elitists say.
1
-
@lupaswolfshead9971 "surprise surprise my comment on the truth about what TOR really is was deleted.
I wonder why."
Comments getting deleted are commonplace on youtube.
And youtube does so deceptively.
When you leave a comment, you will see it. But after you refresh the page, your comment is not there. So no one ever saw it.
youtube has to know that that is happening. It has to be by design.
Also, when you leave a comment, if you keep refreshing the page, it might finally show up after 20 or 30 seconds.
Also, if you change the "Sort by" option (directly next to the bold number of comments), to "Newest first", and toggle back and forth, I have found that it helps to get my comments listed.
youtube has endless filters for all kinds of reasons, many of which are political. So they have algorithms doing auto-deletions at the time you post your comment. But it seems that lots of deleted comments are in error; their algorithms are faulty.
So you are not alone in having your comments vanish or never show up.
I believe that youtube is in violation of Section 230 of the Communications And Decency Act, prohibiting them from being editors (and deleting comments is being an editor). They are allowed to delete comments that contain illegal content. But youtube is deleting countless benign, non controversial comments.
Most people do not realize that their comments never got posted. After all, their browser showed them their comment. So the user moves on, not realizing that other than her own browser, her comment never showed up. And so youtube gets few complaints.
1
-
sysinternals (now owned by Microsoft) has an "autoruns" tool.
Run it as an administrator, and it will show you every place where Windows automatically starts or loads a program (it is numerous).
Scroll down the list, and uncheck what you believe should not be starting.
That will not stop what has already started. But when you restart your computer, then the item(s) you unchecked will not start. If you found the malware program and unchecked it, then that is the end of your malware.
The malware's file(s) will still reside on your computer. But malware is harmless, until you run it. It will sit there until the end of time, doing nothing, no different than any other file you put on your computer and never go back to. If you do identify the actual malware file(s) (autoruns can help you do that), then copy it off to a flash drive, and delete it from your computer (the copy is just in case you screw up and find out that you should not have deleted the file(s)).
Note that if you uncheck the wrong box in autoruns, you can cripple your computer. You will not know of your mistake, until you restart your computer.
So if in doubt, backup your computer. Then, if your computer becomes unbootable, then restore from your backup, and you will be back in business.
If you buy a new computer, then consider running autoruns, and taking a snapshot of everything that is listed.
Then, periodically compare that snapshot by running autoruns, again, and see what has been added. This is especially important right before and right after you install new software.
And even with a new computer, autoruns will help you identify bloatware that is starting in the background that you never knew was there. If it is crap that is of no use to you, then uncheck it. Of course, first see if there is a Windows setting that will disable that item. But if you cannot find what is starting that stuff, then autoruns will allow you to stop it from automatically running.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@1:15 -- "We also use third party fact checkers"
Rogan should have dug into that answer, because those third party fact checkers were chosen, by Zuckerberg, because they fit his political agenda.
facebook uses the Poynter Institute, to manage companies that are doing the fact checking.
All of those companies are run by radical leftists.
So Zuckerberg, knowing he would catch heat for censoring speech with which he disagrees, hires companies that are no different than his leftist world view. Now, he can do what he just did with Joe Rogan. He points to those "Fact Checkers", who are no different than CNN, NBC, and the ladies of The View.
The radical left is very good at creating labels that have nothing to do with the contents of the containers. They come up with the "Fact Checkers" label, so that it sounds legitimate, when it is just another radical leftist outfit.
Also, section 230, of the Communications Decency Act, prohibits facebook from acting as publishers. And by Zuckerberg changing the ranking of posts, and by Zuckerberg applying labels to posts, and by Zuckerberg banning posts (that is, posts of which holds opposing political views), puts facebook in violation of that Act.
The protections that facebook enjoys, under section 230, should be revoked, due to Zuckerberg's blatant, and voluminous violations.
1
-
Ben Shapiro is right on almost every topic. One exception is to know when to not say exactly what is on your mind (have a filter).
Ben Shapiro will be so truthful, to support his position, that he is willing to wreck support for his own causes, just to vent or make his position known.
When you have someone on your team that is highly productive in her activities, you do not bash that person to the world, because one of her points rubbed you the wrong way.
If Ben had said that he spoke to Candace about what she said, and asked for clarification, or that he asked Candace to release a statement clarifying what she said, and she refused, then Ben should have said that he had that discussion with her.
But for him to go straight to the megaphone, and bash a gem on his team, shows Ben's lack of business acumen.
Ben has done this with others, including President Trump.
Ben seems to not understand that no one is perfect (or that no one will mirror his positions 100%).
Ben seems to not understand that you do not take on every single battle, at the expense of winning the war (in a manner of speaking).
You will never hear a democrat bash their cohorts. They focus on the end game -- the win for power. Ben does not do that, even though if conservatives were to control the government, things would improve for all honest Americans. Ben will run over a conservative, and lose the election, just to make his position known.
As smart as Ben is, he needs to smarten up.
1
-
The reason that she keeps talking, and interrupts incessantly, is because she thinks that she wins debates when others walk away from her.
Some people are rude, in order to drive people away, to keep those people from exposing how uneducated they are (or in this case, "she is").
She talks fast, thinking that that makes her look smart -- when it only makes her look disrespectful and shows her lack of a civil upbringing.
Her fast, loud-mouth works on dolts. It does not work on people that have a light on, such as Larry Elder.
As to her "They did not create the system."
Well, is she expecting our system, based on our Constitution, to be discarded and replaced by some anonymous black people that she approves?
If she is unhappy with The United States Of America, she has a long list of 54 African countries, all having "systems" created by black people.
Which one does she want us to emulate?
Why is she not living there?
1
-
1
-
1
-
1
-
Folks, here is why we should not trust this CBS report:
@0:05 "...latest scandal." Listen to the (so called) news anchor's emphasis on the adjective "latest".
@0:35 "...latest scandal."
@0:48 "...latest scandal."
Yet, CBS 17 never stated what the previous scandals were. Ergo, CBS is lying, by way of implying scandals that do not exist.
There were no previous scandals. But CBS wants you to believe that there were previous scandals.
A real news station would not call a first scandal a "latest" scandal.
Since CBS is fabricating the existence of previous scandals, why should we believe that any part of this (so called) news story is real?
Why should we believe that there is a current scandal, when CBS is lying, by implication, that other scandals exist?
CBS is being deceptive. CBS, like NBC and CNN, should not be trusted.
They do report on some actual news items, to maintain the facade that they are a news station. The problem is not the times when they actually are reporting news. The problem is all of the times when they lie. And in this video, they lied.
Also notice, @1:13, you can't see (you can't read) the so-called postings. So CBS is accusing Robinson of those postings, and yet CBS does not show us the postings.
Not being able to read those postings is by accident? They just show blurry, pixilated images, and gullible people connect imaginary dots.
Also, there is no way that Robinson would have posted those comments under his own name. So how could those comments (if they even exist) be associated with Robinson?
Lastly, CBS is using CNN as their source. So any inkling of credibility is gone.
Do not trust CBS, especially for anything that involves politics.
1
-
1
-
President* Biden was reading crafty, slimy, lawyer language from his teleprompter.
When it is time to prosecute him for his crimes, his lawyers will claim two things -- both of which will support what he just said about no president is above the law:
1) The President of the United States of America is legally allowed to do things that anyone else in the country would be jailed for doing.
So after he leaves office, his lawyers will assert that President* Biden never broke the law, because (as President*) he had the authority within the law.
In other words, the President of the United States of America has carve-outs in the law, that no one else has.
2) President* Biden's lawyers will assert that President* Biden is not mentally fit to stand trial.
So even for blatant law breaking -- laws that even the President of the United States of America would be found guilty of breaking... well, it all becomes moot when you are mentally unfit to stand trial.
And the media will support President* Biden's mentally unfit claim all the way.
For years, they have been claiming that he is sharp. Now watch. As soon as he is out of office and there are official charges made against him for his arrest and prosecution, the media will jump on board the "He is mentally unfit to stand trial" train.
Yesterday, before charges were brought, the media called him sharp.
The next day, after charges are brought, the media will claim he is mentally unfit.
Any time President* Biden, or any democrat leaders, sound like they are making sense, keep in mind that it is in furtherance of their deceptive agenda.
Never believe anything that they say, at face value. They are always up to something.
1
-
1
-
1
-
1
-
For folks that rely on the service denying access, after a few failed login attempts... those folks are rolling the dice that the service will not let them down.
I never rely on a 3rd party for my security. I will not use a so-so password, on the assumption that the service will delay attempts by attackers, after X failed logins.
The service might do an upgrade, where something goes wrong, and brute force attacks are not delayed. Or a disgruntled employee disables that protection.
Or, a bad habit of relying on the service might result in a user unwittingly using a so-so password with a service that does not monitor for failed login attempts.
If you use a password manager, and have it create long, cryptic passwords, and a unique password for each service that you use, then you need not rely on anyone else to keep attackers out of your accounts.
Sites that block multiple failed attempts, via delays, are a good thing -- perhaps better than a super strong password. But the former is not in your control, and the latter is.
1
-
Constitutional rights are not up for grabs.
Constitutional rights may not be suspended -- ever.
One of the points of We The People having our constitutional rights, is so when tyrants falsely claim an emergency, to deny us our constitutional rights, we retain our constitutional rights.
Preciously because of what that tyrant is doing, is why our constitutional rights remain in place.
If claiming an emergency suspends our constitution, then what is the point of having a constitution that can be turned off at the whim of a tyrant claiming an emergency?
Even during an actual emergency, that is when our constitutional rights matter all the more.
@5:35 "...about whether or not, in an emergency, we can create a safer environment."
1) There is no emergency.
-- Maui is an emergency.
-- 9/11/2001 was an emergency.
-- Pearl Harbor was an emergency.
2) Denying citizens their constitutional rights, to defend themselves against a tyrannical dictator, does not create a safer environment
Michelle Lujan Grisham just showed her hand. She is saying that disarming We The People makes for a safer environment. Ergo, she is intending to make her unconstitutional gun ban permanent.
If banning guns is safer this month, then it is safer next month, too. And the month after that, and the year after that.
Michelle Lujan Grisham knows the above, which makes it all the worse.
She is testing We The People to see if we will give in to her unconstitutional power grab.
If We The People allow it, she will see that as a sign of weakness, and she will seek to grab more power, and she will seek to trash our constitution more and more.
Folks, Michelle Lujan Grisham is a degenerate, radical leftist that hates America.
Anyone that pisses on our constitution hates it. Ergo, they hate America. They are power hungry tyrants.
Michelle Lujan Grisham is pissing on her oath of office. She should be impeached and removed from office.
1
-
1
-
1) Why the owner did not use 100% premium grade gasoline (93 octane or better) is criminal (in a manner of speaking).
He has $millions to spend on a super car, and he cheaps out on the tank of gas.
2) The Koenigsegg is not designed for drag racing. That it performed as well as it did is a tribute to its brilliant design.
3) The Koenigsegg comes equipped with track tires. Not racing slicks. Rather, tires designed for cornering. Those tires have nothing special traction, until they are heated up. Then they really grab like crazy glue. So doing a drag race, without heating up its tires, is not allowing the Koenigsegg to get a good launch. The Koenigsegg was losing the race at the launch.
4) The launch control was a poor excuse by our host.
He should have practiced several times, without the launch control engaged.
The Koenigsegg is designed for a race course, or an amazing street driving experience.
The Koenigsegg is designed to take turns at mind-bending speeds, without breaking loose.
The Koenigsegg is designed to brake faster than any other car on the road (perhaps a LaFerrai would brake better or just as good).
If the Tesla and and Koenigsegg both had to race across town for an emergency, the Koenigsegg would lose the Tesla at the first turn.
And finally, any man, and I mean any man, would have women jumping in to the Koenigsegg. ;-)
1
-
Holy Moly Steve. How much bragging you do, under the guise of explaining a news item, is astonishing.
You managed to tell us that you have written books, classes that you taught, that you have appeared on TV shows, and had yourself say your own name over and over, by way of you working in "Who is Steve Lehto?"
We go from a news story about a professor accusing his students of using ChatGPT, and end up having a video about the accomplishments of our host, narrated and performed by our host.
The title of this video should be:
"The unsung accomplishments of Steve Lehto, by Steve Lehto, and an unrelated tidbit on a ChatGPT story"
1
-
Folks, if you choose to use One Drive, or any other 3rd party service, then upload only files that you would not mind sharing with complete strangers.
If you have any files that could be used to make your life unbearable if someone used them to hurt you (trade secrets, legal documents, etc), then encrypt those files before you hand over copies to a 3rd party service.
Microsoft and Google are data miners. Do they mine your uploaded files? Who knows? They easily could. And that is why you should not trust them with anything that could hurt you.
We often hear that our data is how we get treated to free services, such as Facebook.
They are not actively snooping, with humans, through your files. But they can easily run algorithms that build a profile on you, and also search for anything juicy or noteworthy. They can scan images, use facial recognition tools, etc, and flag files for one of their legal team members to examine.
For most folks, this is not a problem. But just know that you are handing over your personal data to complete strangers, and those folks have the fastest computers on the planet, and the smartest spyware tools on the planet.
Encrypt anything personal before you upload it to them.
1
-
1
-
1
-
1
-
1
-
For start-up applications, I recommend using "autoruns", by sysinternals (that was acquired by Microsoft).
It is free, and will show you everything that your computer automatically starts.
The start-up listing that our host demonstrated @1:17 shows a small listing, compared to what autoruns will show.
Note that to see the full listing in autoruns, you will need to run it with admin privileges. Otherwise, autoruns will show you only what starts under your login name (and there is a lot of stuff that starts under other account names -- including built-in accounts that you never use).
Also note that autoruns will allow you to cripple your own computer. What do I mean?
There are programs / services that are required to run, in order for Windows to work. autoruns will allow you to disable them. Then, the next time you go to login (or restart your computer), you will be unable to do so. So pick and choose carefully what you have autoruns disable. Do a full backup before taking any chances.
autoruns does not stop a process that is already running. It just stops it from starting, the next time you login (or the next time you do a reboot).
Lastly, autoruns will show you processes that are possibly malware. And once you disable it, it is effectively gone (the files will still be there, but the malware will no longer run).
1
-
@askleonotenboom Leo, a year or so ago, I pointed out that the cloud service owns whatever data you upload to them. I believe it was related to OneDrive. You asked me to cite the language, and I did.
I am not going to hunt it down again, as the services do not place it on page 1, and they do not write it in layman's terms. They intentionally obfuscate it. In fact, the one I found on Microsoft's site was an image of that section's words. An accident, that they posted it as an unsearchable image? But I did provide it when you asked. I am kicking myself for not noting down where it was -- but I did not expect to be revisiting this.
Since it was an image, I had to type it out in the comments (no copy/paste due to it being an image, and these comments support only text).
By the services owning your data, they protect themselves with lawsuits. It allows them to scan your uploads, and allows them to benefit from any data that their scans identify as being useful to them.
A year or so ago, I owed it to you when you asked me to verify or cite my assertion that the cloud service owns your uploaded data. So I took the time and effort to dig up the language in their terms of service. I do not relish repeating that exercise.
How did I know that they own your uploaded data?
A host on a different channel showed examples of the cloud service's terms of service stating as such. But finding that host's video is also next to impossible. But I did post the exact language on one of your other videos, when you asked for it.
1
-
@askleonotenboom "@andrewshaw7144" did not include the text, two paragraphs below what he quoted:
"b. To the extent necessary to provide the Services to you and others, to protect you and the Services, and to improve Microsoft products and services, you grant to Microsoft a worldwide and royalty-free intellectual property license to use Your Content, for example, to make copies of, retain, transmit, reformat, display, and distribute via communication tools Your Content on the Services. If you publish Your Content in areas of the Service where it is available broadly online without restrictions, Your Content may appear in demonstrations or materials that promote the Service. Some of the Services are supported by advertising. Controls for how Microsoft personalizes advertising are available at xxxxxxxxxxxxxxxx (xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx). We do not use what you say in email, chat, video calls or voice mail, or your documents, photos or other personal files, to target advertising to you. Our advertising policies are covered in detail in the Privacy Statement."
Without using the words: "We own your files", they own your files, because they are telling you that they have a worldwide, royalty-free right to use your files however they feel like using your files.
They gave examples. That does not mean that those examples are all-encompassing.
"...and to improve Microsoft products and services..."
Wow, is that ever open-ended. I sure hope that my cycling videos and my spreadsheets help Microsoft to improve their products and services.
They go on to make is sound like it is if you publish your content in certain areas. They count on you connecting imaginary dots.
And they neither identify those areas, nor do they say that that is the sole trigger.
And then they include links for you to drill into, to further obfuscate what they are doing. The additional links lend to more confusion, and difficulty at getting to the answer of a simple question of ownership. The links take you down rabbit hole after rabbit hole.
How can anyone's files improve Microsoft's products and services, if Microsoft is not scanning your files for who-knows-what?
Even if Microsoft does not "own" your files, you are granting Microsoft permission to do anything they want with your files.
I would love to not own a Ferrari, yet I am granted permission to do whatever I want with that Ferrari.
Note that I omitted the actual links from the quote, because my reply would likely get tossed (which might be a good topic for one of your videos).
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
Just as CNN is Fake News.
Just as NBC is Fake News.
...so it is with "Fake Critical Race Theory"
It is fake. So call it fake.
Radical Leftists named it Critical Race Theory, so that the title supposedly gives it a hint of legitimacy.
When the rest of us hop on that train, and also call it Critical Race Theory, we are inadvertently giving credence to the name.
When something is fake, call it fake.
If radical leftists name Flat Earth Theory as reality, would you go along with that name?
No. It would be Fake Flat Earth Theory.
When radical leftists name an agenda, do not let them control the language.
The only people that need Fake Critical Race Theory to be "critical", are the radical, hate-America, charlatan, leftists.
Unless you are quoting someone, do not call Critical Race Theory by that name.
Always call it "Fake Critical Race Theory"
1
-
1
-
@6:05 -- Make sure that the cable is USB 3.0 (or higher) certified. If it came with the drive (and your drive is 3.0), then that cable should be fine.
Some drives come with short cables, and there are cheap, yet longer, cables available. If it is not a 3.0 cable, then that could be an issue.
The USB specification is, I believe, 3 meters. But I would not flirt with that length cable. You should probably keep it no longer than 6 feet.
If your external drive cannot keep up, and you must use an external drive, then I suggest the Samsung T5 (assuming it comes in a capacity that fits your needs).
The T7 is advertised as being faster than the T7. But it depends on how heavily, and for how long without rest, you write to the drive. When the T7 runs out of cache, its "writes" slow down to USB 2.0 speeds. The T5 will also slow down a bit when its cache runs out, but the difference is not really noticeable.
Is your external drive a portable drive?
If your USB port is not delivering enough juice to your drive, then the drive will slow down to USB 2.0 speeds, or even to USB 1.1 speeds (which I believe is something like 150K per second).
If you are using a USB hub, then depending on the hub, it might have only enough juice to power one portable (mechanical) drive. If you happen to have a 2nd portable drive on that same hub, then that is probably going to be a problem.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
The 7zip approach is very good. But it leaves a crack in the procedure, for anyone wanting to cover themselves 100%.
The document was first saved, in the clear, and was then encrypted in to a new file.
A computer forensics expert might be able to uncover the original document, due it it once being saved, in the clear, to your drive. But for general use, to keep nosy people from viewing your documents, 7zip is a good choice for most people.
The beauty of VeraCrypt (perhaps Cryptonator, too (never used the latter)), is that when you save files to a VeraCrypt volume, it is saved with encryption. A non encrypted save never happens.
One other possible security issue is:
How does Word (or any other application) work in the background?
Does Word use a temp file somewhere as you are editing your document? Does Word save that temp file somewhere that is not encrypted?
For example, where does Word save the editing history for your documents, for when you want to "undo" something?
You had a photo embedded in your Word document, which you removed, and then later decided to bring it back with undo. From where did Word obtain the image that you removed? Was it in a temp file somewhere?
How about while 20 minutes into you typing up your Word document, your computer crashes (or you have a power outage). The next time you open Word, I believe it will have part or all of your document available to you, even if you never saved it.
The temp file would typically be deleted after you close the document. But if Word was saving edits along the way, in the clear, somewhere else on your drive, then that might be an issue for some folks.
Perhaps Word has a setting somewhere that allows you to pick where it saves its temporary work? My version of Word is ancient. So I cannot check what is available today.
You could encrypted 100% of your drive(s). That would ensure that no matter where anything gets saved, it will be gibberish to anyone not having a password to unlock the drive(s).
By the way, there is a Windows "cipher.exe" command, that runs from the command prompt.
It appears to allow you to encrypt individual files or directories.
I ran "cipher/?", and the output made my brain hurt. It might be a viable Windows based solution (no 3rd party tools needed) for some folks, if they can process the help screen.
1
-
1
-
1
-
1
-
1
-
@6:36 "It's tough, exactly because what we do, is all about bringing people together."
That is another lie from Budweiser.
Going woke, is the antithesis of bringing people together.
Forcing employees to have radical leftist diversity, equity, and inclusivity "training" (forced indoctrination), is not bringing people together.
Calling a hateful, divisive training "inclusive" does not make it inclusive. It is yet another lie.
Budweiser can beg customers to come back until the cows come home.
Begging is not apologizing.
The executive management at Budweiser is comprised of radical, far leftist elitists.
They need to be financially buried. Otherwise, in a few years from now, even 10+ years from now, they will do the same thing.
Radical leftists never wave the white flag. They never surrender. They play the victim card -- and that is fighting on.
Budweiser's "begging" is not surrendering. It is a strategic tactic to increase sales, regroup, and plan a new "woke" attack for another day.
Being on the run is not a surrender. It is a retreat, to fight on under more favorable circumstances.
You do not give cancer a second chance, when it is on the run. You eradicate cancer, and do not give it a chance to come back.
Everything that Budweiser is doing, with lie after lie, and crafty mixed messaging language, evidences that they are not going to apologize; that they are fighting on. Do not give in to their BS. Do not surrender in the face of victory.
1
-
1
-
@0:47 "The cloud."
Translation: Someone else's computer.
Cloud services will not backup your configuration files. Programs leave such files all over the place. The registry is a popular place. But are "all" of your programs leaving "all" of their settings in the registry? You will never figure out where all of your configuration files are located. So you will never be able to direct the cloud storage service to backup all of those files.
If your boot drive fails, then you will have to re-install Windows.
If you were automatically connecting to your cloud storage, well, with your fresh installation of Windows, you will not be automatically logged in to your cloud storage service.
Do you know your cloud storage login credentials?
You will have to enter them manually. Thereafter, you can set it up to automatically sign you in. But initially, after replacing your failed boot drive, and re-installing Windows, you will have to login to your cloud storage service the old-fashioned way.
When you use a cloud based service, you are giving up control of your data. Those services are very reliable. But they are controlled by other people. They are subject to outages, data losses, discontinuing the service, or going out of business.
If your internet service provider has an outage, then you lose access to your cloud storage.
@5:15 "...on someone else's computer."
I am pleased that our host covered that aspect.
Cloud storage services all tout end-to-end encryption.
1) You have zero ways to verify that their assertion is true.
2) Where are the two ends?
One end is your computer. The other end is the cloud service's computer. Seems reasonable.
However, once your data reaches their computer, does it remain encrypted? Or does the data get decrypted, and then encrypted by them for storage?
If it is the latter, then they have 100% unfettered access to all of your data, in the clear.
When you shop on Amazon, or do your on-line banking, etc, you have end-to-end encryption.
But Amazon decrypts your data. If not, they would not know that you are shopping for. The same for your bank. How can they show you your balances, if your data is not dcrypted by them for them to know what your request is?
The same could be happening with cloud based backups. And yet all of the above examples fulfill the definition of "end-to-end encryption", while the examples I gave show that the service can see 100% of your data in the clear.
3) When the cloud service encrypts your data, they can encrypt it, not only with your key (so that you can unlock your data), but they can also encrypt your data with their own master key. In fact, they can have multiple master keys. It takes a split second to include additional keys to unlock your data. And you have no way to know how they are encrypting your data, and whether or not they have master keys. When they do the encrypting, then they are in 100% control.
It is not likely that anyone at the cloud service is poking around in your data. But if you are a person of interest (celebrity, government official, person making headlines, etc), or 10 years from now become a person of interest, then the cloud service will probably be able to look at all of your data.
There was a story (approximately one year ago), where a father took photos of his toddler's rash, at the request of the doctor. At the doctor's request, the father uploaded those photos to a cloud based storage service so that the doctor could view them. The photos were flagged by the service as child p********phy. But how can that be, with end-to-end encryption. The father was arrested.
The above confirms that cloud based storage services can see 100% of your files in the clear, and that they are running algorithms, prying into your data.
Are they all doing it? Who knows. It is easy for them to do it. So they probably are doing it.
When you hand your files over to other people, then you have zero control of those files. The control that you have, is the control that they allow you to have. They can click their mouse and cut you off. And they can likely see everything that you put on their computers.
If you upload trade secrets, or any files that could ruin your life, then you would be nuts to put those files on a cloud service's computer (some stranger's computer). As our host said, you could first encrypt your files yourself. That is sage advice. But you better use strong encryption, and use a password with loads of entropy. Those big tech cloud service companies have computers that can break 90%+ of the passwords that people use. Nearly all passwords can be cracked in seconds. Some take a few days. Better ones take a few weeks. The best passwords will keep your data safe. That means long passwords, with all kinds of special characters peppered around, none of which follow any patterns.
Use cloud based storage only for files that you would not care if other people got their hands on them, or only if you first encrypted them on your own computer, with a very strong password.
1
-
@16:03 -- Regarding conventional drives being more cost effective than SSDs. Up front costs do bear that out, by a significant margin.
But SSDs consume far less power.
I have no idea how long it would take for SSDs to become more cost effective for an equal amount of storage to HDDs. It depends on each location's electrical costs.
If you have free (or near free) electricity, then running HDDs will be an easy choice. But if you have expensive electricity costs, then maybe it makes sense to have a high SSD expenditure up front?
And then there is the cooling factor, which uses electricity. Thousands of HDDs release a huge amount of heat.
I used to do Chia processing. The scores of HDDs was enough to heat my apartment. I live in New Jersey, USA, and I rarely turned on my heat during the winter. But in the summer, it was brutally hot, requiring me to keep my AC blasting non-stop.
My electricity costs were 4x what I was paying, prior to Chia. I can only imagine what huge data centers pay for electricity. It must be hundreds of $thousands each month. Across their data centers, globally (for the truly huge companies), they are probably paying $millions each month.
1
-
Even if those buses had just enough range in the freezing weather to compete their routes, it would cost double the fuel to run them. What do I mean by double the fuel?
Those buses need to be re-charged. That is done by a charging station. That charging station is fueled by fossil fuels.
It takes the same amount of fossil fuels to fully charge that bus to go 200 miles on a warm day, as it does for that same bus to travel 100 miles on a freezing day.
It would be as if your gasoline car got only have the mileage when it was freezing outside. It would still cost you the same to fill up at the gas station.
-- And it gets worse.
As batteries age, they hold less and less of a charge.
Consider your smart phone. After a year or two, you probably noticed that you were getting less life out of your battery. And if you hold on to your smart phone for 4 or 5 years, it gets much worse.
The same goes for electric vehicles.
-- And it gets worse.
After, perhaps, 7 years, the batteries will need to be replaced. Even if they last 10 years, they will have to be replaced. All rechargeable batteries eventually stop holding a charge, and need to be replaced.
The price to replace the batteries on those electric busses will be north of $100,000.00.
There are electric cars with $60,000.00 price tags to replace its batteries (costing more than the car). So the price for the bus's batteries might even exceed $200,000.00.
-- And it get worse.
When the town orders new batteries for its busses, there will likely be a 6 month waiting period (perhaps longer), due to supply chain shortages, and who knows what else.
It will not be like an Amazon order, where your bus's batteries will show up the next day.
And you can't go into Bob's service station for that bus's batteries.
Those batteries are custom made by the manufacturer. You are at the mercy of the manufacturer, and the manufacturer knows it. You can be sure that the manufacturer will know exactly how high to price their batteries -- just enough to milk every last dollar out of the town's budget.
And to all of the "save the planet" extremists:
-- All of those batteries will end up in landfills.
-- All of the emissions that did not come from those electric busses will have been spewed into the air from the electric company.
-- All of those batteries require rare Earth metals, which are mined by child, slave labor in African countries.
1
-
1
-
1
-
The deceased's death certificate contains the date and location of the person's passing.
If President Trump lost a son, and made such a claim, he would be attacked, relentlessly, for every reason under the sun.
Do not give President* Biden a pass, because we "expect" this from him.
If you get speeding tickets, you do not get a free pass because law enforcement expects you to be speeding.
Republicans seem to bend over backwards to minimize the chaos from the left. Stop doing that. Hold them 100% accountable.
The left never gives the right an inch. In fact, the left fabricates and lies about the right, stealing inches. So do not back off when the left lies and hurts themselves. They are weak now. That is not the time to give them a break. Use this opportunity to reveal them for what they are, and to get them out of office.
President* Biden said that his son died in Iraq. That is either a lie or his dementia.
The right should hold him to his statement, and insist on seeing the death certificate.
1
-
1
-
1
-
@0:35 "..you couldn't buy a cannon"
Folks, we must, must, must assume that everything that President* Biden says is from La-La-Land. He says whatever he feels like saying, as if he knows what he is talking about.
When the Second Amendment was passed, you could buy a cannon.
President* Biden either:
-- Lied
-- Is confused
-- Speaking gibberish while he tries to collect his thoughts
Probably a combination of the above.
Think about it...
If you were asked about whether or not citizens could buy a cannon, at the time our Second Amendment was passed, what would your answer be?
Most folks would not know the answer (why would they -- it is an obscure fact). So most folks would truthfully say: "I do not know"
Yet, President* Biden goes on national television and lies.
Clearly, he could not know that cannons were illegal -- because they were not illegal. Yet he said that they were illegal. So from where did he, the President* of our country, get his information?
Answer: He just made it up. He lied. He talks like he is smart, when he is a dolt.
And the media, including The Five, does not call him out on his nonsensical claim.
When we do not correct what President* Biden lies about, then his lies take root.
1
-
1
-
1
-
How much VRAM do you need to create still images / photos?
Can you provide an image, and have the tool change parts of it (such as a different face, or different skin tone / color, or different hair style, or different weight (make the person skinnier or heavier))?
I would like to try this Hunyuan, free, open source software. I have a 4070 ti with 12 GB of VRAM.
Based on our host's demonstrations, videos would be very short and somewhat low resolution, with only 12 GB of VRAM. But how about still images or photos?
Also, once an image is created, can it be tweaked? For example, tell the tool to have the person smile, or wink, etc? Will each tweak require more and more VRAM?
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
Steve, if ChatGPT propagates BS, and it results in harming someone's reputation, and that harmed person never used ChatGPT, then why should authors of ChatGPT's programming be off the hook?
If I create a web site, and all I have a "Click Here" button, and that button will bring up a page of defamatory information that will harm someone, then will I be off the hook if I make users agree to the same thing that ChatGPT agrees to?
This will lead to sites being able to display anything and everything under the sun, designed to cause all manner of harm to people, their businesses, their reputations, their families, their livelihoods, etc. And the person who hosts the web site can simply point to the language that they had you agree to. Yet, the people being harmed never agreed to.
ChatGPT's responses are not random. Not a single character is random. It is 100% computer code, written by humans. Yes, the code gets extremely complicated and lengthy. But the law should not change because of the length of the code, or the complexity of the code.
Even random number generators are not random. They follow code, created by humans, to perform a calculation and give you a response.
If you could read and follow that code, you would know the supposed random number that will be generated. The computer simply does it much faster.
The same goes with ChatGPT.
The humans that wrote the code did so to produce responses. So it is on them, for when their responses harm people that have nothing whatsoever to do with their service.
Case in point:
If you ask ChatGPT political questions, you will see how you are getting the results chosen by the programmer's ideology.
Ask Chat GPT:
-- Write me a poem praising white people.
It will refuse.
-- Write me a poem praising black people.
It will comply.
-- Tell me a joke about women.
It will refuse.
-- Tell me a joke about men.
It will comply.
-- Write me a blog of why Donald Trump is not a racist.
It will refuse.
-- Write me a blog of why Joe Biden is not a racist.
It will comply.
So ChatGPT is not some alien life form that gets to slander people with no consequences.
ChatGPT does the bidding of the individuals that wrote its code. ChatGTP's responses are precisely, specifically, and exactly what its programmer's programmed it to say.
1
-
1
-
@0:21 "Remember kids, vinyl is better, because it's imperfect"
That statement implies that digital is not imperfect.
Vinyl has flaws.
Digital has flaws.
When both are at their best, vinyl wins.
It is neither easy nor inexpensive to accomplish. But vinyl, at its best, beats digital, at its best -- and nearly no one has ever heard either at their best.
Until our host actually listens to a high-end stereo, professionally set-up in a sound treated room, then he should not cast aspersions on what he never tested; never heard. This is a problem that many tech-savoy engineers have. If they actually did a listening test, using the right equipment, set-up by the right people, in the right room, then they would realize that their so-called know-it-all understanding is lacking. And if they are willing to acknowledge their mistake, then they could use their technical engineering experience to understand why they were mistaken.
Cheers!
1
-
1
-
1
-
1
-
1
-
1
-
1
-
If you placed 5 rifles in front of Alejandro Mayorkas, he would have no clue which one is an AK-47 (even if none of the 5 were an AK-47). Yet, he wants to ban them.
If you asked Alejandro Mayorkas to specify what feature(s) the AK-47 has, that he finds to be the criteria for it to be banned, he would have no idea.
Like a child in an adult body, stomping his feet, saying "Just because!", or "I just want them banned!".
And Alejandro Mayorkas will not stop at the AK-47.
He will ban every gun, without exception, if he had his way. For now, he says "assault weapon". That will, one day, lead to every weapon, if Alejandro Mayorkas has his way.
That is why is has no clue what an assault weapon is, because it is not about any particular gun. He wants all guns banned, and uses the "assault weapon" propaganda line to push his anti-Second Amendment, unconstitutional, radical leftist agenda down the throats of the American people.
1
-
Steve, if the police knock on the suspect's door (as you presented as an avenue to get the owner his motorcycle back), then the suspect will know that the victim and the police are on to him. As soon as no one is watching, that suspect is going to unload the motorcycle, and the owner can kiss it goodbye (not sure how long that Air Tag will last).
The only time you knock on the door, is when you are prepared to go in. You don't reveal that you want to go in, and then not go in.
As to probably cause:
If a child was missing, and that child had an Air Tag on her, they would have that search warrant in 3 minutes.
If dynamite was missing, and the crates had Air Tags, they would have that search warrant in 3 minutes.
If a police car was missing, and that police car had Air Tags, they would have that search warrant in 3 minutes.
I do not blame the police, for the incompetence of the mayor, district attorney, and legislators (together, not properly funding the police, not prosecuting criminals, and being lax on crime -- in Chicago). But when the police will not (or can not) file paperwork to get someone's motorcycle back (when they know who has it), means that the criminals are running the city. It is the breakdown of a, once, civil society.
I wonder: If the owner broke in and took his motorcycle back, would the police find the time to charge the motorcycle's owner with breaking and entering?
No one should try that. Just wondering.
1
-
1
-
Garry G We have three co-equal branches of government. Each has different powers under our constitution. No single branch is subservient to the other branches. No single branch lords over the other branches.
All powers that any of the branches have are derived from our constitution.
Adam Shift and Jerry Nadler held secret hearings that no press and no republicans were permitted to attend. In those meetings, they interviewed witnesses of their choosing, under oath. Not one member of the press nor one republican representative nor one adviser to the President nor one republican witness nor one member of the President's legal staff, etc, were permitted to attend.
So under those outrageous circumstances, you believe that Trump should have caved to BS subpoenas issued by a wildly partisan committee chairman that has no constitutional powers over the executive branch?
Consider the following:
What should any president do, if one day the legislative branch of government were to issue daily subpoenas stating that the president must appear before them and answer questions? Is the president supposed to report to those corrupt representatives on a daily basis? Is the president no longer allowed to make his own schedule (because he will never have time to conduct other business, because he will always be forced to be present and answer daily subpoenas)?
Of course Trump is going to show the corrupt people that are issuing unconstitutional subpoenas that he does not answer to them. Of course Trump is going to show them that he will not participate in their secret hearings or any hearings where zero republican witnesses are permitted to testify.
Garry G:
-- would you have no problem being subpoenaed to appear in court and told that you are not allowed to have a lawyer?
-- would you have no problem participating in a court proceeding where you are being accused of crimes, and are told that you are not allowed to call any witnesses?
Garry G, if you did not know any of this, then I open this clarifies things for you.
If you did already know this, then grow up and stop trolling.
1
-
1
-
If an e-mail message urges you to forward it on, then you should probably not forward it on.
If you read an e-mail message, and you did not decide on your own that this is a must see for everyone, then it is not a must see for everyone.
There are people that arouse themselves by distributing some e-mail message, and climb the walls, hoping that it goes viral. They do not care what was written in the message. They simply want to bask in their imagined glory that they did something that got around the county (or the world).
You should never need anyone to tell you that you should pass it along to the world. You should read the message and have enough sense to figure that out on your own.
As to fact-checking sites:
Please note that most of them are unofficial propaganda arms of a political party.
Do not trust any recommendations from anyone, including me, which is why I am not making any recommendations.
Everyone has political leanings, and will try to steer you to their choice of so-called facts -- even going so far as to suggest that those facts are actually facts, even though people don't like those facts.
Every site that uses fact checkers ensures that company leans their way. In fact, fact checking companies are run by political operatives.
Look up who runs a fact-checking site, and you will likely see the name of someone that was a cabinet member of a political party -- and that information might not be easily found, because it would give away the leanings of those fact checkers.
So if CNN recommends a fact checking site, and Fox News recommends some other fact checking site, and they both swear that their fact checkers are the ones to trust, then where does that leave you?
Just because some company prances around as being "fact checkers", does not make them honest.
Who is fact checking the fact checkers? And on and on and on.
Trust no one, until you vet them yourself.
With enough time and effort, and checking multiple sources, you will eventually learn who you can trust (but never 100%).
And check with sites that you deem to be untrustworthy, or having differing political positions than you have.
You will learn to identify BS, and also learn that some site you thought was BS sometimes opens your eyes.
Lastly, just because some site where you trust the host for cooking, or for automotive content, or for pets, or for computers, etc... just because that host is honest and helpful and likable, does not mean that their political recommendations should carry the same weight.
1
-
1
-
It does not matter that the DNC posted the factually incorrect tweet. Why?
That tweet is in Kamala Harris' name. When Harris gave the DNC permission to speak (tweet) in her name, then Harris owns the tweet.
If anyone feels that Harris does not own the tweets that are tweeted by the people that she approved to make the tweets, then consider the following:
-- The DNC can tweet out anything they want.
When it works, and goes over well, then Harris gets the glory.
When it does not work, and it goes down in flames, then Harris has nothing to do with it, because someone else sent out the tweet.
No sir. It does not work that way.
When you delegate a job to someone or some entity, then you are on the hook for what they do in your name. You gave them permission to use your name, and now you own what they do in your name. And in Harris' case, not only did she give the DNC permission to tweet in her name, she actually assigned the job to them. Do not think, for a minute, that the DNC is doing this without Harris delegating it to them.
1
-
1
-
1
-
Liberalism and leftism are tied at the hip. How?
Liberals virtually never object to the radical woke actions by the left.
In fact, liberals almost always support the left.
Liberals and leftists vote nearly entirely for Democrats -- even radical leftist democrats.
President* Biden has been nominating far left, communist judges, and blatantly racist judges, one after another to congress for confirmation.
Virtually without exception, 100% of democrats in congress vote "yea" on those communist, racist judges.
On issue after issue after issue, liberals always band together as a voting block, and vote for anyone with a "D" in front of their name. They voted, repeatedly, for Robert Byrd, a Ku Klux Klan Grand Dragon. If Joseph Goebbels was alive today, and ran as a democrat, most liberals would vote for him.
So although your Jimmy Carter type liberals would not nominate such degenerate judges, they do support those degenerate judges by voting them in. So it is all the same in the end.
Liberalism leads to leftism (woke-ism). Without liberalism, the radical left would be crushed.
Liberalism is an early stage of societal cancer, that leads to leftism and communism.
If John Fitzgerald Kennedy was alive today, he would be a republican.
1
-
1
-
1
-
1
-
It will be abused. All spying equipment falls into the hands of people that abuse it. And, here, we are talking about government bureaucrats -- so of course it will be abused.
How would you like to be running for a seat on the city council, and the mayor (from the other political party) has the AI traffic data searched for all occurrences of you in your car.
That mayor finds a scene where you were picking your nose. That will spell the end of your campaign for a seat on the city council. It will also spell the end of any politician that you support, that has an unflattering scene in his/her car.
Or how about the mayor finding a scene where you did not have an opportunity to put on your make-up, or do your hair. Well, that image of you will find its way onto social media.
How about if you were supposed to be taking your daughter to a boring lecture, but you, instead, treated her to a fun time somewhere else.
Well, if you are a person of notoriety, those images can be used to make your life difficult.
The video footage can (and probably will) be saved forever. That way, when some unknown person becomes a person of interest, the people in charge of the AI system can pull up all of your scenes, going back years -- even decades (as the decades pass).
And all of the video footage can be indexed in real-time -- meaning: facial recognition, make and model of car, license plate, inspection sticker, etc... all information will be time-indexed with the aforementioned tags. So when someone wants to abuse the system, they simply search for whatever criteria will show them what they are seeking.
They can search for every instance of your car's license plate. They will have a time-indexed map of everywhere your car has been -- and every person that drove your car.
They can search for every instance of your face. They will have a time-indexed map of everywhere you have been, and your face's image, too, and every car you have driven.
Due to the recorded footage being indexed, performing such searches will be as fast as performing a google search. Results will be near-instant.
And can you imagine a data breach, and some web site allows the public to search it all?
Imagine the power behind the people that will control the above.
Imagine the abuse by the people that control the above.
If you where at the helm of the above system, and you have someone that you despise, would you be able to resist pulling up all of the camera footage of that person, their family, their friends, that boss that gets under your skin?
Well, the politically driven people in power will not be able to resist either. They will be able to pull up any and all of the above footage, as easily as you do a web search.
This is not good.
1
-
1
-
1
-
1
-
There is a risk factor when using a VPN service.
VPN vs no VPN.
With no VPN:
Your internet service provider (ISP) can see 100% of the sites to which you are visiting. If those sites are using https, then as our host explained, no one (including your ISP) can see what you are doing on that site. But your ISP will have a log of every visit you make to every site.
With a VPN:
Your internet service provider (ISP) will see a single connection, to your VPN service, and nothing else.
However, your VPN service has effectively taken over the role of your ISP, in terms of seeing / logging every site you visit.
Although your connection to your VPN service is encrypted... when your request to do whatever reaches the VPN service's computer, that computer (that VPN service) can see 100% of what you are doing in the clear.
As soon as whatever you are doing reaches the VPN's server, it decrypts everything.
After all, how could your final destination know what you want, if everything remained encrypted?
So your connection between your own computer and the VPN's computer is encrypted.
Then, the VPN's computer decrypts it all.
Then, if you are visiting a site that uses https, a new encrypted tunnel is created between the VPN's computer and the site you ultimately are visiting.
In a nutshell:
A VPN service is a glorified proxy service. It is a middle-man for everything you will be doing on-line.
Most (perhaps all?) VPN services claim that they keep no logs, and that your privacy is paramount, blah, blah, blah.
You are unable to verify any of their claims.
What better place is there to monitor people's private affairs than a service where the people use it for private matters, and those people have no way to know that they are being monitored?
I am not saying that they do keep logs on everyone. They simply can, easily, and you should know that.
Even if they do not keep logs, they will when handed a court order. And you will never know about that court order, because it will include a gag order (so the VPN service will keep it hush-hush).
Also, consider the liability that the VPN service is taking on. If someone is doing something illegal, and using the VPN's computers for their criminal actions, that VPN service is not going to allow that. And if they feel that you put their business at risk, they will notify the authorities.
Do you know the laws in your own country? They are endless.
How about... do you know the laws in other countries? If you connect to a VPN service in some other country, their laws are enforceable.
But they are somewhere else on the planet, so you are in the clear... right?
Look up five eyes VPN (and perhaps other number of eyes). The eyes are the countries that have reciprocal law enforcement agreements between them.
So you are not using a VPN service for anything sketchy. Well, the VPN service will still know everything that you are doing. And who are those people that have physical access to the VPN servers? Who are those people that can login with root access to those VPN servers? They are employees of the VPN service, and you do not know who they are (they are complete strangers) and they can see 100% of what you are doing.
Use a VPN, but know the risks.
For access to content in other regions, VPNs are great.
For safely connecting between a coffee shop's open hot-spot and your home's computer, VPNs are great (although in this case, you are creating your own VPN tunnel).
But that underhanded activity you might have in mind will probably get you in hot water, thinking you are safe because you are using a VPN service.
For criminals, a VPN's service will likely give you no cover.
For law-abiding people, just know that the anonymous people that run the VPN's service can see everything that you are doing, and can easily keep logs on everything you are doing (no matter what they claim).
1
-
1
-
I respectfully disagree with Judge Napolitano.
He is quoting standard, routine court procedures, and associated laws. President Trump's case does not fit that frame.
A low-level judge is interfering with the top office holder in the United States of America -- The President.
As the President, it is inappropriate, perhaps illegal, to have any (pin in the phone-book) judge, anywhere from sea to shining sea, interfere with the Oval Office. If allowed to happen, then no President will be able to escape having their time spent dealing with unhinged and radical judges. If one judge gets away with it, then dozens more will follow, and more after that.
The result would be a nearly complete choke-hold on our nation's chief executive.
Judge Napolitano has binders on. He does not comprehend the damage that any local or state judge, anywhere, can have on our federal government, at the highest levels of our federal government. As such, it is proper and duty-bound of the US Supreme Court to make a ruling and put this to rest, in order for the President of the United States of America to be able to carry on his duties.
1
-
1
-
@5:52 -- That sale's pitch, interfering with the video, was over the top annoying.
Just when the action began, he have someone blocking nearly all of the action, and yelling at us.
There was a time when people presented commercials separate and apart from the show. Now we have commercials blocking the show.
Then, @6:47, instead of allowing us to hear the car and the tires, our host inserted music. What on Earth were they thinking?
And they did the music bit, again, when they went around the track.
@12:08, instead of letting us watch how the car handles that turn, they fast-forwarded that portion. Again, what on Earth were they thinking.
And, again, @14:07.
It is as if they decided to tease their audience with, "Ha ha, we get to see those parts, but you don't."
Those twists and turns are where the action is. And our host made a mockery out if it.
They earned their thumb's down.
1
-
1
-
1
-
Using a cloud service is handing over your files to complete strangers.
Those cloud use encryption, twice (supposedly), and yet they can still see everything you hand over to them.
The first encryption is "https". Your connection between your computer and their computer is an encrypted tunnel. So no one in-between you and them can see what you uploaded to the cloud service.
When your files arrive at the cloud service, they get decrypted. It is no different than when you do, for example, on-line banking. When your bank shows you your balances, that information is sent to you via https, and is encrypted. But when it reaches you, it gets decrypted, and you see it all (as you should). And your data, that the bank has, is encrypted (by them). But they can, and do, decrypt it, as they need to (such as showing your your balances).
Uploaded files to a cloud service works in the other direction. When they get your files, they see it all. They have your files, 100% in the clear, exactly as you have the same files.
The cloud services claim that they encrypt your files.
Well, they probably do. But you have no way to confirm that they encrypt your files. And since they are encrypting your files, they can decrypt your files. It is similar to you using a password manager. Your passwords are in your encrypted vault. But you have access to your password manager's vault, and you can see your own passwords.
The lesson here is that 100% of what you upload to a cloud service (to complete strangers) is available for them to scan and read (if a scan flags it as being of interest).
The only files that you should upload to a stranger's computer are 1) files that you do not care about strangers seeing, and 2) files that you, yourself, encrypted before you handed a copy to the strangers.
Never hand a cloud service (complete strangers) files that are for your eyes only, unless you encrypt those files yourself. Hand them only the encrypted version of your files.
Consider how ChatGPT is able to write a thesis, and create expert-level spreadsheets, and write expert level Python scripts, and dispense in-depth political views, and offer technical legal advice, and create poems, and write plays, etc, on just about anything and everything. So if you think that Microsoft and Google, and the rest, do not have the means to scan and dissect your uploaded files, you have your head in the sand.
Encrypt your own files before uploading them to a cloud service. It is inconvenient. But that is the cost of privacy and security. Protecting yourself takes effort. Expecting the complete strangers to protect you is irresponsible, especially when they make oceans of $$ by using your data and knowing everything about you.
1
-
1
-
1
-
@13:17
0-60 in 7.3 seconds
The above is not very good, and it is due to the Altima being a pig from a standing start.
Nissan de-tuned the engine, to prevent a fast start. To achieve better fuel economy? To help bad drivers? Who knows?
Once the Altima gets moving (maybe around 25 MPH), then it has very good acceleration.
Most of the time, it is not a problem.
But if you are, for example, in the left lane, waiting at a light, and you realize that you need to make a right at the next light... forget about trying to get ahead of the car to your right.
@16:44
The SR style of the Altima handles very good; almost no lean and no tire squeal (those 19" low profile tires and beefy suspension work well). You can take turns at speed, and the car will behave better than you probably think. I am not suggesting that anyone drive like a nut. But there is no other way to describe how stable the SR is on taking corners. It is no Ferrari, but it is very good.
Not mentioned in the review is that the stereo is nothing special. It is borderline good. Nissan dropped the ball on providing a well balanced, realistic sounding stereo.
Cheers!
1
-
1
-
1
-
@elizabethhenning778 I do not know if you really believe the nonsense in that list that you wrote, or if you are advocating for fraudulent voting in pursuit of your liberal agenda
-- If you believe that there are no bad actors out there, then you are out of touch with reality.
-- If you believe that very, very smart people, that know every facet of voting security measures, never use their knowledge to change votes, then you are out of touch with reality.
-- If you believe that people do not risk a felony conviction, to change an election, then you are out of touch with reality.
-- If you believe that the United States has a way to apprehend foreign criminals, after they commit their voting crimes and leave our country, then you are out of touch with reality.
Voter fraud:
https://www.youtube.com/watch?v=RkLuXvIxFew
Voter fraud:
https://www.youtube.com/watch?v=qYaB5cd2plA
(skip to 3:33 for the above link)
Voter fraud:
https://www.youtube.com/watch?v=w3_0x6oaDmI
(goes into all aspects of voter fraud)
Voter fraud:
https://www.youtube.com/watch?v=LkH2r-sNjQs
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
Not mentioned are the following critical issues:
1) The Electoral College stops corruption at the state lines.
For example, what if Rhode Island officials were to stuff the ballet box? Should that one, small state have the power to swing the results of a nation-wide election? If it were a popular vote, then they could.
2) Mobocracy: The left is always beating the "we champion minority rights" drum. Not so, when it comes to voting for the president. All of a sudden, the rights of all of the small states are ignored. The whole point of our constitution is to protect the inalienable rights of all; to protect the weak, the poor, the downtrodden, from the tyranny of the majority; from the tyranny of the powerful.
3) Bush vs. Gore: Remember the endless lawsuits in Florida? They took place because the election came down to which candidate would win Florida. Now imagine what would happen in a close election, if it were based on the popular vote. The recounts would take place at every single polling station, from sea to shining sea. They would never end. There would be lawsuits everywhere. We would never figure out who really won, and all courts would be forever litigating the vote, grinding all other litigation to a halt.
The Electoral College addresses all of the above. It is not perfect. But it limits the corruption, and protects the rights of all.
Our founding fathers were brilliant!
Cheers!
1
-
1
-
How do you "continue to get out", if you are not there; if you are not left behind?
And note that Charles Marino answers like a slimeball, because he is a slimeball.
Yes, some Americans "continue to get out". But how do they "continue to get out"?
Our military is not escorting Americans out of Afghanistan.
Rather, Americans are paying smugglers to get out, and waiting for deals to be made which would allow them to get out.
In the mean time, those Americans are being hunted down.
In the mean time, those Americans are living a nightmare, never knowing when their hiding place will be invaded and they will be thrown in jail and forgotten, or tortured, or shot dead on the spot.
In the mean time, those Americans have no access to food. If they show their faces in public, they will be jailed, tortured, or killed.
Charles Marino is a disgusting excuse for a human being. He is a textbook example of evil, dressed in business attire.
Justice would be to assign him to relocate to Afghanistan, with no security personnel, so that he can personally help evacuate Americans from Afghanistan.
Folks, there are Americans in Afghanistan. They are there, because they were left behind. If they were not left behind, then they would not be there.
1
-
@10:37 "That protects me, not just from losing access from my database, but losing access to lastpass. I would never expect them to, say, go belly up, or suddenly disappear"
How could you lose access to your database?
Why would you need your lastpass data in a different container? Are you saying that lastpass would stop working if the site goes down?
Why would, if lastpass went dark, you not have access to your lastpass database?
Your ability to get into your locally encrypted lastpass database is at the mercy of your internet connection and lastpass' web site?
I use keepass. It relies on nothing.
By the way, you can add another level of protection to your password management that will make your database of passwords unusable, even if someone discovered your master password.
When you store your passwords in your database, leave off a character. For example, leave out a "6" in the third position of every password.
This would entail a bit of inconvenience, because after you copy/paste your password some site, you would have to manually insert "6" where it belongs.
The more secure you make your environment, the more inconvenient you make your environment.
1
-
1
-
@3:49 "Trying data recovery tools on the drive."
Approximately 2 or 3 years ago, I encountered that problem with an external LaCie drive. One day, the file system decided to go on vacation, and the various partition management tools that I tried all agreed that the drive was RAW.
I searched for free recovery tools. I found only one that claimed it would recover a RAW partition -- Hirem Boot CD (not an actual CD). It contains several partition management tools. None of them were able to recover my RAW partition.
I searched for non-free recovery tools. Nearly none of them offered RAW partition related tools. Of the ones that did, I looked for reviews and videos, and found none that focused on dealing with a RAW partition.
I had a copy of the drive's data, except for some recently saved files (not much, but I wanted to see if I could salvage it). So I turned off the drive for a couple of weeks, while I considered my options. I decided to purchase EaseUS's Partition Recovery software, which includes recovery of data on RAW partitions. But before making the purchase, I turned on my failed drive, and discovered that my partition returned from vacation. I was pleased, and perplexed.
Now, years later, the drive has never given me another problem. I do not trust it. But I use it (never to be a single source of any meaningful files). If I ever decide to purchase a partitioning / recover tool, it will probably be the one from EaseUS.
By the way, one important feature for me is to be able to create a bootable flash drive containing the recovery software. That would allow me to use the recovery software on any computer.
1
-
1
-
His apology was meaningless (other than to open the door for litigation).
His apology was empty words, because he had an opportunity to set up a fund, and refused.
So he says "I'm sorry", and offers nothing to support his assertion that he is sorry.
Ergo:
Sorry, not sorry.
Folks, he could part with $1,000,000,000.00 more easily than we could part with 10¢.
His net worth goes up and down by more than that amount every day. His life would change by nothing, by having a fund. He could still own as many mansions as he chooses, as many sport's cars as he desires, have as many servants, lawyers, etc, as his heart desires. Not a single aspect of his life would change, at all, with a $1,000,000,000.00 fund. But, still, he refuses.
1
-
Leo, please watch a recent video by Rob Braxman Tech "Why the iPhone 16 Should Scare You Sh.....less"
He posted it two weeks ago.
He focused on the iPhone model 16.
Was he wrong?
If the iPhone can do it, then so can the Echo and the rest -- if not today, then in an upcoming model.
As far as us supposedly not being interesting enough...
Should we have to concern ourselves that our elected officials have these devices in their homes? Certainly, elected officials would be of interest, and could be influenced by bad actors that have their private communications.
Same for celebrities, or anyone in the news, or any CEO of a Fortune 500 company, etc. How about the hundreds of mayors, nation-wide. And we have not yet considered abuse in nearly 200 other countries. The big tech companies know exactly who has their "listening" devices in their homes. It is simplistic for them to listen in (or record their activities).
If you could listen in on top government officials, would you resist?
If you could listen in on your favorite musical artists, and your favorite movie stars, would you resist?
The top executives at the big tech companies have that access.
And of course these big tech companies are not going to show their hand, by sending you advertising because you said "coffee makers". They did not become the technology giants that they are by revealing their data collection to you.
We do not have such details on their data collection any more than we have data on any company's trade secrets.
Also, I suspect that these devices (that are supposedly not listening) are banned from the pentagon. But if they were actually not listening (other than the "Hey..." wake-up words, then why would any high-security building ban them? I can't confirm that the pentagon bans them. But I would lay odds that they are banned there.
The fact that these devices are listening to wake-up words, and the hardware is getting more powerful and cheaper, making it cost effective (if not now, then not long from now) to listen in on everything, just the fact that these devices can listen and "phone home", is troubling.
None of us are that interesting. Yet, if you got into a legal battle with Google (or law enforcement issues subpoenas on you), they will have every web search you ever made, every comment you ever posted in youtube, and with their analytics running just about everywhere on the internet, they will likely know 99.9% of every web site you ever visited -- even though we are just not that interesting.
I would like to know what you think about Braxman's video.
1
-
1
-
1
-
1
-
1
-
1
-
Aside from someone wanting to fart around with Kali Linux, why would anyone install it on a Windows box, and especially Windows 10, which is the spyware OS of all OS's?
Why would anyone want to use an open-source, security based OS, and have it be 100% at the mercy of Microsoft?
Isn't Linux the answer to freeing yourself from Microsoft?
If Kali Linux (or anything) gets installed on Windows, a closed-source OS, then everything you do on whatever gets installed can be monitored by the OS.
Linux is faster, more reliable, and more secure than Windows. Well, not if you run your Linux code on top of Windows.
Kali Linux is free, and being run on a commercially licensed OS that is pricey?
Linux has always been a thorn in the side of Microsoft. So Microsoft decided to embrace Linux, and have the masses install it on their OS. Then, down the road, when Microsoft feels that they have enough market share (and they will know, because their OS will phone home), they will just decided to phase out support for WSL. And that will send people scrambling, and many, who would normally be running Linux on their hardware, will just choose to stick with Windows.
And when some Windows patch causes a kernel panic, or some other strange and unpredictable Linux failures, will the problem be a Linux issue, or will it be a Windows issue? Good luck nailing it down. Time well spent? Good luck finding a remedy, especially if it is a Windows issue that WSL depends on.
If there is a good reason for running any Linux OS on Windows, please let me know what that reason is. Short of such a reason, please do not encourage people to put their free, open-source Linux eggs in the Microsoft closed-source surveillance basket.
Cheers1
1
-
Cuomo's reasoning, that the FDA is not running for office, whereas Donald Trump is running for office, is intentionally misleading.
Folks, Cuomo is implying that the people that run the FDA have zero interest in who wins the election.
Nearly everyone that read this comment is not running for office. Does that mean that everyone that is reading this has no interest in who wins elections?
The people that run the FDA are leftist Democrats.
The people that run the FDA knew that delaying the distribution of the vaccine, until after the election, would hurt Trump.
When President Trump returns to the White House, in January of 2025, and he brings with him a majority in both houses of congress, he should have the executives at the FDA prosecuted for:
1) interfering with the election.
2) interfering with the proper functioning of their office.
3) the deaths of thousands of people that would have lived, had the FDA released the vaccine before the election, when they could have, when they already had it available.
Back to Cuomo:
Cuomo is lying to the camera, in his assertion that the FDA had no political interest in the vaccine.
Cuomo is a degenerate.
1
-
With a VPN, you are substituting the VPN for your Internet Service Provider, as far as tracking your on-line activity is concerned.
In fact, you bring more attention to yourself by using a VPN service.
If you want to search for something, without being tracked, the only way I know how to do so is via TOR. And if you are using TOR via Windows, you might be leaking information. Use TOR on a Linux system, to avoid your web searches being associated with you. Using TOR via the TAILs operating system is the most private way to not be tracked.
The Parrot OS, with its Anon Surf feature enabled is another good option.
Qubes OS, with its Whonix VM is also a good option.
Steer clear of VPNs, for anything other than accessing content not available in your region. VPNs can log everything that you do, and courts will not hesitate to issue orders to have them keep logs on users, just as courts routinely issue all kinds of search warrants. Even if your VPN is in a different country, you would have to know the laws of that country, as well as any reciprocal cooperation between your country and the VPN's country.
1
-
The vast majority of President Trump's deficit spending, was on re-building our military.
President Obama gutted our military.
We had no spare parts for airplanes. It got to the point, where when a spare part was not available to fix an airplane, then that airplane was cannibalized to fix many other airplanes.
The same was true for every vehicle and weapon system, etc.
Our military, nearly since its inception, was strong enough to win two simultaneous major wars, and do so decisively.
At the end of President Obama's administration, we could no longer do the above.
After President Trump took office, we were back to full strength, again. That took $trillions, due to President Obama's reckless disregard for our military.
When President Trump returns to the Oval Office, we will have a repeat, due to President* Biden.
President Trump will also have to replenish our strategic petroleum reserves, that President* Biden drained. Heaven knows how much that will cost.
1
-
1
-
1) I do not see how Vultr is not getting sued left and right, for denying people access to their own data.
There must be people / companies with deep pockets, with highly competent legal staff in their employ, that would sue Vultr for that.
You have trade secrets backed up on Vultr's servers. You need access to it. Yet, your only choice is to give ownership of your trade secrets to Vultr, in order for you to re-gain access to your trade secrets.
2) Never use cloud storage. Do your own backups, and keep a copy off-site.
If you find it necessary to use a cloud storage service, then encrypt your data before you upload it to the cloud service's computers. Use strong encryption (gpg or VeraCrypt), and use a strong passphrase (minimum 12 characters, with symbols -- strong entropy).
Anyone that uploads any private,data, in the clear, to a cloud storage service (controlled by complete strangers) is either clueless to what goes on, or out of their mind.
1
-
1
-
1
-
1
-
1
-
1
-
Why run this on a Windows machine? Why not run Linux natively?
Why put all of your eggs in the Microsoft basket?
Why have any performance hit, by channeling everything through Windows?
Windows is not as reliable as Linux.
Windows is not as secure as Linux.
Windows is not as fast as Linux.
Plus, Microsoft (especially Windows version 10) is a huge spyware company, competing with Google for the crown.
Linux has forever been a thorn in the side of Windows. So Microsoft smartly includes the means to run Linux, all-the-while being in 100% control of the environment.
And their plan is working. Folks are running their Linux code on Windows, and becoming dependent on Microsoft.
Down the road, when Microsoft decides that they have enough Linux coverage (and they will know, because Windows 10 phones home with this info), they will announce that they are phasing out WSL as of Windows version 13 (or whatever), or as of some update. Then the scramble to port everything to Windows begins, and Linux becomes a memory. And then watch the prices go up for Windows licensing.
Microsoft is a ruthless company. They are after 100% domination of the OS market. Not good for the public. Stop paying for a spyware OS, especially when the goal is to run Linux applications.
1
-
@9:02 "Also, check it (your password) against a database, like we've talked about before; these known passwords; known, vulnerable passwords, and make sure it (your passwords) doesn't match any of those".
There are sites where you can plug in your password, to conduct such a test. I don't think that you should use such a site, because you are giving them your password.
Find a site where you can download such a database of passwords, and then search that database of passwords, yourself, on your own computer, to see if your password is in there.
One other recommendation:
Do not use browser extensions. They can monitor 100% of your browser activity, including every password that you use to login to any sties.
Browser extensions make using the internet convenient. But with convenience comes compromised security. The more you have of one, the less you have of the other.
Most browser extensions are safe. But bad actors know that people love browser extensions, and so a small percentage of browser extensions contain malware -- and even some very popular browser extensions have been found to be doing nefarious deeds.
As our host recommended, use a password manager. When downloading one, triple check that you are getting it from a legitimate source. The last thing you want to do is download a password manager from a bad actor. They would love nothing more than for you to create your passwords with their app, and then their app sends them all of your passwords. So be 100% sure that you are using a genuine password manager from a legitimate source. And never use a password in two different places (never re-use a password). Every site that you login to should have a separate, unique, strong password (and that is where a password manager shines, making doing so less of a chore). And make a copy of your password manager's database, on a separate storage device.
1
-
@1:05 "maaannnnn, you stepped in it."
Folks, that was Don Lemon's attempt to discredit his guest, right from the onset of the interview.
Think about what Don Lemon's greeting conveyed.
It conveyed that Terry Crews is stirring things up. It conveyed that Terry Crews is the odd one out. Don Lemon attempted to put his guest on defense, with that inappropriate greeting.
Terry Crews did not step in anything.
Terry Crews was on solid ground.
It is Don Lemon that not only steps in it, he swims in it.
Terry Crews should have corrected Don Lemon for that propagandist greeting.
Terry Crews should have said: "Don, your fascist attempt to put me on defense could not even wait until you gave me a proper greeting. I stepped in nothing, while you swim in it."
@2:46 "Let me jump in, Terry"
That was Don Lemon's attempt to break Terry Crews' stride.
Don Lemon was not hearing the narrative that he wanted to hear, so Don Lemon interrupts his guest, who was scoring big points on reality.
Don Lemon did not interrupt during a time when the guest was talking gibberish or rambling. Rather, Don Lemon interrupted preciously to silence what he did not want the world to hear.
To Terry Crews' credit, he kept rolling on, which likely infuriated Don Lemon.
Terry Crews should have said "Don, you are interrupting", and then continued the point he was wrapping up.
Remember that when you are a radical leftist (and Don Lemon is a radical leftist), manners take a back seat to your agenda.
1
-
1
-
1
-
I purchased EaseUS Todo's "Workstation", lifetime license backup software. I did, however, initially have an issue. EaseUS's support personnel were very responsive and offered a solution (not a 100% fix, but still a very good fix). They get A+ for customer support (a rarity these days).
I prefer to do backups while Windows is not running.
That requires you to boot from (something like) a USB flash drive, where that flash drive contains the backup software.
EaseUS Todo has a menu option to create such a flash drive. The issue I ran into, is that the ISO file it created, to be used on that flash drive, did not work.
When I reported this to EaseUS's support personnel, they provided me a link to download an ISO file that they created. Their ISO file worked like a charm. But I am still not able to create my own ISO files -- which is not really an issue, because I can continue to use the one that they made for me.
Although you can allow your computer to run "full" backups while Windows is running, there will be files in use that will not get backed up.
That is why I boot from my flash drive and run a backup. That way, 0% of files will be in use, and 100% of the files get backed up.
Even though doing a backup while Windows is running will result in many "in use" files not getting backed up, you should still be able to do a restore of your computer with such a backup image. So if you are not going to manually do backups via a bootable flash drive, then you should be fine with having backups run automatically while Windows is running.
Decades ago, it was an issue, and I guess that I am overly cautious. But it seems that Microsoft knows about this, as well as backup software vendors, and it should not be an issue.
Also note that no matter how you do a backup, you should create an emergency bootable drive (such as a USB flash drive).
If your hard drive (or your SSD) fails, then when your replace it, how will you restore your data from your backup image? Your hard drive failed, and you no longer have Windows.
If you created an emergency flash drive, then you will be able to boot from that flash drive, and run your backup software, which will copy everything (a restore) to your new drive.
If you did not create an emergency flash drive, then you have some extra work to do.
You will first have to install Windows. Do you have a way to do that?
You will then have to install your backup software. Do you have it, or know where to get it? Do you have your registration code (you might need it).
Once you have the above installed, then you will be able to restore from your backup image. But it is a lot more work, and you could get stuck if you are missing anything. With an emergency flash drive, created by your backup software, that will be all you need.
I used to use Acronis's True Image. But one day they changed the functionality of mounting a backup image as a virtual drive, where it would work, only if you were signed on to your computer as an administrator. If you were signed on as a standard user, then there was no way to mount the image. No UAC prompt. Nothing. You had to sign on with an admin account. I went in circles with Acronis's support personnel, including phone calls with their support personnel. They simply broke that feature. Maybe they fixed it by now? I got fed up with them, due to waste of time, and their refusal to offer me a refund or credit or anything for what they broke.
1
-
1
-
1
-
@13:00 "...support them." -- The Institute For Justice.
Our host frequently asks others to write a check (money transfer of any kind), to donate, to The Institute For Justice.
Our host has never said that he has written a check.
Yes, The Institute For Justice is a worthy cause. But apparently not worthy enough for our host to support them, financially.
It is good that he uses his channel to help raise funds for The Institute For Justice. But that should not excuse him from writing his own check, and set a good example.
Only asking everyone else to write a check, while never doing so yourself, is elitist.
Our host certainly would not be harmed if he wrote a check for $100 to the cause he so fervently believes in. But that, apparently, is for everyone else to do -- not for him to do.
I wonder how many people choose to not send a check, because of the double-standard being set by our host?
If our host will not write a check, then how committed is he to the cause that he claims is so worth?
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@0:06 "Let's get something straight"
Folks, when President* Biden uses that line, it means that the next words out of his mouth are lies.
In the game of "poker", people that are bluffing or lying will often have what is called a "tell". Better players can read when someone is "telling", and knows that that person is bluffing or lying.
"Let's get something straight" is one of President* Biden's "tells". Others are:
"I'm not joking"
"I'm being serious"
"I'm not kidding"
"No joke"
"I mean it"
What do all of President* Biden's "tells" have in common? Answer:
He "oversells" his lies.
He puts too much emphasis on his lies. He thinks that it will drive home that he is sincere. He thinks that what he is saying "right now" is the only thing you should remember. Next time, when he does a 180° turn, he will use one of the above lines so that you are expected to, again, only go by what he is saying right then and there.
Every time he lies, then at that moment, that is the reality he expects you to go home with.
Joe Biden is a habitual liar. He has been lying all of his life.
I am not suggesting that no one lies. But Joe Biden makes a living and has derived power with the art of lying.
But pay attention to all of his "tells", and you will see that each one is attached to a bold face lie.
1
-
@3:03 "Why are you going to social media companies, and telling them that a story may be Russian disinformation, when you don't even quite know that yet."
Once again, a conservative, inadvertently giving cover to the radical left. What do I mean?
The question for Joe Concha is:
Joe, do you really believe that the FBI Director was unsure of what Hunter had on his laptop, and whether or not it was Russian disinformation?
Folks, of course Director Wray knew exactly what Hunter's laptop contained.
Of course Director Wray knew that Hunter's laptop was not Russian disinformation.
Of course Director Wray knew that his agency was colluding with facebook to swing the election.
Of course Director Wray knew that his agency was not trying to curtail misinformation, but rather, his agency was actively spreading disinformation.
Stop inadvertently defending people by way of implying that they did not know. Director Wray knew exactly what was on Hunter's laptop, and Director Wray knew exactly what his agency was doing with facebook.
Director Wray, and all of the people involved with spreading that disinformation, and interfering with 2020 election... all of them should be prosecuted.
Stop playing games with these people. They are not playing a game. They are ruthless people, seeking to gain power (enough is never enough for them), and the Constitution be damned (in their view). These people are not like the rest of us. They are smart, and they are evil. They have blatantly broken laws and committed high crimes that change election outcomes and endanger our freedoms. They are not clueless. They are not flying blind. They are not doing these things by mistake. So stop giving them the benefit of the doubt, as if they would have acted differently, if they had only known better.
Folks, you know that Hunter's laptop is Hunter's laptop, and that it is not Russian disinformation. You always knew that. And we are expected to believe that the Director of the FBI does not know?
It is absurd.
These people should be charged with the serious laws that they intentionally violated.
1
-
1
-
1
-
@0:42 "In the same way that some of those crazy folks think that tube amps sound better because they inject warm distortion or that vinyl reproduces important, inaudible harmonics..."
Dave, every amp, solid state or tube based, has distortion.
As to vinyl having inaudible harmonics... you might be reading propaganda from people that either do not listen to vinyl, or when they did, used a low-end turntable that they never properly dialed in, with a low-end stereo system, and sub-par sounding pressings (80% of pressings are sub-par sounding).
When vinyl is done right, there is nothing "inaudible" about the results.
On a professionally set-up, high-end stereo, with a professionally dialed in turntable, tone-arm, and cartridge, in a treated room, with white hot stamper pressings, your jaw will drop at the realism. When you close your eyes, your ears will not be able to identify the location of the speakers. The speakers disappear.
Your eyes and ears will fight over whether or not you are in the room with the band. You will be able to spot the exact location of each performer. You will feel like you can reach out and touch them. It will be scary real.
The above is very hard to achieve, and very expensive to achieve. But I have heard it in my local high-end store.
But even on other great, but lesser systems, vinyl can sound wildly great. So please do not go by the naysayers. If they have never listened to a professionally set-up, high end system in a treated room, then they are spewing BS.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
If you use a VPN router at home (not expensive), then your mobile device will be able to connect to your home computer (assuming you leave it running) with a secure, encrypted connection, over the internet. Or, if your BIOS / UEFI supports "Wake On LAN", you can wake up your home computer, remotely.
You will need either a similar VPN router with you when you travel, or the software equivalent to be stored on your mobile device.
When properly set-up, you can have full, safe access to your home's computer(s), as if you were sitting at home.
1
-
1
-
I had an external, mechanical, USB drive turn to raw. I took the opportunity to explore the world of file recovery tools.
Of the free ones, nearly none of them support recovering files from raw file systems. They generally focus on recovering deleted files.
There is one tool named "hirensbootcd", which is free. It allows you to create a bootable flash drive. When you boot from that flash drive, you will be in a Windows PE (I believe) environment, and will be presented with a list of recovery tools. A few of them support recovering raw file systems.
None of them worked for me. But they might work for you.
My data was backed up. So I reformatted my raw drive, copied back my files, and it has been working fine for over a year.
With your failed flash drive, I doubt that your data was actually lost. The NAND cells that hold your data probably still have your data. You just need to get to it.
Flash drives could wear out. If that happens, you will not be able to write to the drive. But you should still be able to read from the drive -- and it should not cause any loss of data. Wearing out a flash drive happens from endlessly writing to the drive. That would normally take over a year (perhaps two years) of non-stop writing to the drive. Wearing out an SSD is very hard to do, even if you try. Heat would be faster at causing a failure as compared to wearing it out with writes.
Something else on the flash drive might have failed, causing your file system to turn to raw. It could be a bad tracing on a circuit board.
If your data is important enough, and you have the financial means to pay for a recovery service, they should be able to recover your data. No guarantees, but good odds.
But first see if one of Hiren's recovery tools is able to rescue your files. Note that you will need a spare drive onto which your recovered files will be saved. Also note that the recovery could take a very long time, depending on the size of your failed drive and the speed of your failed drive. It could take all day. Good luck!
1
-
1
-
All the talk and claims about non binary is utter nonsense. "Non binary" is a made up term, from the minds of disturbed people.
You are either male or female. There are no other options, and the choice is not yours. Your DNA was decided at the time of conception.
If you were born a male, you will live your life as a male, and you will one day die as a male.
If you were born a female, you will live your life as a female, and you will one day dies as a female.
Anyone saying that when you were born you were neither male or female, or you get to choose, etc, is either mentally disturbed, or has a financial interest (and does not care they they are ruining the lives of others by spreading such complete garbage).
1
-
There are loads of data breaches, that are not defined as breaches by those that perform the breaches.
Read the terms of service, and the privacy policies of on-line services. Hire a lawyer or two, before you get started. And get some sleep, because you will be in for a long read. And companies redefine words, so that they can legally use those words for what those words do not mean (not a dictionary definition, but their own definition). Companies share your data like there's no tomorrow. They call the other businesses "partners", or that those companies fall under their umbrella, etc, and they give excuses for sharing your data, such as to help them better server their customers.
Since there is virtually nothing that you can do about all of the breaches (ahem, sharing), then you are at the mercy of those businesses and government agencies.
@0:40 "Some talk about encryption..."
Note that every institution, to whom you give your information, has it in the clear (more on that in a moment).
There are two categories of encryption. Your connection between your device and their server. That is encrypted, and that "tunnel" is safe. But when your data reaches the other end (when it reaches the company to whom you are sending your information), it gets decrypted. They have it 100% in the clear. Then, they encrypt it, again, for storage on their servers. It is this latter encryption that is prone to data breaches.
We have no way of knowing whether or not they actually encrypt your data. They probably do. But "probably" is a problem.
Also, we have no way of knowing what kind of encrypt they use. It can be Department Of Defense level encryption, such as the "Rijndael" algorithm, or it can be weak encryption.
And even if they use strong encryption, someone at the other end has the keys to see your data (not in all cases, but in many). Who are those people? What kind of passwords do they use for your data.
If a court ordered your bank to hand over your financial data, the bank can and will. But it is encrypted. And yet the bank is able to hand it over. So someone at the bank can decrypt your information. What other companies can do the same?
And since companies share your information, they are not sharing encrypted files that their partners cannot read (that would be unusable).
So our information is all over the place. With our information in the hands of countless companies, and countless government agencies, we are all vulnerable. Considering the above, it is amazing that there are not data breaches all over the place.
Before computers, all of our data was printed out and put into filing cabinets. Our information was still shared, but not with so many "partners", because back then, it was time consuming and expensive to share our information (it was all 100% manual labor). Today, with computers, it is simplistic for companies to share our data. Before computers, there were data breaches. But no one walked off with a copy of everything. Today, if someone gains access to a business's data, they can copy it all.
But as our host said, breaches happen, but are not too common. His "making the news" illustration was insightful.
1
-
1
-
1
-
1
-
@Omo 're Bi'yan Bing is from Microsoft.
With Windows 10, Microsoft turned up the spying to full steam ahead.
So although I do know know, specifically, about Bing, I will not trust it.
One test is to do a few searches with Bing, and then see if you get facebook ads that are related to your Bing searches. Note that even if you do not, that means only that that relationship does not currently exist. But Microsoft is definitely collecting data from you, and lots of it.
The only way to have a semblance of privacy on the internet (a public network never designed with privacy in mind), is to us a non Microsoft, non Apple, open source operating system and open source browser, such as what is available with many UNIX / Linux type operating systems. The most secure, most private, is Tor. But you get privacy and security at the cost of convenience, speed, and somewhat limited options. Tor goes to extremes to keep you both private and anonymous. But keep in mind that if you use it to sign on to facebook, you are revealing yourself and defeating its purpose.
If you want to have some privacy, then do not use google products. Do not use chrome as your browser. Instead, use Mozilla's Firefox or use the Brave browser. But, again, if you use Firefox to surf to google for searches, then that defeats the purpose. Firefox / Brave and duckduckgo.com makes sense.
Cheers!
1
-
@0:13
"...but his own republican party is scrambling to counter the President's message..."
Fabrication.
@1:09
"The terms 'absentee voting' and 'mail in balloting' are synonymous in most US states. Both generally mean filling out a ballot and dropping it in the mail"
Another lie.
The terms "absentee voting" and "mail in balloting" are not synonymous, in any way, where it counts: And what counts is verify-ability.
The people getting absentee ballots are vetted and individually approved, based on not being able to vote locally (such as known personnel serving on military ships at sea).
Whereas, mail in voting is rife with both incompetence and corruption. Millions and millions of ballots are mass mailed, with no verification, whatsoever, that the recipients exists, or that the ballots reach the intended recipients, or that the intended recipients are the ones that fill out the ballots.
Imagine, for example, nursing homes, where anyone could coerce the patients, or not even deliver the ballots to the patients -- and get filled out by the person in the mail room.
@1:23
"Election experts who have studied decades of US elections say such cheating is rare".
-- Experts? What experts?
-- Who are these "experts"?
-- How many of these experts are there?
-- Who decreed these people to be experts?
-- Who are these experts voting for?
If there are 100 experts, and 98 say mail in voting if rife with fraud, and 2 say that fraud is rare, then Reuters claim that:
"Election experts who have studied decades of US elections say such cheating is rare" is true. All it takes are two so-called experts for their misleading statement to be technically correct.
Reuters knows this. But Reuters wants the fraud.
Reuters wants their candidate, Joe Biden, to win, and fairness and voting laws be damned.
Reuters is an unofficial arm of the Democrat National Committee, masquerading as a news organization.
1
-
Even rich people have a limit, to how much taxes they will pay, even if they are easily able to afford it.
No one likes to over-pay, or be ripped off, even if they are wealthy.
At some point, the rich folks will move to other states where they can get the same living conditions, without the high taxes.
At some point, those $20,000,000 homes will go down in value, because those that can afford them will not make the purchase, due to the high taxes.
1
-
1
-
Windows, especially version 10, is itself a type of virus -- one that spies on the world.
Windows 10 records every keystroke, every mouse click, every file access.
Stop using the closed-source, expensive, spyware, Windows 10 operating system.
Install one of the numerous free, open-source Linux operating systems.
If you are new to Linux, then go with Linux Mint.
Virtually every Microsoft program has a near mirror program available for Linux, and it is all (well, just about all) free and open-source.
Linux is faster, more stable, more reliable, and far less prone to attacks, as compared to Windows.
Cheers!
1
-
1
-
If you want to quickly lock your computer (bring you to the login screen), then run:
tsdiscon
That command is used for disconnecting a remote desktop session. But when you specify no session ID, it defaults to your own login session.
When you log back in, everything will be just as it was, the same as if you clicked, clicked, and clicked to lock your computer.
You can put that command into a bat file, and save that bat file on your desktop. When you double-click it, your computer will get locked.
This might helpful for people that will walk away for a few minutes, and do not want to click, click, and click to lock their screen. A double-click on a desktop icon is less of a bother.
For help, run:
tsdiscon/?
1
-
1
-
Is there a way to use a hardware firewall where you can monitor to which addresses the TV is connecting?
Once identified, have your hardware firewall block those requests.
The above might require you to do a factory reset of your TV, after you created your firewall rules.
Of course, the TV might not work if you do not let it contact its permission server.
But even if the above would quash the permission server attempts and any other BS it tries to force you to agree with, we would be on the hook for the cost of the hardware firewall, as well as needing the skills to configure the rules in the hardware firewall, and all of the time we spend on the above is offensive, because we should not have to do any of the above.
I own nothing from Roku. And now that I am aware of their tyrannical mistreatment of their customers, I will never be a Roku customer.
I will also never recommend Roku to anyone, and I will steer people away from Roku.
By the way, when a company treats their customers with such disdain, you can imagine what a hellish experience it must be to work for them. They must treat their employees like entries on a spreadsheet, and look for any ways to screw them.
1
-
1
-
Louis, consider what Hyundai's personnel will do with the so-called damaged battery, if the customer agrees to have it replaced.
I think that we can safely assume that they will not send that so-called damaged battery into a landfill.
Someone at Hyundai is going to cash in on that so-called damaged battery.
Also, if the customer tells Hyundai that they want their so-called damaged battery back, you can count on Hyundai telling the customer either 1) "We sent out for recycling (or to a landfill)", or 2) "It is too dangerous for us to allow you to take it."
And if the customer tells Hyundai that they want their so-called battery returned to them, before Hyundai starts the job, Hyundai will come up with more BS. Hyundai will come up with any and every excuse to refuse to return the so-called damaged battery to the customer.
And remember: The customer owns that so-called damaged battery.
It begs the question:
Should you trust Hyundai to even replace the so-called damaged battery?
They could replace the protective seal (or fix it, cosmetically), and charge you $60,000.00 for a $200 repair.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
Activism is legal.
Law breaking is not legal. Ergo, blocking traffic is not activism.
What's next? Holding up a bank, in the name of activism?
Well, they were protesting in that bank robbery. So no crime. Right?
Yes, blocking traffic is not as serious as bank robbery. I gave the example to illustrate a point.
You do not get to burn down buildings, in the name of activism.
You do not get to turn over cars, in the name of activism.
You do not get to block traffic, in the name of activism.
Once you engage in criminal activity, you, by definition, are not a activist.
1
-
1
-
1
-
@4:44 "...and the economic crisis that we inherited..."
President Trump's administration produced a booming economy, with record low unemployment, and record growth.
In the months leading up to the 2020 election, the Democrat Mayors and Democrat Governors closed down everything, and they justified their actions as part of the Covid 19 response.
So President* Biden inherited an economy that was ready to boom, again, and he killed it.
@6:20 "...we have now created 8.3 million jobs, in my first 15 months in office..."
People that could not go to work, because the Democrats closed everything down, and now those people are returning to their jobs... well, that is not creating jobs.
And he goes on spewing BS about employment levels, when the vast majority of those jobs were simply people returning to work sites that were closed during the Covid 19 closures.
And then he lies about reducing the deficit.
His party has pushed legislation that is more expensive and budget busting than any other administration in history.
@13:00 "Not a joke"
Whenever President* Biden says "Not a joke" or "I'm serious" or "I'm not kidding", etc, it means he either just lied or is about to lie.
President* Biden makes up BS, and he thinks that he is able to sell his BS by emphasizing it with one of the above lines. He "oversells" his BS.
In the game of poker, some bad players have a "tell". The more experienced players can "tell" when others are bluffing. President* Biden's "tells" are him saying "Not a joke", etc.
@15:22 The President Of The United States Of America is praising the dictator of a communist country where its people languish in gulags, starve to death, have forced labor camps by the millions, child labor, get paid $2 a day, are beaten if they do not meet quotas, etc.
@15:47 "If we don't step up (to China), we're going to be out"
The same man said that a strong China is a good thing.
@16:31 "Not a joke". Translation, the comment that President* Biden attributed to "The president of one of the major companies" is a flat-out lie. Otherwise, President* Biden would have named the company and the person. Add to that his "Not a joke" means he lied.
@17:43 YELLING!
@22:33 He is unable to pronounce the name of the country that he is the President* of.
@18:09 "...and I mean it sincerely"
Same as "Not a joke". He just lied.
Or does he mean that everything else he spoke about he was not sincere because he did not say that he was sincere?
He is not sincere. His "...and I mean it sincerely" means he lied.
@18:50 "No, but really!"
That is another "No joke". Ergo, he just lied.
@20:14 "True story"
That is another "No joke". His "True story" is fiction. He is lying.
@22:03 "Sericy" (he meant "Seriously").
That is another "No joke". So his story is a lie.
@25:12 Creepy. I need a shower.
1
-
President* Biden's spending spree is not just mostly wasteful, the bill is littered with items that are 100% unrelated to infrastructure. The bill contains everything but the kitchen sink, and it all favors radical leftist agendas; everything from voting laws to campaign laws, that all ensure that republicans will never have another chance at winning elections.
And President* Biden has no idea what is in his infrastructure deal.
Every time President* Biden goes before the camera, to promote his plan, he is 100% of the time reading from teleprompters, words written by his handlers (and no one knows who those radical leftist speech writers are).
President Trump took questions from reporters, almost daily, and for long sessions, and never with a teleprompter.
President* Biden never stands outside with reporters and fields questions. Perhaps there is an exception for a question, on some rare occasion. But with President Trump, it was not the exception. He routinely made himself available to the media -- and the media hated him, and he still took their questions, daily, with no teleprompter.
When President* Biden does schedule a time to take questions, his handlers give him a list of the reporters to call on.
How bad does his mental state have to get, before NBC stops ignoring how bad he is?
And these NBC reporters (also known as undeclared members of the propaganda arm of the Democrat National Committee) treat President* Biden's plan as if it is normal.
They make no mention of the mountain of pork and payoffs in the plan, and no mention of the endless regulations in the bill that have zero to do with infrastructure.
This is why NBC is losing viewers at an alarming rate, and deservedly so.
Even people that lean left cannot get the thumb's up clicks to compete with being trounced by the thumb's down clicks.
By the way, "bipartisan", as it pertains to this slobbering report, equals 1 republican senator that is voting with the democrats.
1
-
1
-
1
-
@1:29 "Then, install a data sharing program, like OneDrive or..."
Do that, only if the data you will save to them is not private or sensitive.
When you use OneDrive, or any other cloud storage service, you are handing over your data to complete strangers.
Those services have wildly powerful systems, and have extremely sophisticated software (ChatGPT level), such that they can easily index all of your data and build a profile on you.
It is simplistic for them to do so.
Every photo will likely be scanned with facial recognition tools. Same for every video. They can identify locations, and can identify activities, etc.
Your files contain metadata; lots of personal information, and you are handing it all to complete strangers.
If you want to keep your "work in progress" safe, then copy your work in progress files to an external drive. Make your own copies.
Yes, OneDrive makes it simple, because it happens automatically. For that convenience, you are letting complete strangers know everything about you, down to the finest details.
They can do whatever they want with your files, including sharing your data with others (including any government officials on the planet). Your data will be saved, not only in the country where you live, but the OneDrive servers likely save copies in other regions, too, for redundancy and favorable laws.
It is simple for you to copy your folder to an external drive. It is more simple to let the cloud storage service grab copies of your files. If you are okay with complete strangers having your data, then you are good to go. Otherwise, just copy it yourself to an external drive.
OneDrive, and others, make it simple to share data between devices. If you need to do that, and are okay with them having all of your data, then that is fine. Otherwise, steer clear of companies that take your files. The only exception is if you use strong, local encryption, before allowing OneDrive to grab the files.
The above pertains to "work in progress".
You should still be using backup software, as our host described.
1
-
@askleonotenboom I wrote my comment, because you made no mention of the privacy issue, nor Cryptomator as a privacy tool when using cloud based storage.
In that other discussion, I suggested that you watch a recent video by Rob Braxman. I hope that you did, and would like to hear your take on his information.
He posted another video, 9 hours ago (current date, time is 06/19/2024 @21:16). He explains how big tech is using hardware, already shipping with motherboards, to record everything that you are doing, such that end-to-end encryption is rendered useless (well, useless if big-tech or policing agencies want to see exactly what you wrote, said, did, typed, etc).
When hardware is being used in smartphones and motherboards, to see everything prior to encryption, then it stands to reason that big tech is harvesting everything that you upload to their cloud storage services.
1
-
1
-
1
-
1
-
Leo, I used to use Outlook 2007.
It supported both IMAP and POP3.
At the time, I did not know what the difference was. My ISP told me that it did not matter. At the time, I never heard of IMAP, so I used POP3.
I discovered that it was deleting my e-mail from the server, which I did not want it to do.
Poking around in Outlook's settings, I discovered that it had an option to leave the e-mail messages on the server (however, they still got downloaded). I have no idea whether or not Microsoft removed that feature from later versions of Outlook.
Also, POP3 did not support an encrypted connection between your device and the e-mail server. But it does now (not sure when that was changed). I believe that IMAP always had encryption.
By the way, the ISP that I used over a decade ago allowed users to login to their BSD server, via ssh, and use UNIX (or Linux) commands. That allowed me to use "putty" to login to their server, and use a text based e-mail client (such as "mutt"), directly on their server, to manually delete e-mail messages. It was wonderful to have that granular control over my e-mail messages.
Now I am using a premium Proton Mail package. Supposedly, it supports Outlook, via a bridge (or something along those lines). But owning a current (or somewhat current) version of Outlook is pretty expensive. Microsoft does not sell Outlook, by itself. And Microsoft pushes renting Office, which I refuse to do. And I vaguely remember (from a year or so ago) reading that the current version of Outlook should be avoided (that Microsoft made many unfavorable changes).
So between trying to figure out which is the last, good version of Outlook, buying it (and really owning it), and getting it to work with Proton Mail, is a royal pain. Years ago, I simply purchased and installed Outlook, pointed it to my e-mail server, and I was done.
Leo, do you use Outlook?
Any pointers on my problem?
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
Louis, if you ever have an issue with your Vandersteen speakers, you will not encounter any crap.
I doubt that you will ever have an issue with your Vandersteen speakers. And if you call them, and ask to speak to Richard Vandersteen, he will probably pick up the phone (or call you back if he is unavailable).
If you ever have a warranty claim with Western Digital hard drives (or any of their other companies: G-Technology, Sandisk, HGST, etc), you will see Hoover as a distant disreputable company.
Western Digital puts up every imaginable, conceivable obstacle in your way, including sometimes taking months to ship a replacement drive.
They also try to charge customers a fee, to avoid delays. Western Digital calls it a "Convenience Fee". So you are going to pay Western Digital to honor their warranty. Either that, or roll up your sleeves for a long, tedious process that is designed to wear you out.
Seagate is the opposite. Seagate is a pleasure to deal with.
When I had a warranty claim with Seagate, they offered free data recovery. I did not know that it was included in the warranty.
Seagate recovered the data, and put that recovered data on yet another drive.
So they replaced my failed drive with the same size (same capacity) drive, and they shipped me an additional drive that had my recovered data. And Seagate told me to keep both drives.
So there are reputable companies. Vandersteen and Seagate are two examples.
A warranty has zero or little value, when the company refuses to honor their warranty obligations.
I will never purchase another Western Digital product, even if they offered lifetime warranties.
1
-
@15:12 "We never checked out books without our parents seeing what books we were reading."
1) Alexi Giannoulias is lying.
Children do not run 100% of anything passed their parents.
2) Even if Alexi Giannoulias was the 1 in 1,000,000 children that showed his parents every single book he was reading, that means zero for every other child in our nation.
Of course children will hide books from their parents.
Are children going to think: Hmm, Alexi Giannoulias showed his parents every single book that he ever read. So I will, too.
Ask 1,000,000 children: Who is Alexi Giannoulias?
1,000,000 out of 1,000,000 will answer: I don't know.
But according to Alexi Giannoulias, he showed his parents every single book he ever read, and therefore so does every other child in our nation.
If Alexi Giannoulias' parents are still alive, then an undercover, investigative reporter should strike up a conversation with them, and expose Alexi Giannoulias for lying to congress.
Then, Alexi Giannoulias should be charged with perjury.
We must stop playing games with these lying, child sex predator degenerates.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@Top Gear,
Why do you post a video, where the focus of the video should be about the amazing car, and instead, you make the focus about the camera theatrics?
Why do you not keep the camera still for 10+ seconds, and let us watch the car?
Why do you not keep the same camera angle for 10+ seconds, and let us watch the car?
-- Constant camera zooming in and out...
-- Constant camera angle changes...
-- Constant and intentional camera shaking...
Why do you do all of that?
Is the car not able to stand on its own merit?
Is there a reason you do not want us to see the car, the same way we would see it if we were at the track watching, or in the driver's seat driving?
This should be 100% about the car, and 0% about the post-editing camera work.
You could make a Toyota Corolla made to look like a hyper-car, with similar camera work.
Please release the raw footage of the car doing its thing, so that we can watch, without the constant changes and distractions.
I know that you all watched your raw footage, and loved it. And yet you deny your viewers that same, uninterrupted footage.
I suspect that most of your thumb's down votes are because you never let us actually experience seeing the car perform.
1
-
1
-
1
-
Cuomo was confronted with impeachment, and knows the votes are there for a guilty verdict, which would result in him being fired.
His planet-size ego could not endure being thrown out; fired. This is why he is resigning. And the 14 days is for him to cover his butt, and to take revenge on some people while he still holds power.
Also, when impeached, and found guilty, that "guilty" verdict would be used to prosecute him for his sexual harassment prosecution, and his multiple count, nursing home, homicide prosecution (and I suspect that numerous other skeleton bones would be revealed, if an impeachment trial were held).
Cuomo knew that in the impeachment trial, all many of his criminal, gangster activities would be revealed for all the world to see, live.
Cuomo knew that when that all got televised, that his, yet to happen, criminal trial would result in jail time, due to all of the evidence that would be aired in his impeachment trial.
If Cuomo did nothing wrong, there is no way that he would give up power. In Cuomo's world, "Cuomo" comes first.
Cuomo's BS excuses about doing what is right for government to function properly is just that: BS.
For government to function properly, you do not grope your subordinates, and you do not kill thousands of people in nursing homes.
This is 100% Cuomo's fault.
I hope that no deals were made, that his resigning would mean no criminal prosecutions -- especially with the BS "It's not my fault" video we just watched.
Cuomo needs to be held accountable for his crimes; for his felonies. He should not be given a pass, on being criminally prosecuted, for simply giving up a job that a criminal should not have had in the first place.
Cheers!
1
-
1
-
Now that President Trump is well seasoned in the ways of running the Executive branch of our government, he is not going to allow "Russia, Russia, Russia" type accusations to interfere with his America First agenda.
Every case against him will be dropped.
And you can bet that President Trump will nominate an Attorney General that will hold all of the criminal, swamp dwellers, that criminally abused their power, to be charged for their crimes and brought to justice.
The tables have been turned, and President Trump is going to seize this opportunity to unravel the deep state operatives, and bring all of the key criminals to justice. President Trump is not going to give them an inch.
This, now very experienced version of President Trump knows exactly what he has to do to bring back our booming economy, secure our border (north and south), and not let any of the criminal swamp rats escape the long arm of justice.
1
-
1
-
1
-
When the United States Of America broadcasts weakness, then this kind of chaos takes place.
When the United States Of America has a weak President*, then the United States Of America broadcasts weakness.
If President Trump was in office, this would not have happened.
President Trump does not hesitate to let the world's tyrants know that if they get out of line, they will be hunted down and dealt with.
This is the fault of the fake news media, otherwise known as the unofficial propaganda arm of the Democrat National Committee, who got their senile, corrupt, and weak puppet into office, and now the world has no anchor. The world's tyrants are free to conduct havoc, and they know that there will be no repercussions.
But the United Nations condemns their acts. So the tyrants that kill innocent people, by the thousands, will stop being evil, because bureaucrats at the UN have spoken. Unbelievable!
Folks, this is just the beginning. Chaotic nations around the world will follow in the steps of Sudan's violence and government turmoil.
Let's Go Brandon!
1
-
1
-
1
-
1
-
@andrewlangley9507 The IV Amendment to The Constitution Of The United States Of America reads:
"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
"
The above is describing what is spelled out in an affidavit.
If the affidavit were to be provided, contingent upon charges being filed, then the government could break into anyone's home, never intending to file charges.
The government would have no restraint at going into anyone's home, taking whatever they want, and never having to offer justification for doing so.
When the government breaks into your home, they must justify exactly why they did so, with specificity. They are not permitted to go on an Easter Egg hunt. They must spell out exactly what it is that they are searching for, regardless of whether or not they find what they were looking for, and regardless of whether or not they file charges.
If the Justice Department does not provide President Trump with the full, unredacted affidavit, a court will order them to do so. And since this involves President Trump, it will quickly reach the Supreme Court, and President Trump will easily win his case, and probably by a 9-0 ruling.
Also, if the Justice Department forces President Trump to take them to court, even the radical left media will not be able to effectively spin this. And since they all know that President Trump will prevail if this goes to court, there is no way that the Justice Department is going to screw around with this.
What concerns me is the possibility of the FBI seizing everything in sight (not looking for anything specific), and when they later find something of interest, they will produce an affidavit based on what they found. That is, of course, wildly illegal. But that is what a tyrannical government does.
President Trump and his lawyers are too smart for all of this. If the affidavit is held back, then its authenticity is gone. If that also goes to court, it will be another slam dunk win in the courts for President Trump.
The constitution does not allow for "break in now", and we will show you the paperwork when we feel like it.
1
-
Normal reporters need to do a better job of exposing degenerates, like Ilhan Omar. Here's how:
Reporter: "Do you denounce Hamas beheading children?"
Silence.
Reporter "Do you denounce Hamas beheading children?"
Silence.
Reporter (turning to the camera, and well within ear shot of Omar: "America, Ilhan Omar is a proponent of beheading children, based on her refusal to denounce those child beheadings."
And the reporter should say: "Our headline is that Ilhan Omar supports the beheading of children", and "Ilhan Omar is right here to state otherwise, but she will not, because she wants children to be beheaded."
Any normal person would challenge that accusation. But Ilhan Ohmar will not.
When America sees Ohmar not repudiating that accusation, then on-the-fence Americans will understand who Ohmar is.
Some might say that it is not the role of a reporter to make such an accusation. Well... normally that would be the case.
But when a law maker refuses to denounce child beheadings, then it is appropriate to draw a conclusion, and state so in the presence of the degenerate law maker.
The actual news is to clearly expose the degenerate law maker. The above is how to do so.
1
-
1
-
1
-
1) A paid fair entitles you to one seat, and only one seat, subject to availability (based on the level of occupancy).
If there are 100 seats in a car, and there are 100 passengers in that car, then everyone is entitled to a seat.
If there are 100 seats in a car, and there are 101 passengers in that car, then 1 person will have to stand.
No one has the right to take two seats (unless that person purchased two tickets for themselves for use in a single ride).
2) Feet on seats is not only filthy, it can damage the seats. Women (and mentally disturbed men) wear high heels. Heels can rip fabric.
3) Our host added old age effects to this video? Why?
Why do some people go out of their way to damage otherwise clear videos?
4) This entire video is probably a lie, created by an AI service. I have come to that conclusion, based on:
4a) Spotty video. Clearly there is clear video of what took place, and yet our host refused to show it.
4b) No audio. Clearly there is audio (based on the video we were shown), and yet our host refused to show it.
4c) Our host made this video about her special effects. That smacks of 100% AI generated "everything".
This is likely a compilation of clips from some random video taken on a train, and our host used an AI service to create this video, a fake story, and a computer generate voice to tell the fake story.
The icing on the cake is the phony aging effects (drop-outs, fake shaking, fake flashing, etc) that our host applied to rendering the fake video.
Thumb's down click earned.
1
-
Browsers tend to use large amounts of RAM. I never understood why they hog so much RAM. So when you open dozens of tabs, you will see your RAM get gobbled up.
Then you decide to close lots of your browser's tabs, and your RAM usage drops only a bit, and is still high.
Sometimes programs do not fully release their hold on RAM, but that RAM would be made available to other programs, if need be.
Sometimes you have to open other RAM hungry programs to see the aforementioned RAM get released.
I have had times where Task Manager showed me that I was using 98% of my RAM.
So I started up a virtual machine, that I allocated 8 GB of RAM. But according to Task Manager, I had approximately only 1 GB of free RAM.
When I started up the virtual machine, my 98% usage of RAM plummeted down to 25% RAM usage, because the new virtual machine told Windows that it needs RAM, and so Windows released the RAM that looked like it was in use.
My guess is that all of that RAM was caching something that was, at some point, running, and would have come in handy if I re-started whatever was previously using all of the RAM. So Windows seems to have marked it as in use, but available.
1
-
1
-
1
-
1
-
As busy as the staff was, they had time to (incorrectly) evaluate him and (incorrectly) affirmed that he is psychotic, and (incorrectly) affirmed that he should be medicated.
However they came to their conclusions took time. But without doing the necessary leg-work to check on his identity, they should not have medicated him. There was likely no urgent (can't wait a minute) situation that compelled them to medicate him, without verifying his identity.
He might not have had an identification, making it more difficult. But, again, it is wrong to fill him with drugs without identifying him. There was no need to rush to drugging him.
Did they ask the police to run down his identity?
If not, then the hospital is at fault.
If they did ask the police, and the police told them that they checked, and he is not who he claims to be, the the police are at fault for not actually identifying him.
1
-
@1:08 "Remember that malicious software, once on your computer or other device, can do anything it wants to."
That depends.
For routine computer use, never use an account that has administrator privileges. Always use a "standard" user account. If your login (standard user login) gets infected, and you do not trust it, then create another standard user account, and use that new account. Your old, infected login account will not have access to your new, clean login account (if your old account was a standard user).
Malware has no more access to your computer than you, yourself, have, based on the credentials of your login. If you login as a standard user, then malware running under that login is limited to what that standard user can do. That can be bad, if it encrypts important personal files. But it will not be able to screw with system processes that are core to your computer, any more that you can do so if you tried.
If you routinely use an administrator login, then if you get infected, the malware will be running with administrator privileges, and will have complete access to everything.
Next:
All malware has to embed itself somewhere that starts up when you boot up your computer (or when you login).
Sysinternals (now owned by Microsoft) has an "Autoruns" tool that allows you to see every process that starts automatically.
Simply uncheck anything that should not be there, and the next time you start your computer, the unchecked item(s) will not start. The malware will not run.
But be careful. Autoruns will allow you to stop required processes from starting. You will end up preventing your computer from being able to boot up, if you uncheck the wrong process(es). With Autoruns, if you uncheck the wrong item(s), you will cripple your computer.
Also note that Autoruns does not stop an already running process. It simply shows you what automatically starts, and allows you to uncheck those items, which will stop them from auto starting. Autoruns will not delete malware. But if the malware does not start, then it is just another file sitting there doing nothing.
Lastly, if your computer is running cleanly, then run Autoruns now, and take a screen capture, so that you know what should be there.
Windows Updates might change what is there. New software that you install will also change what is there. So take a snapshot now, and take more snapshots as you install things. Then compare what used to automatically start to what currently automatically starts.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
Tiffany Henyard is a degenerate tyrant.
Tiffany Henyard is who the people of Dolton, Illinois voted into office, and she is what the people of Dolton, Illinois got for voting her into office.
Tiffarny Henyard is exactly what is wrong with an elected official. She will vacuum every dollar out of Dolton, Illinois, to line the pockets of her cohorts.
And while she is bankrupting Dolton, Illinois with corruption, illegal actions, and unconstitutional actions, and abusing her office's power, by and far the people that she is screwing will re-elect her.
It is hard to feel sorry for the people of Dolton, Illinois, because the people of Dolton, Illinois elected her, and will likely re-elect her.
It is hard to feel sorry for the people of Dolton, Illinois who will, time and again, sit at home and not vote, and allow tyrants to be elected to their government.
My heart goes out only to the few people that did not vote for her, and are financially stuck where they are.
To the rest:
Live with who you voted for. Keep voting Democrat. Keep voting for criminals.
If, one day, the people of Dolton, Illinois wake up and vote in a normal mayor, I hope that that mayor goes after every and all criminal actions that Tiffany Henyard and her cohorts engaged in.
I hope that such a mayor fires every police officer that is stealing (via hours that they did not work), and who breached their oath to the constitution when they were sworn in.
1
-
1
-
1
-
1
-
1
-
1
-
TikTok is a China propaganda tool, for the west.
If you live in China, and use TikTok, you will not see any of the depraved, loose, inappropriate for children videos. No twerking, or people ranting about their gender, etc. None of that is present in China on TikTok. Such adult, mentally twisted content is intentionally fed to the west, to dumb down the west, which benefits China.
In China, TikTok is an educational tool. You would never recognize it, after using it in the USA and elsewhere.
1
-
1
-
1
-
1) Almost without exception, nearly all of those charging stations derive their electricity from fossile fuels.
2) Batteries require rare Earth metals, which are sourced by child slave labor, nearly entirely from African nations.
3) All batteries die, and get dumped into land fills.
4) When your electric vehicle's batteries need to be replaced, be prepared for it to cost $15,000.00 or more.
4a) When you go to re-sell your electric vehicle, be prepared for it to have a low re-sale value, based on potential buyers knowing that they will soon have to spend $15,000.00 for new batteries.
4b) Replacement batteries cannot be purchased on Amazon, from your local service station, or any car parts dealers. Your batteries are custom made for your electric vehicle. You will have to get them from your dealership.
4c) Your dealership will not have them in stock, and you will probably have to wait 6+ months for their phone call to bring in your car (factor that 'no car for 6 months' into the re-sale value).
5) In many cities, when you get to a power station, you have to wait in line for hours for an available charging station.
5a) You charge your EV at home, so this does not phase you. That is, until you have to travel and get re-charged away from home. Or will you not risk it, and rent a gas powered car?
6) As batteries age, they hold less and less of a charge.
So that 200 mile range from when your EV was new, will drop to 190, then to 180, and less and less and less.
But it will cost you the same to charge it up to full capacity. So the same tank of gas (so to speak), that same EV charge, will eventually get you half the distance, or less, at the same cost of a fill-up.
7) Have a trip in mind?
Well, aside from waiting in line for hours for a charge, also be prepared to travel out of your way to the nearest charging station.
Gasoline you can purchase anywhere. Charging stations are few and far between. So pencil in extra hours driving out of your way to get an EV charge.
If you charge 100% at home, and you have solar power, then an EV makes sense. For everyone else, it is a mistake to purchase an EV.
Many EV owners are very pleased with themselves for believing that they are saving the environment, having no clue about #1, #2, and #3, above -- and they probably care zero about #2.
The big one that will cause extreme pain for millions of EV owners will be #4, above, and the $15,000.00 bill, and 6 months of waiting. And with inflation, and supply line issues, expect that $15,000.00 to be the minimum, and rise to $20,000.00+.
1
-
1
-
Three items:
1)
@7:06 -- Webroot.
While I was subscribed, Webroot worked well. It never nagged me. It did its job.
Then I learned that Microsoft's "Defender" has come a loooong way since it was introduced during the Paleogene Period.
So when my Webroot subscription was due for renewal, that is when I put Webroot on my "s" list.
First, I could not find a way to unsubscribe. It was a long time ago. So I cannot remember the details.
Webroot made it super simple to subscribe. But to divorce yourself from them, required a divorce lawyer (so to speak).
What I ended up doing was canceling my credit card that Webroot had on file. Ergo, they could not auto-bill me.
That led to their software nagging me to renew my subscription.
The nagging went on for at least a year. Then, one day, the nagging ceased.
Perhaps Revo Uninstaller might have been able to rid my computer of Webroot. I do not remember if I tried. I just remember that Webroot was determined to not let go; to pester me, incessantly.
As our host said, Defender is all you need -- unless you have some unique situation.
2)
If you read the endless documents that you must agree to when using 3rd party anti-virus software, you will find, somewhere in there, that you agree that they have the right to do anything and everything that they want with your computer and your computer's files. You are giving them the equivalent of ownership. They can even use your files for their own business purposes.
The language will not be on page one, and it will neither stand out nor be written in plain English. But if you find it, you will see that you are giving them 100% free reign over anything and everything on your computer.
In all fairness, they do need full file access, to do full scans for malware. But their legalese language goes beyond what the general public would deem normal and reputable, for performing a full scan.
3)
@11:10 -- Delaying Windows Updates.
I delay my updates for two reasons:
First, I keep my computers running 24/7/365. I do not want them randomly re-booting. When the time is right for me to gracefully shut down the running applications, I will do so and have Windows perform its updates.
The other reason for delaying my updates is that I do not want to be a beta tester (or sorts).
Although Microsoft does an outstanding job of ensuring that their updates will not cause problems, I do not want to risk it by being an early adopter of their updates.
Microsoft tests their updates on countless computers, before releasing their updates to the public. But there is nothing like having a billion computers field test your update. I do not want to be part of that billion computer group.
If there should be a problem, Microsoft will quickly fix it. By delaying, I will get the fix, and avoid ever getting the problem.
Of course, I can't know if, when I run Windows Update, what it will download (whether it is a fix or a brand new update). But the delay will give me a better shot at not being among the first to run new updates.
And since I do not do anything risky with my computers, I am not concerned with delaying a security update fix.
Lastly -- All great advice from our host.
1
-
1
-
Why is our host referring to Hertz's action as "repossessing" the car, when Hertz stole the car?
Whether due to incompetence, an honest mistake, etc, Hertz stole that woman's car.
Turning to the towing company:
When the woman who owned the car showed the towing personnel her documents, proving that she owns the car, then the towing personnel that towed her car away, should be charged with grand theft auto (or whatever the specific statute is that they broke).
Look at it this way:
If you did the same thing that Hertz or the towing company did, you would get a visit from the police, and you would find yourself behind bars, charged with a crime.
So why, when you are part of a business that rents cars or tows cars, do those same laws not apply to you?
Perhaps there are laws written for those specific entities?
Our host did not mention any laws that allow those entities to steal cars from people. So unless our host chimes in stating otherwise, I will assume that no such laws exist. By assuming, I could be mistaken. But that is all I have to go by, with the information our host provided.
1
-
"National" means for all of America. Hence, why it is the "National" anthem.
Dissecting an anthem for only some, by definition, means it is not "National". It is the antithesis of the point of having a national anthem, and will be followed by ending our national anthem.
Naming anything "(Adjective) National) is an oxymoron.
And the psychos on the left that are pushing this agenda know that it is divisive. It is their way of bringing down America from within.
-- No national anthem.
-- America is a racist country.
-- Police are hunting black people.
-- No more police.
-- Mob rules.
-- Erase history.
-- Ban words.
-- Redefine words
-- Ban gender.
-- One party, totalitarian political system.
-- No more constitution.
This is the way to make a population confused and hate itself.
This is the goal of the cult "Black Lives Matter" and "Antifa" and the Democrat party, which includes academia, Hollywood, CNN, NBC, and others. All are democrats. None vote for Trump.
Folks, never give in to the mob. Never give them an inch. Give them nothing. In fact, push back and make them give. They are a cancer.
Giving in to the mob always has, and always will, embolden them.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1) There will always be suffering around the world.
If the United States spent 100% of its revenue on ending suffering in other countries, hardly a dent in that suffering would be made. We would not end suffering in a single country. Just look at our own country, and then ask yourself if we would magically fix the suffering in foreign lands.
As long as those foreign countries retain their current form of government, the United States cannot stop the damage that their own governments create for their own people.
2) The stronger the United States is, the more we could do for people around the world.
By creating huge deficits for ourselves, our power declines, making our effort less and less effective, even within our own borders.
3) Regardless of the amendment being debated, the United States is already sending countless $billions to foreign countries. Raise your hand if you can follow the trail of where any of those $billions end up.
4) Corruption is like nothing the world has ever seen. Our tax dollars are being pocketed by criminals all over the world. In every case where we send $billions (or even $millions), much of it falls into the hands of criminals.
No one watches and traces the funds that we send. No one in congress an testify that the X $billions dollars we sent to this place or that place actually went to this place or that place.
The best a congressperson could do is state that this or that watchdog group put out this or that report. Anyone reading those reports? And no one knows whether or not this or that report is credible. The watchdog groups are probably rife with corruption.
5) We have massive corruption within our own government.
Can you imagine what goes on in foreign lands, when we send them $billions?
American families are struggling to pay their bills, have shelter, and feed themselves. Millions of Americans are on welfare. Millions of Americans live in the street. And Barbara Lee wants to send $billions (that we have to borrow from China) to foreign lands where much of it will fall into the pockets of thieves.
1
-
Why are the police not arresting the teachers that hand out that book?
Why are the police not arresting every authority, at that school, that allowed that book to be given to children?
And now that the school board cannot say that they did not know, then if they do not immediately confiscate those books, then the board members should be arrested.
And now that the school's principal cannot say the they did not know, then if they do not immediately confiscate those books, then the principal should be arrested.
Did the members of that school board say that they will be doing an investigation?
Did the members of that school board say that they will be immediately confiscating that book?
If not, then they should be arrested.
Being employed by a school is not a waiver for criminal law. The law has not "school employee" exception.
In fact, the District Attorney's office should make an example out of that school's teacher, principal, and board members.
If the District Attorney's office will not act, then the District Attorney should be fired, and the Mayor should act.
What else is needed here?
Are all of the authority figures pedophiles? They must be, because why the heck would they not be arresting the school employees that are responsible?
1
-
@2:13 "There is... there is no such person again...", regarding President* Biden's microphone being cut off.
1) This will continue happening, and will eventually show Blinken to be a liar.
2) A follow-up question should have been:
"The only way you could possibly know that no one has the means to cut the President's microphone is if you actually checked"
"Why did you check?"
"With whom did you check"
3) "Why did the President's microphone get cut off?"
"Who checked on the cause?"
"If no one checked, then why did no one check?"
"And if no one checked, then how did you arrive at your answer that no one cut off the President's microphone?"
It seems as though when Republicans start, by asking the right question, they are rarely prepared for the lie that is given in response to their question.
It seems as though the Republicans always think that they are going to stump the liar, from asking their initial question.
Why are the Republicans nearly never prepared with focused follow-up questions, to prove that the person lied?
These congressional office holders blab for a living. And yet, when it comes to corning these liars, they fall apart. What gives?
1
-
1
-
1
-
1
-
1
-
1
-
@1:02 "Can I define America?", President* Biden claims that Xi Jinping asked him.
President* Biden is lying. How do we know that he is lying?
When the executive of a nation asks such a question of you, you would then ask the same question of them.
Yet, President* Biden never asked Xi Jinping to define China.
President* Biden makes up wild stories, as an excuse to portray himself as being strong. President* Biden is basically making up a question for himself, for him to answer his own question. So both his question is fabricated by him, as well as his answer to his fabricated question is also fabricated.
When Xi Jinping hears President* Biden's fabrications, he (of course) sees exactly why President* Biden is making up wild stories. Xi Jinping sees President* Biden as a weakling, that has to tell wild stories to hide the fact that he is a weakling.
President* Biden does the same thing with "My father once said..."
Folks, every time President* Biden claims that his father said this or that, President* Biden is lying.
No one can fact check what President* Biden claims his father once said. That is why President* Biden uses his dead father that way.
Similarly, no one in the press is going to ask Xi Jinping to confirm President* Biden's BS story. So President* Biden lies his butt off.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
Biden does not care when he looks like a fool. Why?
Biden is in love with Biden, and in his mind, so is everyone else. So in Biden's mind, he can do no wrong. In his mind, he always looks amazing. He cannot fathom that he looks foolish and that people are cringing at his performances.
Biden surrounds himself with "yes" men.
Hook Biden up to a lie detector, and ask him if he thinks of himself as God's gift to us.
If he answers "Yes", the lie detector will ring "True".
If he answers "No", the lie detector will ring "False".
Biden really believes that he is something special. So he keeps going out there, and due to the bubble that he lives in, he keeps thinking that he is a rock star.
And this, folks, is one of many reasons why this clueless, evil man must never hold a position of power.
1
-
1
-
1
-
When computers had minimal resources, and it was very expensive to expand their resources, developers worked hard to write tightly written code.
My first computer was a DX2, 66 mHz, with a 340 MB hard drive, and 8 MB of RAM.
Yet, I was able to run Word, Excel, and play games, etc, albeit not with wild graphics.
In 1977, my Atari 2600 played games stored on chip that held 4096 bytes of data (every game in those cartridges were at most 4096 bytes), and ran in 128 bytes of ram.
(not megabytes -- not kilobytes -- actual bytes)
That Atari 2600 computer played chess.
In the arcades, Pacman, Space Invaders, and Tempest were all under 25,000 bytes (under 25KB), as were virtually every other arcade game.
Steve Gibson (of Gibson Research Corporation) writes all sorts of sophisticated code in a few kilobytes.
So did the team form System Internals (before Microsoft purchased them).
Developers, today, have virtually no space constraints with disk space and with RAM space. Ergo, developers have no incentive to write tightly written code.
When computers were run from 8086 chips, developers had to write tightly written code, even if the computer magically had a huge storage capacity. That was because it was the only way to have such a slow processor provide satisfactory performance.
But with today's wildly faster CPUs, developers give virtually no consideration to performance. Even poorly written code runs quickly.
So with huge storage drives, and huge RAM capacities, and fast CPUs, developers focus on bells and whistles and shiny objects to grab our attention.
Since that is what pays their bills, I can't blame them. But there is a laziness factor there. If they were offered $1,000,000 to shrink their 2GB of code down to 50MB, I bet that they could.
Bloatware is real.
1
-
1
-
1
-
Critical Race Theory is Fake. So always call it "Fake Critical Race Theory", just as you would call CNN "Fake News".
The radical left named it with the adjective "Critical". Of course they did. They are experts at Fake titles, too.
It is "critical" only to their hate-America agenda. Other than that, it is the rantings of evil people.
If the radical left was teaching "Critical Flat Earth Theory", would you use their name for that, too?
Of course not. You would call it:
"Fake Critical Flat Earth Theory"
So stop calling Critical Race Theory without the leading adjective "Fake".
If you call it by the name fabricated by the radical left, then you are inadvertently giving credence to the fake theory.
When mainstream (normal) people also call it Critical Race Theory, then that title gains relevance (and titles matter).
When everyone calls it "Fake Critical Race Theory", then it will be known to be the Fake Theory that it is.
It is "Fake", so always call it "Fake", as it should have been in the title of this video (and hopefully future postings by TheDC Shorts.
Cheers!
1
-
1
-
1
-
Computer components tend to fail from excessive heat and power surges.
Keep everything plugged in to a quality surge suppressor or quality UPS (uninterruptible power supply).
Not all surge suppressors are built the same.
That $10 power strip from your local hardware store that claims to offer surge protection (suppression) will not handle large surges, and will stop suppressing surges after being tapped by many tiny surges. The LED that it might have, that indicates that it is actively protecting you, is meaningless. The built-in metal oxide varistor (MOV) that absorbs the surges will vary in quality, wildly, from one model unit to a different model unit. The MOV will eventually do nothing, after absorbing X number of surges. So you want a good one that can last.
Low voltage puts a strain on equipment. A quality UPS, that offers voltage regulation, will compensate and protect your equipment.
Your equipment might fail, anyway. But if you have your stuff plugged directly into a wall outlet, you are more likely to have failures.
Storage is relatively cheap, compared to a few years ago. So as our host advises, make copies of your important files.
And if your copies are on your own USB drive, then keep that USB drive powered off when not in use, to protect it from ransomware, etc.
1
-
1
-
1
-
1
-
1
-
@melodicguitarist821 A hard drive is not likely to ever lose any data, due to being turned off for lengthy periods of time.
But any drive can fail. If your powered off drive fails, the next time you go to use it, that failure will probably have nothing to do with that it sat idle for months or years. It probably had something else that was about to fail, the next time you powered it on (wither that be the same day, the next day, or the next decade).
If the data on that drive is important, then get yet another drive. Keep a copy of your data on two backup drives.
I do not know how much data you need to protect. But you can get 32GB flash drive for less than $5.
If you need 1TB, you can get a 1TB external USB drive for approximately $50.
The odds of your existing backup drive failing (or losing data from sitting idle) and also your additional drive suffering a similar fate, is virtually 0%. You would be more likely to win the lottery, twice, before having both of those drives fail at the same time.
With two backup drives, containing the same data, you need not worry about their reliability. If you check on them once a year, and one of them is not working, you still have your other one, and you can purchase a replacement for your failed one (or have it replaced under the warranty). When you get the replacement, and copy your data to it, you are back in business with two backup drives.
Lastly, although it is within the realm of possibility that a HDD or SSD could lose files from data rot, that is almost unheard of.
If that was an issue, then with billions of computers worldwide, that issue would be making headlines.
If a HDD has a file that Windows needs, but it is a static file that never gets updated... if such files were getting corrupted due to data rot, then people all over the place would be having issues.
Let's say that you never use Notepad. Will it not work, if you finally use it for the first time, 10 years later? It will work, even those the bits of data that store Notepad's coding have not been touched or refreshed in over a decade. And note that when you load a program (such as notepad), it does not get refreshed to the drive. It simply works, because the data does not rot or fade.
I would not give data rot any concern.
However, I would give having your data backed up to only 1 drive to be a serious concern. With two backup drives, rot or fade or mechanical failures will not matter, because such calamities will not befall both of your backup drives at the same time.
1
-
1
-
1
-
1
-
1
-
1
-
@4:33 -- Although, technically, you will shorten the life of an SSD with multiple overwrites (or any writes), you will not be able to kill your SSD with writes, even if you tried.
This was revealed with Chia crypt-o mining, where SSDs were used, extensively, to create huge plot files. The more plot files that you had, the better your chances of getting a win.
People have been churning away at creating plot files for 3+ years, 24/7/365, with non-stop writing to their SSDs, and no one in the Chia forums has reported that they wore out their SSD.
Note that some software, such as Samsung's Magician, will warn you that your SSD is nearing its end of life. Just ignore that warning (but always have a backup).
SSDs are hard coded to include a terabytes written value. When you write that number of terabytes, the maintenance tools simply tell you that your drive should be replaced.
With Chia crypt-o mining, we have learned that SSDs are still running, with no issues, after going 5x the terabytes written value.
SSD manufacturers will not test writing to their new drives, for years, to actually determine how many terabytes written their SSDs can withstand. So they kind of pull a number out of the sky, and release their SSD to the market.
Also, by having maintenance tools report that the SSD is nearing its end of life, people purchase news SSDs. So there is the increase of sales incentive that the SSD manufacturers use to plug in an arbitrary terabytes written value.
For a daily driver PC, your SSD will last your lifetime, your children's lifetime, and likely your grandchildren's lifetime. If it fails, it is likely due to a manufacturing defect, or an overheating issue (writing to an SSD, non-stop, will heat it up quite a bit -- almost too hot to touch). But a light breeze, by a fan in your computer's case, will keep it cool enough for heat to not be an issue.
1
-
Very old people, that have dementia, when frustrated (when they don't get their way), often lash out with crankyness.
Such is the case with President* Biden.
When radical leftists have their harmful agendas restrained, due to the amazing protections afforded to The People by our Constitution, the inner tyrant of the radical leftist often bubbles to the surface, revealing their disdain for the Constitution that they took an oath to uphold.
Such is the case with President* Biden.
By the way...
When President* Biden or Jen Psaki turn their backs to the press, and rudely walk away, then the press should investigate the exact reason that they had for turning their backs and rudely walking away. How?
The first question, during the next press conference, should be:
On [date / time], at the previous press conference, when asked [fill in the blank], you turned around and walked away.
Why did you refuse to answer that question?
When you walked away, where did you go? Was something so urgent that you choose to blow off the press? If yes, what was that urgent matter? Who are the personnel that dealt with that urgent matter?
In other words, find out exactly why they walked off, and exactly what they did, and with whom they did it, when they walked off.
This line of questioning needs to be asked early in the press conference, when President* Biden and Jen Psaki have no excuse to walk off.
Cheers!
1
-
1
-
1
-
1
-
1
-
Mexico's economy will collapse. Claudia Sheinbaum is not going to let that happen. She is playing a game of chicken with President Trump, and she has no chance. She will fold, and the tariffs will come off.
Communist Prime Minister, Justin Trudeau, will also fold. It will just take longer. One of the reasons it will take longer, is because Justin Trudeau cares zero about the Canadian people. He will let them suffer, as Canada's economy collapses.
The end result is that both Mexico and Canada will remove the tariffs they have charged the United States for decades, and then United States will then do the same.
Well, the tariffs will come off, only if additional conditions are met. For example, securing both the southern border and the northern border, and stopping illegal drugs from crossing the border.
If Mexico or Canada do not take corrective actions, then I suspect that President Trump will increase the tariffs. President Trump is not bluffing. President Trump wants a fair playing field, and President Trump wants the criminal border related crimes to end.
1
-
1
-
1
-
1
-
1
-
@1:52 "Some drives -- they just get slower".
This is probably due to the drive having less free space. Why should that result in slower drive performance?
Drives initially write data to their outer portion of their disks. For each rotation, the outer portion of the disk has far more physical real-estate, as compared to the disk's inner portion.
For example:
A somewhat large file might fit on the outer portion of a disk platter, with perhaps 5,000 rotations.
Whereas, that same file, if written to the inner portion of the platter, might take over 10,000 rotations. The latter is going to take longer.
So the drive is not really slowing down, even though you are seeing slower performance.
If you were to format that drive (or delete all of its files), you will probably see the drive suddenly have the speed it used to have, because it can now write data to the outer portions of its platters.
@3:00 "...that there's nothing to be recovered. Literally, everything in that drive has been lost when it fails"
There are recovery companies that will be able to recover nearly everything from any failed drive. I doubt that any failed drive ever has lost "literally, everything".
Engaging data recovery experts to recover data from failed drives is not inexpensive, and can get very expensive, depending on the time that they have to put in to recovering your data. If it is a failed board, they likely will have those boards, and can either replace yours, or use theirs to make your drive functional and copy your data to a new drive. That is a relatively painless chore for them. But if they have to spend more time, due to head crashes that damaged parts of the platters, then that will be a more costly procedure, and have less chances of a full recovery.
To literally lose everything, you would have to do so intentionally, by using a degaussign machine that is designed to wipe a drive and make that drive unusable.
You can also run wiping software, if the drive is working. But even then, experts with the right tools can still recover data, depending on how your software wiped the drive.
You can also melt the drive in an incinerator.
You can drill a hole through the drive. But that will not make all of the data unrecoverable. It will make it a super tedious chore to recover any data. But data recovery experts have tools that can read data from the undamaged portions of the drilled platters. If the FBI needed to search for data on a drilled drive, they can.
Drives have multiple platters. It is virtually impossible to have a failure that erases everything on all of those platters.
I suppose a direct lightning strike might do the trick. But now we are getting into the realm of situations that no one encounters.
My point is that if your drive fails, there are people that can recover your data. You will pay for that service. But whatever caused your drive to fail will not stop those experts from recovering most or all of your data.
Based on our host's @3:00 statement, I would appreciate our host giving us an example of a type of failure that would make the data unrecoverable, even by expert data recovery companies.
What part, contained within the drive's casing, would (upon failing) be able to destroy 100% of the drive's data? I can think of none.
1
-
1
-
Although the Accord has very good handling, for a family sedan, the car is designed to hold you back from pushing it hard around turns.
If you already have speed, you can take the turns at speed.
But if you try to accelerate more than only slightly, around a turn, the electronic throttle will ignore your pressing on the gas pedal. You can floor it, and the car will maintain speed around a turn, but will not accelerate around a turn.
I am talking about "not your average turn". I am talking about pushing hard into a turn and trying to accelerate. The car will not cooperate. It is a safety issue, to save you (and others) from your bad driving.
Putting the car into sport mode and turning off* traction control will not remedy the above, because turning off* traction control does not turn off traction control.
That's right. Turning off the traction control does not turn off traction control. Rather, is lessens the effect of the traction control, but not enough to let you rev the engine around a hard turn at speed.
There is a headache of a procedure that allows you to truly turn off the traction control, which you must do before you start the car. That will turn on a blinking traction control light on your dashboard (situated directly to the right of the standard traction control light).
When the traction control is truly off, and you put the car into sport mode, it will not hold you back. When you press on the gas, no matter the speed or the turn, you will go. The car will feel more like a traditional car with a traditional throttle.
This is not an issue for 99.99% of customers. But for those that want to unleash the full potential of the car, this is a head's up for you.
Also note that the 1.5 model Accords come with Goodyear tires, which are not as good as the Michelin tires that come on the 2.0 model Accords.
For 99%+ of customers, this will make no difference, because you will never push the car hard enough to reveal where the Goodyear tires slip and the Michelin tires still grip.
Also note that the 6 cylinder Camry will be faster, light to light, due to it having a naturally aspirated engine.
Although the Accord's turbo lag is minimal, it is still turbo lag.
This is why Honda's premium brand, Acura, has electric motors in their flagship, twin turbo NSX. Those electric motors fill in the gap to provide instant acceleration, until the twin turbos kick in.
Cheers!
1
-
Remember when Budweiser tried to trick the public by putting Alissa Heinerscheid on leave? -- as if that was some sort of apology from them.
Now you see that that was smoke and mirrors, trying to fool people into thinking that they took proper action.
Now they fired her.
Did they give her $5,000,000.00 severance?
Until we hear that ever executive involved was fired (including the CEO), and that no more than 6 months severance was paid, then it is all BS to trick people to come back.
Until we hear the board members say that Budweiser's chief staff screwed up, and they will never go woke again, then they are not sorry, and it is all BS.
Do not let them BS you.
They are run by radical leftists. They have repeatedly lied and spewed BS. They are not to be trusted. Let them go broke.
If they hire a conservative CEO, then you know that they are taking proper actions. So far, it is all a show.
1
-
1
-
1) This is most likely an attack. My money (so to speak) is on a disgruntled CrowdStrike employee.
It is hard to force Windows 10 or Windows 11 to crash, due to a poorly written application.
Someone at CrowdStrike found a weakness within Windows, and they exploited it. Such weaknesses are not easy to find.
2) Every government agency, and every business that is having major issues, is due to their own incompetence.
They should all be backing up their computers, daily.
They should know that they just got an update today, and now all of their computers that got that update are not working.
The quick fix is to boot from emergency boot media, and restore the operating system from the last backup, which should have been done only hours before the CrowdStrike update.
That would get everyone up an running right away.
3) Some government agencies and businesses will have put their databases on their OS drive. So if they restore from a backup, their databases will be missing recent additions, deletions, or changes.
They would have to back up their database files, before doing a restore from yesterday's backup. Then, after they restore their OS from yesterday's backup, they would have to copy their database (that they just backed up) to their C: drive where they just did the recovery.
This would all be avoided if they did not store their database files on the C: drive.
-----
Did CrowdStrike screw up?
Yes.
But the bulk of the blame, for the downtime with so many critical services, is the incompetence and attitudes of indifference with the personnel that run those businesses.
They should never allow themselves to be shut down by a 3rd party.
My computer has no issues. And if it should receive an update that cripples it, I will restore it to prior from receiving the crippling update. That is my responsibility for my own equipment.
All of those giant businesses should be doing the same. It is outrageous that they are scrambling, because they do not have backups.
People that have stock in those companies, and are losing their shirt, should sue those companies for gross negligence.
Sue the airlines, too, for financial losses due to missing flights.
Sue the government agencies, for lives that are lost.
It is 100% unacceptable for those businesses to not be able to quickly recover from this.
1
-
1
-
1
-
@0:24 -- It would be more accurate to write that President* Biden was shielded by his caregivers (not handlers).
Do you hear the chaos in that room?
It is basically the same as the screaming and screeching on college campuses. And it all adds up.
The two camps:
1) The press, made up mostly of radical leftists, who are proponents of the brainwashed college students, and 2) the Biden caregivers, are all of the same ilk.
They are incapable of conducting themselves with civility.
They deserve each other.
President* Biden's caregivers treat the press like pests, and the press laps it up. The press keeps coming back for more, and keeps supporting the people that are treating them like vermin.
But the out-of-control riot-like environment and decibel level in that room is the result of narcissistic babies yelling at other narcissistic babies.
And note that it is President* Biden's caregivers that are ordered (perhaps by Jill Biden) to yell and yell and yell, to hide her husband's mental decline.
And President* Biden sits there, amused. He is so far gone, that he does not even realize how weak he looks, and how not-in-control he looks.
No CEO or Chief Executive would ever allow one of their meetings to have that chaos. But President* Biden is too out-of-it to recognize it or to do anything about it.
And remember, President* Biden is mostly controlled by caregivers (not handlers).
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@swanchamp5136 "You just spouted a ton of nonsense"
You wrote that on the internet, so it is true.
"this was about how Trumpers think drag is more dangerous than guns, no one mentioned rape."
Giving an analogy to expose the absurdity of the question is taboo, because no one mentioned the analogy. We are not allowed to make a point that exposes the absurdity of the question. So we disallow facts that drive home a point, when those facts are based on reality. We do not want facts to rock our fantasy land.
"Most school shooting are done by someone who legally bought the gun."
But shooting children in a school is illegal. Maybe the we need a gun law that requires murderers to read the "gun free zone" signs, before shooting up the school?
"Also drag artists don't twerk in front of kids."
Artists? Well, I enjoy the majesty of mobile restrooms. The art of their construction is breathtaking. And I take a deep breath to take in all that art.
"As the senator pointed out Drag has been a form of entertainment for a very long time."
Until now, there has never been "Family friendly drag shows, with children stuffing currency down men's shorts."
Those "very long time" ago drag shows were not drag shows. They were women impersonator shows, for adults only.
"Even in Elizabethan times men were playing the parts of women in Shakespeare's plays."
None of them twerked for children.
"At no point did the host condone child sex acts, you made that up."
When you condone adults performing "R" rated sex acts for 8-year olds, you are a child sex predator.
"You talk about wanting to defend your nation against tyrannical rule yet Trump said from day one he would be a dictator and arrest those who opposed him."
That is twice that you brought up Trump, where I never mentioned Trump. Apparently Trump is renting space in your head.
1
-
This is the beginning of the end of Democrats winning elections (even with cheating). Why?
They were getting illegal boat-loads of tax payer's money funneled into their campaigns. Now that they will no longer have the laundered money, they will lose power.
And although that is scaring them, it is not their main worry.
What is really scaring them is being charged, criminally, in countless money laundering schemes.
Elon Musk and his teams have only scratched the surface of the corruption. Wait a few weeks, and even a few months, and we are going to be astounded by what Musk's teams will reveal. It will make what has already been exposed seem like small potatoes.
Lower level criminals will start singing, to be charged with lesser crimes. That will lead to larger fish being arrested. They, too, will sing, and on and on. There are going to be tens of thousands of arrests. Some very well known names will eventually be brought to justice for their crimes. Long overdue. But the long arm of the law is finally catching up to them.
1
-
1
-
1
-
1
-
1
-
@10:36 -- It is not the end of our "Constitutional Democracy", because the United States of America is not, and has never been, a Constitutional Democracy.
America is, and has always been, a Constitutional Republic.
And yet radical, woke, leftist, democrat, David Jolly, is lecturing us on our Constitution, when he either does not know the basics, or is lying to our faces.
1
-
The police were wrong, but not criminally wrong, and their intentions were proper.
Police routinely come across suspects that turn out not to be people of interest. When the suspect follows police orders (something normal people do), and the suspect is not combative with the police, then the police wrap up their business in a couple of minutes with no drama.
This was 100% escalated by suspect.
Instead of the police concluding their business in 2 minutes, they spent 10x that amount of time at the scene, plus they had to call EMS because of the taser, plus they have to take the man to the hospital to remove the taser part in his back, plus the hospital staff has to spend time admitting him, plus a doctor has to spend time working on him and examining him, plus a mountain of paper-work that the police and hospital will have to fill out and file, plus time spent by officers at the scene explaining to their lieutenant what happened, plus time and expense to reset the taser for re-use.
All of this because the suspect would not get out of the car and identify himself.
1
-
1) Driving 100 MPH, and the officer did not give him a speeding ticket, is outrageous.
Let's say that the driver fights the reckless driving ticket in court. Well... reckless how?
I could just see the officer, in court, trying to explain how the driver was reckless, and not speeding.
The driver can effectively make the case the he was not speeding, because the officer did not cite him for speeding.
@2:00 "I stopped him for speeding". Notice that he left out that he did not give the driver a speeding ticket.
2) That driver, by the officers own words, was not allowed to be driving at that hour.
And the officer let him drive. This, too, is outrageous.
Watch how that officer, and the police department, get sued for the subsequent crash, because that officer enabled that driver to drive when it was illegal for that driver to drive.
@2:32 -- Of course that officer was nervous. He knows where this is going. He knows he is about to have legal nightmare issues for not issuing a speeding ticket, and for letting that driver drive.
How irresponsible do you have to be, to let someone, who was doing over 100 MPH, without a licence to drive at that hour, to just pull out and do the same thing?
That officer was trying to be kind. But it pains me to write that that officer used seriously poor judgement. Is this a "defund the police" issue, where the police department has to accept unqualified applicants?
1
-
@timmattle4730 "You cannot arrest for motor vehicle violation or impound for these mv violations in New Jersey."
You just made that up.
Moving violations are part of Criminal Procedural Laws.
If you commit a moving violation, then you violated a section of criminal law.
Taken to the extreme... if you commit any moving violation (not coming to a full stop at a stop sign, or right turn on red, or do not signal for a lane change, etc, you can be arrested and taken to jail. But the police have the discretion to release you, on the scene, on your own recognizance -- which is normally what happens.
"He didn't haven't him on radar (never said it was radar) it's a visual estimation."
We do not know whether or not the officer used radar. The officer is not required to provide that information at the scene.
Also, the police are not required to use a radar gun for speeding tickets. They can follow a speeding vehicle, and they can use visual observations. They are trained to accurately estimate the speed of vehicles.
"The reckless is the better choice."
It is not an "either / or" choice. When a driver is both speeding and reckless, then they violated both respective sections of Criminal Procedural Law.
1
-
1
-
1
-
1
-
1
-
1
-
Folks, now we know how Hitler was able to rise to power in Germany. He jailed people for speech, and now Germany is at it, again.
Hitler used his Gestapo police, and, today, Germany is at it, again.
Vice President J. D. Vance's speech was a warning to Germany, and other European nations, to end their march to totalitarianism. This is a sign that President Trump is going to end America's alliance with NATO.
With several European countries being taken over by mass migration (it is wildly out of control), and the leaders of those countries jailing their own citizens for nonsense, the United States of America can neither rely on nor trust those nations -- and it is only getting worse. Those nations are not what they were during World War II. And those nations have not even been paying their NATO dues.
So get ready for President Trump to cut ties with NATO, and reset our alliances. Vice President J. D. Vance has warned them.
By the way, if any citizen of Germany would say what Vice President J. D. Vance said at that conference, Germany's current day Gestapo agents would jail them. If any German citizen tweets Vice President J. D. Vance's remarks, they will be arrested. That is how bad it is in Germany.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@Nick41622 "Was not. His comment was blatantly criticising."
You just criticized my comment. If you don't like it you should make your own video! Not criticise someone who is trying to help us!
See how that works.
1) "@lilmsgs" comment was not criticizing our host.
2) If it were, then get used to life. People, products, and services get criticized.
Can you imagine a world were criticism is banned?
Buying a car? Reading reviews? What's the point. None of the car's issues will be critiqued.
Taking a vacation and checking out hotels? I hope for your sake that people include criticism of issues, in order for you to choose the right hotel.
And you never criticized someone running for office?
I am not talking about name calling, or child playground nonsense, which when we grow up we are expected to know better.
Criticism, when made constructively, is beneficial.
Assuming that the target party of the criticism is mature, they will appreciate the feedback, so that they could improve their product or service.
I hope that my constructive criticism of your intolerance for criticism will make you reconsider your position.
1
-
1
-
1
-
1
-
1
-
Camera theatrics:
Almost without exception, every camera angle, where we got to see the car taking a fast turn, was edited to appear in slow motion.
It is fine to include slow motion shots. But why are we denied seeing the car perform in real-time, too? Why must every shot, except 1, be shown to us in slow motion?
Also, in a 6:59 length video, there were a total of only 5 seconds of letting us see what the driver sees. Yet there were several minutes of us looking at the driver's face.
Top Gear:
What makes you think that we are watching this video because we want to stare at someone's face?
Don't you think that we would rather see the road? Don't you think that we would want to see it from the perspective of being behind the wheel?
Top Gear, you were given the opportunity that the rest of us can only dream of getting, and you did not share it with us. You shared camera features and face shots. You did not share the excitement of the driving experience. You can do better.
1
-
The radical leftists (Harris, Biden, Bernie, the squad, etc) are aware of the horrors of socialism. But they do not care, for two reasons:
1) When you rule in a socialist system, you live like a king. So the radical leftists that are pushing socialism are doing so for their own unquenchable thirst for power.
2) The radical leftists do not call it "Socialism". Rather, they call it "Democratic Socialism", to trick the uninformed into thinking that it is not the same thing.
Socialism, in all of its forms, regardless of the adjective preceding the noun "socialism", is still socialism.
And all socialism leads to untold hardship and poverty for the country. All. No exceptions.
Be aware that when Democrats and brainwashed college students sing the praises of "Democratic Socialism", explain to them that they can call it Rainbow Socialism, Cheeseburger Socialism, or Everything Is Free Socialism. It is all different wrapping paper around the same turd.
Cheers!
1
-
Problems related to "pass":
1) It runs only on Linux (no Windows version, as far as I know).
So the people writing down their passwords are certainly not using Linux operating systems.
2) Even if "pass" was available for Windows, it is too complicated for the general public. For example, they would have to understand the tie-in with gpg. They never even heard of gpg, and most folks would not understand gpg even if they attended a class on gpg.
For a Windows user, I recommend "keepass". It is free and open source, and relies on no 3rd parties (no web sites are involved to use keepass). No internet connection is needed to run keepass.
And for the last holdouts, who would struggle with keepass or any other password manager, and are forced to write down their passwords, then "peppering" their notes will go a long way into keeping their notes safe, even if a bad actor makes a copy of their password list.
When they write down their passwords, they should add an extra 3 characters at either the beginning or the end (and those 3 characters should vary for every password on their list). They will know to not include those 3 characters when entering their passwords into a web site. Alternatively, they can leave off a couple of characters to what they write down, and add them back in when typing out their passwords to a web site. For the latter, they would have to always use the same couple of characters for every password on their list.
1
-
@5:43
The damn music and constant camera angle changes, during the speed run, ruined it.
Why couldn't they just point the camera at the road and let us watch and listen.
An occasional camera change would be okay. But not the constant every second change. But change, and change, and change, and change, and change, is amateurish.
Is the speed test about the guy with the laptop and editing software? Or is the speed test about the car and letting us watch and listen.
I would even accept a shot at the road, with an inset view of the driver and other camera angles switching in the inset. But what they did here was vandalize the footage.
Folks, I guarantee you that the BBC crew and the Top Gear crew watched the front view for the entire run (and without music), because that is the best view. And yet they deny their audience that view.
1
-
1
-
1
-
1
-
1
-
@10:49 "Another option is to choose systems with end-to-end encryption, and you would be the only one who actually has access to the decryption keys."
@11:10 "With end-to-end encryption, not even the company that made your security camera can get access to your footage."
Slimy companies use the term "end-to-end" encryption, in a wildly misleading way. And they likely have complete access to your footage.
For example, when you use cloud storage (you are using some stranger's computer to store your files), and that cloud storage company brags about how they use end-to-end encryption, and that prevents people from seeing your data, well... they are lying (by omission) to you. It does, indeed, prevent people from seeing your data. But define "people". Which people?
They left out the adjective "all", as in "all people", because end-to-end encryption does not stop "all people" from seeing your data. What counts is which people will have access to your data.
The end-to-end encryption is between you and them. So those are the two ends. You are on one end, and they are on the other end.
Once your data reaches their end, it is decrypted. They have your data in the clear.
When you go on-line and shop at Amazon, or pay your bills with your bank, etc, you (via your web browser) are using end-to-end encryption.
But of course the entity on the other end sees it all. If not, how could Amazon know what you purchased? Or how could you bank know which bills you are paying? They have to see 100% of what you are doing (while no one between you and them -- the two ends -- can spy on your activity).
The end-to-end encryption is referring to a tunnel between you and them, so that no one in-between you and them can snoop on your data while your data is in transit. There are typically 10 to 30 different computers or devices (hops) that complete the digital circuit between you and Amazon (or your bank, or anywhere else). It is those other devices that, without end-to-end encryption, would be able to see your data.
So when you use OneDrive, or GoogleDrive, or DropBox, etc, they can all see your data.
There was a somewhat recent case where a father used a cloud storage system to provide revealing photos of his toddler to his doctor, due to the toddler having a rash. That father was arrested. But the cloud storage service used end-to-end encryption.
Even if they claim that they store your data with encryption, that is a lie of omission, due to what they are not telling you.
When your encrypted data arrives at their location, it is 100% decrypted. They have it in the clear.
Then, once they have your data, they encrypt it (again). Since they encrypt it, they can decrypt it.
If you are not personally encrypting your data, using your own local computer (the one connected to your keyboard), then cloud storage company's personnel can see your data in the clear. Not every employee. But high ranking employees (whoever the CEO of VP of Information Services, etc) have complete access to your data.
If you want to safeguard your data (it literally is "your" data), then have your camera's feed store your footage on a VeraCrypt drive. VeraCrypt is free and open source. It is easy to use. It creates a virtual drive letter that, once you put in your password, behaves just like any other drive letter. And files that you put into that drive letter will be encrypted on-the-fly.
You will have 100% control over your files.
But no encryption will save you from yourself, if you use a stupid password.
I estimate that 90% of people's passwords can be brute force cracked within 1 minute.
Perhaps another 8% will take a couple of days to crack.
Then, perhaps, 1% will take a few weeks to crack.
My guess is that less than 1% of people use strong enough passwords that would take years or centuries to crack.
Huge data breaches, that revealed tens of millions of people's passwords, is how we know how strong (and weak) people's passwords are.
Your password (or pass phrase, if you use "spaces" in your password), must have at least 12 characters, in mixed case, with numbers and symbols, to have any chance of being secure (with today's computer cracking power). Sixteen characters will offer far better security. But if you simply pad your password with a bunch of !!!!!!!!! symbols, you will not fool the tools that crack passwords. Password cracking tools know all of the tricks and fudging that people use in their passwords.
If you want to know how to create an unbreakable password that is easy to remember, then search the "Computerphile" channel for a video named "How to Choose a Password - Computerphile"
1
-
1
-
1
-
VeraCrypt has a few of features that I believe are not present in Cryptomator (I am unsure, because I have never used Cryptomator -- so please correct me if I am mistaken). And the opposite is likely true (Cryptomator having features absent in VeraCrypt), since the two tools have different ways of securing your data.
-- Hidden volumes.
VeraCrypt allows for an encrypted volume to be stored within a standard encrypted volume. The beauty of the encrypted, hidden volume is that no one can detect that the hidden volume exists.
So if you are forced to unlock your VeraCrypt volume, the assailant, 3-letter agency, whomever, cannot know that there is yet another volume contained within. So your hidden volume is safe. But you can unlock your hidden volume just as easily as your standard volume.
-- Key files.
VeraCrypt allows you to use a file (or files) as part of your pass phrase. If you omit pointing VeraCrypt to that file, when unlocking your vault, then you will not be able to unlock your vault. So even if someone knows your passphrase, they will also have to know which file (or files) you used. So your passphrase can consist of only typed characters, or only a file (or files), or a combination of typed characters and a file (or files).
But if you use a file as part of your vault's encryption, and if that file changes (even by one byte), then you just lost access to your VeraCrypt vault (same as typing in your passphrase, and getting one character wrong).
-- VeraCrypt allows you to choose from a list of ciphers, when creating your vault. This is probably not a must have feature, as the default cipher is supposedly unbreakable, in both VeraCrypt and Crytomator.
-- VeraCrypt allows you to create unlimited vaults. So you can have one vault for one category of files, and another vault for some other category of files.
I wonder if Cryptomator allows for two or more encryption schemes, if you are using multiple 3rd party storage services? It is not necessary to use different encryption schemes for each storage service. But there are probably some folks that have a use for it. Is there such an option with Cryptomator?
Leo, great video. And thanks for the Crytomator tutorial. If I ever start using a 3rd party storage service, then I will be installing Cryptomator.
1
-
1
-
1
-
1
-
When you are making a one-time purchase... that is a good time to use a virtual / digital credit card.
To the vendor, that card will show up as a perfectly good credit card (because it is). But since it is a virtual card, you (the customer) control that card's usage. You can set that card up to be used for a specific amount. and then the card becomes defunct. That way, (in this example), Hertz would be able to put through the agreed upon charge (at the time of the rental). But that card would not accept any later charges (such as a bogus $10,000) charge.
There are several companies that offer virtual card services. You must fund the virtual cards, via a bank account (or similar). Once done, that card will accept a charge (or charges, as you choose), as long as you properly funded the card. To the vendor, all they see is a valid credit card where they get paid from that card.
Such virtual credit cards are helpful with trying to end subscriptions, where a company made it simplistic to sign up, but makes it difficult to end your subscription (like requiring that you send them a notarized letter via certified mail). With a virtual credit card service, you can end any cards that you created, and crate new ones at will.
1
-
1
-
1
-
1
-
1
-
1
-
Courts have consistently ruled that, when there is conflicting language in a contract, the judgement will favor the customer.
And although what Sony did is technically a use of conflicting language, it most certainly favors the customer. Why?
When you make the purchase, there is no doubt that you made the purchase. That information is clear, up front, and unambiguous.
To then have small print, buried on page 22 of a torturous document, to negate the former purchase language, is preposterous.
A court would weight, on one hand, clearly written language presented to the customer that clearly conveys a purchase, while on the other hand, page 22 says otherwise.
Of course the court will rule in favor of the customer.
And Sony is not authorized to change the meaning of words.
A purchase is a purchase.
It is like ordering a blue car, and they deliver to you a green car. When you object, they tell you to read page 22 of the document that you signed, where their definition of blue is green.
It is absurd.
1
-
1
-
1
-
Calling those men "Trans-Women", as denoted in the title of this video, is giving credence to the lie that those men are women.
Putting the adjective "trans" in front of the noun "women", does not make a man into a woman.
Calling a 99-year old man, a young man, does not make that man a young man.
Calling a bald man, a hairy man, does not make him hairy.
When normal people call men [adjective] women, we are inadvertently giving credence to the notion that those men are women. They are not women. They are 100% men.
No amount of acting lessons, make-up, wardrobe changes, surgery, or foot stomping will make a man into a woman.
Do not call them what the radical leftists demand that you to call them. Doing so is akin to agreeing that those men are women.
They are cross-dressers. Call them cross-dressers. Call them men.
1
-
@7:58 "Instead, go to the web site, directly."
Two or three years ago, I wanted to talk to Western Digital's customer support. They do not list their phone number on their site. I did web searches, and none of them seemed trustworthy.
Eventually, I crossed my fingers and called. From the USA, I could hear that I was being transferred overseas. Was I really talking to a Western Digital employee? I did not know.
Eventually, based on my end results, I discovered that it was Western Digital. But their customer support is abysmal (not the fault of the front-line personnel that are following the policies of upper mismanagement). If you want your warranty to be honored, without navigating every conceivable hurdle, then never purchase any Western Digital products (includes Sandisk and others).
Seagate, on the other hand, is the exact opposite of Western Digital. Easy to reach. No doubt who I have reached. No nonsense results. A pleasure to deal with.
1
-
1
-
1
-
I recommend steering clear of 3rd party anti-virus offerings.
Read their End User License Agreements, and privacy statements, and every item in small print (so to speak), and read it all, no matter how legalese it is worded. Why?
In every one that I have checked, their carefully, but tortured, language gives them permission for full access to your computer, monitoring everything you do on your computer, and collecting information on all of the above.
Some of that is necessary, in order for the software to scour your computer for dangerous files. And the excuses in the agreements for collecting all of your information basically boils down to them claiming that it helps them develop better protection.
Windows Defender does an outstanding job. If it did not, there would be complaints all over the internet.
Windows also collects massive amounts of your information. But since Defender does an outstanding job, there is no need to add more spyware (3rd party anti-virus) to your computer, even when that spyware will protect you. Yes, anti-virus software is a form of spyware, even though it protects you.
And you can avoid most of the problems with on-line threats, if you did anything risky or anything you are not entirely comfortable with, via a virtual machine. Depending on the virtual machine, the protection it will offer will vary. But it would be difficult for a virus to jump from your virtual machine to your physical machine (at least the vast majority of threats will be contained in the virtual machine). And at the end of your session, you can clobber the virtual machine, and it will revert back to before you had used it. Any bad programs that just got installed will disappear.
1
-
This is President* Biden's price hike.
Prices were soaring months before anyone heard of Ukraine.
America was 100% energy independent, in the tail end of President Trump's administration.
America was a net exporter of energy.
America need not be dependent on Russia, or any other country.
Alaska has more oil than all of the middle-eastern countries, combined. America can power the world.
Our dependence on foreign oil is self-inflicted, at the hand of President* Biden.
America's farmers feed the world. But if you prohibit our farmers from farming, then prices rise.
Ergo, because President* Biden is prohibiting energy companies from producing energy, energy prices rise.
And let's assume for a moment that this is 100% Putin's fault.
Then what is President* Biden doing about it?
Answer: worse than nothing, because he continues to deny energy permits to energy companies.
All of President* Biden's heart-felt comments of empathy are feigned. He cares zero about anyone's struggles.
He just read a teleprompter's words, written by an anonymous person, filled with lies, and we are expected to believe that he has empathy?
President* Biden's actions, not his words, tell us he cares zero about the hardships of Americans.
1
-
@Mikel3564 Yes, anyone can edit wikipedia's pages. But when you do so, watch your edit be undone, sometimes within seconds.
I once confirmed a Gilligan's Island story, using a link to a Bob Denver interview, and moments later, my link was gone.
wikipedia has administrators that can lock in (or out) changes.
Search for a "John Stossel Wikipedia Bias" video, from two years ago, and you will see their radical, woke, leftist bias. For a hot, political topic, like the Gulf Of America, it is a safe bet that wikipedia's administrators have locked in their bias into the content related to the name change (that they are refusing to change).
1
-
1
-
1
-
1
-
1
-
1
-
Physical security is key (as our host said). Without it, someone can clone your boot drive, and they will have a copy of your computer to boot up on their own computer.
Sites that have very good security should detect that an attempt to login to their site came from a computer with different hardware or from a different location, and should make the user jump through more hoops to complete the login.
I auto-login to nothing. I use a password manager, and accept the few extra steps to login manually. It gives me peace of mind. But if someone wants the convenience of automatically logging in to web sites, then whatever works for them is what they should do (assuming they understand the risks).
In my case, I do not understand how a browser stores passwords -- and that is my main reason for not allowing my browser to automatically log me in. If my browser is simply saving a cookie that has my password, well... that seems to be insecure. If malware gets into my computer, what is stopping it from grabbing all of my cookies?
And for folks that do not backup their computer (and that's most people), then if their drive fails, all of their auto-login data is gone.
Everything runs smoothly until something goes wrong. That is when people wish that they did a backup, and wish that they used a password manager, etc.
Security and convenience do not make for a happy marriage. When you have your security on auto-pilot, then you are giving up a level of control. If you are comfortable with that, then it works for you.
1
-
Louis, the HP executives that created the artificial, 15 minute hold time, are not afraid to talk to the customers, because they never take customer calls. They are degenerates that will enact policies that they believe will increase the company's profits by 1/10 of 1%, by screwing their customers, and by making life miserable for the representatives that answer the phones.
Those HP executives are not making mistakes. They know exactly what they are doing. They know exactly how their decisions will piss off countless people. They do it, anyway, because they do not care about anyone, other than themselves, and the person that will write their annual bonus check.
HP's executives are simply evil. If you were suffocating, and it would cost them $5 to get you to the hospital, they would not part with the $5 (if they could get away with it).
1
-
1
-
The ¼ mile times were almost 1 second too slow.
The is probably due to one or more of the following:
-- The car was left in its default driving mode (the mode when the car is started). You must press the "Sport" button, in order to have the transmission shift for best performance, as well as increasing the turbo boost. In the default driving mode, the car compromises some of the performance, in favor of better fuel economy (not what you want when conducting a "performance" test).
-- The "Traction Control" was left in its default driving mode (the mode when the car is started). You must press the "Traction Control" button to turn it off, in order to get the best acceleration.
-- The tires were cold. Was a burnout done, to help the car launch?
-- The driver is not up to the task, or had a bad run. Does MotorWeek do multiple runs, to ensure they are getting the best that the car has to offer?
By the way, the slalom test was probably also done in the default driving mode. In "Sport" mode, the suspension stiffens up and the car gets lowered a bit (I believe).
1
-
1
-
1
-
1
-
@Lucille69caddy "Ok, clueless is as clueless does, lol", writes the clueless person.
"“Sport mode, traction control, default driving mode”, etc. If you need all of these nanny state options to optimize driving a car, you are INEPT."
Again, you responded, and did not answer the question:
3rd request:
"How did you conclude that the Honda Accord can't run adequately without all of those gadgets?"
Since you are clueless, or perhaps trolling, I will explain to you why your reply was a response, and not an answer.
The question was about the Honda running "adequately". Note the adverb "adequately", which you asserted the car cannot do without the gadgets.
In your last response, you changed the topic to "optimizing" the Honda.
Try and answer the question about "adequacy"; that according to you, the car needs gadgets to be "adequate".
1
-
@Lucille69caddy "I’ve come to the conclusion that PERHAPS you just like to hear (in this case see) yourself speak (text). See what I did there? 😳Probably not😆"
Your above reply is yet another response, and not an answer.
After I took the time to spell out how you, who was labeling me as clueless, that you were clueless. After I laid it out for you, you woke up.
A person with integrity would apologize for their name calling, and their misunderstanding of the written words.
Based on your last reply, you are not a person of integrity. You chose to continue being obnoxious. You are doubling down on a losing hand. You are digging a deeper hole. Like so many losers, you are not alone with your "keep digging" strategy.
4th request:
How did you conclude that the Honda Accord can't run adequately without all of those gadgets?
You wrote it. You just made it up. You lied.
Each of your replies, where you refuse to back up your "run adequately" claim, proves my point that you made it up and you lied.
Why not reply again, without answering the question. Maybe if you keep not answering, you will trick me?
It did not work 3 times in a row. Maybe the 4th time you will pull the wool over my eyes?
1
-
1
-
gpg (GNU Privacy Guard, which replaced pgp (Pretty Good Privacy), is free and open source.
For those that are unfamiliar with its purpose, it encrypts individual files, and does so in different ways, depending on your needs.
-- It can do symmetric encryption. Meaning that you give it a file and it creates an encrypted copy of that file. To decrypt it, you must give it the pass-phrase that you used at the time when you encrypted the file.
-- It can do public key encryption. Meaning that you can encrypt a file, and only the recipient, to whom you give the file, will be able to decrypt it. Your own passphrase will not work (unless you encrypted it so that both you and the recipient can decrypt it). You can even encrypt files so that multiple recipients can decrypt it. This is accomplished via public and private keys. The beauty of this is that you never have to share passphrases with anyone. But all recipients must have gpg installed on their computers.
It is an amazing utility, with no back doors, thoroughly tested, and used by regular people as well as by people dealing with the highest level of privacy and security issues.
1
-
1
-
@colt5189 I never heard of Teracopy. Apparently, it has been around for several years.
From my brief research, it looks like a GUI alternative to Explorer, when copying files. You still use Explorer to copy / paste or to identify the files in question. But then Teracopy takes over to perform the actual copying.
Teracopy appears to identify when you are copying numerous small files, and will kick off concurrent / simultaneous copying jobs, as long as SSDs are involved.
Explorer, on the other hand, will copy each of those small files, 1 by 1. So Teracopy will be much faster.
But there is no comparison with robocopy, when it comes to command-line options, to customize your copy request.
And with robocopy, it is easy to repeat your copy job, or put it in a bat file.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
I will not put any company's microphones in my home. But now we have to ask people we visit, whether or not they have these spyware devices in their homes (assuming we have anything private to discuss).
A few years ago, I visited a friend. He had Alexa, but I did not know.
I found out when one of his children said "Hey Alexa".
So all of that time my words were being sent to Amazon.
I did not give my friend a hard time, because he is oblivious to the privacy and technology issues involved.
But people that have these devices should tell their guests that they have them.
Or, they should unplug them when they have guests.
The same thing goes for "Hey Siri".
If you do not disable that feature, then everything that your iPhone's microphone hears is being sent to Apple.
I use Siri. But I manually activate it for when I use it.
We live in a world where big tech companies have our voice prints, and transcripts of our words, and the vast majority of people have no clue about it. Even when it is brought to their attention, most people do not care. I have asked them to let me place a microphone in their home. Well, they refuse that request. But they are fine with complete strangers at big tech companies having microphones in their home.
1
-
1
-
1
-
Two more records I would have on such a list:
-- Led Zeppelin II. Specifically, the first two songs on side 1 of the RL / SS hot cut pressings.
I heard "Whole Lotta Love" on a very high-end system, in a treated room, and my eyes and ears were fighting over whether or not the band was in front of me. They were carved out in three-dimensional realism like nothing I have ever experienced -- nothing else has ever come close.
-- The Beatles, Abbey Road.
With the right pressing, on a great stereo, that pressing sounds amazing. The grunge of the guitars, the spacing of the voices, etc, is fantastic. All future releases / re-masters of that album were botched, in one way or another.
One other honorable mention:
Madonna's double album, "The Immaculate Collection", made with QSound, has songs with the widest soundstage I have ever heard. The songs were not recorded exceptionally well (not bad, but not great, either). But that QSound is wild.
Vogue has the best sound quality of all of the songs on that double album (to my ear). It is actually very good. And with the QSound effect, there are sounds appearing directly to the left and the right, as if there are speakers in those locations. Invite a friend over, and they will accuse you have having hidden speakers to the sides. If you want to test your stereo's soundstaging, play some songs from "The Immaculate Collection". The songs will vary in sound quality and the QSound effect. But that is a go-to album for ultra-wide soundstaging effects.
1
-
Steve, you have virtually no evidence on what took place, and you have expoused conclusions on what took place. If not the legal definition of conclusions, you drew an obvious connect the dots diagram, where you laid out all of the dots.
You have no idea whether or not the driver and the passenger knew each other, or what their relationship was.
You have no idea on whether or not the passenger knew about the driver's warrant.
But you make it clear as day what was what.
@2:50 "...all of my interests come together...", which is you being politically subjective, and not legally objective.
You conflated other improper forfeitures with this one, as if they are connected. As a lawyer, you know that one case has nothing to do with the other, other than keeping statistics.
You brought up the American Civil Liberties Union, which is a far left Democrat run organization, as a source, and you painted a picture of minority communities being targeted by police, etc.
The amount of policing in an area is based on the amount of crime in an area. Minority communities have far more crime than non-minority communities. So of course there will be more police activity in minority communities. But you painted a picture of police going out looking to screw with people in minority neighborhoods.
Go to radical leftist organizations, and you will get radical leftist statistics.
Go to far right organizations, and you will get far right statistics.
Steve, I will wager 10 to 1 that you are a life long Democrat. And videos like this one show your bias.
Having a bias is nothing to apologize for. We all have them. But at least acknowledge where you stand, politically, and how you choose your organizations for your statistics.
1
-
1
-
1
-
1
-
1
-
Note that the radical leftist media is covering up this latest fall, by not showing us the other camera angles.
There are other angles, where you can see his feet, at the instant that he falls. But none of us have seen it.
I know that the other camera angles exist, because one video briefly showed up, showing an overhead angle, from the right, where you could see everything.
But that camera angle was left as an insert (too small to really make out the details), and they cut away from the insert, a moment before he fell.
So such videos, where we would be able to clearly see what happened, are being suppressed / banned.
If it were a Republican that took that fall, we would be seeing 12 different camera angles.
When the President is making a speech, there are always multiple cameras recording him. Yet, other than what I described above, none of them are showing up.
In other words, the "tripping over a sandbag" excuse is likely a lie.
And even if it is not a lie... it is a huge bag of sand. Anyone with ½ of their vision and a working brain would see it.
1
-
1
-
1
-
The mentally disturbed man, at the start of this video, is correct that he has a right to be protected by identifying as whatever he wants. And that is where it ends.
He has no right to impose his self-identifying sickness on anyone else.
He is a man (a beta man). But he is a man. Other than, perhaps, people that live with him, no one should be calling him anything other than "sir".
No one should be made to be a fool, by going along with his insanity. But he does have the right to self identify as whatever he wants, just as he has the right to dress up any way he wants. That does not mean anyone must compliment him, or copy him, or gravel to his psychotic demands.
Anyone think that he will be campaigning for President Trump?
----------
For the next, based, speaker...
I would like to have seen who, on that counsel, was interrupting him and admonishing him. Because whoever that was, needs to be fired (voted out), and never be allowed to be around children, unsupervised, and never be hired for any job with authority over anyone else.
1
-
@11:22 "...if you're using their stuff, they have to disclose to you, what information of yours they're going to use and if so, how, and maybe get your permission to use it."
Steve, the problem is that China's Communist government will lie.
They can make up anything that they want, and have their app do anything else that they want. It is absurd to believe their disclosures.
TikTok is closed source code. That means that no one (other than the people who wrote the code) knows what the app is doing.
Yes, we can all see what it is doing, on the surface. But we cannot see anything and everything else it is doing, in the background.
China's Communist government is not going to reveal its app's spying algorithms.
The whole point of TikTok is to have created a spyware app that everyone will want. So China's Communist government created an app that does two (or more) things. On the surface, the users are entertained with videos. Below the surface, all of the nasty data mining takes place.
This is a big issue, because high-ranking government officials probably have TikTok on their personal phones.
And if not the actual government officials, then their family members will have TikTok on their personal phones.
So how great is it for China's Communist government to have microphones on children's phones, collecting the private family discussions of high-ranking government officials?
Check wikipedia for all of the countries that banned TikTok.
The NYC public school system had banned TikTok.
There were other bans, too, not mentioned in the wikipedia page.
Lastly, what "rights" does TikTok have in Montana, or anywhere other than in China?
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
gpg has a -c option, which performs a symmetric cipher.
In other words, you can encrypt any file, and only the person who knows the password (or passphrase) will be able to decrypt it.
Here is an example of how to encrypt a file named "secret.doc"
gpg -c secret.doc
Upon executing the above, gpg will ask you to enter a passphrase. Enter anything you want. Whatever you enter will be what is required to decrypt your file.
When done, you will have two files.
You will have your original "secret.doc", and you will also have "secret.doc.gpg".
Note that the above process will create a binary encrypted file. In other words, you will not be able to view the contents of "secret.doc.pgp", because it will contain binary characters that are not viewable.
If you want your encrypted file to look like what Rob was showing in this video, then you would run:
gpg -a -c secret.doc
The above, now having the "-a" option (ascii armor), will tell gpg to use only human readable characters in its creation of the encrypted file, which will be named:
secret.doc.asc
Note that the above can probably be done via the graphical program that Rob demonstrated in this video. But I never used it, so I do not really know. I use only the command-line version of gpg.
Also note that the above has zero to do with public key encryption. In my examples, you are simply encrypting a file with a passphrase of your choice, using the gpg program.
gpg is mostly used in the fashion that Rob demonstrated. But you asked question about storing encrypted files across multiple platforms. My examples will accomplish your goal.
If you have countless file that you want to encrypt, then gpg is probably not the best suited for your goal.
Another choice that might work better for you would be to create a VeraCrypt encrypted volume (which is a different program than gpg). VeraCrypt allows you to mount a new drive letter, and it will behave like any other drive letter. The benefit is that your VeraCrypt drive letter will do on-the-fly encryption. Anything that you put into the VeraCrypt drive letter will be encrypted. When you dismount the VeraCrypt volume (a simple click), all of the files that you put into that volume will reside in a single file. You can make copies of that file and store them anywhere you want. That VeraCrypt file will be useless to anyone, except you, because only you will be able to mount that file (because only you will have the passphrase that will allow it to be mounted).
Cheers!
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
With Hunter being pardoned, then he cannot assert any Fifth Amendment rights, because he is not in any legal jeopardy.
As such, when subpoenaed to testify, he must tell the truth.
If he refuses to testify, then he is in contempt of court (or contempt of congress), and goes to jail.
If he lies under oath, then he will be charged with perjury, and will likely end up in prison.
So it is anything but over with Hunter and the Biden crime family.
Hunter will have to spill his guts and tell all, or go to jail. No pardon covers future crimes.
Neither President Trump nor (soon to be) Attorney General Pam Bondi will let the Biden crime family off the hook. Even if no convictions happen (due to pardons), all of the crimes will be exposed.
1
-
1
-
1
-
1
-
1
-
"There are some chargers which are quick chargers which charge your phone faster."
You mean that there are charges with different amperage ratings, just like our just explained?
"Also, it is recommended that you do not use phone while it is charging"
Recommended by whom? And why?
Folks, do not listen to this nonsense. If you need to use your phone, or want to use your phone, while it is charging, then do so. Do not inconvenience yourself.
All that might happen is that you will not charge as quickly -- just like our host explained. But nothing harmful will happen to your phone.
Ever use something like google maps, via your car's Apple's Car Play to navigate (GPS)?
That works only while your iPhone is connected with a cable to your car's USB port. And guess what?
You are using your phone while it is charging. It is the only way to use google's mapping on your phone via Apple's Car Play.
So there is no recommendation from Google, or from your car's manufacturer, to not use your phone while it is charging -- as that would render useless Apple's car play and any number of apps.
So charge your phone and use it as you deem necessary, just as you have been doing. Has anything harmful happened? There is your answer.
This user (that wrote the opening comment) chimes in with nonsense. He has a history of leaving such inane comments.
1
-
1
-
1
-
In order for the Instant Ink program to work, your HP printer must be connected to your internet router, via a TCP/IP connection (you cannot use a USB connection with the program). This allows your printer to send and receive information to/from HP's servers, which is how HP knows when you are going to need ink, and they will ship you ink that will arrive, prior to you running out of ink.
And by the printer being connected to your internet router (and not to your computer), the printer does not need your computer to have connectivity to HP's servers.
When I signed up to the Instant Ink program, they offered a "Free" subscription plan, that offered 10 pages per month (now it is 15 pages per month). But you had to give HP your credit card information, so that they could bill you if you printed more than 10 pages (or 15 pages, as it is today).
Some months after I signed up, some bean counter at HP determined that the "Free" program was not working out for them. So they canceled the "Free" program, and let their subscribers know that they would have to choose a different plan. This is dishonest, because I purchased my HP printer, based on them offering the "Free" program.
Apparently, I was not alone, and HP was probably used. Because a few weeks later, they grandfathered me back into my "Free" program.
However, they warned me that if I should ever switch to one of the other Instant Ink offerings, then I will not be allowed to return to the "Free" program.
So I still have the "Free" program.
Also dishonest of HP is that, although you paid for and own the ink cartridges that came with the purchase of your printer...
...the minute you sign up for the Instant Ink program, you no longer own those cartridges. You agree to turn ownership of those cartridges over to HP; they instantly become "rented" cartridges.
However, if you independently purchase ink cartridges somewhere, then you own those cartridges, and if you use those cartridges, then pages printed with those cartridges will not count towards your subscription's page count.
The printer keeps track of each page that is printed, and whether you had "rented" cartridges in the printer, or you had "owned" cartridges in the printer.
As soon as you print a page with rented cartridges, the printer updates HP's servers. You can log-in to HP's Instant Ink site and see exactly how many pages you have printed in your monthly subscription period.
Since I print only 2 or 3 pages, on average, each month, the "Free" program is perfect for me, because when the printer warms up, after not printing for a few weeks, it burns off a fair amount of ink, doing its cleaning cycle. So I use more ink via the cleaning cycle, than I do with actual print jobs. And it is of zero concern to me, because it costs me $zero.
And when I do print (and this goes for anyone using the program, regardless of which level of the program they signed up for), I always use the highest quality setting, which uses the most ink.
Since HP counts pages, and not ink usage, it is most beneficial to use the highest quality setting. The only exception would be if you are in a hurry, and you are printing photos. In that case, you would probably choose a lower quality setting to have the pages print faster.
Cheers!
1
-
1
-
1
-
1
-
1
-
1
-
Not covered in this video is the wildly expensive cost of replacing your electric car's batteries.
All batteries, no matter how high their quality, and no matter how meticulously maintained, eventually will not hold a charge. And before it gets to that point, all of the numbers our host quoted would have to be redrawn, because as the batteries age, their ability to go the distance will diminish. What starts out as 200 miles will become 150 miles, then 100 miles, then 50 miles, and finally will not even start the car.
So you go to replace your electric car's batteries.
That's when you find out it will cost $15,000 today, and likely much more in 5 to 7 years.
The batteries are not the type you can buy at your local service station. The batteries are not what gasoline powered cars use. Rather, the batteries for your electric car are proprietary, and you will be at the mercy of the electric car company's pricing and availability.
So the costs that the host quoted are neither factoring in $15,000 over the life of the car's batteries, nor the battery's diminishing driving range.
For those that will sell their electric car before their batteries go bad...
You will find that your resale value has the cost of battery replacement built in.
And it will not matter if you try to find someone that knows nothing about the batteries going bad. Anyone can easily check on how much used electric cars are selling for. So you will get the going market value, which will not be very good if your electric car is 5+ years old.
People with electric cars and hybrids eventually lose their gas pump savings as their batteries go bad.
1
-
1
-
1
-
@2:16 "President Trump and his team are once again testing the limits of executive power..."
President Trump is testing nothing. President Trump is using the authority granted to him by Congress.
The person testing, and abusing, his power, is (@1:42) James E. Boasberg, who is a radical leftist, trying to legislate from the bench. That judge was cherry picked by the plaintiffs (judge shopping).
@2:21 "...at a time the US Supreme Court has appeared willing, time and time again, to allow the President to decide what is, and is not, and actual national security threat".
The Supreme Court is "willing", and "time and time again", and "allowing"?
Talk about fake, biased news.
The Supreme Court Justices are basing their rulings on our Constitution. And @The National Desk anchor, Kristine Frazao, issues a report conveying that the justices have a political agenda.
And if the President of the United States of America is not the right person to decide what is a national security threat, then who is?
If President Trump needs a place to house those vile gangsters, he should house them next door to James E. Boasberg and next door to Kristine Frazao. Watch how fast they will fight to have those gangsters deported and 100% support President Trump.
Thumb's down click earned for the wildly biased [fake] news reporting.
1
-
I hope that President Trump has staff that is tracking every corrupt Biden official (as well as other corrupt government employees), and details / evidence about their corruption, so that when President Trump returns to the oval office, he can have hew Attorney General bring justice to them all.
President Trump needs to pick a strong, no nonsense Attorney General, that will hire staff that are also no nonsense, and bring appropriate charges against all of them for their corruption.
This needs to be organized now, to be ready on day 1 of President Trump's return to the oval office.
Four years is a short period of time to bring a sea of corrupt people to justice.
Many high ranking people will be more difficult to catch. So it will take catching others who make plea deals, to bring high ranking corrupt personnel to justice. This all takes lots of time. Again, that is why this needs to be tracked now, and be ready to go on day 1 of President Trump's return to the oval office.
President Trump must pick the right Attorney General, who, in turn, must hire the right staff, who, in turn, must hire the right staff, etc. A superstar team of legal policing must be put in place to clean house of so many corrupt officials. It will be a team effort, and must be organized by experts who will not be deterred from their oath of office.
1
-
@L ani My comments were based on the host's narrative, which I partially quoted in my original comment.
For the lawyers, nitpickers, and leftists, looking to defend mobs and rioters, here is the full quote:
@0:17
"For weeks, Portland has seen Black Lives Matter protests nightly in front of the federal courthouse"
It is those "nightly" mobs to which this video posting is basing its message, and it is those "nightly" mobs to which I am writing are not protesters.
In other words, my comments are based on this video. This is customary for youtube. People comment on the video.
This video is about night time mobs. So my comments are based night time mobs.
L ani,
You really made an effort and a reach to misdirect the meaning of this video and my comments. You should get some sleep, as you have more rioting to do in a few hours.
And when you report to the police that your home got burglarized every night for 3 months, keep an ear open and listen for when one of your neighbors chimes in with:
"But you had peaceful visitors during the day."
1
-
1
-
1
-
1
-
@Merichguy2 By doing incremental backups, you should (depending on the software) be able to restore files from each backup session.
In other words, if you do a weekly incremental backup, then you can restore files from week#1, or week#2, etc. That is helpful if you screw up a file without realizing it. You might have to go back a few images (a few iterations of your incremental backups) to find that file from a time before you screwed it up.
Even if you do a monthly full backup (as our host does), you do not need to delete the previous month's full backup (if you still have enough free space on the drive holding your backups).
If you delete your full backup, followed by starting a new full backup, you run a risk of data loss. It is a very slim risk -- but still a risk.
At the moment you delete your full backup, then until you compete another full backup, you have no backup.
So while performing your full backup, if your source disk dies, you will not be able to complete your full backup. Now you have a real problem, because you do not have any backup.
I suggest that when you start a full backup, you always keep your previous full backup. Never leave a moment where you have no full backup.
But those incremental backups are handy for grabbing files in the state that they were in on each date you did the incremental backup.
One other precautionary point:
It is convenient to leave your target drive connected all of the time. When your backups run, you do not need to plug your target drive in to a USB port. However, that convenience is risky.
If a bad actor gets control of your computer (like a ransomware attack), you do not want your drive that contains your backups to be connected to your computer.
Also, keep a copy of your backup installation file on your target drive. If your C: drive dies, you will want to have your backup software on your target drive. And keep a copy any registration code, etc, that you will need for you to be able to use your backup software. In other words, if your C: drive dies, then have everything that you need on your target drive to get you up and running when you replace your C: drive. If your backup software includes creating emergency boot media, then get a flash drive and have it be your emergency boot media.
1
-
1
-
1
-
@1:38 "...that he (the police chief) can't do certain things, until he get approval from the community"
Then he is a police chief, in name only. He should be replaced with a police chief that does his job.
And if the police chief does look to the "community", then know that in Minneapolis, that "community" is the radical, police-hating, violent, mob ruling, vandals.
Those in that "community" are the minority, and by a very wide margin.
If you want to really seek approval from the "community", then stop looking at the mob as being the "community", and start looking at the law abiding, freedom loving, police supporting people of Minneapolis.
You are the police chief. Show the mob that they are the problem. Show the mob that they will go to jail for their violent actions. Never give in to the mob. Never give the mob an inch.
With a police chief that is controlled by the mob, then the city of Minneapolis is finished.
1
-
Those protesters know next to zero about what took place, or the details about what took place.
They hear "trigger" words, such as "police", "warrant", "black", and "shooting". And they become judge, jury, and executioner.
These are hateful, rage filled degenerates that are marching. Some are simply lemmings or dupes or too stupid to understand that they are being used by the hateful, rage filled degenerates.
They march and get nasty before finding out why the warrant was issued, and why the person was shot.
By the way...
Raise your hand if you sleep with a gun in your bed.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
@2:10 "...and they all synchronize, up to a cloud (someone else's computer)".
Isn't it taboo to let anyone else have your private key?
@8:35 "...they may be able to crack those, and come out, with what is the actual password, if given enough time".
If your password manager creates a 15+ character, cryptic password, then the amount of time would be half of forever. And with a password manager, you can use a 20+ character, cryptic password.
You would have a better chance of winning the lottery, three times in a row, before being able to crack a 20 character password, such as this:
ayba]{(<[%+H JS616@A
And, the attacker would need to know which hashing algorithm was used, and would also need to know if multiple iterations of hashes were used, and if salt or pepper was used to further complicate generating the hash.
If you lose your computer, it is somewhat simple to change a user's password, making it somewhat simple for whoever has your computer to login to your computer. Now that they are logged in as you, your passkeys are at their disposal. And if you ever bring your computer in for a repair, they can clone your drive, plug in the cloned drive to their own computer, login as you, and they have your passkeys.
With a good password manager, then as long as you use a strong master password, and you also have the password manager create virtually unbreakable passwords, then you should be fine. And some password managers will not paste in your password if the site is a fake. A user might not detect a similar (but different) URL. But a password manager will detect it as a different site. Passkeys do not do that.
Lastly, password managers allow you to easily make copies of your encrypted password database. You can store those copies anywhere, even on your arch nemesis's computer.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
Every person that I know, whether family or friends, never backup anything. Most, but not all, business associates that I know, also never backup anything.
Sooner or later, they will regret their recklessness. They will call me, and I will not help them, because I tried to set them up to do backups, and they just refused. They will not make their irresponsible decisions my problem. The only help I will offer is to point them to a data recovery service, and then they are on their own.
For $49 (which they all have), they each could have purchased an external USB drive and protect themselves. But they refuse. And that, I suspect, is 99%+ of all people.
1
-
@4:17
"...who don't understand economics..."
Many of them do understand that socialism leads to misery. But that misery is for the population, not the tyrants that control power over the population. They live lavishly.
Socialists, such as Bernie Sanders, understand this. Beneath all of his "I'm for the people" rhetoric is a power hungry, evil human.
If he were to gain enough power, he would stop hiding his true intentions. He would rule as all tyrants rule.
As a good and generous nation, we have difficulty believing that such despots are among us. But they are. And of course they do not reveal themselves, completely, until they have full control.
Socialism leads to the state having absolute power over the people. Absolute power corrupts, absolutely, which is precisely the reason why socialists that seek power salivate at their chance of attaining such power. So they do understand economics. They are in it for themselves, not for the governed.
1
-
1
-
1
-
There are ways to test / demo software in a virtually safe environment.
The "Pro" and "Enterprise" versions of Windows include a "Sandbox" feature (which you turn on via the "Turn Windows features on or off" tool).
With Sandbox enabled, your computer can create a virtual machine (Windows inside of Windows). On that virtual machine (that Sandbox), you can install and run and test just about anything you want. The Sandbox machine cannot (in theory) touch your real Windows machine. And when you close the Sandbox, everything that you did vanishes, like it never happened (well, if you interacted with computers on the internet, that still happened -- but on your own machine, it is like you never ran the Sandbox). So anything you installed within your Sandbox will not be there after you close down the Sandbox, and start it up, again.
Sandbox is a Microsoft tool, and has been around for years. It if has vulnerabilities, they would be known and fixed. There can still remain vulnerabilities. But this is about as safe as it gets for running risky software or visiting sketchy sites. In fact, you can intentionally run malware within your sandbox. It will screw up your sandbox. But your main Windows box will remain unaffected, and a restart of your sandbox will return it to its original status.
Since you cannot save the state of your sandbox, then it can be frustrating, because the next time you start it up, you have to install and configure stuff you had already done.
Since nothing is without risk, and since you might choose to tinker with otherwise dangerous software in your sandbox, you should backup your computer before doing any of the above.
If you are running the Home version of Windows, then the Sandbox feature will not be available. You could run other virtualization software (such as Oracle's free and open source "Virtual Box"). It will not be as secure as Windows built-in Sandbox tool. But Virtual Box is a good option for testing supposedly reputable software (I would not use Virtual Box to test known ransomware, because Virtual Box is designed with convenience in mind, and security is not as tight as the built-in Sandbox tool).
1
-
1
-
1
-
Three points:
1) If you work with sensitive data, then consider using BitLocker's full disk encryption. Or use VeraCrypt's full disk encryption (or set up an encrypted VeraCrypt volume for your sensitive data to reside).
With full disk encryption, you will never need to wipe your disk.
If you are running Windows Home, then BitLocker is not an option. It is disabled. Pro and Enterprise versions of Windows have BitLocker enabled. The Home version can mount an already encrypted BitLocker volume, but the Home version cannot create a BitLocker encrypted volume.
VeraCrypt works with all editions of Windows.
Also, VeraCrypt is free and open source code.
2) If you want to securely delete a single file, or group of files, then you can run software designed for that purpose.
Sysinternals (acquired by Microsoft) has a secure delete program named "sdelete".
From the command prompt, you run:
sdelete name-of-file
-- or --
sdelete name-of-files*
3) If your concerns are with your OS drive, then use full disk encryption -- especially since you probably have an SSD for your OS drive (and wiping free space on an SSD is basically useless).
With full disk encryption, your OS drive will never need to be wiped.
If you only need to store specific files with encryption, then use VeraCrypt. It will create a single file that it will mount as a drive letter. Anything you put into that drive letter will be encrypted.
1
-
1
-
@5:57 -- "Older technology could only store two different levels of electrons"
@6:08 -- In the upper right-hand corner of the video: "Single Level Cell", which is referred to as SLC.
Yes, SLC is older. But it is not the runner-up in the speed department.
In fact, SLC NANDs are the fastest, and most expensive, types of SSDs available. They also last the longest, in terms of how many times you can write data to them (not covered in this video is that after you write to the SSD X number of times, the SSD will eventually not be able to be written to, again. Nearly no one will ever run into that problem. But SLC SSDs can take the most punishment.
Not all SSDs are equal, in terms of speed. The speeds are, from fastest to slowest (and from most expensive to least expensive):
-- SLC (single level cell).
-- MLC (multi level cell -- as in two levels).
-- TLC (triple level cell).
-- QLC (quad level cell).
QLC SSDs are very slow. Many are slower than mechanical hard drives.
But, you say you have a QLC SSD and it is very fast. Well, you are both correct and you are incorrect. Why?
Slow SSDs (such as QLC SSDs) have cache (a portion of the NAND cells are comprised of the faster verity of NAND cells (see listing, above)).
That cache can be anywhere between 20 or so GB to over 100 GB, depending on the size of the SSD.
So when you copy a few gigabytes to your QLC SSD, it flies, because it is using its fast MLC or SLC cache. But if you were to continuously write hundreds of gigabytes to your QLC drive, it will go from a speed demon to a snail.
When you are not actively writing to the SSD, it will unload the data in its cache to the slow QLC NAND cells, all in the background. So the next time you use the SSD, the cache will be empty and the SSD will be fast, again.
Big companies (google, microsoft, amazon, etc), that provide on-line services for customers, use SSDs made from 100% SLC NAND cells. Those SSDs are very expensive, very durable, and very fast.
The host's comment, @5:57, conveys that SLC is old (and therefore slow). He did not actually claim that SLC is slow. But what will people think when they hear him say "Older technology..."?
Which SSDs are 100% SLC or MLC?
Good luck figuring it out. For some reason, that information is not readily available.
But if one 1-TB SSD costs $69, and another one costs $99 (or more), then there is a good chance that the cheap one is QLC, and the pricier one is MLC or SLC.
The speed ratings on the box are always for the small percentage of the faster cache section of the SSD.
That is fine, for 99%+ people that do not hammer the SSD without rest. But the advertised speeds are not entirely truthful.
And when you see videos of people running benchmarks, they never use huge files (who wants their benchmark tests to take a long time?).
So when those benchmarks use 1GB or 5GB files, it is testing only the fast cache section of the SSD.
Run the benchmark with a 250GB or 500GB file.
A SLC drive will tear through the test.
A QLC drive, with some MLC cache, will take an eternity to come back with the results (and the results will be abysmal).
Cheers!
1