Animator vs. Animation

I found some fun videos at YouYube and thought maybe everybody should just take it easy and kick back. I stashed some booze and whatever around the place, make your self comfy, and I’ll be back later to sweep up, and pack my stuff up…..

Animator vs. Animation (original)
Uploaded on May 14, 2007
Originally made in 2006, entirely with Adobe Flash.
visit my website! http://www.alanbecker.net

Animator vs. Animation II (original)
Uploaded on May 14, 2007
The animator, looking for a challenge, decides to make the stick figure harder to beat. Little does he know exactly how much power he is giving to the little guy. Long live The Chosen One!

Animator vs. Animation III (original)
Uploaded on Oct 2, 2011
The third episode of the Animator vs. Animation series.
“The Chosen One” from episode two is trapped inside the Animator’s internet explorer in forced labor as a pop-up blocker. This segment follows his eventual escape onto Microsoft Word, Solitaire, Minesweeper, and the desktop.

Animator vs. Animation IV (original)
Published on Oct 2, 2014
BEHIND THE SCENES: http://youtu.be/ptc7rGXp284

The struggle between a stick figure and its creator, a computer animator. In this fourth installment, the animator is finally shown in real life interacting with his computer monitor. The stick figure, resisting his tormentor, attacks his social life by hacking his Facebook account, traveling onto his iPhone via USB cord, and drawing animations of his own to dismantle the

Stick Texting – iPhone App with animations by Alan Becker

Published on Aug 8, 2012
***THE STICK FIGURE LEAPING OUT OF THE BOX IS MERELY A DRAMATIZATION. In the App, he is confined to the text box. ***
I worked with Mitch Robiner to make short stick animations that you can insert in your iPhone text messages in place of emoticons. It’s a brand new app so please help make it super popular!! $1 for a limited time!

Malware! Your Computer Is Infected!

If you suddenly have a bunch of pop-ups, pages opening up, even though you never hit any link, and warnings about your computer being infected, it is.
Don’t call the numbers provided by the message! Those are scammer numbers to sell you free stuff, and they want to get into your computer, so they can leave they’re own bugs in it.

If you have malware go to http://www.malwarebytes.org/antimalware/ , and get their free download. Follow the directions all of the way through. Now before you delete all of the things that program found, highlight what it is, and copy the names of the malware onto a notepad, or wordpad document, and go to Google/ search and see where that takes you.

I recommend you go to http://malwaretips.com/blogs/malware-removal-guide-for-windows/
and follow this blogs instructions. It will take 4 or 5 different cleaners to remove the malware. I am going to give you a list of links for these cleaners. Some of them are free, and unfortunatly some aren’t.

Once your computer is infected, you may never get rid of it all. The new crap that is infecting your machine is tenacious as hell…
It will take a coulpe of hours to run the cleaners through your computer, and hopefully you will at least regain some control over it.

I recommend you go to http://www.malwarebytes.org/antimalware/ , and read some of they’re blog. If you have the names of the malware, type it into they’re search place, and the information you need will magically appear.

Here are some of the cleaners, and tools you will probably have to use to remove the malware.
http://www.malwarebytes.org/antimalware/

http://www.surfright.nl/en/downloads This is hitman pro. When you use it, where it says USER ID type in FREE TRIAL, or free version and they will let you use it for 30 days.

https://toolslib.net/downloads/finish/1/ This is ADW CLEANER. It will be the first one you run, after you’ve identified your particular infection.

This one will be number two. http://malwaretips.com/blogs/pup-optional-mindspark-removal/#junkware

This is number three, but if you did what I said earlier, you already have this.
http://www.malwarebytes.org/antimalware/

This is number four. http://www.malwarebytes.org/antimalware/

These are some others, but they will cost money. You may have to actually buy some of these to rid yourself of the malware.
A note: I still have to scan my computer every week, and I am still pulling malware out of it. Good luck, and have a nice day!

http://malwaretips.com/blogs/remove-adware-popup-ads/

http://malwaretips.com/blogs/remove-tech-support-scam-popups/

http://malwaretips.com/blogs/malware-removal-guide-for-windows/

http://malwaretips.com/blogs/settingupdate-theupdatercheck-com-removal/

http://malwaretips.com/blogs/remove-fake-flash-player-update/

Why Do I Need A New Charger?

Here is the most popular question about new technology, and the products we are encouraged to buy. ” Why does every new item need a new style of charging cord? ” Even gadgets of the same make seem to require you to purchase a new charger, as the older style doesn’t work on the new model.

The answer is only too obvious, but it raises the question, aren’t these big businesses making plenty of money, selling us ” new and improved ” gadgetry? I am constantly amazed with all of the changes that are made to virtually the same products. There is no reason to change the simple things, like charging cords.

Most of the new tech items are using the USB port type chargers, and have the ability to recharge from a laptop, or a wall mount type charger, although the basic amperage may be different. Usually there is a safety feature installed to prevent your device from accepting too much voltage.

All of the phones use the same voltage batteries, but the battery designs are different, so you can’t use the old one you have. That way you have to buy a new one, and that generates more revenues for the parent company. Most of the laptops, and notebooks use a battery that ranges from 5 volts to 20 volts, depending on the device.
Almost all of the phones use a 3.6 volt battery. For those not in the know, it takes more voltage than what the battery voltage is, to fully charge. That is why chargers for your phone say they deliver 5 volts, while the battery is only 3.6 volts.

iClever® Intocircuit Power Castle PC26000 26000mAh External Battery Pack/High Capacity Power Bank Charger for Laptops, Notebooks, Netbooks, Tablets and Smart Phones. Compatible with HP, Dell, Toshiba, Acer, Samsung, Sony, Gateway Laptops; Google Nexus 7 Tablets; iPad 4,3,2, iPad mini, iPad Air, iPhone 6, 6 Plus, 5S, 5C, 5 (Lightning Cable not Provided), Samsung Galaxy S6 S5 S4,S3, Note 4 3 2; HTC One M8 M9 and More

Here’s how to charge any battery enough to keep doing the important stuff.

Fact 1: All past and future rechargeable batteries can be safely trickle charged if you don’t overcharge them. Trickle means low current, like half an amp for an average camera or phone battery.
Fact 2: Small incandescent bulbs such as flashlight bulbs and christmas tree mini lights make great current regulators.

You can plug any USB device into any USB cable and into any USB port, and nothing will blow up — and in fact, using a more powerful charger should speed up battery charging.
Comparative power supplies
Power Supply Tension (volts) Ampere
USB 1.0 5.0In 0.5A
USB 2.0 5.0In 0.5A
USB 3.0 5.0In 0.9A
Wall Charger iPhone 5.0In 1.0A
Wall charger for iPad 5,1In 2.1A
Wall charger for Amazon 5.0In 0.85A

There are three types of USB plugs 1.0 2.0 3.0 The 1.0 is the original largest type. the 2.0 is the smaller one that was introduced a few years ago, and the 3.0 is the smallest type.

Why Every New Macbook Needs a Different Goddamn Charger

Jarte – Better Than Word pad

http://www.jarte.com/store.html
Jarte – Better Than Word pad
I don’t know how everyone else is writing their posts, I don’t get to sit behind them and see what program they’re using. I didn’t like Office, and Open Office, the free program was just as much a pain, as the Microsoft program was. I never liked notepad, as it always wrapped the sentences. So for years I have used Word pad, which is a great program, except…..

Word pad has great features, and is a well written program, utilizing an engine that functions extremely well. It is versatile and always reminds me when I need to save my work. My only complaint with Word pad is it didn’t come with a spell- check feature, and that will be it’s downfall!

When I want a document for purposes other than a post for this site, I would have to pretend I was creating a new post, so I could edit the document, as this site has a spell-check function, and lets me know when the wording is not right. Word pad doesn’t have those features. Apparently Word pad doesn’t have many features other document editing programs have, so I have changed to a new program!
http://www.jarte.com/?so=j&ed=s&ve=53

Jarte \jär · ‘tay\ noun (est. 2001) 1. A free word processor based on the Microsoft Word Pad word processing engine built into Windows. 2. A fast starting, easy to use word processor that expands well beyond the Word Pad feature set. 3. A small, portable, touch enabled word processor whose documents are fully compatible with Word and Word Pad.

“It’s one of life’s little ironies that in a country with free speech, a program called Word costs over a hundred dollars. Fortunately, we also have Carolina Road Software and their free-of-charge word processor, Jarte.”
—PC World magazine

The Jarte word processor relieves that problem by including only the features likely to be needed by real people. Jarte is designed for students, writers, small business people, and home users. But what really makes Jarte special is the unique way it makes the features that are included easily accessible.

You expect a word processor to be able to handle Word documents, font and paragraph formatting, spell checking, print preview, and more. While Jarte performs all the standard functions well, the most important aspect of Jarte is the numerous small details that make it an efficient and enjoyable tool for creating documents. Small details like:

photo--Jarte Plus Store

-Jarte Plus Store

Tabbed document windows for easy access to your open documents
Larger buttons for the most commonly used functions
Instant dictionary and thesaurus word lookup (integrates with free WordWeb)
Spell check and text search tools that do not park themselves on top of the text you are trying to edit
Single click bookmarking that make bookmarks both useful and usable
Instant access to the documents and folders you designate as your favorites
Instant access to the fonts you designate as your favorites
Use of the mouse scroll wheel button to copy and paste text
It is Jarte’s thoughtful details that will leave you wondering how you lived with that cumbersome office word processor for so long.

Take it With You!

Jarte may be the best word processor available for mobile PCs. Jarte takes up very little space on your SSD or hard drive, it runs quickly and efficiently, and Jarte’s compact display is perfect for small screen PCs. Jarte supports touch screen gestures, such as finger swipe scrolling and pinch zoom, for use on tablet PCs such as Microsoft’s Surface Pro. Jarte is an ideal word processor for mobile PCs!

Jarte may also be the best portable word processor available. Jarte can easily be run directly from a USB flash drive (or even a DropBox folder), so your word processor is always ready for you no matter what PC you’re using, providing the ultimate experience in portable word processing.

Stable WordPad Editing Engine

At the heart of Jarte sits the same word processing engine used by Windows’ WordPad. The difference is that Jarte builds far more capability around the WordPad editing engine than the WordPad program itself does. The significance of this fact is that Jarte users are secure in the knowledge that Jarte is making use of the same reliable, time tested editing engine used by millions of other Windows users all over the world. If you have tried other alternative word processors and found them to be unstable that may be in part due to their use of unreliable, home grown editing engines.

Microsoft is continually upgrading the WordPad editing engine, although you would never know it by examining WordPad. The WordPad program itself has not changed since it was first introduced. Jarte, on the other hand, continues to evolve and take advantage of useful features as Microsoft adds them to the WordPad editing engine.

Jarte is a Free Word Processor? What’s the Catch?

Yes, Jarte is completely free. There are no ads, no trial period, no nag screens, and no crippling of essential features. We do sell a separate edition of Jarte called Jarte Plus for those who want more. Many of Jarte’s regular users have been more than willing to pay the small price for the extra bells and whistles provided by Jarte Plus.

Whether or not you choose to upgrade to Jarte Plus, we hope you will go forth and free other weary souls from their corporate office word processors by introducing them to Jarte —the word processor for the rest of us.3/20/2015

SPAMMING IN MY NEIGHBORHOOD

I feel like I’ve been used. This might be how a rape victim feels. Someone crept around my neighborhood, and stole hundreds of blogs. What had started out as a near empty blog, with an about page and two articles in it, turned into a full blown blog over night.

We all re-blog articles that we want a greater audience to see. If we find something that we think our readers need to know, or would truly enjoy, we re-blog it. The word-press system allows for this, and usually cuts the post short, so you must go to the SOURCE. to finish the post.
That site now has hundreds of articles on it and just as many backlinks. I have reported this to word-press
https://en.support.wordpress.com/report-blogs/

 

timethief replied to a forum topic that you subscribe to
in response to the topic “Is someone, re-blogging hundreds of articles a day, Spamming?”:

 

You’re welcome. There’s nothing wrong with creating a private collection of resource links to reblogs but leaving the site public and exhibiting the bot-behavior you report goes beyond the pale. I’m sure our Terms of Service Staff will take care of this off the forums after you report it.

 

Report a Site

 

If you find a site that violates our Terms of Service, we want you to let us know about it. Please understand that we don’t always respond to these reports, but every single one is read (by a real human being), and the reported site is reviewed accordingly.

More importantly, please note that the team behind WordPress.com strongly believes in freedom of speech. WordPress.com has a vast audience spread across many cultures, countries and backgrounds with varying values and our service is designed to let internet users freely express any ideas and opinions without us censoring or endorsing them.

We take all reports seriously, but we won’t remove sites just because they are offensive (even to us!). We think the right response to bad or offensive ideas is to speak out against them, not to censor them. If a site is publishing offensive content with which you don’t agree, feel free to create a site to speak your own mind on the subject — you’ll of course have the same rights.

If you do have a site to report, please read on.

Reporting a WordPress.com site:

If you’re logged in to a WordPress.com account and stumble upon a site you’d like to report, simply move your mouse over the menu on the far left of the admin bar, and you’ll see Report this content which will allow you to send us a report for:

content that is spam
adult content not suitable for general audiences
abusive content
content that promotes self–harm/suicide
content that infringes your copyright
Report this content

Clicking that link will bring up this following form.

report_content

If you’re not a logged in WordPress.com user please use the form found here. https://en.wordpress.com/abuse/

Before reporting a site with this form please verify that the site in question is hosted by Automattic. We only host sites that have “wordpress.com” in their URL or say “powered by WordPress.com” on the site. We have no control over sites that say “Powered by WordPress.org.” Those sites use the open source WordPress software and aren’t hosted by us, so you should contact the appropriate web host with complaints.

If we receive a complaint and aren’t in a position to make a determination (for example whether something is defamatory or not), we defer to the judgment of a court. Please forward any legal process relating to a site hosted on WordPress.com to court-orders@wordpress.com. If you are a member of a law enforcement agency, please contact us at law-enforcement@wordpress.com.

If your copyrighted material has been used without your permission and in violation of the law, please submit a formal DMCA notice by following the instructions found here: http://automattic.com/dmca.

 

11 free tools to protect your online activity from surveillance

http://mashable.com/2014/10/29/private-internet-tools/
The documentary Citizenfour, which debuted to a limited release on Friday, offers the closest look yet at Edward Snowden, the whistleblower who exposed the National Security Agency spying scandal. In the film, Snowden and the journalists he works with go to great lengths to shield their correspondence from unwanted eyes.

Though Laura Poitras’ film explores a very extreme circumstance — a massive leak of top-secret information to the press — it’s as good a reminder as any that we live in a time of widespread government surveillance, and you can’t be sure who’s intruding on or monitoring your Internet activity and communications.

SEE ALSO: Private Browsing Settings Aren’t as Private as You Think

You might want more privacy online for any number of reasons — you could be a journalist reporting on a sensitive topic, like Poitras and Glenn Greenwald, or you might just want more peace of mind in light of the NSA revelations. To better protect yourself, here are 11 tools (presented in no particular order) to help you encrypt data, block intrusive trackers or remain altogether anonymous on the web. Note that this is by no means an exhaustive list of what’s out there, and no security measure is 100% effective. All of the tools listed here are free.
1. Tor Project
Tor is a free software program that allows people to use web connections anonymously. Widely considered to be one of the best privacy tools on the web, Tor can be downloaded as a software package, and there’s a Tor-enabled browser available. It’s difficult to track information that passes through Tor — so much so that Russian President Vladimir Putin has put up a $110,000 reward for anyone who can crack its secrets.

Where to get it: Direct download https://www.torproject.org/

2. The Guardian Project
The Guardian Project creates open-source apps to help people communicate privately. All of the group’s software is downloadable for free for Android smartphones. For secure web browsing, there’s a privacy-friendly browser called Orweb that works with a Tor-enabled proxy called Orbot for mobile. There’s also a private messaging service called ChatSecure, an app for private phone calls and a pixel-destroying camera tool to blur faces in photos. This project is almost worth a list all its own.

Where to get them: Google Play, Amazon or direct download https://guardianproject.info/apps

3. DuckDuckGo
duckduckgo
IMAGE: DUCKDUCKGO
DuckDuckGo is a search engine that doesn’t track or share any of your information. If you’re looking for better privacy, use this over Google.

Where to use it: Duckduckgo.com https://duckduckgo.com

4. HTTPS Everywhere
When you’re browsing the web, you’ll notice that URLs typically have the “http://” prefix, if not the more secure version: “https://” (HTTP Secure). The HTTPS Everywhere browser plugin works with Chrome, Firefox and Opera, and it attempts to automatically switch any HTTP web address over to HTTPS, which encrypts communication between you and the server to protect against eavesdropping or impostors.

Where to get it: Google Play or direct download https://www.eff.org/https-everywhere

5. Ghostery
Ghostery allows you to keep tabs on companies that track your visits to websites. With this browser extension, you can block companies from collecting your browsing data. Ghostery has a popup option that displays a message each time you visit a site with a list of who’s tracking you.

When I visited Amazon.com, for example, Ghostery showed me I was being tracked by these entities:

tracker
Where to get it: Direct download https://www.ghostery.com/en/

6. Privacy Badger
Privacy Badger is a browser extension that can block third-party advertisers, but it has a moral compass. If Privacy Badger suspects a tracker is overstepping its bounds by tracking what you’re doing without your permission, the extension stops the advertiser in its tracks. It’s all based on the principle of user consent: If the advertiser breaks the rules, Privacy Badger cuts the cord.

Where to get it: Direct download https://www.eff.org/privacybadger

7. GPG

 

You may have heard of PGP (Pretty Good Privacy), an encryption program developed in the early ’90s to make email conversations more secure. It’s a bit outdated, though. The better option is GPG. The GNU Privacy Guard system allows you to encrypt and sign your data. Each party has a pair of “keys,” one public and one private. The sender, in this case, sends the email to the receiver’s public key, but this encrypted message can only be deciphered if the receiver enters his or her private key (that is known only to them) upon reception of the communication.

BONUS: Mashable explains Shellshock
What is Shellshock? | Mashable

 

The video above is a quick tutorial on using GPG with public key encryption to prevent the interception of your communication. The video tutorial was created by Snowden (that’s his jumbled voice you’re hearing) and sent to Greenwald before the NSA leaks.

Where to get it for Windows: Direct download http://www.gpg4win.org/

Where to get it for Mac: Direct download https://gpgtools.org/

Android, Apple Vulnerable To Hackers

FREAK security flaw Android, Apple using vulnerable to hackers
https://www.icpea.com/freak-security-flaw-android-apple-using-vulnerable-hackers-286569?utm_source=dlvr.it&utm_medium=gplus#prettyPhoto
#Freak #NSA – FREAK security flaw made Android, Apple users vulnerable to hackers – Many Apple and Android users had been left vulnerable to hackers for more than a decade due to a former U.S. government policy, according to cybersecurity researchers.

photo-Freak security flaw

Freak security flaw

The security flaw, called FREAK, made visitors to a multitude of websites — including U.S. government-managed Whitehouse.gov, NSA.gov and FBI.gov — susceptible to cyberattacks that break secure Internet connections, according to The Washington Post.

Thousands and thousands of websites had been vulnerable to attacks. Safari and the default Android browser — but not Chrome — are affected. FBI.gov and Whitehouse.gov have been repaired, but NSA.gov — somewhat ironically — remains vulnerable. Meanwhile, Apple and Google have been working on a fix for the FREAK flaw.

An Apple spokesperson told Mashable that a fix for iOS and OS X would be available through software updates next week. Google is is encouraging all websites to disable support for the export certificates, a spokesperson for the search giant said. The company has also “developed a patch to protect Android’s connection to sites that do expose export certs and that patch has been provided to partners.”

The flaw resulted from a former U.S. rule that was lifted in the 1990s but had a lingering impact. The rule forbid exporting products with strong encryption, according to the researchers who discovered the flaw. To make sure it wasn’t assisting strong cybersecurity in other countries, the U.S. shipped “export-grade” products abroad.

Readmore : FREAK security flaw made Android, Apple users vulnerable to hackers