Against: Fascism, Trump, Putin, Q, libertarianism, postmodernism, woke-ism and Identity politics. For: Democracy, equalism, art, science, Enlightenment values and common-sense liberalism.
Tuesday, December 08, 2009
Update
I'm doing a full re-install. Actually, I took apart all the hardware and dusted everything. You know, this computerizin' stuff is hard.
10 comments:
Anonymous
said...
All the effort you're doing may make you feel better, but believe me it's not going to stop this. When you finally exhausted yourself and realize that there is something else involved, please connect with me and I'll explain what it is. You're not going to believe what is really happening and how huge it is!
Let me guess, Marty, it's your ex-wife and her goons in Joes computer... They shoved bales of Chicago CIA cocaine into his hard drive... don't you think Joe will find the coke?
Marty, aren't you worried about letting the cat out of the bag online, and then signing your name and location? If you're going to blow the whole thing wide open, don't you fear for your life?
I guess Joe can't hear what we're saying now. I still think he should get a Mac. Trying to get the bugs out of a PC is a truly Zen pursuit.
I keep getting flashes of the awesome scene at the end of the movie "The Conversation," where the guy is tearing his apartment down to find the hidden bug.
The results will certainly surprise everyone when it finally surfaces. It's much deeper than software issues and playing games here and there. For them it's strickly business and they have devised some very interesting technology to pull it off. Again this is beyong Electronic Store parts, it's much deeper and bigger than that.
Joe, if you're interested please feel invited to contact me.
Joe, I've decided to write a few posts describing what I did from researching and testing Intrusion over the years. My system of dealing with intrusion has worked out well for me. Please ask if there are any questions.
As of now, there are three posts. 1: Testing for Intrusion and setting up systems for maximum privacy. 2: Hardware Intrusion Explanation 3: Different Types of Intruders and Systems
Joe, after finishing my first post and counting the chracter amount, I was sure it would post. However your system repeatedly tells me I'm over your limit when I know I'm not. My best guess is this shows foul play. I'll try later as the first post is in two sections.
10 comments:
All the effort you're doing may make you feel better, but believe me it's not going to stop this. When you finally exhausted yourself and realize that there is something else involved, please connect with me and I'll explain what it is. You're not going to believe what is really happening and how huge it is!
Marty Didier
Northbrook, IL
Let me guess, Marty, it's your ex-wife and her goons in Joes computer... They shoved bales of Chicago CIA cocaine into his hard drive... don't you think Joe will find the coke?
Anon- thank you for the morning laugh.
Purenoiz
Marty, aren't you worried about letting the cat out of the bag online, and then signing your name and location? If you're going to blow the whole thing wide open, don't you fear for your life?
There was a time, say a half century ago, when some of us used to do similar with internal combustion engines.
We weren't burdened with a concern that our government had somehow messed with them, however.
I guess Joe can't hear what we're saying now. I still think he should get a Mac. Trying to get the bugs out of a PC is a truly Zen pursuit.
I keep getting flashes of the awesome scene at the end of the movie "The Conversation," where the guy is tearing his apartment down to find the hidden bug.
LMAO, Anon.:)
The results will certainly surprise everyone when it finally surfaces. It's much deeper than software issues and playing games here and there. For them it's strickly business and they have devised some very interesting technology to pull it off. Again this is beyong Electronic Store parts, it's much deeper and bigger than that.
Joe, if you're interested please feel invited to contact me.
Marty Didier
Northbrook, IL
Joe, I've decided to write a few posts describing what I did from researching and testing Intrusion over the years. My system of dealing with intrusion has worked out well for me. Please ask if there are any questions.
As of now, there are three posts.
1: Testing for Intrusion and setting up systems for maximum privacy.
2: Hardware Intrusion Explanation
3: Different Types of Intruders and Systems
Marty Didier
Northbrook, IL
Joe, after finishing my first post and counting the chracter amount, I was sure it would post. However your system repeatedly tells me I'm over your limit when I know I'm not. My best guess is this shows foul play. I'll try later as the first post is in two sections.
I may be tempted to email the post to you...
Marty Didier
Northbrook, IL
Post a Comment