Everyone is normal until you get to know them.
Dave Sim
Everyone is normal until you get to know them.
Dave Sim
Personality based interpretations of the “Priority to the right”-rule.
Type-B personality:
The “Priority to the right” rule means I should give way to vehicles approaching from the right at intersections.
Type-A personality:
The “Priority to the right” rule means I can run down people coming from the left at intersections.
😀
…which is much harder to do when it’s for real.
It’s not like there’s a rule book for… uh… dating (for instance)… or well I guess there are many but… you might as well bring a dice and do a Dice Man instead.
Anyway… don’t play games, real or imaginary, unless you know the rules.
Funny misreading of quote:
An increasing number of writers are being dragged, clicking and screaming in some cases, into the 21st century.
I know I click and scream sometimes 😀
Do you have an anti-virus program for your phone?
You may not think of it as such, but if you have one of the more modern Smart Phones out there (iPhone, Android) you’re carrying around a small computer with more capacity than a desktop or laptop computer with a few years under the belt.
The threat are definitely real. Hacking a phone would make it possible to read your e-mails, use the phone as a listening device and hear your conversations or make it call a high price number in Bahrain. What you see happening to phones on TV and movies are not really so far fetched – although it usually requires more than just being near the phone like the guys in Person of Interest, before it gets hacked.
Part from these basic actions cracked.com lists the following things that can be done with a hacked phone or how a phone can be hacked:
So, what to do?
However, think of the following:
I’ve been running Avast Anti-Virus, and Avast Anti-Theft. The anti-virus software scans applications I install (which, in a contrary of the popular depiction in TV series, is the most common way of infection). The anti-theft software makes it possible for me to locate or wipe the phone if it gets stolen (I have linked my phone up with Dropbox, so wiping it on theft is probably a smart thing to do).
Of course, part from having a good anti-virus software installed, you also need to follow a few rules:
If you’re a fan of the TV series Pretty Little Liars, where a mysterious person, or group of persons, called “A” seems to have a magic ability to know everything about the main characters and what they are doing in exact that moment. You might want to think “hacked phones” and “A” may not seem so mysterious anymore…
One can only hope this only happens in TV, but a few irresponsible app installs later you may be monitored by NSA/China/your jealous ex… Or… well… I think we’re monitored by those three entities regardless of a hacked phone, but you get my meaning!
Yes, it’s not easy. Of course it’s not easy. If it was easy we’d yawn and come up with something harder to do.
I work with installing and configuring software products. The following “documentation” on backup procedures for an imaginary software system called “Wolfram Idea Management” came to me in the half asleep/half awake stage just after waking up, but kind of before realizing it has happened.
And, no, I hope this has never happened for real! If there is a Wolfram Idea Management system out there, any likeness to that system is coincidental even if per chance the following document could have been ripped out of that software package’s manual pages – then any likenesses are still just coincidental. I’m just that good! (No I do not work with a system called Wolfram… Although the phrase “backing up concerned files” do come from work…)
Backing up concerned files
Important! Important! Important! Important! Important! Important! Important!
ONLY RUN THE PREPACKED BACKUP COMMAND IN WOLFRAM® WHEN BACKING UP FILES!
The command is named “calli-fuckyou-fornia-dream.exe“
For the long explanation read the below text.
Important! Important! Important! Important! Important! Important! Important!
Please! Please! Please! Read the whole document before you backup the system!
IT IS IMPERATIVE THAT YOU DO READ THE WHOLE DOCUMENT BEFORE YOU BACKUP THE SYSTEM!
Focus Cards can be used by people with high level of distraction and bad short term memory to quickly regain focus when they get distracted.
Since I’m a person with a pretty bad short term memory (due to Asperger, I think), and are pretty good at getting distracted (mostly due to ADHD), I’ve found, that part from my to-do-lists (in GTD-style), I need something to keep me focused while I am working on a task.
Nope! No apocalypse this year either 😀
(Image by Stéfan)