Saturday, November 15, 2008
OPERATION CHRISTMAS CHILD, CHICK-FIL-A, NOVEMBER 22, BE THERE!
Montgomery & Prattville area Chick-Fil-A's are sponsoring a "Christmas drive", November 22nd, from 10-2 to collect donations for children for Christmas. Bring toys in a shoebox, and you get a free Chick-Fil-A sandwich, and hopefully not Gary's chicken, from Montgomery Unite forums, LOL...I have horrible visions of chickens after reading about that, but I know CHICK-FIL-A will help me get over those visions. Yum Chicken!
BARACK OBAMA WEBSITE, ABSOLUTELY BEAUTIFUL FAMILY PICTURES!!
www.barackobama.net
I hope that you enjoy the family pictures posted on Obama's site as much as I did! This is an excellent site to learn more about our President elect.
I hope that you enjoy the family pictures posted on Obama's site as much as I did! This is an excellent site to learn more about our President elect.
Thursday, November 13, 2008
SUPPORT OUR AMERICAN TROOPS
http://www.opgratitude.com/
This is an excellent site that was sent to me by a good friend. PLEASE VISIT IT and support our American troops. THEY NEED US...
This is an excellent site that was sent to me by a good friend. PLEASE VISIT IT and support our American troops. THEY NEED US...
Wednesday, November 12, 2008
CYBER BULLIES & CYBER STALKERS, "GET LOST IN SPACE"!!
This specific posting is dedicated to all of those victims who are being stalked online in political or other type FORUMS. I am still researching other material, but thought this would make an interesting post, for those of you who are TIRED of the stalking. WE NEED BETTER LEGISLATION.
"Cyberstalking Methods
Cyberstalkers have employed various methods of Internet communication to harass their victims. Although not exhaustive, the following list describes some of the methods that cyberstalkers may use:
• E-mail: A method of communication that allows an individual to transfer text, picture, video, and audio files to another person’s electronic mailbox. In using e-mail to harass, the cyberstalker creates a textbased, graphic-based, or audio-based message of a threatening, alarming, or otherwise harassing nature and sends it to the e-mail account of the intended victim.
• Newsgroups: A method of communication that amounts to an ongoing discussion about a particular topic.Internet users contribute to the ongoing discussion by posting their opinions, comments, or related experiences about a particular subject. These postings are linked together and can be retrieved by querying a database of newsgroup topics. Cyberstalkers can use these forums to post threatening or defamatory statements directed at a specific individual or group of individuals. In New York v. Munn (688 N.Y. S.2d 384; 1999), the court found the defendant guilty of aggravated harassment for posting a message to an Internet newsgroup that instructed people to kill police officers from the NYPD.
• Message boards/guest books: A method of communication similar to a newsgroup in that its contents amount to comments about a particular topic. Internet sites often have guest books where visitors can enter their names and make comments about the site. The visitor’s name and comments are subsequently available to be viewed by others visiting the Web site. A person who wants to threaten or harass the owner of a Web page easily can leave alarming messages in a guest book.
• Internet sites: A method of communication that involves posting information to a unique uniform resource locator (URL). Internet users later can retrieve this information by directing their Web browser to the corresponding URL. An Internet site becomes the method of harassment when a cyberstalker posts information on a Web page about an individual that causes them to become alarmed or frightened. For example, a cyberstalker could create an Internet site that advertises sexual services for hire and includes the victim’s picture, phone number, and address. Subsequently, the victim is bombarded with telephone calls or personal visits from individuals inquiring about the advertised sexual services.
• Chat rooms: A method of communication that enables real-time text, audio, and video-based group interaction. Chat rooms, or chat channels, usually are organized around specific topics of conversation. Topics include, but are not limited to, such issues as politics, religion, relationships, and sex. When communicating in a chat room, a participant’s messages are broadcast to everyone signed into the particular chat room. Several types of chat services have emerged since the development of the Internet. Chat services can be public or private. Public chat services are open to everyone with access to the Internet. For example, Internet relay chat (IRC) and I seek you (ICQ) chat are open to all Internet users. Both IRC and ICQ chat rooms have hundreds of chat channels that cover a diverse range of subjects and enable the transfer of files between active participants. Unlike public chat services, private services limit access to their chat channels and are hosted by specific on-line service providers. Chat rooms provide cyberstalkers with different options to harass their victims. A stalker can send alarming messages directly to the victim while conversing in a chat room. The message is delivered to the intended victim, as well as to all those users who currently are logged into the chat room. In addition, the cyberstalker can pose as the victim in a chat room and provide personal information to participants, thereby resulting in the intended victim being directly contacted in person, by e-mail, or by phone.
• Third-party instant messengers: A method of communication that enables real-time text, audio, and videobased interaction between two individuals over the Internet or a computer network. Users program their instant messenger software to notify them when designated individuals log on to the network. With instant messaging software, users have the ability to engage in real-time dialogue with a designated person as long as both parties are connected to the network. Stalkers with prior knowledge of a victim’s screen name can use an instant messenger to send harassing messages in real time when both parties are logged onto the Internet.
• Commercial service user profiles: A method of communication that involves posting descriptive information about oneself to the membership directory of a commercial Internet service. Service subscribers can query this directory so that they may find other members who share similar hobbies, interests, or backgrounds. People
"Cyberstalking is basically a state-of-the-art extension of the physical form of stalking. Cyberstalkers use electronic mediums such as the Internet and emails to pursue, harass, or contact another in an unsolicited fashion. They target victims using every technology at their disposal — online forums, bulletin boards, instant messengers, chat rooms, spyware, and spam."
The above quote was taken from this link:
http://criminal-law.freeadvice.com/criminal-law/cyberstalking.htm
Alber Gore worked hard towards eliminating CyberStalking. Here is a great link for those of you out there that are being followed by trolls.
QUOTE FROM AL GORE CONCERNING CYBER STALKING:
"Make no mistake: this kind of harassment can be as frightening and as real as being followed and watched in your neighborhood or
in your home."
Vice President Al Gore
http://www.usdoj.gov/criminal/cybercrime/cyberstalking.htm
"What Is Cyberstalking?
Although there is no universally accepted definition of cyberstalking, the term is used in this report to refer to the use of the Internet, e-mail, or other electronic communications devices to stalk another person. Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property. Most stalking laws require that the perpetrator make a credible threat of violence against the victim; others include threats against the victim's immediate family; and still others require only that the alleged stalker's course of conduct constitute an implied threat.(1) While some conduct involving annoying or menacing behavior might fall short of illegal stalking, such behavior may be a prelude to stalking and violence and should be treated seriously."
The following is quoted descriptions of cyberbullies taken from the following link:
http://www.us-cert.gov/cas/tips/ST06-005.html
"What is cyberbullying?Cyberbullying refers to the new, and growing, practice of using technology to harass, or bully, someone else. Bullies used to be restricted to methods such as physical intimidation, postal mail, or the telephone. Now, developments in electronic media offer forums such as email, instant messaging, web pages, and digital photos to add to the arsenal. Computers, cell phones, and PDAs are new tools that can be applied to an old practice.
Forms of cyberbullying can range in severity from cruel or embarrassing rumors to threats, harassment, or stalking. It can affect any age group; however, teenagers and young adults are common victims, and cyberbullying is a growing problem in schools.
Why has cyberbullying become such a problem?The relative anonymity of the internet is appealing for bullies because it enhances the intimidation and makes tracing the activity more difficult. Some bullies also find it easier to be more vicious because there is no personal contact. Unfortunately, the internet and email can also increase the visibility of the activity. Information or pictures posted online or forwarded in mass emails can reach a larger audience faster than more traditional methods, causing more damage to the victims. And because of the amount of personal information available online, bullies may be able to arbitrarily choose their victims.
Cyberbullying may also indicate a tendency toward more serious behavior. While bullying has always been an unfortunate reality, most bullies grow out of it. Cyberbullying has not existed long enough to have solid research, but there is evidence that it may be an early warning for more violent behavior."
"Cyberstalking Methods
Cyberstalkers have employed various methods of Internet communication to harass their victims. Although not exhaustive, the following list describes some of the methods that cyberstalkers may use:
• E-mail: A method of communication that allows an individual to transfer text, picture, video, and audio files to another person’s electronic mailbox. In using e-mail to harass, the cyberstalker creates a textbased, graphic-based, or audio-based message of a threatening, alarming, or otherwise harassing nature and sends it to the e-mail account of the intended victim.
• Newsgroups: A method of communication that amounts to an ongoing discussion about a particular topic.Internet users contribute to the ongoing discussion by posting their opinions, comments, or related experiences about a particular subject. These postings are linked together and can be retrieved by querying a database of newsgroup topics. Cyberstalkers can use these forums to post threatening or defamatory statements directed at a specific individual or group of individuals. In New York v. Munn (688 N.Y. S.2d 384; 1999), the court found the defendant guilty of aggravated harassment for posting a message to an Internet newsgroup that instructed people to kill police officers from the NYPD.
• Message boards/guest books: A method of communication similar to a newsgroup in that its contents amount to comments about a particular topic. Internet sites often have guest books where visitors can enter their names and make comments about the site. The visitor’s name and comments are subsequently available to be viewed by others visiting the Web site. A person who wants to threaten or harass the owner of a Web page easily can leave alarming messages in a guest book.
• Internet sites: A method of communication that involves posting information to a unique uniform resource locator (URL). Internet users later can retrieve this information by directing their Web browser to the corresponding URL. An Internet site becomes the method of harassment when a cyberstalker posts information on a Web page about an individual that causes them to become alarmed or frightened. For example, a cyberstalker could create an Internet site that advertises sexual services for hire and includes the victim’s picture, phone number, and address. Subsequently, the victim is bombarded with telephone calls or personal visits from individuals inquiring about the advertised sexual services.
• Chat rooms: A method of communication that enables real-time text, audio, and video-based group interaction. Chat rooms, or chat channels, usually are organized around specific topics of conversation. Topics include, but are not limited to, such issues as politics, religion, relationships, and sex. When communicating in a chat room, a participant’s messages are broadcast to everyone signed into the particular chat room. Several types of chat services have emerged since the development of the Internet. Chat services can be public or private. Public chat services are open to everyone with access to the Internet. For example, Internet relay chat (IRC) and I seek you (ICQ) chat are open to all Internet users. Both IRC and ICQ chat rooms have hundreds of chat channels that cover a diverse range of subjects and enable the transfer of files between active participants. Unlike public chat services, private services limit access to their chat channels and are hosted by specific on-line service providers. Chat rooms provide cyberstalkers with different options to harass their victims. A stalker can send alarming messages directly to the victim while conversing in a chat room. The message is delivered to the intended victim, as well as to all those users who currently are logged into the chat room. In addition, the cyberstalker can pose as the victim in a chat room and provide personal information to participants, thereby resulting in the intended victim being directly contacted in person, by e-mail, or by phone.
• Third-party instant messengers: A method of communication that enables real-time text, audio, and videobased interaction between two individuals over the Internet or a computer network. Users program their instant messenger software to notify them when designated individuals log on to the network. With instant messaging software, users have the ability to engage in real-time dialogue with a designated person as long as both parties are connected to the network. Stalkers with prior knowledge of a victim’s screen name can use an instant messenger to send harassing messages in real time when both parties are logged onto the Internet.
• Commercial service user profiles: A method of communication that involves posting descriptive information about oneself to the membership directory of a commercial Internet service. Service subscribers can query this directory so that they may find other members who share similar hobbies, interests, or backgrounds. People
"Cyberstalking is basically a state-of-the-art extension of the physical form of stalking. Cyberstalkers use electronic mediums such as the Internet and emails to pursue, harass, or contact another in an unsolicited fashion. They target victims using every technology at their disposal — online forums, bulletin boards, instant messengers, chat rooms, spyware, and spam."
The above quote was taken from this link:
http://criminal-law.freeadvice.com/criminal-law/cyberstalking.htm
Alber Gore worked hard towards eliminating CyberStalking. Here is a great link for those of you out there that are being followed by trolls.
QUOTE FROM AL GORE CONCERNING CYBER STALKING:
"Make no mistake: this kind of harassment can be as frightening and as real as being followed and watched in your neighborhood or
in your home."
Vice President Al Gore
http://www.usdoj.gov/criminal/cybercrime/cyberstalking.htm
"What Is Cyberstalking?
Although there is no universally accepted definition of cyberstalking, the term is used in this report to refer to the use of the Internet, e-mail, or other electronic communications devices to stalk another person. Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property. Most stalking laws require that the perpetrator make a credible threat of violence against the victim; others include threats against the victim's immediate family; and still others require only that the alleged stalker's course of conduct constitute an implied threat.(1) While some conduct involving annoying or menacing behavior might fall short of illegal stalking, such behavior may be a prelude to stalking and violence and should be treated seriously."
The following is quoted descriptions of cyberbullies taken from the following link:
http://www.us-cert.gov/cas/tips/ST06-005.html
"What is cyberbullying?Cyberbullying refers to the new, and growing, practice of using technology to harass, or bully, someone else. Bullies used to be restricted to methods such as physical intimidation, postal mail, or the telephone. Now, developments in electronic media offer forums such as email, instant messaging, web pages, and digital photos to add to the arsenal. Computers, cell phones, and PDAs are new tools that can be applied to an old practice.
Forms of cyberbullying can range in severity from cruel or embarrassing rumors to threats, harassment, or stalking. It can affect any age group; however, teenagers and young adults are common victims, and cyberbullying is a growing problem in schools.
Why has cyberbullying become such a problem?The relative anonymity of the internet is appealing for bullies because it enhances the intimidation and makes tracing the activity more difficult. Some bullies also find it easier to be more vicious because there is no personal contact. Unfortunately, the internet and email can also increase the visibility of the activity. Information or pictures posted online or forwarded in mass emails can reach a larger audience faster than more traditional methods, causing more damage to the victims. And because of the amount of personal information available online, bullies may be able to arbitrarily choose their victims.
Cyberbullying may also indicate a tendency toward more serious behavior. While bullying has always been an unfortunate reality, most bullies grow out of it. Cyberbullying has not existed long enough to have solid research, but there is evidence that it may be an early warning for more violent behavior."
Monday, November 10, 2008
MY REASONS FOR VOTING FOR BARACK OBAMA
I had seriously considered Huckabee to begin with. I also considered Ron Paul. I visited his website and was astonished at his delivery of over 4000 babies. That was something! I know delivering babies doesn't qualify you for President, but it was an interesting tidbit, otherwise :) With Huckabee, we would have gotten Walker Texas Ranger in the White House as a presidential aide, and Walker (Chuck Norris) can kick some serious butt! I also felt that Huckabee could move us forward, but it wasn't in the cards for him this time around. I also like the fact that Huckabee is a minister. MAYBE NEXT TIME! I considered all of the candidates before I made the decision to vote for Barack Obama. I considered that Barack had both white and black ancestry, and I felt that he could be a common denominator for both whites and blacks. He could be the thread to bring unity, where all else failed. I didn't vote for Barack because he was black, nor did I vote for Barack because he said he could bring change. EVERYONE SAYS THEY WANT CHANGE! I didn't vote for Barack to make history. I voted for Barack because I felt he was the best candidate to move us forward with the economic crisis. I also voted for Barack, because God forbid, if something were to happen to him in the presidency, and he would be disabled to carry out his term, then I felt confident with Joe Biden to be able to step in. I COULD NOT see Sarah Palin leading the nation, although she is a powerful and strong woman. She might be strong enough and knowledgeable enough to lead in 4 more years, but not this year. She was a little rough on the edges. Hillary was also a choice of mine, but like Huckabee, it wasn't in the cards for her either. I believe that Hillary had the knowledge and experience (with her husband serving 2 terms as a former president) to serve our country as President. She could have gotten some excellent advice from Bill as to foreign policy, economics, military decisions, etc. HOWEVER, NO MATTER WHO I CONSIDERED, Barack Obama is our PRESIDENT ELECT. I voted for him, I'm proud to say that, and I'm looking forward not backward. I have hope for America now. GOD BLESS BARACK OBAMA AND GOD BLESS AMERICA!!
GOING TO TAKE MORE THAN JUST LITTLE OLE ME TO WORK TO STRENGTHEN AMERICA
Please get involved in some sort of political activism or public work to move America forward. I strive hard, taking my time out, to find interesting articles to post here, and to alert you to up to date political news. If you have anything of interest for my readers to know, please post, or you can contact me at murphree4psc@yahoo.com
I feel it is ALL AMERICANS' duty to work towards a common goal of bettering ourselves and making America all that it can be. We live in the greatest country on earth and I believe it is a privilege to be an American.
I feel it is ALL AMERICANS' duty to work towards a common goal of bettering ourselves and making America all that it can be. We live in the greatest country on earth and I believe it is a privilege to be an American.
BARACK OBAMA & JOE BIDEN'S "TRANSITION" WEBSITE
Write to President Elect, Barack Obama, and Vice President Elect, Joe Biden, and TELL THEM YOUR VISION FOR AMERICA!! This site also takes info on other things such as media, jobs, etc.
http://change.gov/page/s/yourvision
http://change.gov/page/s/yourvision
Sunday, November 9, 2008
ELOQUENT "CHOICE WORDS" FROM SARAH PALIN
QUOTE FROM NEW YORK TIMES, shows Governor Sarah Palin has had a change of heart about Barack Obama. Apparently he is an "ok" guy now.
“Barack Obama has been elected president,” Ms. Palin said. “Let us, let us — let him — be able to kind of savor this moment, one, and not let the pettiness of maybe internal workings of the campaign erode any of the recognition of this historic moment that we’re in. And God bless Barack Obama and his beautiful family.”
Great Sarah! Maybe with the help of you and others pulling together, Obama's tenure as President will be a successful one for all Americans.
http://www.nytimes.com/2008/11/09/us/politics/09memo.html?_r=2&partner=rssuserland&emc=rss&oref=slogin&oref=slogin
“Barack Obama has been elected president,” Ms. Palin said. “Let us, let us — let him — be able to kind of savor this moment, one, and not let the pettiness of maybe internal workings of the campaign erode any of the recognition of this historic moment that we’re in. And God bless Barack Obama and his beautiful family.”
Great Sarah! Maybe with the help of you and others pulling together, Obama's tenure as President will be a successful one for all Americans.
http://www.nytimes.com/2008/11/09/us/politics/09memo.html?_r=2&partner=rssuserland&emc=rss&oref=slogin&oref=slogin
Subscribe to:
Posts (Atom)