Jump to content

CharmedOne

Members
  • Posts

    115
  • Joined

  • Last visited

Posts posted by CharmedOne

  1. Friends,

    Here it comes: After months of secret negotiations with the players who pushed SOPA, the major Internet Service Providers on the verge of implementing their "Six Strikes" plan to fight "online infringement". With essentially no due process, AT&T, Cablevision Systems, Comcast, Time Warner Cable and Verizon will get on your case if you're accused of violating intellectual property rights -- and eventually even interfere with your ability to access the Internet. (You can contest accusations -- if you fork over $35.)

     

    Click here to tell the ISPs to back down -- or that you'll look to take your business elsewhere:

    http://act.demandprogress.org/letter/six_strikes/#1?referring_akid=a8171963.2302156.2lfzRJ&source=auto-taf

    After the first few supposed violations, they'll alert you that your connection was engaging in behavior that they -- the giant corporations that provide your Internet service -- deem inappropriate.

    And then it gets really dicey: They can make it difficult for you to access the web, or start throttling down your connection.

    Click here to tell the ISPs to back down -- and put them on notice:

    http://act.demandprogress.org/letter/six_strikes/#1?referring_akid=a8171963.2302156.2lfzRJ&source=auto-taf

     

    From Wired:

    After four alerts, according to the program, “mitigation measures” may commence. They include “temporary reductions of Internet speeds, redirection to a landing page until the subscriber contacts the ISP to discuss the matter or reviews and responds to some educational information about copyright, or other measures (as specified in published policies) that the ISP may deem necessary to help resolve the matter.”

    That's right: These mega-corporations now claim the authority to undermine your Internet access -- and want to serve as judge, jury, and executioner. Tell them to back off -- or that you'll start looking for other places to bring your business.

    Just click here to tell the ISPs to back down:

    http://act.demandprogress.org/letter/six_strikes/#1?referring_akid=a8171963.2302156.2lfzRJ&source=auto-taf

  2. The CIA has formed a WTF unit to deal with any fallout from the WikiLeaks disclosures.

    The CIA has launched a taskforce to assess the impact of 250,000 leaked US diplomatic cables. Its name? WikiLeaks Task Force, or WTF for short.

     

    The group will scour the released documents to survey damage caused by the disclosures. One of the most embarrassing revelations was that the US state department had drawn up a list of information it would like on key UN figures it later emerged the CIA had asked for the information.

     

    "Officially, the panel is called the WikiLeaks Task Force. But at CIA headquarters, it's mainly known by its all-too-apt acronym: WTF," the Washington Post reported.

     

    WTF is more commonly associated with the Facebook and Twitter profiles of teenagers than secret agency committees. Given that its expanded version is usually an expression of extreme disbelief, perhaps the term is apt for the CIA's investigation.

     

    Earlier this month the Guardian revealed that the CIA was responsible for drafting the data "wishlist" that the US state department wanted on UN secretary general, Ban Ki-moon, and other senior members of the organisation. The Washington Post said the panel was being led by the CIA's counterintelligence centre, although it has drawn in two dozen members from departments across the agency.

     

    Although the CIA has featured in some WikiLeaks disclosures, relatively little of its own information has entered the ether, the paper reported. A recently retired former high-ranking CIA official told the Post this was because the agency "has not capitulated to this business of making everything available to outsiders.

     

    "They don't even make everything available to insiders. And by and large the system has worked," he said.

     

    While most of the agency's correspondence is understood to be classified at the same "secret" level as the leaked cables that ended up online, it is understood the CIA uses systems different from those of other government agencies.

     

  3. Again another goverment wants to regulate the internet, tho they have a good reason in the UK to regulate the internet I find it stupid to block porn from people in the UK because half the of newspapers like in germany for instance has nudity in the news papers. Heres the story.

     

    The UK government has plans to ask ISPs to block all pornography from home Internet connections by default, in order to ensure that children are not accidentally exposed to sex while using the Internet. Under the plan, customers would have to ask their ISP for access to pornography. Homeowners would either specify which adult sites they want to be able to view, or pick a classification for their connection to restrict what is received according to age ranges, such as U, 12, or 18.

    The UK's largest ISPs, including BT, Virgin Media, and TalkTalk, will be called to a meeting next month to discuss the idea. Instead of using parental controls to stop access to pornography by opting out, the goal is to kill off access to pornography in the first place, and then allow adults to opt in. Most British ISPs prevent users from inadvertently viewing child porn websites but ministers want companies to use the technology to block pornography sites unless people specifically ask to view them.

     

    "Unless we show leadership, the internet industry is not going to self-regulate," Claire Perry, a British Conservative Party politician and the Member of Parliament for Devizes, said in a statement according to The Sunday Times. "The minister has said he will get the ISPs together and say, 'Either you clean out your stables or we are going to do it for you'. There is this very uneasy sense for parents of children that we do not have to tolerate this Wild West approach. We are not coming at this from an anti-porn perspective. We just want to make sure our children aren't stumbling across things we don't want them to see."

     

    The government is pushing for this despite the fact that Internet Services Providers' Association in the UK has found that such a complete block would be expensive and technically difficult. Frankly we think the argument should still be around how effective it would be if it were implemented in the first place

     

  4. Looks like Glenn Beck was right in my last post I made about internet regulation & on top of that phone apps will be regulated to. Heres the story about the FCC.

     

    The US Federal Communications Commission (FCC) has voted to move toward giving itself the authority to regulate the transmission component of broadband Internet service.

     

    The FCC wants to re-establish its authority after a US federal appeals court found in April that the regulator had exceeded its authority in asking cable network provider Comcast to stop throttling BitTorrent peer-to-peer file-sharing traffic.

     

    Google, Amazon and other content providers have been pushing for net neutrality regulations that will prevent telecoms firms from favouring or discriminating against certain types of content.

     

    The FCC argues that the additional power is central to expanding the availability of broadband in the US, according to the New York Times.

     

    But first, the FCC must get public comment on its proposal to reclassify broadband as a telecommunications service to make it subject to stricter regulation.

     

    The FCC has promised that if it wins approval for the reclassification, it will apply only regulations necessary to implement a universal, competitive service and protect consumers.

     

    But opponents say the reclassification will give the FCC the power to regulate rates charged to consumers by broadband service providers.

     

    The FCC is to seek public comment on whether to opt for keeping regulation as it is, imposing a full telecommunications regulatory regime, or applying limited regulation.

     

    The FCC is pushing for the third option as a middle path between excessive regulation and a lack of protection for competition and consumers.

     

    The Open Internet Coalition has come out in support of greater regulation and said the move would ensure that consumer choice and innovation on the broadband internet will receive the protections it requires.

     

    But AT&T has slammed the FCC proposal, saying it creates investment uncertainty and could cost jobs.

     

  5. Dutch police said they have arrested a 16-year-old boy for participating in web attacks against MasterCard and Visa as part of a grassroots push to support WikiLeaks.

     

    A press release issued on Thursday (Google translation here) said the unnamed boy confessed to the distributed denial-of-service attacks after his computer gear was seized.

     

     

    He was arrested in The Hague, and is scheduled to be arraigned before a judge in Rotterdam on Friday. It is the first known report of an arrest in the ongoing attacks, which started earlier this week.

     

    The arrest came shortly after anonops.net, a Netherlands-hosted website used to coordinate attacks against companies perceived as harming WikiLeaks, was taken offline. A Panda Security researcher said the website was itself the victim of DDoS attacks, but the investigation by the Dutch High Tech Crime Team has also involved “digital data carriers,” according to the release.

     

    It didn't specify the crimes the boy was charged with or say exactly what his involvement in the attacks was.

     

    According to researchers, the Low Orbit Ion Cannon tool, which thousands of WikiLeaks sympathizers are using to unleash the DDoS attacks, takes no steps to conceal their IP addresses. It wouldn't be surprising if attackers who used the application from internet connections at their home or work also receive a call from local law enforcement agencies.

     

  6. Some things on dialog editor I have never messed with & when you click check box & add it to the dialog & make it a push button I dont use the same thing for a push button like so?

     

    on *:dialog:DIALOGNAME:sclick:11:{
      if ($did(11).state == 0) { /disable #yadayada }
      elseif ($did(11).state == 1) { /enable #yadayada }
    }
    

    Or can I make them work the same way I do standard buttons & also in the properties part after making it a push button what does 3 State mean or do?

  7. Maybe error i jumped to quick about buzzen staff not doing much to stop cyber bullying if so i am sorry, as a chatter I cannot see whats going on with what staff does, but i do see what is not being done. I am sure you all work your butts off to keep server going, it is just frustrating to see people in buzzen ran rooms picking on others who did nothing to them. Heres more info on cyberbullying.

     

    What is Cyberbullying?

    Cyberbullying is any harassment that occurs via the Internet. Vicious forum posts, name calling in chat rooms, posting fake profiles on web sites, and mean or cruel email messages are all ways of cyberbullying.

     

     

     

    Examples of Cyberbullying

    A person is bombarded by anonymous threatening and taunting emails at home, even though there is no direct harassment in public. The victim has no idea who is sending the messages and starts to feel like everybody is against them. That person is being cyberbullied.

    A message board is spammed with name-calling posts that spread vicious rumors about a specific person. The rumors aren’t true but people see the posts and believe them. That person is then ostracized by peers. This person is the victim of cyberbullying.

    A nasty fake profile is posted at a social networking site using a person’s real name, photo, and contact information. That person starts getting weird email messages from strangers who think the profile is real. Some of the messages are crude. Some of the messages are mean. This is another example of cyberbullying.

    These are just a few examples of cyberbullying. If you are taking part in things like this it is not harmless fun. You are being a cyberbully. If you are the victim of this type of treatment you are being cyberbullied and there are things you can do to stop the harassment.

     

     

     

    Why Do People Cyberbully?

    Bullying has been around forever but cyberbullying is different because it lets a bully remain anonymous. It is easier to bully in cyberspace than it is to bully face to face. With cyberbullying a bully can pick on people with much less risk of being caught.

    Bullies are natural instigators and in cyberspace bullies can enlist the participation of other students who may be unwilling to bully in the real world. Kids who stand around doing nothing in a real life bullying incident often become active participants in online harassment.

    The detachment afforded by cyberspace makes bullies out of people who would never become involved in a real life incident. The Internet makes bullying more convenient and since the victim’s reaction remains unseen people who wouldn’t normally bully don’t take it as seriously.

     

  8. should all be changed to dll\mdx.dll providing it is in dll\ folder. I do not even see an "alias mdx { .. }"

     

    alias rebar { return dll/rebar.dll }

    should be reduced to one only.

     

    ....

     

    going back to what Dan said, maybe you should get rid of SB2 and SB3 first.. and only try to make SB1 work first. If you correct these errors, I can actually attempt to run the code.

     

     

    You do not see the alias for mdx because it is in my aliases in scripts editor like so.

    mdx { return $shortfn($mircdirdll\mdx.dll) }
    mdx.view { return $shortfn($mircdirdll\views.mdx)  }
    mdx.bars { return $shortfn($mircdirdll\bars.mdx)  }
    mdx.gen { return $shortfn($mircdirdll\CTL_GEN.MDX) }
    mdx.dialog { return $shortfn($mircdirdll\dialog.mdx) }
    nHTMLn_2.95 { return ($mircdirdll\nHTMLn_2.95.dll }
    

    I origionally did have just the left side bar alone works perfect, also if I removed the

    } 
    dialog sidebar1 {

    bracket mismatches the dialog quits working & dosent dock, i have tried many times to make it work without the mismatches & some reason side bars stop working so i just left them.

  9. Its better not to use those long pipes and breaks.. for example:

     

    on *:START: { 
      /dialog -m switchbar2 switchbar2 | /dialog -m sidebar1 sidebar1 | /dialog -m sidebar4 sidebar4 | .splay start.mp3 
    }

    Can be done better this way..

     

    on *:START: { 
      dialog -m switchbar2 switchbar2
      dialog -m sidebar1 sidebar1
      dialog -m sidebar4 sidebar4
      splay start.mp3 
    }

     

     

     

    Ok ty DJ i didnt know that using pipes & breaks was bad. :pizza:

  10. Sylvester Stallone broke his neck while filming a fight scene in his latest movie.

     

    The veteran action hero had emergency surgery and a metal plate inserted in his neck following the accident on the set of The Expendables.

    The 63-year-old actor was filming a fight with wrestling co-star Stone Cold Steve Austin, 45, in the upcoming movie, but it was so realistic that Stallone ended up with a hairline fracture in his neck

     

     

    Stallone told FHM magazine: 'Man, it was seven guys, kicking each other's ass, one guy tougher than the next. No joke, our stunt guys were begging for mercy.

    'Actually, my fight with Stone Cold Steve Austin was so vicious that I ended up getting a hairline fracture in my neck. I'm not joking.

     

    'I haven't told anyone this, but I had to have a very serious operation afterwards. I now have a metal plate in my neck.'

    The plot of the film centres around a team of mercenaries who head to South America on a mission to overthrow a dictator.

    The movie features a who's who of veteran action actors including Arnold Schwarzenegger, 62, Bruce Willis, 54, Dolph Lundgren, 52, Mickey Rourke, 57, Jet Li, 46, as well as relative youngster Jason Statham, 37.

    It also stars Brittany Murphy, who died in December of a heart attack.

    Stallone, who wrote the

     

    He said: 'Bruce's character, who hires me to do the job the film's based on, turns to me and says, "Look, there's one person I need to talk with before I give you the job."

     

    'At which point Arnold, who plays my oldest rival, walks out.

     

    'And it's clear we have a lot of history there. So I tell him I should have shot him a long time ago when I had the chance.

    'And the scene goes from there. But man, those guys were up for it.

     

    'They got out of bed at 5.30am just to shoot a small five-minute scene.'

    It is not the first time the actor has been hurt during filming. He was also badly hurt by Dolph Lundgren when he filmed Rocky IV.

     

    He said: 'Dolph and I always went for it. I gave him orders to try to knock me out while the cameras were rolling. At one point, he hit me so hard on the head I felt my spine compress.

    'He then hit me with an almighty uppercut. That night my chest started to swell, and I had to be helicopter-ambulanced from my hotel to a nearby emergency room.

    'I was told that Dolph had punched my rib cage into my chest, compressing my heart. If it had swollen any more, I would have died.

     

    'After that, I was like, "Dolph, it's only a movie, bro."'

    Stallone recently revealed that he and Arnold Schwarzenegger, once huge rivals, are now the best of friends.

    'He's my best friend now. It's strange, given what big rivals we used to be. He's still ridiculously competitive, though. See this watch?

    'This is the only one of its kind in the world, so I wore it to our last lunch. Arnold was desperate for me to get him one but I had to explain that wasn't possible. He was so mad!'

     

     

     

     

  11. Ok ty or your suggestions tho i never really messed with DCX just MDX & have a tough time with that as far as using 1 dialog structure, and hiding specific dialog controls id have to see something done like that so i can study how it was done & reproduce same effect with my own dialog. But the suggestions do sound awsome.

  12. The thing is I dont get any errors but when I try to get them to dock after clicking next or back each one docks differently which to me is wierd cause i am sure the codes right I attached a small video with this to see docking problem :lolwave: with a title :lolwave: .

     

    I amready know about the bracket mismatch but i remove it dialog stops working so i leave it, i dont think thats the problem.

     

    on *:START: {
      /dialog -m switchbar2 switchbar2 | /dialog -m sidebar1 sidebar1 | /dialog -m sidebar4 sidebar4 | .splay start.mp3
    }
    
    
    
    ;;;;;;;;;;;;;;;;;;;;;;;;;;;;SWITCH BAR 1;;;;;;;;;;;;;;;;;;;;;;;;;;;;
    
    
    :/dialog -m sidebar1 sidebar1
    }
    dialog sidebar1 {
    alias sb1 { dialog -m sidebar1 sidebar1 }
    alias csb1 { dll $rebar UnDock left | dialog -x sidebar1 sidebar1 }
    alias rebar { return dll/rebar.dll }
    dialog sidebar1 {
      title "sidebar1"
      size 0 0 188 776
      option pixels
      icon 77, 0 0 188 800, $mircdirimages\leftbar.jpg, 0
      text "", 1, 51 23 87 16, center
      button "<< Back", 2, 22 531 67 25, disable
      button "Next >>", 3, 92 531 67 25
      text "Script Options", 4, 54 510 77 16, center
    }
    on *:dialog:sidebar1:sclick:*:{
      if ($did == 3) { /dialog -m sidebar2 sidebar2 | /dialog -x sidebar1 sidebar1 }
    }
    
    on *:dialog:sidebar1:init:*: { 
      dll $mdx SetMircVersion $version 
      dll $mdx MarkDialog $dname
      dll dll\mdx.dll SetBorderStyle 1 staticedge  14 50 Georgia Bold
      dll $mdx SetMircVersion $version
      dll $mdx MarkDialog $dname
      dll dll\mdx.dll SetColor $dname 1 text $rgb(%list1colour,%list2colour,%list3colour)
      dll $mdx SetFont $dname 1 40 Georgia Bold
      mdx SetFont 1 +a 12 100 Verdana
    
      dll $rebar Dock $dialog($dname).hwnd > left | /splay zip.wav  
      did -a sidebar1 1 $time(h:nn:ss tt)
    
      colorize
    
      .timerNOW 0 1 timer.now
    }
    
    ;Aliases
    alias mdx_fullpath { return $+(",$mircdir\dll/mdx.dll,") }
    alias mdxinit { dll $mdx_fullpath SetMircVersion $version | dll $mdx_fullpath MarkDialog $dname }
    alias -l timer.now {
      if ($dialog(sidebar1)) { did -ra sidebar1 1 $time(h:nn:ss tt) }
      else .timerNOW  OFF
    }
    alias SideBarRFH {
      did -a sidebar1 1 $time(h:nn:ss tt)
      .timerNOW 0 1 timer.now
    }
    
    alias colorize {
      var %x 1
      :lp
      dll $mdx SetDialog $dname bgcolor $rgb(0,0,0)
      dll $mdx SetColor $dname %x background $rgb(0,0,0)
      dll $mdx SetColor $dname %x text $rgb(255,255,255)
      dll $mdx SetColor $dname %x textbg $rgb(0,0,0)
      inc %x
      if (%x == 100) { goto nd }
      else { goto lp }
      :nd
    }
    
    
    ;--------------------------------------------------------------------------------------------------------------
    
    :/dialog -m sidebar2 sidebar2
    }
    dialog sidebar2 {
    alias sb2 { dialog -m sidebar2 sidebar2 }
    alias csb2 { dll $rebar UnDock left | dialog -x sidebar2 sidebar2 }
    alias rebar { return dll/rebar.dll }
    dialog sidebar2 {
      title "sidebar2"
      size 0 0 188 776
      option pixels
      icon 77, 0 0 188 800, $mircdirimages\leftbar2.jpg, 0
      button "<< Back", 2, 22 531 67 25
      button "Next >>", 3, 92 531 67 25
      text "Script Options", 4, 54 510 77 16, center
    }
    on *:dialog:sidebar2:sclick:*:{
      if ($did == 2) { /dialog -m sidebar1 sidebar1 | /dialog -x sidebar2 sidebar2 }
      if ($did == 3) { /dialog -m sidebar3 sidebar3 | /dialog -m sidebarx sidebarx }
    }
    
    on *:dialog:sidebar2:init:*: { 
      dll $mdx SetMircVersion $version 
      dll $mdx MarkDialog $dname
      dll dll\mdx.dll SetBorderStyle 1 staticedge  14 50 Georgia Bold
      dll $mdx SetMircVersion $version
      dll $mdx MarkDialog $dname
      dll dll\mdx.dll SetColor $dname 1 text $rgb(%list1colour,%list2colour,%list3colour)
      dll $mdx SetFont $dname 1 40 Georgia Bold
      mdx SetFont 1 +a 12 100 Verdana
    
      dll $rebar Dock $dialog($dname).hwnd > left | /splay zip.wav  
    
      colorize
    }
    
    ;--------------------------------------------------------------------------------------------------------------
    
    :/dialog -m sidebar3 sidebar3
    }
    dialog sidebar3 {
    alias sb3 { dialog -m sidebar3 sidebar3 }
    alias csb3 { dll $rebar UnDock left | dialog -x sidebar2 sidebar2 }
    alias rebar { return dll/rebar.dll }
    dialog sidebar3 {
      title "sidebar3"
      size 0 0 188 776
      option pixels
      icon 77, 0 0 188 800, $mircdirimages\leftbar2.jpg, 0
      button "<< Back", 2, 22 531 67 25
      button "Next >>", 3, 92 531 67 25, disable
      text "Script Options", 4, 54 510 77 16, center
    }
    on *:dialog:sidebar3:sclick:*:{
      if ($did == 2) { /dialog -x sidebar3 sidebar3 | /dialog -m sidebar2 sidebar2 }
    }
    
    on *:dialog:sidebar3:init:*: { 
      dll $mdx SetMircVersion $version 
      dll $mdx MarkDialog $dname
      dll dll\mdx.dll SetBorderStyle 1 staticedge  14 50 Georgia Bold
      dll $mdx SetMircVersion $version
      dll $mdx MarkDialog $dname
      dll dll\mdx.dll SetColor $dname 1 text $rgb(%list1colour,%list2colour,%list3colour)
      dll $mdx SetFont $dname 1 40 Georgia Bold
      mdx SetFont 1 +a 12 100 Verdana
    
      dll $rebar Dock $dialog($dname).hwnd > left | /splay zip.wav  
    
      colorize
    }
    

    Movie_0001.wmv

  13. I would have to see this in action I guess before really understanding what you want to do! Sounds like a simple halt on an if gate equals the nick in the msg the room part which would have to be pulled from a list of gates associated with the nick, I could be wrong, Ive never had a need to bother with such prot myself lol...

     

     

    Well error & chain seen it in action lastnight & what made me come jup with this idea, i noticed flooders with same nick & different gate numbers sooooo this is what i came up with to stop them.

  14. Explain that better plz lol.. not sure what you mean by "everytime"?

     

    Ok what this protection does is if the same nick enters the room under different gate numbers it is set to message the room who the flooder is, i plan on fixing it to kick, but it tells you the same nick & all the gates & floods the room with text, i only wanted it to say who the flooder is one time not on every gate that enters room with the same nick. :pizza:

  15. Ok my code works thats not the problem, i was wanting it to say $nick is a clone flooder! just one time not everytime can someone help fix it pls ty. :pizza:

     

    on @*:JOIN:#: { 
      hinc -mu5 cloneflood $nick 
      if ($hget(cloneflood,$nick) >= 2) { 
        var %x = 1 | while ($ialchan(*,#,%x).user) { 
          if ($ifmatch != $ial($me).user) { 
            msg # $ifmatch Hey $nick is clone flooder! 
          } 
          inc %x 
        } 
      } 
    }
    
  16. The serial bully

    How to spot signs and symptoms of serial bullies, sociopaths and psychopaths

    including the sociopathic behaviour of the industrial psychopath and the corporate psychopath

     

    The Attention-Seeker

     

    Motivation-: to be the centre of attention

    Mindset-: control freak, manipulation, narcissism

    Malice-: medium to high; when held accountable, very high

     

    1.) emotionally immature

    2.) selectively friendly - is sickly sweet to some people, rude and offhand to others, and ignores the rest

    3.) is cold and aggressive towards anyone who sees them for what they really are or exposes their strategies for gaining attention

    4.) overfriendly with their new target, especially in the initial stages of a new working relationship

    5.) overhelpful, ditto

    6.) overgenerous, ditto

    7.) manipulative of people's perceptions, but in an amateur and childish manner

    8.) manipulative with guilt, ditto

    9.) sycophantic, fawning, toadying

    10.) uses flattery to keep a person in authority on side

    11.) everything is a drama, usually a poor-me drama

    12.) prefers not to solve problems in own life so that they can be used and re-used for gaining sympathy and attention

    13.) capitalises on issues and uses them as a soapbox for gaining attention

    14.) exploits others' suffering and grief as a vehicle for gaining attention

    15.) misappropriates others' statements, eg anything which can be misconstrued as politically incorrect, for control and attention-seeking

    16.) excusitis, makes excuses for everything

    17.) shows a lot of indignation, especially when challenged

    18.)lots of self-pity

    19.)demanding of others

    20.)easily provoked

    21.)feigns victimhood when held accountable, usually by bursting into tears or claiming they're the one being bullied and harassed

     

     

    --------------------------------------------------------------------------------------------------------------------------------

     

     

    The Wannabe

    Motivation-: craves respect for being competent and professional despite lacking in competence and professionalism

    Mindset-: deceptive

    Malice-: low to medium; when held accountable, medium to high

     

    1.) similar to the attention-seeker

    2.) is one of life's chronic underperformers and is best described as ineffectual in everything

    3.) craves undeserved respect and attention and will go to considerable lengths to acquire them

    4.) hangs around the fringes of a profession

    5.) not professionally qualified but claims they are a professional because they sit next to a professional or work alongside or near or in the midst of professionals, or provide services to professionals

    6.) lacks the ability, competence and professionalism to be a qualified professional

    7.) wants so much to be seen as competent professional person but is unable and unwilling to put in the work to achieve this

    8.) is unable and unwilling to apply knowledge gained from experience but instead devotes time and effort to improving skills of deception, manipulation, false claim, denial and projection

    9.) may have been rejected by their chosen profession for lack of competence

    10.) is spiteful towards and despises anyone who is qualified in the profession from which the bully has been excluded by virtue of lack of competence

    11.) is likely to be vilifying the profession they want to belong to or which they're claiming to be part of or which they are claiming to represent

    12.) displays a deep-seated envy and jealousy of the professionals that he or she works alongside or claims to serve

    13.) harbours a bitter resentment, grudge, distaste and contempt for the professionals that he or she works alongside or claims to serve

    14.) is likely to be criticising, condemning, disadvantaging and causing detriment to the professionals he or she works alongside or claims to serve

    15.) may seek positions of power over the professionals he or she works alongside or claims to serve, perhaps to facilitate a compulsion to criticise, condemn, disadvantage and cause detriment

    16.) is irresistibly drawn to organisations, roles and positions which offer the wannabe power and control over the professionals s/he despises (eg inspection regimes, approval roles, regulatory bodies, ticksheet compliance schemes, political correctness police, trade union official, etc) - and is often described as a talentless jobsworth

    17.) when in a position of power associates with and makes alliances with or surrounds him or herself with clones, drones, minions, fellow wannabes, sycophants and brown-nosers

    18.) instinctively objects to any suggestion of change, reform, improvement, progress or evolution, but has no viable or positive alternatives of their own

    19.) opposes every idea, suggestion, opinion, contribution or reform on principle but has no original, positive, constructive ideas or contributions of his or her own

    20.) is likely to plagiarise and steal others' ideas which are then put forward as their own

    21.) may place undue emphasis or reliance on an old, minor or irrelevant qualification to bolster their claim of belonging to or deserving to belong to a profession

    22.) may claim ambiguous or misleading or bogus or fraudulent qualifications, associations and experience

    23.) displays a superior sense of entitlement because they associate with or serve higher performers

    24.) emotionally immature

    25.) controlling

    26.) easily provoked

    27.) when challenged is adept at rewriting history to portray themselves as competent, professional and successful, regardless of multiple witnesses and overwhelming evidence to the contrary

    28.) quickly and loudly feigns victimhood when exposed and held accountable, often repeatedly and loudly accusing the person holding them accountable of being a bully

    29.) when held accountable makes conflicting and contradictory threats and demands (eg demands apology but orders the other person not to communicate with them)

    30.) when held accountable makes lots of loud but empty threats (eg of legal action such as libel, slander, defamation etc)

    31.) only carries out threats of legal action when in the presence of a superior serial bully, especially a sociopath type

    32.) may indulge their jealousy and envy of professionals or those they claim to serve by pursuing vindictive vendettas, sometimes with the help of a superior serial bully, especially a sociopath type

    33.) is easily manipulated and controlled by a superior serial bully

    34.) female wannabes may be arch bullies (some people might call them puppetmasters or queen bees)

    35.) may surround herself with drones of the opposite sex

    36.) may exploit some perceived vulnerability in self to ensure drone loyalty

    37.) gives the appearance of loyalty to drones but will discard them when they've served their purpose

    38.) is likely to have affairs to gain power, status or position

    39.) presents as a false victim when outwitted

    40.) may feign exclusion, isolation or persecution

    41.) malicious

    42.) constantly tries and will do almost anything to be in the spotlight

    43.) includes Munchausen Syndrome

    44.) the focus of their life is to be the centre of attention

     

    --------------------------------------------------------------------------------------------------------------------------------

     

     

     

    The Guru

    Motivation- task focused

    Mindset- confusion, inability to understand how others think and feel

    Malice- zero to low; when held accountable, low to medium (it's often the absence of malice that identifies a guru type of serial bully) but could be medium to high if narcissistic or psychopathic traits are present

     

     

    1.) often successful in their narrow field of expertise

    2.) regarded as an expert

    3.) valued by the employer because s/he brings in the money, status etc

    4.) ruthlessly pursues objectives regardless of the cost

    5.) ruthless determination to succeed

    6.) can be successful over the medium term in their field

    7.) task focused

    8.) zero people skills

    9.) control freak

    10.) mainly but not exclusively male

    11.) often has a favourite who receives extra attention but who is expected to reciprocate with sycophancy

    12.) favours, protects and promotes non-threatening sycophants whilst marginalizing and hindering the advancement of those with higher levels of competence, especially in people skills

    13.) apt to betray those formerly favoured, especially when the favoured person starts to show independence of thought or action, or starts to receive more attention or become more popular than their mentor

    14.) a male Guru in a position of power may exhibit inappropriate sexual conduct

    15.) gauche, aggressive and unpleasant but not evil

    16.) may not be overtly attention-seeking but dislikes those around them getting more attention than they're getting, or getting attention which doesn't include the bully

    17.) selfish, self-centred, self-opinionated, dogmatic and thoughtless and with a tendency to pontificate

    18.) apt to throw temper tantrums when things don't go well or can't get their own way

    19.) emotionally immature, perhaps emotionless, sometimes cold and frigid

    20.) convincingly intellectualises feelings to compensate for emotional immaturity

    21.) intelligent (often highly) but lacks common sense

    22.) is happy to lie to suit own purposes

    23.) can have a rigid routine

    24.) does not accept responsibility for their own behavior

    25.) blames others for own inadequacies

    26.) refuses to recognise that they could have any shortcomings of their own

    27.) does not live in the present

    28.) usually extremely neat (for example, desk is always clear)

    29.) organized (sometimes overly)

    30.) tempts fate but always gets away with it

    31.) has stereotypical ideas about gender roles (though this may not be expressed consciously)

    32.) makes assumptions about others' thoughts

    33.) does not follow social rules, for example may display bad table manners in public

    34.) appears unable and unwilling to engage in and sustain small talk

    35.) seems unaware of the nature and purpose of rapport

    36.) seems to exhibit some symptoms similar to autism, although autistic people tend to be shy, introspective and lack manipulative skills and are usually the targets of bullying, not the perpetrators (it's unknown whether there might be a common cause or whether the similarities are just a superficial coincidence) [more on autism]

    37.) appears unable to read people and their thoughts and especially feelings

    38.) when held accountable exhibits genuine confusion as to why their behaviour is inappropriate

    39.) in cases where malice is low or absent the person my be regarded as somewhat avuncular or mildly jovial or charismatic in nature

    40.) likes the appearance of normalcy but rejects responsibilities of relationships

    41.) is unable to comprehend or meet the emotional needs of others

    42.) often puts work and duty above everything, including relationships

    43.) makes power plays, for example leaves the room when someone is speaking, or pretends not to hear and constantly asking a person to repeat what they just said, etc

    44.) doesn't share information about self (thoughts, insights, etc) and is not open to receiving this type of information from others (allegedly knows it all already)

    45.) secretive

    46.) possessive of objects and sometimes people

    47.) may view people as objects (this enables controlling behaviour of other people)

    48.) thinks of self as superior and above the law / rules / regulations etc (these only apply to other people)

    49.) uses denial as a defence mechanism

    50.) there are likely to be problems with succession

     

    --------------------------------------------------------------------------------------------------------------------------------

     

     

     

    The Socialised Psychopath or Sociopath

    Also known as the corporate psychopath, workplace psychopath, industrial psychopath and administrative psychopath.

    Motivation- power, gratification, personal gain, survival

    Mindset- manipulation, deception, evil

    Malice- high to very high; when held accountable, off the scale

     

     

    1.) Jekyll & Hyde personality

    2.) always charming and beguilingly plausible, especially to those who are capable of protecting or enhancing the sociopath's position

    3.) excels at deception (this must never be underestimated, but always is)

    4.) excels at evasion of accountability

    5.) is extremely and successfully manipulative of people's perceptions and emotions (eg guilt and anger)

    6.) silver-tongued, has an extreme verbal facility and can outwit anybody (including a top barrister) in verbal conflict

    7.) will often engineer himself or herself into a position of authority as gatekeeper of the organisation and thus the person through whom all information must flow, and the person to whom all requests for services must be referred - which he or she then takes delight in denying

    8.) is adept at offering weak and inadequate people the positions of power, control, security, influence or respect that they crave but who lack the necessary competencies to achieve - such people are unaware that their consequent dependence on the sociopath makes them permanent manipulatees, pawns and expendable agents of harassment

    9.) identifies those essential to the sociopath's survival and manipulates their perceptions them by making them feel special and thus obligated to reciprocate with support and protection

    10.) manipulates others into making fools of themselves in situations where they cannot back down or from which they cannot withdraw - these people become increasingly susceptible to further manipulation and are then trapped as pawns in the sociopath's game

    11.) is likely to be surrounded by people who, having been subjected to control, manipulation and punishment by the sociopath, look wretched and who start to exhibit behaviour best described as disordered, dysfunctional, sullen, aggressive, defensive, hostile, retaliatory, counterproductive or cult-like and for whom disbelief, disavowal and denial are instinctive responses

    12.) creates an environment where levels of denial are so great that those involved are oblivious of the foolishness and self-evident absurdity of their denials when presented with the facts, with the result that non-involved observers are led to question whether such levels of denial merit psychiatric intervention

    13.) is contemptuous of disrepute to their organisation and of collateral damage and of the destructive consequences for all direct and indirect parties

    14.) is always surrounded by and leaves behind a trail of dysfunctional organisations, destroyed businesses, ruined careers, stress breakdowns and unexplained suicides

    15.) despite a trail of devastation to individuals, organisations, families and communities, the actions of a socialised psychopath may go undetected or unrecognised for years

    16.) a history of conducting frivolous, vexatious and malicious legal actions, especially (but not exclusively) against anyone who can recognise the sociopath for what he is

    17.) only after the sociopath is exposed and relieved of position, or they move on, can the full depth of their destructive behaviour be fathomed and the consequences calculated

    18.) is skilled at identifying, undermining, discrediting, neutralising and destroying anyone who can see through the sociopath's mask of sanity

    19.) at all times restricts the actions and rights of others (especially those holding the sociopath accountable) whilst aggressively protecting his or her right to do anything without being hampered by social norms or legal requirements

    20.) pursues endless vindictive vendettas against anyone perceived as a threat or who attempts, knowingly or unknowingly, to identify or reveal or expose the sociopath, or who makes efforts to hold the sociopath accountable

    21.) is adept at appropriating rules, regulations, procedures and law to manipulate, control and punish accusers regardless of relevance, logic, facts or consequences

    22.) persists in and pursues vindictive vendettas using self-evidently false evidence or information, even after this is brought to the attention of the sociopath

    23.) will often manipulate minor bullies of the Wannabe type (who on their own might or would not merit the label 'serial bully') into acting as agents of harassment and as unwitting or unwilling conductors of vendettas

    24.) is adept at placing people in situations where the sociopath can tap into each person's instinctive urge to retaliate in order to use them as his or her instruments or agents of harassment

    25.) gains gratification from provoking others into engaging in adversarial conflict

    26.) once conflict has been initiated, the sociopath gains increased gratification by exploiting human beings' instinctive need to retaliate - this is achieved by encouraging and escalating peoples' adversarial conflicts into mutually assured destruction

    27.) revels in the gratification gained from seeing or causing other people's distress

    28.) when faced with accountability or unwelcome attention which might lead to others discerning the sociopath's true nature, responds with repeated and escalating attempts to control, manipulate and punish

    29.) is adept at reflecting all accusations and attempts at accountability back onto their accusers

    30.) is adept at creating conflict between those who would otherwise pool negative information about the sociopath

    31.) has no limits on his or her vindictiveness

    32.) the need to control, manipulate and punish develops into an obsession with many of the hallmarks of an addiction

    33.) is skilled at mimicry and can plausibly and spontaneously regurgitate all the latest management jargon

    34.) exhibits minimal professional skill level and competency

    35.) exploits his or her intelligence to excel at talentless mediocrity

    36.) is always identifying the behaviours and strategies to which other people respond with the desired effect

    37.) is able to anticipate and credibly say what people want to hear

    38.) is easily able to win people over before betraying them or deceiving them or ripping them off

    39.) easily manipulates and bewitches an immature or naive or vulnerable or emotionally needy person to be their spokesperson or agent of aggression

    40.) exploits anyone who has a vulnerability

    41.) is pushy and extremely persuasive

    42.) is sexually inadequate and sexually abusive

    43.) is likely to protect anyone accused of or suspected of sexual abuse of pedophile activity, and will frustrate or obstruct investigations into that person

    44.) maybe associating with, or actively involved in, abuse or pedophile activity

    45.) has no emotions, no emotional processing capability and no ability to understand other's emotions

    46.) is incapable of understanding, initiating or sustaining intimacy

    47.) the male sociopath has often convinced a string of women to feel they are in love with him and despite being treated abominably they blindly continue to be loyal to him and minister willingly to his every demand

    48.) may start projects with apparent enthusiasm and energy but quickly loses interest

    49.) frequently takes unnecessary and uncalculated risks but takes no account of consequences

    50.) is reckless and untrustworthy with money

    51.) is likely to be illegally diverting or siphoning off significant sums of money to his or her own budget, project, account or cause

    52.) is unreliable and untrustworthy in every facet of life

    53.) is likely to be leaking confidential information or secrets to third parties

    54.) is likely to have committed or be committing criminal or near-criminal offences, eg fraud, embezzlement, deception

    55.) is likely to have committed or be committing breaches of harassment and discrimination law, employment law, contract law, etc

    56.) disregards rules, regulations, Health and Safety requirements, professional standards, codes of conduct and legal requirements, etc

    57.) cannot comprehend the deeper semantic meaning of language and is thus unable to understand or appreciate metaphor, hyperbole, irony, satire etc (these elicit either zero response or a hostile response)

    58.) likes, seeks, enjoys and relies on procedure, ritual and ritualistic practices

    59.) through arrogant overconfidence takes increasingly risky chances and eventually overplays their hand or makes a mistake which leads to the sociopath revealing him or herself

    60.) exhibits parasitical behaviour, takes everything and gives nothing

    61.) grabs headline credit for minimal, flukey or other peoples' success whilst surviving off the backs of manipulatees who are exclusively blamed for all failures

    62.) rarely blinks, may have stary scary eyes that cut right through you, or may avoid eye contact completely

    63.) is callous, cold and calculating

    64.) is devious, clever and cunning

    65.) is ruthless in the extreme

    66.) regards people as objects and playthings to be discarded when surplus to requirements

    67.) displays zero empathy

    68.) completely without conscience, remorse and guilt

    69.) malicious and evil

  17. Ok in the US using any electronic device to harass, stalk or threaten anyone if a felony. The major problem with convicting anyone of this on the web is a tricky situation. First off you got the jurisdiction problem. NO COURTS want to extradite anyone for cyber bullying because it would be costly even if they are in a different country. Cyber bullying is a major problem on the net & people dont come to the net to be harassed, they come to the net to unwind yet there are those losers out there with no selfesteem that want to make the net their place to bully & harass others who did nothing wrong to them. Now back to the question is cyber bullying illegal, this will answer a few things.

     

    Cyber-bullying has been in and out of the news lately. For example, last month a teenager who posted a death threat on Facebook became the first person in Britain to be jailed for online bullying http://www.dailymail.co.uk/news/article-1208147/First-cyberbully-jailed-Facebook-death-threats.html . And research indicates as many as one in 10 employees suffer from cyber-bullying at work, so employers should be aware of their responsibilities http://www.personneltoday.com/home/Catrin .

     

    Q What is cyber-bullying?

     

    A It is any use of information and communications technology to support deliberate and hostile attempts to hurt, upset or embarrass another person. Examples include sending abusive e-mails and phone calls, posting comments on websites such as Facebook or Twitter, hacking into other people's accounts and sending viruses. Cyber-bullying tends to be associated with schools, but employers should be aware that staff who receive offensive e-mails or phone calls from colleagues or customers could be the victims of cyber-bullying in the workplace.

     

     

    Q What should employers do to reduce the risk of cyber-bullying happening in their workplaces?

     

    A Employers should ensure that they have up-to-date, effective IT policies which set out clear consequences for non-compliance. Disciplinary policies should make it clear that cyber-bullying may constitute gross misconduct, and could result in summary dismissal.

     

     

    Q Can employers take more Draconian measures?

     

    A Well, they could ban the use of social networking websites or personal mobile phones in the workplace, but should bear in mind that this will have little effect on cyber-bullying, which can take place outside of working hours.

     

     

    Q What legislation must employers abide by?

     

    A Those that monitor employees' internet and e-mail use to reduce the risk of cyber-bullying should ensure that they comply with their obligations under the Regulation of Investigatory Powers Act 2000, the Data Protection Act 1998, and the Telecommunications Regulations 2000.

     

     

    Q What should an employer do if an employee complains about being cyber-bullied?

     

    A The most important consideration is to ensure that the employee receives appropriate support and is convinced that their employer is taking the matter seriously. Employees should be encouraged to preserve all evidence of cyber-bullying by saving e-mails, logging phone calls and taking screen-prints of websites. Much will depend on the identity of the cyber-bully. If it is a fellow employee, employers should conduct an investigation and, if appropriate, take disciplinary action. If the employer decides to take disciplinary action it should ensure that it complies with the Acas Code. If the cyber-bullying involves illegal content or contains threats of a physical or sexual nature, employers should inform the police.

     

     

    Q If an employer fails to act appropriately on a complaint, what legal action may they face from the employee concerned?

     

    A Employees cannot make a complaint to an employment tribunal for cyber-bullying alone. However, if the cyber-bullying relates to their sex, race, disability, sexual orientation, age or religion, they may be able to bring a claim for discrimination and/or harassment. In serious cases employees may choose to resign and bring a claim for constructive dismissal. Employers owe a duty of trust and confidence to their employees, and a failure to take cyber-bullying seriously or to prevent it from recurring could breach this duty. For this reason it is crucial that employers take appropriate action to deal with cyber-bullying and treat it as seriously as face-to-face workplace bullying.

     

     

    Q Will an employer be liable for complaints that follow cyber-bullying?

     

    A Employers may be liable for discriminatory acts of their employees, but at present will generally not be liable for the acts of third parties such as customers or visitors to the office unless there is a discriminatory reason why the employer failed to prevent the harassment. However, the forthcoming Equality Bill will change this, and employers may be liable for discriminatory cyber-bullying committed by third parties. If an employee complains that, as a result of cyber-bullying by a fellow employee, he has been constructively dismissed, the employer may have a defence if it can show that the cyber-bully was acting outside the scope of their employment. However, the employer could be liable for harassment by a third party if the employer is in breach of the implied duty to provide a suitable working environment. Employers have a duty to take reasonable steps to protect their staff from bullying and harassment and a failure to do this could mean the employer is liable for a constructive dismissal claim arising from cyber-bullying.

     

    Catrin Llewellyn, solicitor, Reynolds Porter Chamberlain

  18. ill be racing a funny car on the straight track i start tomarrow after 6 runs I am qualifyed to race, thanks to the owner of the car Ezra Boggs which this is his car one ill be driving below.

     

    Posted Image Posted Image Posted Image Posted Image Posted Image

    Posted Image

  19. some reasong i can add name but it will not let me add password whats making it do this????

     

     

     

     

     

     

    ;------------------------------------------------------------------------------------------------------------------------------
    ;------------------------------------------------------------------------------------------------------------------------------
    ;------------[ Email Dialog ]--------------------------------------------------------------------------------------------------
    ;------------------------------------------------------------------------------------------------------------------------------
    
    
    alias signin { 
      /dialog -m sign sign 
    }
    
    
    }
    dialog sign {
    alias sign { dialog -m sign sign }
    alias csign { dll $rebar UnDock center | dialog -x sign sign }
    alias rebar { return dll/rebar.dll }
    dialog sign {
      title "Pass Word Dialog [ /signin ]"
      size -1 -1 191 73
      option dbu
      icon photos\icon.ico, 0
      edit "", 1, 37 15 78 10, return autohs
      text Email:, 2, 9 16 25 8, center
      edit "", 3, 37 29 78 10, pass return
      button "Add", 4, 116 15 19 10, flat
      button "Delete", 5, 116 29 19 10, flat
      text Password:, 6, 9 30 28 8, center
      edit "", 7, 37 43 96 10, read return
      text Nick:, 8, 9 45 25 8, center
      box , 12, 5 10 182 47
      box , 13, 5 10 134 47
      button "Ok / Cancel", 14, 70 59 37 9, ok cancel
      text "By &Aimz ©2010", 11, 124 62 65 8, center
      edit "Pass Word Dialog [/PASSW]", 15, 50 4 80 10, center
      box "", 16, 2 0 188 71
      icon 9, -38 -65 291 274,  images\back.jpg, 0, noborder
      icon 10, 141 17 43 37,  images\middle.jpg, 0, noborder
      icon 17, 2 74 187 126, Images\small.jpg, 0, noborder
    }
    
    on *:dialog:sign:init:*: {
      .timer -m 1 1 sign.an
    
      did -ra $dname 3 %password
      did -ra $dname 1 %email
      did -ra $dname 7 $buzz.decode($me)
    
      .splay mepart.wav | .timer.p 1 1 splay password.wav
    
      dll $rebar Dock $dialog($dname).hwnd > center
      dll $mdx SetMircVersion $version
      dll $mdx MarkDialog $dname
      dll $mdx SetFont $dname
      dll $mdx SetColor $dname
      dll dll\mdx.dll SetBorderStyle 1,3,2,6,8,2,6,7,8  14 50 Georgia Bold
      dll dll\mdx.dll SetColor $dname 1,3,2,6,8,2,6,7,8 text $rgb(%list1colour,%list2colour,%list3colour)
      dll $mdx SetFont $dname 1,3,2,6,8,2,6,7,8 40 Georgia Bold
      mdx SetFont 1,3,2,6,8,2,6,7,8 +a 12 100 Verdana
      colorize 
    }
    
    on *:dialog:sign:sclick:*:{
      if ($did = 4) { if ($did = 4) { $iif($did(1), set %email $did(1)) | $iif($did(3), set %password $md5($did(3))) | .splay Data.wav | .loadbuf -ro sign 1,3 | .echo $active 0,4Email & Password 0,12Added } }
      if ($did = 5) { .unset %email | .unset %password | .loadbuf -ro sign 1 | .loadbuf -ro sign 3 | .echo $active 0,12Email & Password 0,4Deleted | did -r sign 5 }
      if ($did = 14) { .splay zip.wav }
    }
    
    alias refresh { did -r sign 5 }
    
    alias colorize {
      var %x 1
      :lp
      dll $mdx SetDialog $dname bgcolor $rgb(155,0,0)
      dll $mdx SetColor $dname %x background $rgb(155,0,0)
      dll $mdx SetColor $dname %x text $rgb(255,255,255)
      dll $mdx SetColor $dname %x textbg $rgb(155,0,0)
      inc %x
      if (%x == 100) { goto nd }
      else { goto lp }
      :nd
    }
    
    alias sign.an {
      var %i 0
      while (%i <= 191) {
        dialog -srb sign -1 -1 %i %i
        var %t 1
        while (%t <= 73) inc %t
        inc %i
      }
      .timer -m 1 1 sign.tbar | .splay mepart.wav
    }
    
    alias sign {
      if ($dialog(sign)) {
        dialog -c sign sign
        dialog -mado sign sign
      }
      else { dialog -mado sign sign }
    }
    
    alias sign.die {
      var %i 231
      while (%i >= 0) {
        dialog -srb sign -1 -1 %i %i
        var %t 1
        while (%t <= 73) inc %t
        dec %i
      }
      dialog -c sign
    }
    
    alias -l sign.tbar {
      var %i 0
      while (%i <= 24) {
        timer.tbar 1 0 dialog -t sign $left(Email Dialog,%i)
        var %t 1
        while (%t <= 400) inc %t
        inc %i
      }
    }
    
×
×
  • Create New...