Jump to content
aberdeen-music

Conspiracy???


Guest Neubeatz

Recommended Posts

Guest Neubeatz

Jews, Politics and Spyware: A Word on Computers

Opinion; Posted on: 2004-07-21 22:31:24

Detailed instructions for the secure PC and Mac

by Mike Andrews

To all who use a personal computer in accessing the World-Wide Web... listen up, because what follows is information that will never appear on Jewish-controlled, monopoly television media; the so-called mainstream. Neither will you find it in any manual, nor incorporated into the curriculum of a computer science class.

As an older person who grew up during the age of Teletype machines and black and white television, learning to use a personal computer has been quite a challenge. Over time some very lucid thoughts regarding politics, race, the Internet and the circumstances surrounding modern communications have been burned into my awareness.

Having used a typewriter for years, making copies of my work at the local quick-stop, moving up to a personal computer with modern print and composition options was to me like waking up in activist's heaven!Most White people suffer from a slight case of navet... and I was no different. So please suffice it to say that my worldview, if you will, was a bit rough that day in late August, 2001 when my first PC arrived, just prior to the tragic events of one week later. Now, after three years of Windows hell... kicking and clawing my way with anger and frustration as constant companions, the train has finally pulled into the station. The cat's out of the bag and it's time for a bit of computer Truth. Scary, unwelcome truth. "Iron Bells," wrote Poe. Wonder if 'ol Edgar had had a vision of the Windows PC?

As a birthday gift to myself, fed up with the Jewish mob's agenda of suppression through mass deployment of hacking and spyware, I shifted my communcations venue up a notch and graduated to the Unix kernel. I bought a Mac. I was tired of Cool Web Search and C2.Lop paying their incessant visitations on me; tired of losing newly-installed operating systems to the mob's rodent-agenda. Windows would be a nice way to go in a world where Jews and their hurray-for-us-and-to-hell-with-everyone-else attitude didn't exist. But unfortunately, reality has a way of wafting up and smacking unca Billy's people in the face... especially those who've butchered sacred cows by publicly denying the Jewish version of World War II!

Today in Germany alone more than 5000 political prisoners are rotting in dungeons for doing no more than uttering words that fall under the definition of hate speech -- which, basically, is anything Jews hate to hear. German citizens who make the mistake of questioning any aspect of organized Jewry- especially regarding the holohoax- can be arrested and thrown into prison for "crimes against the memory of the dead." And it's not just Germany; Canada and the UK also have 'hate speech' laws made of, by and FOR Jews! In other words, individual freedom to speak one's mind is totally suppressed for everyone but Jews in these nations by the very faction causing all the trouble! American boys and girls of military age are now languishing under hellish circumstances in Iraq and Afghanistan, fighting and dying in bloody Israel's war of expansionism. Recognizing the wrong in these things and speaking against them in email messages and posts to various Internet forums has made me a target of the Jewish lobby's enforcement/persecution wing, the ADL. Consequently... and I'm not quite sure how they're doing it... my computers have been attacked relentlessly since the events of 9-11-01. Many of the attacks must be with the complicit involvement of ISPs I've used. Otherwise, given the fact of dynamic (constantly changing IP addresses), how could the hackers pin-point my location? No, it's been an 'inside job' all the way.

Jews have fomented terror against all nations selfishly, viciously and greedily. Jews ARE terrorism incarnate. The Arabic-islamic peoples, if left alone to live their lives in peace, unmolested, would still regard America as a friendly nation. Our world would be a much safer place and many of our children would still be among the living... if not for Jews. Some of you who are members of the 'over 50' set may recall an old Bob Dylan tune named "If not for you." Just rearrange the lyrics a bit so that they read 'If not for Jew' ...and there you have it in proper context. Gullible Christian fundamentalist lackeys, whom Jews are now leading by a tether attached to their noses... are also at fault. As stipulated in Law, ignorance is no excuse.

The US' involvement in Afghanistan and Iraq was initiated deliberately of, by and for Jews through the events of 9-11-01; conspired, planned and executed by Israel and its americanized satellite- the Washington neocon faction and the Jewish lobby. According to genuine experts there is no oil crisis. What option does that leave? Dubya's neoconservative controllers- almost exclusively Jews- have led us into a never-ending scenario of global hegemony and war, in which our children are being slaughtered as sacrificial animals in effigy to Jewish greed. Mr. Bush is not only a Zionist lackey but a psychopathic murderer and war criminal of the first water, along with Wolfowitz, Perle, Feith, Cheney, Rice, Powell and the others... all guilty of mass murder. Mr. Bush and his entire cabinet should be tried and sentenced to life emprisonment... or death. This must necessarily include the US Congress, with some few exceptions, since the greater majority of its members rubber-stamped the Jews' edict of aggression a few days after 9-11 without so much as even reading it! -- Same for the freedom-robbing Patriot Act. What gutless cowards they are! What unconscionable traitors!

Now that the root of the problem is made clear, its ramifications in the world of computing- the spyware debacle- become clear as well. Israel cannot tolerate the Truth. A nation founded on lies and cruelty is unable to survive in the white light of exposure; just as a marble statue cannot long stand on feet of clay. The recent deployment of spyware has perhaps been the most successful and profitable weapon of all in the Jews' ongoing battle to control thinking and free speech. If one cannot access the Internet he will not be able to mass-communicate his opinions to others. Ergo, control over and selective suppression of communication is implemented by Jews through the broad-scale deployment of a plethora of electronic mal-ware. Chinese hackers are paid to assist; Israel maintains a close, symbiotic relationship with the PRC. Paraguay and certain other Zionist cells in South and Central America also contribute. The Russian Jewish mafia has been very strong in eastern Europe, although recently Mr. Putin's courageous actions against the 'Oligharchs' has reduced that threat... and the Russian government has cooperated in finding and shutting down hackers. Yet despite these commendable actions on the part of Mr. Putin, the Jew-controlled dominant media in America have only negative things to say about his government, twisting the truth around to suit the Zionist game plan.

If a targeted victim is too clever for his would-be suppressors and manages to wriggle free of their entrapment by, say, removing Cool Web Search Trojan through manual means... other ways of dealing with such individuals- those who commit the offense of exposing Israel's glorious (self-serving) AGENDA and then somehow managing to remain aloof- are trotted out so that a massive amount of pressure is applied to affiliated ISPs and/or web hosting firms, most of which are controlled by Jews. In the recent past very few entities operating commercial servers have been willing to buck the menace of ADL threats, and many are the hapless victims of ADL intervention who have been dropped. Additionally, since Jews control so many domestic ISPs, email messages and browsing habits of American, white gentile subscribers are closely monitored. A victory cry was heard arising from these would-be enslavers of Humanity recently when a US appeals court ruled in favor of permitting ISPs to read subscribers' email. Hopefully the decision will be challenged and defeated; but for now, thanks to Jewish control of the American judiciary and the US legal system, we are one step closer to slavery. Remember always, white people- that the Soviet Union was formed through a Jewish action called the Bolshevik Revolution. Jews did that... Jews enslaved the great nation of Russia... murdering the Tsar and his family... and Jews were the principals all throughout the 'Uncle Joe Stallin' period (1917-1990), when tens of millions of white Russian gentiles were murdered in cold blood, many from a bullet to the back of the head!

As a revenue-generating tool, spyware has won the black ribbon. The American advertising industry (the mob)- a wing of the Jewish mafia- which happens to be the ONLY mafia that ever was- (you didn't really think it was the Italians??) -- has full control over virtually all so-called mainstream television, most radio broadcasting and print media. With the Internet's recent advent as an unregulated, free-for-all global forum, the Zionist hawks began realizing in the mid-to-late 1990s that their facade of lies and disinformation spewing out like a river of sewage through mainstream sources was facing increased risk of exposure. So top-notch code-writers were hired and brought in to deal with the threat. The infamous monitoring software P.R.O.M.I.S., stolen from an American firm in 1979 by the CIA-Mossad double agent J. Pollard and later retro-engineered by the Israeli government, has been involved. A consequence of this is Spyware that can easily repose in the targeted computer without the owner's knowledge... or immediately and arrogantly notify the victim of its presence through harassing popups and browser redirects, depending on the whim of its manipulator. Since millions of Windows computers are deliberately infected at the factory by little yarmulke-clad rodents, users are set up for victimhood from the start. You knew that, right?

Gee... I thought everyone was wise to the re-seller racket. You mean to say that you bought your computer with a pre-installed OS and (may or may not have) received install media at point of sale? S'pose maybe your trusty Windows machine could have just a liiiitle bit of spyware hiding in it... and the rats've got you over a barrel? Want to find out? Okay, do this: (Win. XP?)... Hit Start> Run and type regedit; Enter. No no no no no... forget about Ad-aware 6 and SpyBot. FORGET PestPatrol. Good God... If you've got PP installed... no wonder you're having trouble with spyware! PestPatrol IS spyware! Listen carefully: Your remover programs haven't done anything for you up until now but lead you on... and here you are extolling their virtues! Sure, they find ominous things like ALEXA-RELATED (think of the preceding words as emanating from an echo chamber). PestPatrol even finds CWS at times, after first downloading it into your machine. Ad-aware 6 detects a CWS variant it classifies as RegData and pretends to remove it... but you know by now, Mr. and Ms. victim, that if it's ever paid you a visitation it always comes back. So much for Ad-aware 6. And that 'Related' stuff in SpyBot fairly scares the bejesus out of me. Very nefarious-sounding. But... there are more and bigger fish to fry. So come on... let's do something constructive for a change, shall we? And let me say before-hand that I sincerely hope you come out smelling like a rose. But don't count on it.

Ready? Okay... hit Start> Run and enter regedit. At the Registry tree click on H_KEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerMain. Scroll down the 'Main' folder to the bottom. See an entry there in the right-hand panel for StartPage? Uh huh. It's bogus; a browser hijacker. You can try deleting it, but depending on what else is lurking in the shadows... like in your Hosts folder, or shdocvw.dll (located in System32), it may easily come back. Now, scroll down to Windows> Shell Extensions> Approved to see what the rodents have approved there for your displeasure and their profit. Two insidious and highly lucrative Trojans enjoy hanging out in the Approved list, under the following (semi-secret) CLSIDs: {CFBFAE00-17A6-11D0-99CB-00C04FD64497} (iGetNet) installed as DefaultSearchHook, URLSearchHook, Microsoft URL Search Hook, etc., etc., and {C4EE31F3-4768-11D2-BE5C-00A0C9A83DA1} (C2.Lop), similarly threaded. One hooks into the onboard file search and sends your activities 'home on report' whenever you go online. The other threads to all your Internet browsing activities and reports on that. Hope you come up clean, because deleting either of these bastards will blank out your Windows Search Assistant folder. Bye Bye Rover. Still, it's better to live free WITH LESS than continue as a slave; crumbs thrown from your cruel masters the only compensation. Want to do one more? Good. Scroll down a little farther to ShellServiceObjectDelayLoad and see if a CLSID is there beginning with either CFBFAE00 or C4EE31F3. (Same two.) If so, chop it. Give it the axe. There are others. Go to every entry for IE Toolbar and look there. Be on look-out for the word 'Extensions' under toolbar trees. When you come to any instance of 'Extensions,' click on it to see what's 'extended' for your pleasure. This is where Alexa ({c95fe080-8f5d-11d2-a20b-00aa003c157a}) likes to hide. If present, delete only the CLSID. Look for the term WebCheck, exactly as shown here. There's a legitimate entry for Web Check, but not with the words together. If present, delete it and any CLSID it refers to... often MyDoom ({E6FB5E20-DE35-11CF-9C87-00AA005127ED}), which makes a 'zombie' of your machine that sends spam and/or porno to hundreds of other computers without your knowledge, using your own email.

The above isn't all, by a far cry. But we're not going to concern ourselves with CLEANING ALL the garbage from a hopelessly infected system, are we? Absolutely not. It's next to impossible, anyway. Because many more little and big demons live in Windows computers. As one example, navigate to System32 and scroll down to a file named shdocvw.dll. Open it in WordPad, as NotePad may not have enough memory to deal with it... although it won't hurt to try. (R-click on it and look for 'Open with'... if it's not there, click 'Open' and then in the next window (a warning from unca Billy that you're about to commit sacriledge against your superiors) click 'Choose program' (or whatever it says); uncheck the box for 'Open all programs of this type,' etc.; choose WordPad and click OK. After opening, go up to Edit and click Find, then type "{" without the quotation marks into the Find window; hit 'Find now' and just keep tapping the button until you reach destination. That's a quick way to search for CLSIDs when you have no idea what they are. (it'll take a while... '{' appears as a standard in code-writing, so you'll highlight quite a few of them before hitting paydirt)... but since nearly all CLSIDs are preceded and closed by "{" this will get the job done. Your target is a CLSID list that's about one-twentieth of the way down. If you'd prefer, there's no reason why you can't find it by scrolling; but in the large files, as you'll discover, normal scrolling is a bit unproductive. You'll immediately know when you're getting close, as the terrain changes from code jibberish to printed language characters (mine are in English). Now, look for the following: {CFBFAE00-17A6-11D0-99CB-00C04FD64497} (IGETNET again); C4EE31F3-4768-11D2-BE5C-00A0C9A83DA1 (C2.LOP, same as before); {E6FB5E20-DE35-11CF-9C87-00AA005127ED} (MyDoom/NetSky variant, as above); EFA24E62-B078-11d0-89E4-00C04FC9E26E} (IE History Band- apparently with 5 variations- EFA24E60-64. All are browser hijackers and should be deleted when found in the Registry. You won't be easily able to delete them from shdocvw.dll, as it's a write-protected file, so please don't try; and Alexa in its most common configuration {c95fe080-8f5d-11d2-a20b-00aa003c157a} (as above).

If you've found any of these write-protected CLSIDs, then perhaps you begin to see why trying to salvage your current system is hopeless, especially in light of the fact that your machine was probably infected at the faktory... or perhaps at the point of sale... complements of pogrom-mentality rodentia, which means you can bet your bippy that any install media received with the purchase is contaminated as well. You've no means of doing a clean installation of Windows if all you've got is infected media. At the same time, all you'll accomplish in removing the spyware from your current system is cause functions so threaded to crash... such as the Windows Search Assistant folder, which will tempt you to run a Repair installation from... you guessed it... your infected media. Additionally, files such as shdocvw.dll are protected operating system files, and cannot be tampered with as they are shadow copies threaded to their parents in the Root folder. Friends... thas' too deep for me. Plus, if you change even one digit in any CLSID within shdocvw.dll your machine will refuse to start Windows at the next boot until you place the (infected) install media in the tray! Yeah, they gotcha coming and going. Shdocvw.dll threads to your entire system, periodically restoring bad CLSIDs that may have been deleted, whether you like it or not.

So you can't easily defeat the monitoring system unca Billy's gang has engineered for your displeasure; all that'll do is set you back up again for the rodents. What we're going to do is format the drive and re-install, using factory-boxed, first line Windows media (for which Microsoft charges a premium, and now you see why)... complete with the nice little manual that nobody ever reads. Right? Okay. Now, here's what you must do if you're infected and want a clean computer: First, you must format and do a fresh install using the suspect CD received when you bought the computer (if you didn't get a CD, which is common, you may have an option to receive one from Microsoft; but there's no point in formatting if you can't immediately reinstall); then before adding any other software or going online, open the Registry as we just did and check to see if the same setup with iGetnet and C2.Lop is still present. Those components *could* theoretically have been installed via drive-by while you were surfing; so it's always good to check before making a final and possibly expensive decision. The iGetNet and Lop CLSIDs serve as vectors for all sorts of fun and interesting ways the rodents have of torturing their victims, so if those two strings are absent there's a change your media may not be contaminated. Cross your fingers. If you come up clean, count yourself fortunate. Otherwise, you'll know your install media is... you guessed it.

Don't know how to run a Format? It's easy in Win. XP! Just place your media in the CD-R and reboot unless you've got a combo drive- in which case it'll have to go there. I'm no fan of combo drives, because they incorporate both CD-R, CD-RW and DVD-RW functions in one tray, thus opening the door to a possible transfer of any galloping spyware that may be infecting your system. Your BIOS will need to have First Boot set on 'Boot from CD-ROM' rather than 'Boot from floppy;' so if you have an older comp, say, that was upgraded to XP, your BIOS may need a tweak; but if it isn't set correctly, don't worry... we'll find out in a minute. Okay... with your install CD in the CD-R tray, hit Restart. When XP reboots you should see a line of script in white letters appearing at the top of the screen saying "Press any key to boot from CD-ROM." If it's there, BIOS is okay. If it doesn't appear, and Windows starts normally with the CD in the drawer, then you'll have to reset BIOS.

...It's not difficult. Here's how: Press restart and as soon as the screen goes dark begin tapping the Delete key tap-tap-tap-tap... sort of fast, about twice per second, until a lovely blue screen appears. It'll say System BIOS, or Award BIOS, etc., so you'll know you're in the right place. Now- from your keyboard (mice don't go to BIOS) scroll up/down using the arrows array, pressing Enter to display the various menus. Usually the first heading is the one you want; scroll down the list until you come to entries for First Boot: 3-1/2" floppy; Second boot: CD-ROM; Third boot: LS-120, or similar. Make changes, resetting to: First Boot: CD-ROM; Second boot: Floppy; Third boot: LS-120. It's sort of like multiple choice, with a minimum of input. All the settings will be on a list... and you simply scroll up or down with your arrows until the selection you want is highlited; then Enter. The Second and Third boot settings are not critical; it's the First boot device you must set to CD-ROM in order to run the Windows XP Install program. Next, before departing the BIOS section, return to the main screen by hitting Escape, scroll forward using your Down arrow to the entry 'Save changes and exit;' save your work and hit Enter, which will reboot your machine. Stay on your toes, because this is a fast reboot and you must be ready to 'Press any key' at the prompt.

Running a forensic check on your install media

Okay, we're back again at the point where a line of script should appear at the top of your screen, prompting you to "Press any key to boot from CD-ROM." Go ahead... press a key (be prompt) and start the install process. Read the instructions that appear on your screen at each step and just do what it says, with your aim that of performing a fresh installation. You should be fine. At the place where you're given the option to press R to open the Windows Repair Console, do NOT press R; take the other option and continue. After hitting F-8 and agreeing to the EULA, you will be given another option to perform a Repair installation by pressing R; don't. Continue with the standard install process, which will do a complete Format of your infected drive and erase all the spyware. In some Install versions NOT running the Repair program requires pressing Escape, then Enter. This will completely format (erase) your old operating system and reset the NTFS partition for the new. There's a bit more input just before formatting that you'll be required to make; but you should be okay if you just think it through. Don't get in a hurry; nothing will happen if you ponder for a while. If your old system was infected you shouldn't make any backups before formatting. It's a total loss; get used to it. Backing up now is a rodent's dream, as it perpetuates the infection... spreading it from contaminated media to your cleanly formatted drive. Continue with the installation, attending to the several instances where user-input is required, and then you're done. Yeah, you'll have to go through the COA littany... entering your 25 digit key; and of course there's the activation insult, compliments of unca Billy. Supposedly Windows will remind you "every couple of days" to activate your 'new' system. But I've found that the reminders usually come every few minutes, in those annoying little popup baloons. Done? Now it's time to re-check the Registry...

If, as I hope is the case, your Registry shows no signs of the CLSIDs CFBFAE00 and C4EE31F3, you may be in good shape and not in need of a better install CD. But this time let's be prudent and look in a couple of new places we didn't check before; so Do this: Regedit> HKEY_ROOTCLSID. Scroll down to the Cees (it's all in alpha-numeric order) and check again for the CLSIDs {C4EE31F3-4768-11D2-BE5C-00A0C9A83DA1} and {CFBFAE00-17A6-11D0-99CD-00C04FD64497}. Check also for {E6FB5E20-DE35-11CF-9C87-00AA005127ED} (NetSky/MyDoom Trojan) and {O1E04581-4EEE-11D0-BFE9-00AA005B4383} (Internet Explorer Address Bar- a browser hijacker); {0E5CBF21D15F-11D0-8301-00AA005B4383} (Internet Explorer Links bar- a browser hijacker) and {EFA24E62-B078-11d0-89E4-00C04FC9E26E} (IE History Band, a hijacker). Do a repeat in H_KEY_LOCAL_MACHINECLSID. Don't let your Registry cow you; there are a lot of things you can do there without causing noticeable ill effects on your OS. To speed up the checking process immensely, affix your pointer on the elevator button (the scroll button) and 'brutalize' the scrolling process. You're the boss! If any of these files are present, it's hopeless... take my word.

Still infected? Do yourself a favor and call Microsoft at 800-426-9400. Politely explain that you've discovered through forensic analysis that Windows install media you received with your computer is contaminated, and ask about first-line, boxed, Hermetically sealed factory replacement media. There are some steps you'll have to go through to prove your ownership of a single-used license. If you're able to meet Microcrook's criteria and can caugh up $45, you'll soon be the proud owner of a new, CLEAN CD. If it isn't clean... at least you have a leg to stand on with Microsoft... and now you know how to determine that. If you're still infected following our fresh install you owe it to yourself to shell out a few more bucks for top-of-the-line media. Remember- once you receive it, you can use it on any computer running Windows XP for which you have a COA. Simply do a Format running the new CD in the CD-R, NOT- repeat NOT NOT NOT the CD-RW tray, and at the point where the installer is required to enter his COA (Certificate of Authenticity), use the old key that came with the computer. You'll find it stuck to the top-front or somewhere on the outside in plain view... an irridescent plastic sticker bearing a 25-digit alpha-numeric code. What we're doing is all perfectly legal, and from there you'll be able to use the new, uninfected media in running unlimited fresh installs, with subsequent Repair installations as needed on all your machines! Running a Repair leaves all your files and documents intact; it doesn't format the drive. That way, regardless of how many times you delete spyware and impugn your system... you'll always have a clean CD for Repairs. Another advantage gained will be the ability to run a system File Check, when critical operating system files are damaged, inaccessible or missing. Simply place your CD in the CD-R tray and go: Start> Run> and type sfc /scannow. This will set your file system back aright. Further on I give some tips for making backups and keeping clean CDs clean.

Large sums of money have changed hands between the various mob factions involved in the spyware racket. Subterfuges were created long ago in the form of spyware-helper forums to lull victims into believing they have an avocacy to fall back on. Almost every nation in the Western Hemisphere has a mob cell that operates and perpetuates this scam. Many billions- even trillions- of dollars in revenues from the illicit sale of personal information have rolled into mob hands through the dumbing down of users. All this, of course with full cooperation from Israel's paid American lackeys, who masquerade as our Washington politicians. WE'RE ON OUR OWN HERE!!

There is a God. And there is OS-X. Worship and obey the Laws of one with all the fiber of your Being; use the other for communication and general computing. (Linux is a sort of archangel Michael.) Never get it mixed up, though, as to which is which, despite the similarities between them. Mac IS! Windows is... not. Is this clear? I didn't think so. Well... just look at it from this perspective: If an 800 lb. gorilla comes and sits on your Microsoft-based computer, threatening you with violence every time you get close... and another computer running, say, Linux or OS-X has no gorilla... which one would you choose? The answer is self-evident. Of course, millions of loyal Windows users continue trying to 'avoid the ape,' downloading endless patches from unca billionaire Billy. Sorry, friends, but that just ain't gonna work. Get used to magillastein... or switch to a SAFE operating system.

Why am I posting all this stuff? Very simple; it's because I'm concerned about personal freedom. As long as criminal agents of a subversive foreign power are permitted to act freely in debasing our sacred freedoms, all of us are in dire jeopardy! Understanding how to wrest back the control these rodents have over our lives will serve as effective collateral against further trampling of our rights. Knowledge is power! Spreading knowledge freely without undue intervention is every American's innate prerogative. Let's exercize this right now while we still can... by ensuring that WE and our trusted associates are the only ones using our computers!

A word about Macintosh

Who needs spyware removers? Formatting OS-X is simple and easy. Better still, get hold of a $40 USB floppy drive and run a 3-1/2 inch external diskette-wiper. Doing so cuts the Gordian knot of competing with onboard firmware that may have a tendency to help you remain infected. Because...

...Sometimes Apple's latest integrated hardware components falter at mid-stream when operating the new OS-X 10.3.3, 8-pass overwrite, as now available in Disk Utility. For some reason the operation occasionally grinds to a halt short of completion. This may leave spyware residing on the drive in unwiped sectors where it can still infect. Think of it as the 'gift' that keeps on giving. Think, also, of possible reasons why the OS-X wipe process stops short. Where'd you buy your Mac? Remember- 'resellers' are notoriously dishonest when the chance to make additional money exists. Some pre-installed Mac computers just may have 'kooties!' As with Windows, the buyer's best bet is to demand that his computer come with a clean drive, sans OS. Then the legitimate Macintosh system of your choice (OS-X 10.3.4 is the current top choice) can be installed at home from boxed, hermetically sealed media.

On the other hand, simple formatting of an OS-X partition (erasure) may also leave spyware behind as freespace residue, where it can be lifted up by any hacker using unerase software and reinfect your newly-installed operating system. Windows users face the same dilemma. I can tell you from experience that when this happens it's very frustrating... as is learning you've reinfected a fresh, new system by adding favorite software programs from contaminated media. Very discouraging.

Nothing beats a D.o.D.- level overwrite run from floppy for security and convenience.

The Mac Superdrive, although highly touted, is still but a single, dual-purpose CD-ROM/DVD-ROM. There's nothing written that says spyware infecting your OS will not be capable of migrating onto media run in the tray, such as music CDs, etc. It's a well known fact that this can happen, and I have the infected media to prove it! Care to trade? Besides, I can cite definite proof that it's possible for onboard spyware hiding in the Macintosh system to infect media, in this: Recently I purchased Aladdin Systems' Internet Cleanup, version 1.0., made for OS-X. Visiting the Aladdin web site after installation to register and check for updates, I discovered that version 1.0 had been bumped up to 1.1; so I downloaded the update. Several weeks later OS-X (in version 10.3.2) suffered a fatal browser-based error of the hacker variety that forced me to go through a format/reinstall. After OS-X was in place I began restoring all my favorite aftermarket software... and ran the Internet Cleanup 1.0 CD again. To my surprise the version that installed was 1.1! Now, how'd that happen? For this reason it makes sense to avoid saving anything to CD/DVD once spyware is suspected, and to consider, as well, what may be lurking in your most recent backup.

Fortunately, the circumstances that led me to format and reinstall OS-X had stemmed from a browser-based attack on Safari, not from spyware. Safari and Java 1.4.1 were irrepairably damaged, but not infected. That's where doing your homework pays off in maintaining clean, periodic backups. It also pays to realize that virtually everything you store in your computer remains in a permanent record, secreted away some place within Apple's hardware matrix. Format procedures and hard drive wipes won't affect it. What could it be... where, and why? -- Apple denies any knowledge. Again, why? (Dejavu of unca Billy?)

By the same token, it makes sense that Mac users find ways to avoid running OS-X install media during spyware-ridding format procedures. If you've done this even ONCE, (and practically every Mac user has) the OS-X media could be infected! Although I know of no specific commercial offering of a made-for-OS-X floppy-run wiper, it occurs to me that a tool such as WipeDrive from AccessData Corp., (accessdata.com) should be able to do the trick on a Mac hard drive, the same as a Windows FAT or NTFS partition; it would have to be coded for Mac, of course, but after all, Apple drives are standard ATA, partitioned in the Apple_partition_scheme. Any company that makes disk wipers should be able to supply what you need.

Very few Apple-Macintosh users ever bother to make sure new drives are clean before installing the OS. My policy as a paranoid Schlitzophrenic is to run any new drive through the formatting ringer before placing an operating system on it. Then I know it's clean! Never enter sensitive information that you can't afford to lose into ANY COMPUTER, including Apple-Macintosh. Be old fashioned; keep personals in a safe. And know that when buying a new computer you have to ask questions, like for instance, is the hard drive a standard, first line, numbered unit from the manufacturer... or a generic OEM unit? And if the OS is preinstalled... (if you accept it that way... and this is asking for trouble) you, the buyer have a right to set up your computer *in the store* BEFORE paying the money- so you can examine the file system and operability. the sales staff will try to discourage you from this, claiming you can always bring the computer back if anything's wrong, etc., etc. Don't let 'um. If they persist, use your foot-power and walk out. You'll be doing yourself a big favor. My impression has been that Apple stores- not 'authorized resellers' -- have the best and most reliable deals. You may pay a little more... but it's worth it.

For the truly paranoid, (no no...paranoia is good) it may be wise to make backup copies of wiper media prior to first usage. Storing the main program on a CD-R would be ideal, as from there you can create all the floppies you want without ever running out. Going that route the CD will never be placed into harm's way during an infection episode, where risk of contamination is a factor. After each wipe and subsequent reinstall, against the chance that the floppy may now have 'kooties'... it would be wise to simply toss it and create a new copy. The little floppy disks are cheap by today's standards; you can get them in ten-packs for only a few dollars. Even if you only use a floppy wiper once then throw it away... what of it? With a cleanly wiped drive and fresh OS, you'll be able to make boo-coos of cheap replacements. Floppy drives are two-way streets, ya' know, just like CD-RWs. Gotta watch what you're doing.

If a wiper program could be run from CD-ROM... and if your Mac had two separate removable CD-ROM drives, a CD-R, say, and a CD-RW -- it would be safe to run the wiper from CD-R. But except in older Macs, that system is no longer available. I wonder why that is? But regardless, once your Mac drive is overwritten and sparkling clean, reinstall OS-X from a saved, recent image... and viola- you're done!

We don't need no stinking spyware removers! Besides... on average, decent people, like those of you with a POSITIVE interest in the subject of this article- have no concept of the depths of corruption that exist within the global software industry. It's easy to get burned when you go into something with both eyes shut. So... here's some strong coffee for you, pertaining to removers and the people who make them.

So you thought you had an advocate?

Virtually ALL entities offering spyware-detection-and-removal software (that I know of) are apparently in league with the mob or cooperating with its agenda; doing little or nothing to oppose it. In other words, those who pose as Samaritans, offering victims 'blessed' help in dealing with spyware infections... and those actually causing the infections... are all identically-minded members of the same group... known, without mincing words, as organized Jewry. They are 'the tribe,' if not the mob, masquerading among themselves in an outrageous facade as 'opponents.' It's all a colossal dog-and-pony show; smoke and mirrors... a new-age cyber-spin on the old good-cop-bad-cop routine... designed to trick victims of their data-mining agenda into believing they have an advocate. Money changes hands. Mob hackers go around grinning untill their faces ache about the... schtupid goyim, whom they've duped, harassed and used for profit. I'm sure I saw something on television recently about a strange facial anomaly to the cheeks that has begun appearing among these fine people... caused by going over extended periods with the tongue reposed in that region of the mouth. And they can't figure out why the world hates them?

Those who honestly believe they will be able to obtain genuine, FREE help in removing spyware- from ANY source- are being fooled. Sure, if you can pay hundreds or thousands of pounds or dollars for personal security, you can obviously afford to be spyware-free. No sweat; money talks. Yet for the rest of us the spyware removal industry represents not a friend... but a sickening, albeit recent one-up on the old mob protection racket- the new twist being that mob profiteering techniques have now expanded to cyberspace.

As things stand at present in re low cost 'professional' spyware removal, the situation is grim. It appears that Mac people are beginning to come around to that realization; Intelligent and savvy Windows users have known it for some time. It's why we must all become more astute in ways of manually detecting and removing mob-ware.

Any of you who've had a pre-OS-X 10.3.4 version Mac infected with spyware- or a Windows platform stymied with CWS- know that none of the so-called scanner/remover tools- 'free' or commercial- will deal with the bad stuff. They won't even detect it in most instances, despite the CWShredder facade. Why? ... Ans: Because of collusion between the various mob factions, including unca billionaire Billy's club... whereby secret agreements are made in low places to omit detection and removal of lucrative components and/or built-in corporate data miners. This maintains the advocacy illusion among the gullible, while perpetuating profits from the latest data-miners. Would the mob cut its own throat, telling victims how to remove immensely profitable, opiated sugar teats?

I truly believe that a certain young German lad of some acclaim had the same desire a few years ago, and tried to do just as my pipe dream asserts. But his life was soon monopolized by mob interests... the tribe... who increasingly suppressed his freedom- even to communicate openly with clientele lest he be accused of anti-Semitism. Now he leads the sorry life of a broken, morally bankrupt and ethically debased coward. Nevertheless, I'd rather think of him thus than concede that he went over to the rodent side. Germany, remember, is a land where free speech is prohibited. The wise will understand... but this is what the mob does to any who are not preparred for their initially sweet siren song, that all too soon turns into hard, dictatorial demands.

Yes, the spyware-helper forums, including various Mac forums, pretent to be your advocate... 'helping' you solve your problem. Yeah. Sure. And who knows- maybe some of you reading this blurb DID get help; I'm not saying no one ever benefits... maybe you were satisfied. But for most of us, that simply isn't the case. Of course it's true that members of a certain tribe receive 'special' benefits; not so for the rest of us. If you're a 'tribalist,' it's likely your needs were satisfied.

'Victims' posting at the various forums and getting recognition- getting 'help'- I make to be members of the tribe who are either on a mob payroll at some advertising firm or 'riding for the brand' independently. That is to say they're cooperating with the Jewish mob, tongues-in-cheek, thespians one and all; putting forth an element of pretentiousness designed for one purpose: To trick the honest victim (read gentile) into believing the forum and its plethora of recommended 'free' removal tools (each of which downloads more infecting parasites and/or serves as repository for whatever the current, premiere spyware agent happens to be)... has his best interests at heart. Hey... that's Holywood!

The real truth is so vile and callous that many refuse to believe it; it is actually inhuman. Yet the sole purpose of such forums and their cold-blooded software ghouls is to perpetuate the mob's data-mining agenda, infecting as many new victims (= revenue) as possible. It could also be added that if any sincere dupe-cum-wizened-victim gets a belly-full and begins posting the truth in such places, his posts will suddenly disappear and he'll be quickly blocked from further access, membership be damned. Did you happen to see the movie "The Matrix?" -- It's an arrogation of what's described in this article... the power THEY have over us.

Data mining rules as a weapon of profit used in the distruction of free speech! When will we begin to realize that there are only two ways of dealing with spyware: Becoming proficient in finding and removing it ourselves, doing as suggested above by making backups -- and by demanding greater enforcement of existing legal statutes, coupled with the broad-scale issuance of arrest warrants. For Windows users the key to being spyware-free lies in NOT buying install media from re-sellers, because doing so is only asking for trouble. As well, the wise will buy new computers with blank drives and install the OS from first-line, clean media obtained directly from the manufacturer. That way an advantage is gained which may be allegorized in this old, trite joke:

A man developed accute appendicitis one day and was rushed to the hospital. After a brief examination the attending physician rushed the near-critical patient into the operating room and commenced applying anesthesia. Next thing the man knew he was waking up in recovery with mounting abdominal pain and missing his right leg, which had been amputated above the knee! Next to him, still asleep from anesthesia, lay a man with his right leg all swolen and black up to the knee... and sporting a fresh dressing over his abdomen. Putting two and two together, the victim soon realized that a mistake had been made, and that he was the brunt. Happily for him, the other fellow had been treated to a free apendectomy!

Soon legal assistance was retained and the new amputee filed a malpractice suit against the hospital and bumbling surgeon. On court day the complainant sat in his wheelchair before the judge... his right trouser-leg filled with stale air. Just as he was contemplating a huge punitive settlement His Honor suddenly banged the gavel hard three times and proceded to throw the whole case out, claiming the amputee didn't have a leg to stand on. The real punchline is this: When you buy from re-sellers, what you're getting is not an operating system, but a revenue source for hackers and data-miners. After using such infected media for, say, about six months or longer it will eventually come to you that the incessant hacker episodes you're experiencing aren't being caused by anything you're doing wrong in regard to security; it's the install media!

The nice, shiny install CD you got at such a low price- possibly with your new computer- may be infected with at least 40 or more parasites and Trojan horses. If this is your situation it precludes any possibility that you will ever be able to enjoy personal security. You have to cut the thether that rodent mentalities have bound you to and act positively to remove their involvement from your life. This process must begin with a first step... which is that of admitting to yourself that the price you paid for the new computer bringing you this news... was exorbitant. It's known as getting burned... and like our victim of medical malpractice you don't have a leg to stand on, because "the law" will do nothing, and Microsoft will merely clip you, quite nonchalantly, an additional $45 or so for a clean CD (if you qualify). The free lunches ended when you left home.

If you're reading this message you have both a computer and a telephone... use them! Make a polite pest of yourself by frequently calling/writing/emailing/faxing your elected representatives' offices and demanding change in the form of benevolent government involvement in assisting the general public with removal of spyware. If laws were passed to force the advertising industry rodents to immediately furnish kill/removal codes for all spy/ad-ware components and mandate that the targeted user would have to give his consent before anything could be done, this would be a freer nation! Remember... the squeaking wheel gets the grease!

Cancer, once discovered, must be excised at its root. Who ever heard of a doctor... a surgeon... giving any cancer patient two APCs and saying "call me in the morning?" -- Or of treating a compound fracture with a bandaid and an aspirin? (Of course, bad as things are these days regarding healthcare it must be admitted that the above scenario takes on a sickening ring of truth.)

...Using the greatest teaching tool of all, analogy, we realize that the same principle applies to the spyware issue as to medicine. Until those factions creating and deploying spyware have been routed at the source and arrested, the invasion of our personal lives will continue unabated. Hail Mr. Putin for your courageous actions against Kodorkhovski and Yukos! Mr Putin's efforts in dealing with the Russian Jewish mafia and its titular, collective head, the Russian oligharchs, are commendable. It is this band of traitorous thieves to which Mr. Kodorkovsky belongs. The latter's cohorts in crime fled to Israel after stealing billions from the Russian people, in the period that ensued after the collapse of Communism. Jewish robber-barons almost backrupted the Russian Treasury, and it goes strongly to Mr. Putin's credit that he has made such great strides of economic recovery in the face of overwhelming adversity.

The Jewish element had long been in power in Russia when the wall fell; in its wake- still linked to the bastions of Bolshevist power- the oligharchs took everything that wasn't nailed down, then fled with the bounty. Putin is now recovering a large chunk of those illicit spoils for the people. There in Israel Mr. Khodorkovsky's colleagues have found safe haven among birds of the same feather... and you can just bet that he'd like very much to join them there.

The Russian/Israeli mob are responsible for much of the data mining and spyware outrage we suffer in the US, with the full cooperation of the American Jewish mob. Thankfully, Mr. Putin's influence in eastern Europe is causing some ... *problems* for the chosenites. This is good.

Spyware is every American's business because it demeans and abases our First Amendment rights. Let us all have the courage to stand up for freedom! remember... it's much easier to hold on to something than to reclaim it once lost. Many millions of dead men and women 'stand' in mute testimony to this great Truth. Freedom isn't free! Pay it no attention and it WILL GO AWAY!

Food for thought.

Best to All,

Mike Andrews

--------------------------------------------------------------------------------

Source: Author Printed from National Vanguard

Link to comment
Share on other sites

Today in Germany alone more than 5000 political prisoners are rotting in dungeons for doing no more than uttering words that fall under the definition of hate speech -- which' date=' basically, is anything Jews hate to hear. German citizens who make the mistake of questioning any aspect of organized Jewry- especially regarding [b']the holohoax

[iMAGE LINK REMOVED DUE TO OFFENSIVE CONTENT]

What, you mean this?

Holocaust Denial is about on a par with joining a flat-earth movement and insisting that the world was created as it is now by God in 1972. :moody:

Link to comment
Share on other sites

Guest Neubeatz

fuel

THE ROVING EYE

A thousand Fallujahs

By Pepe Escobar

"The bombs being dropped on Fallujah don't contain explosives, depleted uranium or anything harmful - they contain laughing gas - that would, of course, explain [Pentagon chief Donald] Rumsfeld's misplaced optimism about not killing civilians in Fallujah. Also, being a 'civilian' is a relative thing in a country occupied by Americans. You're only a civilian if you're on their side. If you translate for them, or serve them food in the Green Zone, or wipe their floors - you're an innocent civilian. Just about everyone else is an insurgent, unless they can get a job as a 'civilian'."

- Riverbend, an Iraqi civilian girl, author of the blog Baghdad

Burning

Once again the US has been caught in a giant spider's web. Fallujah now is a network: it's Baghdad, Ramadi, Samarra, Latifiyah, Kirkuk, Mosul. Streets on fire, everywhere: Hundreds, thousands of Fallujahs - the Mesopotamian echo of a thousand Vietnams. The Iraqi resistance has even regained control of a few Baghdad neighborhoods.

Baghdad residents say there are practically no US troops around, even as regular explosions can be heard all over the city. Baghdad sources confirm to Asia Times Online that the mujahideen now control parts of the southern suburb of ad-Durha, as well as Hur Rajab, Abu Ghraib, al-Abidi, as-Suwayrah, Salman Bak, Latifiyah and Yusufiyah - all in the Greater Baghdad area. This would be the first time since the fall of Baghdad on April 9, 2003, that the resistance has been able to control these neighborhoods.

Massive US military might is useless against a mosque network in full gear. In a major development not reported by US corporate media, for the first time different factions of the resistance have released a joint statement, signed among others by Ansar as-Sunnah, al-Jaysh al-Islami, al-Jaysh as-Siri (known as the Secret Army), ar-Rayat as-Sawda (known as the Black Banners), the Lions of the Two Rivers, the Abu Baqr as-Siddiq Brigades, and crucially al-Tawhid wal-Jihad (Unity and Holy War) - the movement allegedly controlled by Abu Musab al-Zarqawi. The statement is being relayed all over the Sunni triangle through a network of mosques. The message is clear: the resistance is united.

The mobile mujahideen

Fallujah civilians have told families and friends in Baghdad that the US bombing has been worse than Baghdad suffered in March 2003.

The Fallujah resistance for its part seems to have made the crucial tactical decision of clearing two main roads - called Nisan 7 and Tharthar Street - thus drawing the Americans to a battle in the center of town. Baghdad sources close to the resistance say that now the Americans seem to be positioned exactly where the mujahideen want them. This is leading the resistance to insist they - and not the Americans, according to the current Pentagon spin - now control 70% of the city.

There are at least 120 mosques in Fallujah. A consensus is emerging that almost half of them have been smashed by air strikes and shelling by US tanks - something that will haunt the United States for ages. The mosques stopped broadcasting the five daily calls for prayer, but Fadhil Badrani, an Iraqi reporter for BBC World Service in Arabic and one of the very few media witnesses in Fallujah, writes that "every time a big bomb lands nearby, the cry rises from the minarets: 'Allahu Akbar' [God is Great]".

Badrani also disputes the Pentagon spin: "It is misleading to say the US controls 70% of the city because the fighters are constantly on the move. They go from street to street, attacking the army in some places, letting them through elsewhere so that they can attack them later. They say they are fighting not just for Fallujah, but for all Iraq." The mujahideen tactics are a rotating web - Ho Chi Minh's and Che Guevara's tactics applied to urban warfare by the desert: snipers on rooftops, snipers escaping on bicycles, mortar fire from behind abandoned houses, rocket-propelled-grenade attacks on tanks, Bradleys being ambushed, barrages of as many as 200 rockets, instant dispersal, "invisible" regrouping.

Iraq's borders with Syria and Jordan, all highways except a secondary road leading to the borders, plus Baghdad's airport, all remain closed. Baghdad in theory has become an island sealed off from the Sunni triangle - but not for the resistance, which keeps slipping inside. Hundreds of Iraqis are stuck on the Syrian border trying to go back home.

Riverbend, the Iraqi girl blogger quoted above, writes of "rumors that there are currently 100 cars ready to detonate in Mosul, being driven by suicide bombers looking for American convoys. So what happens when Mosul turns into another Fallujah? Will they also bomb it to the ground? I heard a report where they mentioned that Zarqawi 'had probably escaped from Fallujah' ... so where is he now? Mosul?"

He could well be in Ramadi, where hundreds of heavily armed mujahideen now control the city center - with no US troops in sight.

Tough tactics

The Pentagon is pulling out all stops to "liberate" the people of Fallujah. According to residents, the city is now littered with thousands of cluster bombs. In an explosive accusation - and not substantiated - an Iraqi doctor who requested anonymity has told al-Quds Press that "the US occupation troops are gassing resistance fighters and confronting them with internationally banned chemical weapons". The Washington Post has confirmed that US troops are firing white-phosphorus rounds that create a screen of fire impervious to water.

Dr Muhammad Ismail, a member of the governing board of Fallujah's general hospital "captured" by the Americans at the outset of Operation Phantom Fury, has called all Iraqi doctors for urgent help. Ismail told Iraqi and Arab press that the number of wounded civilians is growing exponentially - and medical supplies are almost non-existent. He confirmed that US troops had arrested many members of the hospital's medical staff and had sealed the storage of medical supplies.

The wounded in Fallujah are in essence left to die. There is not a single surgeon in town. And practically no doctors as well, as the Pentagon decided to bomb both the al-Hadar Hospital and the Zayid Mobile Hospital. So far, the International Committee of the Red Cross has reacted with thunderous apathy.

The Sunni revolution

When a few snipers are capable of holding scores of marines for a day in Fallujah - an eerie replay of the second part of Stanley Kubrick's Full Metal Jacket - and when eight of 10 US divisions are bogged down by a few thousand Iraqis with Kalashnikovs and grenade launchers, the fact is the US does not control anything in Sunni Iraq. It does not control towns, cities, roads, and it barely controls the Green Zone, the American fortress in Baghdad that is the ultimate symbol of the occupation.

In 1999, the Russians bombed and destroyed Grozny, the Chechen capital, a city of originally 400,000 people. Five years later, Chechen guerrillas are still trapping Russian troops in a living hell there. The same scenario will be replayed in Fallujah - a city of originally 300,000 people. All this destruction - which any self-respecting international lawyer can argue is a war crime - for the Bush administration to send a brutal message: either you're with us or we'll smash you to pieces.

The Iraqi resistance does not care if thousands of mujahideen are smashed to pieces: it is actually gearing up for a major strategic victory. The strategy is twofold: half of the Fallujah resistance stayed behind, ready to die like martyrs, increasing the already boiling-point hatred of Americans in Iraq and the Middle East and boosting their urban support. The other half left before Phantom Fury and is already setting fires in Baghdad, Tikrit, Ramadi, Baquba, Balad, Kirkuk, Mosul and even Shi'ite Karbala.

They may be decimated little by little. But the fact is Sunni Iraqis are more than ever aware they are excluded from the Bush administration's "democratic" plans for Iraq. The only Sunni political party in interim premier Iyad Allawi's "government" is now out. And the powerful Association of Muslim Scholars (AMS) - the foremost Sunni religious body - is now officially boycotting the January elections. There are unconfirmed reports that Sheikh Abdullah al-Janabi, the head of the mujahideen shura (council) in Fallujah and a very prominent AMS member, died when his mosque, Saad ibn Abi Wakkas, was bombed.

The Sunni Iraqi resistance is now configuring itself as a full-fledged revolution. According to sources in Baghdad, the leaders of the resistance believe there's no other way for them to expel the American invaders and subsequently be restored to power - especially because if elections are held in January, the Shi'ites are certain to win. Contemplating the dogs of civil war barking in the distance, no wonder Baghdad's al-Zaman newspaper is so somber: "Iraq will remain a sleeping volcano, even if the state of emergency is extended forever."

(Copyright 2004 Asia Times Online Ltd. All rights reserved. Please contact content@atimes.com for info7rmation on our sales and syndication policies.)

Link to comment
Share on other sites

Jews have fomented terror against all nations selfishly' date=' viciously and greedily. Jews ARE terrorism incarnate. The Arabic-islamic peoples, if left alone to live their lives in peace, unmolested, would still regard America as a friendly nation. Our world would be a much safer place and many of our children would still be among the living... if not for Jews. Some of you who are members of the 'over 50' set may recall an old Bob Dylan tune named "If not for you." Just rearrange the lyrics a bit so that they read 'If not for Jew' ...and there you have it in proper context. Gullible Christian fundamentalist lackeys, whom Jews are now leading by a tether attached to their noses... are also at fault. As stipulated in Law, ignorance is no excuse.

[/quote']

Bob Dylan was a Jew you idiot.

your whole post sucks baws. go away

Link to comment
Share on other sites

[iMAGE LINK REMOVED DUE TO OFFENSIVE CONTENT]

What' date=' you mean this?

Holocaust Denial is about on a par with joining a flat-earth movement and insisting that the world was created as it is now by God in 1972. :moody:[/quote']

Sorry Neil, but how can you deem that image offensive, but not think that this guy's racist rant isn't worthy of censorship and/or banning?

Link to comment
Share on other sites

Guest tv tanned
Sorry Neil' date=' but how can you deem that image offensive, but not think that this guy's racist rant isn't worthy of censorship and/or banning?[/quote']

Never saw the image but I agree entirely with the second part of your statement.

Link to comment
Share on other sites

Guest Neubeatz
Jews, Politics and Spyware: A Word on Computers

Opinion; Posted on: 2004-07-21 22:31:24

Detailed instructions for the secure PC and Mac

by Mike Andrews

I am not Mike Andrews, my views and opinions are not his,

The post came directly from his website.

I dont believe that its a serious website, and did not think that by posting it would prompt people into saying I should be banned or censored.

But I forget, this Aberdeed, or Adeedberd

If anyone wants to talk to me about political idealism, racism, equal rights and justice,

Use the PM.

:up:

Link to comment
Share on other sites

  • 4 years later...
I didn't, he was fucking hilarious. :(

He was a borderline lunatic. He just fucking wound people up with his terrifying views, and the scariest part was he wasn't even trolling, he actually meant every word of it. I still expect to read about him bursting into a primary school with a shitload of guns.

Link to comment
Share on other sites

He was a borderline lunatic. He just fucking wound people up with his terrifying views, and the scariest part was he wasn't even trolling, he actually meant every word of it. I still expect to read about him bursting into a primary school with a shitload of guns.

I dunno, I came on here at the tail end of his campaign. He was obviously just doing it to piss people off and it was fairly hilarious from an outside perspective. I imagine he's probably quite normal, but a tad neurotic.

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...