Category: News

  • Under the DeVos administration how will our kids meet their best friends?

    Best friends are found in schools
    Best friends are found in schools

    Most people’s best and oldest friends are from our early schools days. DeVos is known to take the life long pleasure of socialization so that if a child or parent signs in online for 1 minute the “privateering school” seems legally is entitled to steal tax payers money.  If tax dollars earmarked for education go to pay for private homes of girlfriends instead of education, it should be wrong.  But DeVos disagrees and the GOP gives her free reign to create theft rings.  More

    Eli Broad who sponsors the best and most high performing charter schools in the country tried to stop her plan to defraud the public much like her brother Eric Prince did with his billions Dollar thefts in war of Iraq with his privateering military company Blackwater. To this day Eric Prince finds it offensive that people hold him accountable as to how he spent taxpayers money. Eric Prince said in recent interviews in an Alt-Right media company that he should not be accountable because the missing Billions and Billions of dollars were spent in a “private” military company and therefore he should not have to disclose the where the missing money went nor where it is now.

    The only lesson the public can learn is how bottomless the sense of entitlement has become under our dysfunctional government that provides no oversight and no accountability of how and where our rapidly disappearing taxes and pensions has become. Unrepentant thieves have overthrown the government. DeVos will be a disastrous example of self righteous thievery of billions of taxpayers money due to funneling American public funds into “private” pockets. Another billion dollar heist is underway and sanctioned by Paul Ryan and McConnell. No wonder they want to silence the voices of reason.

  • Celebrate life in a healthy way! Show this to endangered adults and endangered teens

    National Overdose Deaths—Number of Deaths from Prescription Drugs. The figure above is a bar chart showing the total number of U.S. overdose deaths involving prescription drugs from 2001 to 2014. The chart is overlayed by a line graph showing the number of deaths by females and males. From 2001 to 2014 there was a 2.8-fold increase in the total number of deaths.

    National Overdose Deaths—Number of Deaths from Prescription Opioid Pain Relievers. The figure above is a bar chart showing the total number of U.S. overdose deaths involving opioid pain relievers from 2001 to 2014. The chart is overlayed by a line graph showing the number of deaths by females and males. From 2001 to 2014 there was a 3.4-fold increase in the total number of deaths.

    Doctors need to become aware that maybe they are vulnerable to strong man sales techniques.

    ProPublica found that doctors nationally who accepted payments from manufacturers were two to three times as likely to prescribe high rates of brand-name drugs. The higher the payments on average, the higher the rate of brand-name prescribing.

    The NYT in an article by Dr. Arias, who is preparing a larger study of mortality trends over the past 15 years, said drug overdoses, liver disease and suicide were the main drivers of the gloomy trends among whites in recent years, a pattern also found by other researchers. Life expectancy for whites had been rising for decades, but it has stagnated in recent years. It inched up in 2010 and 2011, and was flat in 2012 and 2013. But new federal data, drawn from all deaths recorded in the country in 2014, showed that life expectancy for whites dropped to 78.8 years in 2014

    Particularly Oxycontin has caused addiction which often leads to abuse of Heroin. It is a deadly drug.

    Unless you are already dying from an incurable cancer, there is really no reason to take a drug that can cause you to become a drug addict.  As a dying person it is okay only because you are going to die anyway.   Before even considering taking an opioid make sure you internalize the consequences for short-term relief.

    Side Effects and Warning for Oxycontin

    Never take this medicine in larger amounts, or for longer than prescribed. Do not crush or break an extended-release Oxycontin tablet. Swallow it whole to avoid exposure to a potentially fatal dose.

    Advertisement

    OxyContin is be habit-forming, even at regular doses. Take this medicine exactly as prescribed by your doctor. Never share the medicine with another person. MISUSE OF NARCOTIC PAIN MEDICATION CAN CAUSE ADDICTION, OVERDOSE, OR DEATH, especially in a child or other person using the medicine without a prescription.

    Tell your doctor if you are pregnant. Oxycodone may cause life-threatening withdrawal symptoms in a newborn if the mother has taken this medicine during pregnancy.

    Do not drink alcohol. Dangerous side effects or death could occur.

    Enjoy the holidays and stay safe!

  • GOP who stopped Obama from releasing Russian cyber attacks. How they will respond to the Trump and Putin alliance will determine the future or demise of the free world.

    World Peace in the hands of Tillerson?
    World Peace in the hands of Tillerson?

    “The sanctions are targeted, not sectoral, and will have a very limited impact,” said Thomas Wright, a fellow and director of the Project on International Order and Strategy at the Brookings Institute. “This will not deter Putin from interfering in French or German elections in 2017.”

    Thomas Wright also suggests that:  “Trump is opposed to America’s alliance arrangements, he is opposed to the open global economy, and he is pro-authoritarian and pro-Russian.  That it is pretty clear this is the most important election anywhere in the world since the two German elections of 1932,” he wrote, in reference to the parliamentary elections that ultimately resulted in Adolf Hitler coming to power. “No other election has had the capacity to completely overturn the international order—the global economy, geopolitics, etc.”

    In the Atlantic Monthly article Thomas Wright further explains: “Trump’s isolationist ideology has three components, according to Wright: 1) opposition to U.S. alliances; 2) opposition to free trade; and 3) support for authoritarianism. In Wright’s view, these three beliefs, if translated into policy in a Trump administration, could do away with the liberal international order that the United States helped design after World War II and has led ever since.  Full Article

    Thomas Wright explains in a report for the Lowy Institute for International Policy:  “To understand Donald Trump’s foreign policy, we must distinguish between his three core beliefs that he has held for many decades and rarely if ever wavered from, the central themes of his campaign, and other issues. His core beliefs are opposition to America’s alliance arrangements, opposition to free trade, and support for authoritarianism, particularly in Russia. If he is elected president and governs in a manner consistent with these beliefs, the United States will be transformed from the leader of a liberal international order into a rogue superpower that withdraws from its international commitments, undermines the open global economy, and partners with Putin’s Russia.” Full Report

    How the GOP responds to the Trump and Putin alliance forged to transform the US into a rogue country that works solely for a few chosen corporation – just like Russia is now – will determine our future and the future of the free world.

    Source: Thomas Wright quotes from a variety of sources. For more information feel free to contact him directly at The Brookings Institute

  • Cyber Warfare attacks by Russians are happening all over the US

    Down the Rabbit Hole we go.
    Down the Rabbit Hole we go.
    The US Government released a report and recommends that all citizens and companies take pre-cautions.

    The Department of Homeland Security (DHS) recommends that network administrators review the IP addresses, file hashes, and Yara signature provided and add the IPs to their watchlist to determine whether malicious activity has been observed within their organizations. The review of network perimeter net flow or firewall logs will assist in determining whether your network has experienced suspicious activity. When reviewing network perimeter logs for the IP addresses, organizations may find numerous instances of these IPs attempting to connect to their systems. Upon reviewing the traffic from these IPs, some traffic may correspond to malicious activity, and some may correspond to legitimate activity. Some traffic that may appear legitimate is actually malicious, such as vulnerability scanning or browsing of legitimate public facing services (e.g., HTTP, HTTPS, FTP). Connections from these IPs may be performing vulnerability scans attempting to identify websites that are vulnerable to cross-site scripting (XSS) or Structured Query Language (SQL) injection attacks. If scanning identified vulnerable sites, attempts to exploit the vulnerabilities may be experienced.

    Commit to Cybersecurity Best Practices

    A commitment to good cybersecurity and best practices is critical to protecting networks and systems.

    Here are some questions you may want to ask your organization to help prevent and mitigate against attacks.

    1. Backups: Do we backup all critical information? Are the backups stored offline? Have we tested our ability to revert to backups during an incident?

    2. Risk Analysis: Have we conducted a cybersecurity risk analysis of the organization?

    3. Staff Training: Have we trained staff on cybersecurity best practices? 4. Vulnerability Scanning & Patching: Have we implemented regular scans of our network and systems and appropriate patching of known system vulnerabilities?

    5. Application Whitelisting: Do we allow only approved programs to run on our networks? 6. Incident Response: Do we have an incident response plan and have we practiced it?

    7. Business Continuity: Are we able to sustain business operations without access to certain systems? For how long? Have we tested this?

    8. Penetration Testing: Have we attempted to hack into our own systems to test the security of our systems and our ability to defend against attacks?

    For the full document with more valuable advice:  Click