Friday, December 16, 2022

The mentality and quality of Bulgarian PC Repair services....

      Did you had a computer, serviced under warranty services to see that the technician sucks dicks and mess up your computer to behave worse than when it was given for upgrades?

 I had such issue with my Lenovo Thinkstation D20. I gave my Lenovo for warranty services upgrades of RAM, with clear and specific instructions what i want done, instructions based on Intel's ark website for the CPU at hand, found here:
https://ark.intel.com/content/www/us/en/ark/products/52576/intel-xeon-processor-x5690-12m-cache-3-46-ghz-6-40-gts-intel-qpi.html

Based on the CPU specs as noted by the manufacturer, i explicitly requested 12 sticks, 8 GB per Stick of ECC, DDR3, 1333 Mhz RAM. This exact  RAM specifically. I also Specifically and explicitly mantioned i want 12 identical sticks - same make and model, same manufacturer, same specs.


where it is clearly stated, that the CPU can manage DDR 3, ECC, 1333 Mhz RAM. So based on the Lenovo's specifications, found Lenovo's Support website, it was stated that after a Bios Upgrade to 2 versions before last, the Workstation becomes capable to support and manage 96 GB ram, using 12 RAM sticks of 8 GB per stick, separated in two pools of 48 GB per pool - 6 sticks, of 8 GB per stick, one memory pool for every CPU. For those of you who struggle to figure it out by themselves alone, i use X58 Server grade chipset with support for 2 CPUs, and both CPU sockets are in use, i run 2 CPUs both are Xeon X5690 - also server grade CPU.

Well i updates to the latest BIOS, so BIOS is now ok. This is where my visit to service came in play. I went to the service, and i requested upgrade or RAM, replacing 12 sticks of 4 GB per stick of ECC, DDR3 ,R1, 1066 RAM, with 12 sticks of 8 GB per stick, ECC, DDR3 1333 MHZ, using Intel Ark site for a guide what RAM to select.

2 days later, i took my computer "done and ready" to find my Linux crashes or random. WTF? it did not crashed before the upgrade, it was stable as a rock. I also notices a bit sluggish performance issue - it is not as snappier as before the upgrade. WTF? Upgrading RAM this way should not slow it down, yes i will not feel bombastic speed upgrade, but it will be able to handle much heavier workloads, without performance penalty.

I pulled my bag of tricks - my bag of bootable USB drives.

I used mu distribution's boot usb, to run the live environment and test. I verified my Linux install is not corrupted.

I used another bootable USB, and I ran GRC's Spinrite 6.0 on Level 2, which is extensive READABILITY test, WITHOUT any writing, verified my SSD is not corrupted,

I rebooted, I used another bootable USB with Hiren's boot DVD, and trimmed my SSD, Then i ran Intel CPU test. The test recognized chipset and CPU setup correctly.

Test crashed. Were Intel Xeon beasts defective? Not likely - Xeon is tough beast, but not impossible.

I removed all the ram and i installed some spare non ECC sticks of DDR 3, 1333 mgz, 2 sticks, 4 GB per stick, one per every CPU pool. I ran Intel CPU test again. It passed with clean bill of health and lower temps, compared to previous setup. Another WTF, how i get lower temps on same workload, for the same duration, and same intensity, same coolers, same fans, same thermal paste, in the same room and same ambient temperature between tests? Well being left without much to do except complaint to service for bad work, i said to my self, f*ck these c*cksuckers, these c*cksuckers are useless pieces of shit.

I decided to see that else they screwed on my computer - going into BIOS, password was placed. I called to ask them for the password, and ask them why they lock me out from my computer. They said "This is a system ares and we reset it to fail-safe defaults, and we locked it, for your own good. I asked what else they did, they said they re-pasted the CPU's, explaining the brand of paste they used. It was a cheapo-crap piece of bulk paste sold i 5 liter buckets to cheap cents. Thermal conductivity around 1.3 watts/Meter-Kelvin - for the non-initiated, in the cooling this crap is so shitty that CPU cools better without thermal paste, compared to this cheapo crap. Ok, I pushed the clear CMOS button to reset CMOS in factory defaults, i examined my fans, all of them were set in non-optimal configuration - front and rear fans acted as intakes and CPU cooling fans were facing up. Well There is no laminar flow in the case to ensure proper cooling, and fast expel of the heat.

Well, i took the CMOS battery out, and i removed all fans, all heatsinks, thoroughly cleaned the CPU and heatsinks, I went out i bought some decent thermal paste - Thermal Grizzly Kryonaut Extreme, which is premium grade, premium performance thermal paste - 14,2 watts/MK, it smokes the living daylight out of the cheapo poop i found on my CPU's after the technician.

I Re-pasted my CPUs again, installed the heat sinks in their correct orientation, and i reinstalled all fans to their correct orientation, so the front is intake, the rear is exhaust, and both CPU fans blow in the same direction as the general airflow created by the intake and exhaust fans. there now i have good paste, and optima cooling based on even laminar airflow, trough the case, expelling heat faster, and maintaining even lower noise, and cooler case and cooler processors.

I placed the CMOS battery back, i went into BIOS, and readjusted power options, turbo ptions, P states and C states as recommended for Westmere generation CPU, again information on that - ark.intel.com for the CPU in question.

Well so far so good. I put 8 GB ram again, the 2 x 4 gb as known good ram and compliant to specs RAM, intel cpu test for 190 minutes buning torture - My CPU's were much cooler - 58C on the package for CPU 0 and 54 C for CPU 1.

Well i put the RAM from the warranty service again, ran tests again intel CPU test crashed. It took it deeper into the test, it took it longer before it crashes, but it crashed. CPU temps: 68 C on the packace for CPU 0 and 64 C on the package for CPU 1. WTF?

Then i pulled one more USB flash drive, running Memtest X86. This is where it all came clear - all 12 modules were random mix of ECC, DDR3, 1600 and 1866, Neither of which are supported by the CPU and they are mixed speed, mixed settings mixed timing, mixed steppings. So The CPU used the lowest common denominator to make them work somehow with non-compliant RAM. The slow down is coming from mixing and matching speeds to the lowest common denominator, the crashes came because none of the sticks were supported as noted in the ark.intel.com specs for the CPU. All of the 12 sticks were unsupported. 


I collected all the evidence i could, i filed a complaint against the service into authorities, and with the same evidence i demanded my money back accusing them for being dishonest cheap cheats, and telling them that i already gave all evidence to authorities and i already have the complaint filed and working. Well they did not gave me my money offered free repairs, i asked why? to screw up my computer again? i just rebuilt the whole thing to get it into correct build. I demanded my money back and i told them i will not recall authorities. Well Waiting for authorities to come and make their judgement.

I just purchased 12 identical Samsung RAM Sticks of ECC, R2, DDR3, 1333 Mhz RAM, as recommended on ark.intel.com and the RAM Sticks are in delivery. Once they arrive i will replace them, and i will continue to work with authorities to get my refund. As for incorrect modules, i will give them back to the service. I do not need them, and selling server grade RAM is not easy. It does not run on consumer grade computers, it is not supported, the consumer grade PC will not even post with ECC server ram, it does not know what is this, what to make of it and how to use it.

This is the mentality of Bulgarian PC repair shops.

This is the quality of Bulgarian PC repair shops. 

Saturday, July 2, 2022

Fuck off Microsoft, I don't give shit if you like it or not, i don't give a fuck if you like it or not.

I am happy i am using Linux, because i have reclaimed my computer from Microsoft and Microsoft no longer has the voice or authority on my computer. i am free to use my computer the  way i want, and i am not forced to use my computer the way Microsoft wants. It is my computer it is not Microsoft's computer. I am master of my computer, no one else is master of my computer, not you, not Microsoft, not anyone. Why don't you simply Migrate to Linux? 

Also, it is clear that Microsoft cannot put one decent browser together. Their long supported ill-born browser Internet explorer failed, their second ill-born browser Edge Classic/Edge Legacy also failed. Microsoft was forced to adopt the Chromium browser core, and by doing so Microsoft admitted openly to the world that Microsoft cannot put one decent browser together. 

Microsoft is full of requirements and limitations about what your can be or cannot be. Why should i build a computer to make Microsoft happy? Who the fuck is Microsoft to determine what i need for me? Fuck off Microsoft, i will use whatever computer i want, the way i want to use it, and do no give shit if you like it or not, i do not give a fuck if you like it or not, i will simply shove it deeper and deeper in you throat until you swallow i and until you are happy with it.

Linux does not need any License activation

Microsoft wants you to buy and activate a license

Linux does not have any license keys

Microsoft wants you to pay for, and activate a license

Linux does not perform any tracking,

Microsoft wants to link your License activation with you Microsoft account so they can always identify you, your computer your copy of Windows and link them together. 

Linux does not force defaults on you, Linux might suggest some and ask you if you want, but it is not forcing them on you. With Linux if you decline a suggested service, it says declined permanently, until you decide to use it. 

Microsoft tries to force their services on you, regardless if you want them or not, and if refuse, Microsoft is trying to forcefully shove them in your throat until you swallow them and use them. 

Linux allows you to setup your own, user setup defaults, and once done, they will stay as your defaults until you decide to change them. 

Microsoft defaults overriding are always overriding user defaults, and Microsoft is trying to take away your options to setup your defaults.

Linux does not need account subscription, it is not asking for account subscription. Linux does not hint, this, Linus does not suggest this. Once install is done linux is working and that's it. 

Microsoft forced Microsoft account subscription, and link it with your license activation and default programs and default services, to allow full and comprehensive tracking and to be able to link everything with you, your computer, The instance of windows you are using, and with their services. 

Linux does not force you to use any services. You can choose any service you want and set it up as default. once you do that it will be your default, and it will stay as your default, until you change it. 

Microsoft is forcing you to use Microsoft services, bu taking away from you any means to setup your own default services. 

Using Linux no one is spying on you, your data is not collected and not sold. Everything is visible Linux is opensource, everyone can see and read the source of the kernel and add changes. This eliminated the chance of something funny to get in the kernel and the OS

Microsoft is proprietary and no one can see and edit or suggest changes, this allows Microsoft to put in and put out anything they want, because they want, there is no guarantee that if they put something in it that will be noticed for some tine.

Using Linux i can use whichever browser i want, my choice is respected and stays as i have chosen, 

Microsoft is trying to force edge on Windows users and as hard as windows users run away from edge, the more forcefully Microsoft tries to shove edge in their throats. 

Using Linux, i can use whichever default search engine i want and my choice is respected and stays.

Microsoft is trying to force Bing on users, regardless if the users like it or not. 

Using Linux i do not have to comply with nonsense system requirements which are not justified in any way. I can simply build a any decent compute that serves me well, that serves my needs well and serves my purposes well, then i simply install linux, and it is already working. No requirements, no limitations. simply Install and go. That's all there is to it.

Using Linux, i am free to use whatever default program i want, my choice is respected and my choice stays.

Microsoft is always trying to force you to use their programs as default programs, regardless if you like it or not, regardless if you wan it or not. 

Using Linux, i can use whichever default web page to open by default, and my choice is respected and stays.

Microsoft is trying to force msn.com on users, regardless if the users like it or not. 

Using Linux, i can use whichever default translation service i want and my choice is respected and stays.

Microsoft is trying to force their translation service on users, regardless if the users like it or not

Sunday, November 22, 2020

Paypal, company of thieves and scammers who illegally seized my money and illegally kept on hold my money. This Qualifies Paypal as thieves.

As recent Victim of Paypal's shady practices i was able to reclaim my money back from paypal. If you are the paying side and your money are help by paypal for no reason, raise issue with paypal, and see if they help. If they provide fast  and prompt refund, you are good, issue is resolved. Well this was not my case. I tried to buy goods for 600 dollars, offer to pay via paypal. Seller agreed. I made the payment, providing proof i paid. On the next day, seller told me he did no received the money. He sent me proof showing my payment to him as agreed being help by paypal. I raised issue with paypal, money was not returned to me or forwarded to seller. I tried to discuss this with paypal, communications was slow and difficult, every time i raised the issue, whatever support person contacted me, lied payment is successful, i presented proof payment was not successful i was transferred to new support, presented my case, again i was told a lie that payment is successful, not investigation of the case, nothing. Stalled. Obviously paypal thought i am stupid to believe a lie, without presenting proof to back it up, while i presented proof to back up my position. Well they thought the ycan postpone it until i give up or i forget about it. Well to their lack of luck i did not gave up and did not forget. After obviously help and support was on no use and no help in any way, i went to may bank, asking assistance, explaining my case, how money i held by paypal and i presented proof to my bank. this is the key here present proof to your bank to backup your story. bank will need this proof later. 2 or 3 weeks into bank's assistance i was surprised by communications from paypal stating that they received claims from my bank, for the money, but paypal had no idea what the claim is for. Another lie from paypal. They were really pushing me to cancel my claim. this is where i gained all evidence i have, all communications with paypal, all communications with seller, every little bit and piece i had, and presented it to my bank encouraging my bank to keep its effort and to use all of the material i provided. I replied to paypal i am not giving up, and i told paypal that i presented all i have, every little bit and piece to my bank and i encouraged my bank to keep the effort of reclaiming my money. It worked. I got notification from my bank my full amount of money is recovered from paypal. paypal tried to say they sent the money but another lie. That claim is inconsistent with what i saw in my banking app. banking app said: source: Claim/dispute, did not said paypal as sender.  So to all you who sent money and your money is no hold by paypal, this is how i managed to reclaim my money so use this to reclaim your money, it worked for me, i sincerely wish it works for you, i sincerely hope it works for you. And remember always keep your communications with the other person and paypal, never discard it, never dismiss it, because it may seem insignificant to you, or paypal may lie to you it is not relevant, but it may prove what your bank or credit card company needs to make the final move and reclaim and recover your money for you. Be strong, be tough, and be relentless. If you are the receiving side, your course of action is to team up with sender and make joint effort, with sender. Once the sender gets him money make new sale and make the money transfer using alternative service other than paypal. The image below is sent to me from the seller, seeing i made the arranged payment, but he did not received the money, because the money is illegally seized by paypal and illegally kept on hold by paypal, which qualifies paypal as thieves. Well This is past now. i was able to reclaim my money from paypal, and i still made the same purchase and buy the same items from the same seller i paid in different way. In the middle of this big dispute, i simply removed all my data from paypal while i still had the chance, and i closed my accout wit them, while i still had the chance. I will never ever trust paypal, i will never ever use paypal, and never create new account. 

 

Tuesday, September 15, 2020

Make Windows 10 64 bits, ver. 1903 and later versions of Windows resilient to crypto ransomware

 Make Windows 10 64 bits, ver. 1903 and later versions of Windows resilient to crypto ransomware



This guide is free gift for everyone, for everyone's benefit and it is not limited by money, prices, charges, fees, licenses or in any other way. It is free gift to everyone, for everyone's benefit. Enjoy. Good luck!
 
We all know this heart breaking feeling to see all of our files encrypted, by a malicious piece of ransomware, extorting us for money. this will not pass away on it's own. It will be here to stay, because there is money involved. Until there is profit for malware authors to do so they will always do. They will be relentless extorting us. How to stop it? Well you can Starting with 5th generation Core I3, I5, I7, I9, Xeon X series, Xeon W series, processors and their respective generation motherboards motherboards, a new set of security features appear, all of them based on advanced virtualization and memory management features, meant to support new virtualization features. These features allow reinforced memory integrity, reinforced system memory area protections and reinforces core isolation, basically improving the security against borrowing a thread or jumping in someone else’s memory space, for further mischief. We will use this to reinforce the main protection against crypto ransomware, and to make defeating it and circumventing it far more difficult.

This guide is made in 3 parts,

part 1 – prerequisites conditions to make it work without visible performance penalty

part 2 – actually securing the files

part 3 – reinforcing whatever security measures have been taken to further increase resilience. Keep in mind the more obstacles you throw on the crypto malware’s path of the malware, the better for you, you will slow it more and more because it will have to deal with more things in its way.

part 1 – prerequisites conditions to make it work without visible performance penalty:

1. Windows 10 x64, ver. 1903 or later, in ver. 1903 this feature is introduced, in later versions it only gets stronger and more resilient.

2. 5th generation or later generation Core I5 or higher CPU, for performance reasons, to make it work without visible performance penalty. The latest generation the higher performance the lowest performance penalty. The higher series CPU, the higher the performance, the least performance penalty.

part 2 – actually securing the files enable following 2 features in windows 10 as follows:

First and foremost activate Windows protected folders, which is basically the essence of the whole thing. In essence protected folders will give the protection of files, everything else following serves means to reinforce and fortify this feature, to be more difficult to circumvent and more resilient against sabotage, to make this feature more resilient to attacks and sabotage, it also serve to reinforce the OS in general against general variety of trouble you can find in the internet. 




on this window the feature we need is Microsoft windows Defender application Guard. This makes Windows defender to be sharp on guard, especially with browsing conditions. Keep in mind unsafe browsing is a well known attack vector to infect with whatever is there malware crawling the internet. Crypto ransomware included. When you set other options like guarded host and all virtualization options, you actually prime and prepare for use windows own memory protection routines and features, to greatly reduce the chance of an app being able to escape it's own memory space and try to enter memory space of other programs. in specified processors, there are routines and instructions in hardware which accelerate this and reinforce the protection effect. even if the OS misses memory tampering attempt, the processor will catch it, see that one program try to tamper memory space of another and will throw exception, because the processor does not like what is happening. you may not use sandbox but it sets the environment and variables for memory protection. We are going to use these variables later, to reinforce our defense. 

Next step is to activate protected folders. This is a selection of folders, that we want to give special protection. Windows has it's default folders selected by default, but you can add any folder of your choosing. 

To activate it, open Windows security, then virus and threat protection, then enable following options: 



Real time protection - to make it work at all

Cloud protection - to make it recognize better, by using additional threat data from Microsoft cloud, make it more aware of real malware and reduce false positive alarms.

Tamper protection - this one is very important. this on makes windows OS more aware to monitor strictly what is happening and if one program is trying to sabotage another, or mislead another. This is part of reinforcing the protected folder feature to be stronger and more resilient. 

next enable the most important of all reinforcing options, memory integrity and core isolation. this means the malware cannot borrow treads or sabotage memory space with fake data, to falsify access where it should not have any. 


Go to Device security, then open it, and find the option core isolation. click on core isolation details:


and activate the memory integrity option:


this is using the processor's memory management routines in hardware, so even if the program or windows miss some attempt for mischief, the processor itself will catch it, and stop it throwing exception, for memory violation an whatever address it is happening. So if the malware try to make some mischief, the processor will be annoyed and will react to stop it. Now Reboot. Let all there options come into effect. If you are with older gen Core I processor and weaker than Core I5 you may experience some performance penalties. 

So here we are after the reboot. The computer is working with greatly hardened memory management, and resilience to memory attempts for mischief. as we said, these memory options need to harden the protection option of protected folders against sabotage or circumvention attempts. 

Now return to virus and threat protection:


click on manage controlled folder access:

Windows will take you to ransomware protection section. There is an option Controlled folder access which is disabled by default. Enable it. This option is the meant and the heart of the whole exercise. 



Great. now it works, but you need to say which folders you want protected, so click on protected folders and begin to specify which folders you want protected. choose the folders which contain your important files. Keep in mind Windows also has it's own set of default folders that will be protected. It is fully ok to add your folders to the default set from windows. Add them.



After you finish adding your important folders, it is time to specify which programs are allowed to write in these folders. Click add an allowed app and point windows to an app you want to add to allowed apps, that will be allowed to make changes. 


I would allow programs like word, excel, power point and other programs in Microsoft office suite, Irfanview or other program for managing images, Windows media player, i use it to manage my multimedia content, it can do a lot of security if you know how to, media player classic to manage my movies, Adobe audition, Free Audio Converter, Creative Wavelab, Audacity for music recording and music editing, and misc programs like winrar, notepad++, SumatraPDF, QBit torrent, browser, and most important windows shell - explorer.exe also must be allowed. keep an eye on recently blocked programs it may be blocking a program you want to be allowed. 
 
This is white list filter. only programs and applications you allow, will be able to write there. If it is not allowed, i will not write. because the crypto ransomwere will not be allowed, it will not be able to make mischief. all reinforcements will protect form various mischief and will make it more hardened and more resilient to attempts to sabotage. this is why these are important and i have placed them first. because they are important.  Of top of all that as the final finishing tough, the final detail, work with explicitly set standard user. this will further away take any access to the crypto ransomware, and further limit the cryptomalware in terms of access and ability to wield damage. 

The final hardening piece to make it really strong is the standard non admin account. convert your current account into standard user, by creating another password protected admin account. login to the new admin account and use it to demote your default account to standard user. The Standard - non admin account will help, by deny access to shadow copies - shadow copies are another way to recover after ransomware attack. if you are with administrator attack, the ransomware can attack the shadow copies. When you are standard user the ransomware will be denied access to the shadow copies, and all other memory hardening settings we made, will pose big challenges and big problem for a ransomware to try to use exploits to promote itself to admin, basically because it will not be able to go out of it's memory region to manipulate and sabotage other processes. 

That's all. Enjoy much stronger and much hardened Windows 10 ver. 1903 or later, against may typed of malware, crypto ransomware. Good luck!

 Preliminary tests were made on my computer at home on my dual Xeon X5660 CPU workstation, equipped With Windows 10 pro for Workstations 64 bit, ver 2004. Results on professional grade equipment computer with professional grade equipment version of Windows were solid as concrete. All files OUTSIDE protected folders fell victims, as expected. All files INSIDE protected Files, were safe, unaffected, perfectly readable, perfectly editable, as expected. I was also able to open the files INSIDE the protected folders, with their own apps, view their original content undamaged, edit them, save them and remain intact with their original content undamaged, and all consequent opens and edits of the file, while computer is infected with ransomware. Result is as expected. This result gives me high hopes for my little project. 

What is the main goal of this research? 
The main goal of this research is to stop initial damage to your files during infection and give you time to clean and restore your computer to good healthy state. 

When these should be applied?
These settings should be applied immediately after the computer is installed drivers and users are set, so they can work and be in effect as soon as possible. When infection comes. If they are already up and running, when infection comes, they will work and help you and protect your files INSIDE protected folders. If you apply them too late - after infection - it is too late. your files are lost. forever.

What is the main goal of this?
The goal is to prevent initial damage and give you time to clean and restore computers to good state.

What it can really do?
If applied in time it will prevent damage to files INSIDE protected folders and give you time to clean and recover computers to good state.

What it cannot do?
It cannot recover all files which are already damaged. These are already beyond repair. These are lost. Forever. It will not protect any files OUTSIDE protected folders.

Which are the protected folders?
Any folder you want. Windows defines few folders as protected by default. Outside of these, you can define any folder you want for any reason you want. 

Is all this valid only for protected folders?
Yes. It is valid for protected folders only and it does not affect any other folder or file outside protected folders.

How to make the best out of this?
Choose your protected folders wisely, and make sure you have added all folders you know you will use, and all folders in question if they are going to be used or not. You must move all your files of value there, save only in protected folders, and never save anything outside protected folders.

Who can benefit from this research?
Everyone who has new enоugh and at least medium end computer can benefit from all this, one way, or another, depending on current environment and situation.

Does this research involve installing more programs? 
No. It is done by managing windows factory built in options and features only. 

Will this make my computer slow? 
No performance penalty will be felt on any decent computer.

Will this make my computer unstable? 
If all drivers are installed correctly, and you have chosen high quality drivers, WHQL signed - No. No negative impact will be felt. 

If your drivers are a mess,  then yes. If your drivers are a mess, a wide variety of negative side effects can happen.

Are my programs going to be affected?
Yes. All and any programs which are not explicitly whitelisted will not be allowed to write in protected folders. Please make sure you have added all related to your activities programs to the white list.

How do i add programs to white list?
Detailed instructions how to add programs to white list are provided in the research itself. Please read it carefully before proceed with it.

How do i add folders to protected folders?
Detailed instructions how to add folders to protected folders are provided in the research itself. Please read it carefully before proceed with it. 

Does this negate the need of decent backup?
No. Nothing removes the need of decent backup. Decent backup is the most important best practice and the best protection against data loss. 

What is the cost for this research?
The price is: 0.00 $ 

This research is free. This research is free gift for everybody, for everybody's benefit.

This guide is free gift for everyone, for everyone's benefit and it is not limited by money, prices, charges, fees, licenses or in any other way. It is free gift to everyone, for everyone's benefit. Enjoy. Good luck!

Saturday, August 17, 2019

!!!Отново за ве неуважението на фейскбук към данните на потребителите си, и към техните лични данни!!! !!!Yet again about facebook's disrespect for users and their privacy!!!



What Linus Media Group missed, is that the phone/tablet apps for android/apple about facebook and messenger, are roaming around your phone, and take whatever information they want without your consent and share it anyay they like again without your consent.
Нещо което хората от Линус Медия Груп, пропускат, е това че приложението за фейсбек и месинджър, събират всякаква информация от телефона без ваше знание и съгласие, и я споделят както си искат без ваше знание и съгласие.

Tuesday, June 4, 2019

Violence breeds more violence


Violence breeds more violence

 Social circus gives hope and motivation, to move forward, to those who have none, by redirecting the anger gained in the war, to creative behavior. It is very easy to gain anger, if you or your loved ones are victims of war. This anger only breeds more victims of the same war. Good starting point to plant the seed of the social circus is refugee camps. The first important step, is to study their culture and background and then to develop approach, how to train them, so they can develop into a person who improves, while training.

Social circus aims to develop social skills to become more productive member of the society by physical and mental training. The training is actually designed not only to make people physically fit, but also to give them responsibility and discipline, and the ability to focus and develop systematic approach of dealing with problems and difficulties. One important moment you need to understand is that all may seem different, but in reality, we are all equal. This means you need to understand that people come from different cultures and backgrounds, but once the social circus gets in motion, you need to understand that all these people are equal. Race, political believes, skin color, religious believes, place of origin, no longer separate people to fashionable groups of the day.

The best way to do all this, is by allowing people to express themselves, give them example to follow, by expressing yourself and ask them express themselves and ask them to be creative.

Another good way to do this is to show people the philosophies:

I’m allowed to make mistakes, therefore I’m allowed to learn

and

I want to learn, not only from books, but also by gaining experience, by exploring, and to share our ideas.

 Take pressure away from people, remove the mistake-punishment model and turn the whole idea to a fun game, in which we learn while we play.

Friday, January 11, 2019

И рече клоунът:
Страхуваме се от истината, защото истината е груба, и не си сменя лицето и формата, не е мека и пухкава, и не заема различни форми, така както утешващите лъжи правят тези неща. За това човеците търсят утешаващи лъжи, които могат да вземат всяка форма. Човеците се самозалъгват, че търсят истината, докато в действителност те просто търсят потвърждение на вярванията си, потвърждение което утешавщите лъжи винаги им дава за разлика от истината. Медиите се възползват от тази наивност на човеците, и постоянно пълнят главите как няколко корпоратвни магнати са велики и са пример за подражание, само заради това как надуват егото с удобства, титли и пари и се самозалъгват, че са значими. Останалите са долу на ниското, съзнанието им е обсебено от тези с удобствата. Търсите истината, тя е там, пред вас, истината е там пред очите ви, вие не я виждате, защото сте избрали да бъдете заслепени от утешаващите лъжи, които медийте постоянно бълват. Хората не виждат колко обедняха душите им. Казват че искат да са с истински човек до тях, но как да им поварваш когато:
Любовта се превърна в секс
Жените са с акъл на 14 годишни
Свалките са в чата
Срещите са във вайбър
Киното се превърна в тагване
Почерпката се превърна в мъртво пиянство
Приятелството се преврна в лицемерие
Действията се превърнаха в противоречия
Истината се превърна в обида
Лъжата се превърна в разговор
Самотата се превръща в ежедневие
Умът се превръща в непотребност
Дипломата се превърна в пълнеж на рамката
Когато е важен външния вид
Когато парите стават повод за власт
Ние живеем в стерилно общество. Дали е защото всички заедно решихме че Стив Джобс е велик човек, защото е изкарал милиарди, експлоатирайки деца, или защото всичките ни герои и са фалшиви? Заливаме другите около нас с празни и глупави коментари придавайки им несъществуващи важност и значение, в социалните мрежи, за да прикрием социалната ни и интимна деградация, защото ние избрахме това стерилно общество в което живеем, не с нагласените ни избори, а с нашите пари, ценности и действия, и това не го правим защото някоя книга ни прави щастливи, а защото искаме да сме упоени. Искаме да сме упоени, защото ни боли да сме истински, защото ни боли да не се преструваме, защото сме просто едни страхливци. Всичко това прави света около нас една голяма лъжа.

Thursday, January 10, 2019

Масово каране на скейт пред ндк

Масово каране на скейт пред ндк

Let us demonstrate for our right to skate and ride in unity. 
You don't really have to justify your passions to anyone.
не съм скейтър, но показвам съпричастност, НДК е място където много хора практукуват различни хобита, и не приемам за правилно некви си там комплексари в държавни униформи на държавна издръжка, да тормозят хората за това че упражняват хобито си. Като искат да се правят на толкоз велики, да ходят да тормозят дилърчетата дето тровят децата ни с дрога, да ходят да комплексарите с мощните джипки дето ни мачкат и газят, пияни и надрусани, ама защо не тормозят тях? Защото са жалки страхливци, тормозят нас защото нямаме средства да отвърнем, ама не тормозят тях, треперят им от страх, те не са полицаи, те са жалки комплексари, те нямат чест, те нямат достойнство, те са срам и позор за полицейската служба по света!