Please email me at:
Or use the form below.
[contact-form 1 “Contact form 1”]
The no-pants guide to spending, saving, and thriving in the real world.
Hayden Panettiere has formally announced her engagement! The starlet will be marrying Vladimir Klitschko, who is a world renowned boxer that has won an Olympic gold medal. The unexpected public revelation has sparked rumor trails regarding glitzy wedding plans. While no date has been set, and nothing has been confirmed, there is widespread speculation that the event is going to be glamorously over-the-top.
Although Panettiere’s fiance is 13 years older than her, it is the first marriage for both partners. This may instill extra incentive for the couple to make their officiation an extremely flashy occasion. Because Klitschko is a famous Ukrainian athlete, he will also be anticipating a magnificently choreographed wedding. Both individuals could invest fortunes in perfecting their walk down the aisle together.
Of course, one of the biggest decisions that Panettiere faces is the selection of her gown. All eyes will be on the fabric that she chooses for this special day. If they go through with a public wedding, the dress will be permanently immortalized in global media. She is going to want to show off flawless class, glimmering austerity and sizzling sultriness. Fashion critics are eagerly anticipating her selection. The high-end designer that she picks will receive a tremendous boost in popularity, especially if she pulls off a beautiful presentation.
A crazy wedding would be completely in character for the young television star. Her most known role was a bubbly cheerleader on the long-running series, “Heroes.” With vivacious charm, she became a sex symbol across the country. Explosiveness is simply a part of her personality, so a bombastic celebration is to be expected. Furthermore, Ukrainian wedding parties have a tendency to be more raucous than American traditions. If they follow any of the groom’s cultural practices, the event could become out of control.
The massive ring on Panettiere’s finger indicates no desire for privacy regarding this affair. In fact, it was an invitation for the mainstream media to cover the entire ordeal. This hints that the couple might be planning a gigantic wedding event. They can easily afford it, and the public celebrations will rapidly enhance the star’s critical acclaim.
In contrast, a private exchange of vows would disappoint her legions of fans. Furthermore, paparazzi could still infiltrate the wedding to snap pictures. To avoid any uninvited intrusions, the couple should be open to media coverage during their nupital arrangements. This will let them control the event, and allow them to recoup some of the expenses through lucrative network contracts. Regardless of how they conduct the wedding, it is certain that the whole world will be diligently watching with admiration, and perhaps a slight tinge of jealousy.
I’ve been walking though my analytics data. That is the Big Brother software I use to know everything about each one of my dear readers. It’s all part of my master plan to rule the world. Muwahaha!
Some of the results are interesting.
The single most-used search term to find this site is “slow carb diet“, which is great, because I really enjoyed writing that post. I’ve been slacking on the diet lately, but I’m still down more than 30 pounds. I’m currently ranked #3 in Google for this term. If I move up 2 more spots, I’ll outrank Tim Ferriss for his own product. If I aggregated all of the “slow carb” variations, this post probably accounts for more than half of my traffic from Google.
Many of you come here by searching for “how to have a perfect life“. I’ll do everything I can to help you achieve that, but it’s going to take work on your part. There are no shortcuts.
“Beat the Check” is another popular search term, but a very bad game to play. It’s almost impossible to win it, since the Check 21 Act of 2004.
It’s interesting that “trained husband” brings a few of you each month. My question: are you shopping, or exploring a new fetish? Don’t be shy.
I’m a bit amazed that “zombie wheels” is something people actually search for, but 140 people hit Google looking for that term every month, and a few of them make it over here.
“How to stretch a meal“, “things you should buy online“, and “unsecured loan advice” are some of the top personal finance terms bringing you all in, though “how to make a bunker” and its variation are popular, too.
“Hoe can you force your wife” is a bit disturbing. Most of the results are naturally for sex. I can’t help but hope that I’ve either really disappointed this visitor, or convinced him that force is a bad idea.
“How much did a pound of gold weigh in 1854?” is a search that makes me giggle. To the best of my knowledge, the troy scale has been used to weigh gold for a lot longer than that.
That was a fun little stroll through my statistics. Hopefully the fact that I used “fetish” and “sex” in a post will draw more crazy search terms.
How did you find me? Inquiring minds want to know, so please tell me in the comments.
We live in a decidedly credit-centric culture. Whip out cash to pay for $200 in groceries and watch the funny looks from the other customers and the disgust from the clerk. It’s almost like they are upset they have to know how to count to run a cash register.
If someone doesn’t have a credit card, everyone wonders what’s wrong, and assumes they have terrible credit. That’s a lousy assumption to make, but it happens. For most of the last two years, I shunned credit cards as much as possible, preferring cash for my daily spending. Spending two years changing my spending habits has made me comfortable enough to use my cards again, both for the convenience and the rewards.
Having a decent card brings some advantages.
Credit cards legally provide fraud protection to consumers. Under U.S. federal law, you are not responsible for more than $50 of fraudulent charges. many card issuers have extended this to $0 liability, meaning you don’t pay a cent if your card is stolen. Trying getting that protection with a wallet full of cash.
The fraud protection makes it easier to shop online, which more people are doing every day. At this point, there is no product you can buy in person that you can’t get online, often cheaper. How would you order something without a credit card? Even the prepaid cards you can buy and fill at a store will often fail during an online transaction because there is no actual person or account associated with the card. The “name as it appears on the card” is a protective feature for the credit card processors and they dislike accepting cards without it.
If you’re going to use a credit card, you need to make a good choice on which credit card to get. There are a few things to check before you apply for a card.
Annual fee. Generally, I am opposed to getting any card with an annual fee, but sometimes, it’s worth it. If, for example, a card provides travel discounts and roadside assistance with its $65 annual fee, you can cancel AAA and save $75 per year. A good rewards plan can balance out the fee, too. I’m using a travel rewards card that has a 2% rewards plan. That’s 2% on every dollar spent, plus discounts on some travel purchases. In a few months, I’ve accumulated $500 of travel rewards for the $65 fee that was waived for the first year. The math works. A card that charges an annual fee without providing services worth several times that fee isn’t worth getting.
Interest rate. This should be a non-issue. You should be paying off you card completely every month. In a perfect world. In the real world, sometimes things come up. In my case, I was surprised with a medical bill for my son that was 4 times larger than my emergency fund. It went on the card. So far, I’ve only had to pay one month’s interest, and I don’t see the balance surviving another month, but it’s nice that I’m not paying a 20% interest rate. Unfortunately, as a response the CARD Act, the days of fixed rate 9.9% cards seems to be over.
Grace period. This is the amount of time you have when the credit card company isn’t charging you interest. Most cards offer a 20-25 day grace period, but still bill monthly. That means that you’ll be paying interest, even if you pay your bill on time. To be safe, you’ll need to either find a card that has a 30 day grace period, or pay your balance off every 15-20 days. Some of the horrible cards don’t offer a grace period of any length. Avoid those.
Activation fees. Avoid these. Always. There’s no card that charges an activation fee that’s worth getting. An activation fee is an early warning sign that you’ll be paying a $200 annual fee and 30% interest in addition to the $150 activation fee.
Other fees. What else does the card charge for? International transactions? ATM fees? Know what you’ll be paying.
Service. Some cards provide some stellar services, include concierge service, roadside assistance, and free travel services. Some of that can more than balance out the fees they charge. My card adds a year to the warranty of any electronics I buy with it, which is great.
Credit cards aren’t always evil, if you use them responsibly. Just be sure you know what you’re paying and what you’re getting.
What’s in your wallet?
If you’re like millions of people who saw Miley Cyrus’s performance at the MTV Video Music Awards recently, you’ve probably wondered what the effect of massive success on the music and acting star. Cyrus seems to be
doing everything possible to remake her image in the exact opposite of her squeaky clean mold that Disney and other companies have created for her over the last several years. (A rumor has it that Disney even created a contractual obligation for Cyrus to maintain a certain haircut during her “Hannah Montana” television show.) There’s a sense of someone taking on their first sense of independence, and running with it — the star seemed to be sending the message to the audience that she was not going to live according to the expectations of others anymore, and from the look of it, they got that message loud and clear.
The fact that Cyrus is barely into her 20s should tell you something about how much time she has to develop her career. She has enough to retire at an age when most people are just starting their first real job. And that is a tough position to be in. If she is hoping to push her singing and acting career well into adulthood — as most artists would like to — it may be that she is trying to make her mark now. Think of it a bit like Bob Dylan in 1964, releasing electric music for the first time, when before that point he was primarily known as a folk singer making gentle acoustic music.
Dylan’s idea may have been a bit like what Cyrus’ is. That is to say, maybe Miley Cyrus is trying to avoid becoming a has-been, a relic of the 2000’s who burned out playing inoffensive pop music. If this is the case, Cyrus may be able to shift her career into a different mode by showing herself to be an uncompromising artist. Remember that even the greats of the past — Frank Sinatra for example — were once viewed as essentially music for teenagers, and not serious artists. Sinatra even suffered career failure in his 20’s when his audience grew up and moved on to other things. But he came back to record success when he began allowing his music to mature and his ideas to gain focus. If Cyrus can pull such a move, she may not be remembered as a teeny-bopper, but as a serious artist.
Skip to the bottom if you’re familiar with PRISM and don’t want to hear any political talk and rampant violations of our Constitutional rights, but still want to protect your privacy.
For those of you who haven’t been paying attention, the PRISM program is an NSA program to monitor electronic activity.
Lots of electronic activity.
The companies identified to be working with the NSA in this grand overreach include AOL, Apple, Facebook, Google, Microsoft, PalTalk, Skype, Yahoo! and YouTube. For most people, that is the definition of “the internet”. If you’re doing it online, the NSA is–or could be, at their leisure–watching.
This isn’t a crazy conspiracy theory. This is happening, and the government has admitted it. In fact, when this broke, the executive branch’s response was along the lines of, “Don’t worry, we’ll find the guy who leaked this information.”
On top of that, the government has been demanding phone records from at least Verizon on a daily basis.
In addition, the Justice Department was just busted wiretapping Associated Press phones.
Seriously, if you put this in fiction, nobody would buy it, because it’s ridiculous in the land of the free.
As far as the people who say I’ve got nothing to worry about if I’m not doing anything wrong: shut up. You can speak again when you give me your email passwords, bank records, and let me install a toilet cam in your house. What are you trying to hide?
Seriously, there is such a mess of non-legislative administrative regulations that are considered felonies that the best estimate is that most people commit three felonies a day, without realizing it.
When we live in a system with so many rules that have never been voted on and our legal system refuses to consider legitimate ignorance of the law to be a defense and we have a collection of secret laws that are a felony to disclose or violate, government spying gets far more dangerous.
The Foreign Intelligence Surveillance Act of 1978(FISA) is the law the NSA is using to justify all of these data requests. The law, that we all must obey, is being overseen by a small subcommittee in Congress, and the FISA courts are just a small subset of the judges. The judges are signing warrants allowing the wiretaps and massive surveillance, but that is clearly unconstitutional and, hence, illegal.
The text of the Fourth Amendment to the Constitution, the supreme law of the United States is: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”
Any warrant that cannot name a place to be searched is illegal.
Any warrant that cannot describe the person to be monitored is illegal.
Any warrant that is not backed by probable cause is illegal.
Tell me how “I want to watch what everyone is saying on Facebook and seize all of the data” meets any of those criteria.
Bueller?
Wiretapping the AP is a serious violation of the First Amendment, too. “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.”
“Congress shall make no law…abridging the freedom of speech, or of the press..and to petition the Government for a redress of grievances.”
Monitoring the press in case somebody breaks a story the government doesn’t want broken is crap.
How can we petition the government for redress of grievances that they call a felony if the company discloses the violation to us? It’s self-serving circular crap.
When you throw the IRS harassing charities working for the “wrong” politics, you start to pine for the good old days of Nixon-level fair play and integrity.
To be fair, FISA got nasty with the Patriot Act, which was an abomination enacted by a different political party. Hey, Washington, next time try to remember that your laws will someday be administered by your political enemies, k? (NSA: I trust you’ll pass the message for me?)
There are four main pieces to discuss, based on the scandalous Constitutional violations reported recently.
1. Social media monitoring. There’s nothing to this. If you post things on Facebook, the government sees it and knows it’s you. Don’t post anything you don’t want broadcast to the police, your grandmother, and your priest.
2. Internet browsing. There is very little that is secure on the internet. The government can subpoena your ISP and get any records they keep. Unless you go anonymous and encrypted. Welcome to TOR. The Onion Router is a system that encrypts your internet traffic and bounces it all over the world. Once you enter TOR, nothing you do can be tracked, until your internet request leave the TOR system. The system is not centrally owned or controlled, so nobody in the system can track what you are doing.
For example, if I use the TOR browser to search Wikipedia, a snoopy NSA goon could tell I’m using it, and they could tell there was a request from the TOR system to Wikipedia, but they can’t tie one request to the other. If I’m dumb and log into Facebook, I lose that anonymous shield.
That’s solid protection from anyone watching your internet traffic.
How do you use it?
Easy. Just install the Tor Bundle. When you want the NSA to stop snooping over your shoulder because you want to do a search on erectile dysfunction, you launch TOR and the TOR browser and search without having to share your embarrassing secrets.
3. Email. Email is easily the least secure means you can communicate. When you send an email, that message is in plain text, and it bounces from server to server until it reaches the recipient. Any of the involved servers can keep a log of the traffic and read your email.
Never, ever, ever, ever put anything incriminating or important in an email. Don’t send credit card numbers, your social security number, or the address of your meth lab.
But what if you want to have a dirty conversation with your spouse without letting the sick voyeurs at the NSA listen to you ask your wife what she’s wearing and how would she like it torn off?
Use PGP. OpenPGP is a free software encryption program that is basically impossible to decrypt. It’s known as public-key encryption, which means that anybody can encrypt a message to you that only you can read.
It’s like magic.
To use PGP, the easy way(for Windows users) is to get Gpg4win. Install that, then open Kleopatra. This will let you generate your encryption key. You do that by:
You now have a set of PGP keys. To get your public key that others can use to send you messages, right-click your certificate and select “Export certificates”. Pick a path to save the certificate, then do so. You can open this file with notepad to get your public key, or you can email the file out. There is no need to worry about security with this file.
You will end up with something that looks like my public key here:
—–BEGIN PGP PUBLIC KEY BLOCK—–
Version: GnuPG v2.0.20 (MingW32)mQENBFGyPPkBCAC8zc5B7srG/ZyRMpokP3KyIMd9GA4n94wT89sP/yWFylbTKXDM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=fHba
—–END PGP PUBLIC KEY BLOCK—–
To get your private key, that you can use with any number of plugins for your email client, right-click on your certificate and select “Export secret keys.”
You can either use PGP as a plugin for your email client, or you can use Kleopatra’s feature “Sign/encrypt files”. To do that, write your message in a file, then select the feature inside Kleopatra. You’ll end up with an encrypted file you can attach to your email that snoopy government man can’t read.
4. Phone calls. This would appear to be harder, since your phone is largely out of your control. There’s nothing practical you do about a landline, except to avoid saying anything sensitive. On your cell phone, you have options, assuming you use a smartphone.
For Android users, it’s free an easy. Install Redphone. If you place a call with Redphone, it checks to see if the caller also uses Redphone. If he does, it places an encrypted call over your data plan to the other phone. Nobody can listen in to an encrypted call. The same company also makes a program for texting.
For iPhone users, you’re stuck with Silent Circle for $10/month, which may be a better option, since there is support for more devices, including Android. It was designed by the guy who designed PGP and handles texting and email, too.
There you are, the whats, whys, and hows of modern, hassle-light, private communications. Doing what we can to foil bad government programs is our patriotic duty.