Please email me at:
Or use the form below.
[contact-form 1 “Contact form 1”]
The no-pants guide to spending, saving, and thriving in the real world.
Debt can be thought of as a disease–probably social. Most of the time, it was acquired through poor decision making, possibly while competing with your friends, occasionally after having a few too many, often as an ego boost. Unfortunately, you can’t make it go away with a simple shot of penicillin. It takes work, commitment and dedication. Here are three steps to treating this particular affliction.
1. Burn it, bash it, torch it, toss it, disinfect. Get rid of the things that enable you to accumulate debt. If you keep using debt as debt, you will never have it all paid off. That’s like only taking 3 days of a 10 day antibiotic. Do you really want that itchy rash bloodsucking debt rearing its ugly head when you’ve got an important destination for your money? Take steps to protect yourself. Wrap that debt up and keep it away.
2. Quit buying stuff. Chances are, you have enough stuff. Do you really need that Tusken Raider bobble-head or the brushed titanium spork? They may make you feel better in the short term, but after breakfast, what have you gained? A fleeting memory, a bit of cleanup, and an odd ache that you can’t quite explain to your friends. Only buy the stuff you need, and make it things you will keep forever. If you do need to indulge, hold off for 30 days to see if it’s really worthwhile. If it’s really worth having, you can scratch that itch in a month with far fewer regrets.
3. Spend less. This is the obvious one. The simple one. The one that makes breaking a heroin addiction look like a cake-walk(My apologies to recovering heroin addicts. If you’re to the point that personal finance is important to you, you’ve come a long way. Congratulations!). Cut your bills, increase your income. Do whatever it takes to lower your bottom line and raise your top line. Call your utilities. If they are going to take your money, make them work for it. If they can’t buy you drinks or lower your payments, get them out of your life. There’s almost always an alternative. Don’t be afraid to banish your toxic payments. Eliminate your debt payments. This page has a useful guide to debt and how to clear it off.
Update: This post has been included in the Festival of Frugality.
In the past, I’ve gone through a detailed series of budget lessons demonstrating how to make a budget and showing my personal budget spreadsheet template. If you weren’t here to see them develop, you probably haven’t seen them at all. I’ve never built an actual index for those posts.
This is the master index of my budget planning resources. As I develop more, this will grow.
Budget Lesson #1 – In this lesson, I go over how we handle discretionary income and I explain our modified envelope system. The discretionary budget contains things like our grocery bill, or the clothes we buy. We have near-total discretion over what is purchased, hence the name.
Budget Lesson #2 – Lesson #2 contains the details of our monthly bills. These are the ones that are consistent, predictable, and actually due each month. Most people take these for granted as the bills they have to pay, but it’s not true. You can get almost all of your regular bills reduced just by asking. You would also be surprised what you can do without, when properly motivated.
Budget Lesson #3 – This is where I explain how we deal with the non-monthly bills. That is, the bills that have to be paid, but are not due on a monthly basis. I also share the personal budget spreadsheet template I developed. I am working on a few sample templates to match various imaginary scenarios. If you’d like to be an anonymous case study, and get free help setting up a budget, let me know, please.
Budget Lesson #4 – In this lesson, I describe our “set-aside” funds for things that will need to be paid eventually, but not on a set schedule. Sometimes, they are never actually due. We set aside money for the parties we throw, for car repairs and for a number of other things. A few of these items are outright optional, but they are part of what makes life fun. You can’t make a budget without including some of the extras.
Budget Lesson #5 – This is the companion piece to lesson 2. Learn how I’ve reduced–or attempted to reduce–each of these bills. For the better part of two years, I called Dish Network every few months to ask for a discount. For almost 2 years, it was granted. Then one, day, they told me they were putting a note on our account to keep us from getting any more discounts, so I canceled. 100% discounts help us save more.
Budget Lesson #6 – This is the reduction companion to lesson 3. These bills are harder to reduce. Have you ever successfully gotten your property taxes lowered?
Budget Lesson #7 – This is the reduction companion to lesson 4. Notice a pattern, yet?
Budget Lesson #8 – Here, completely out of order, is the reduction companion to lesson 1. Watch as I magically reduce–or rationalize–our discretionary budget.
So, dear readers, what part of budgeting should I address next?
You should never be in the company of anyone with whom you would not want to die.
-Duncan Idaho, from God-Emperor of Dune
Some people suck the life out of everyone they encounter. Whether it be through lies, unreasonable demands, emotional abuse or manipulation, or just a vile personalty, the people they meet are worse off for the encounter. The people they interact with every day are screwed.
My time is too precious to waste any of it unnecessarily on people who remove value from it. I like being with people who enrich my life, instead.
Unfortunately, since I’m not an advocate for the use of hitmen, not every toxic person is easy to eliminate from your life.
Toxic people come in 3 basic varieties: professional, personal, and family. There is some overlap between the categories.
The personal category is easiest to deal with. These people aren’t relatives or coworkers, so you won’t see them at family gatherings or at work. I’ve dealt with these people in two ways.
First, there is the direct approach. One former friend, who was really only a friend when it was convenient for him(a pure leech), got told that he wasn’t invited to one of our parties because I was inviting his ex-wife, instead. That was the last time he called me.
The second option is far more passive. I set up a contact group in my phone called “Life’s too short”. At first, I set it up with a fairly insulting ring tone, but I later switched it to no ring at all. I don’t know they’ve called until I check my voicemail. It’s far less direct, but also far easier than the direct approach.
Dealing with the toxic people in your family is more complicated. You’ll see them at holiday gatherings, or hear about them during unrelated visits. You probably have a lot of memories growing up with them, and may feel some level of obligation–deserved or not–to maintain contact. It’s hard to break a tie that you’ve had your entire life.
Can you fix their behavior? It’s worth trying to have a frank discussion about how they are treating you, or the things they are doing. If the problem is that they are constantly bringing over their methhead boyfriends, banning the drug addicts from your home, while still welcoming the relative may be an acceptable fix. If the problem is a constant need to belittle you, demanding they stop may work. If the problem is a lifetime of emotional abuse, it probably isn’t fixable.
Is banishment an option? Can you put that creepy cousin on the Life’s Too Short list? You’ll still have to deal with him at family gatherings, but you can always leave the room when he comes in, right? Don’t engage, don’t participate in any conversation beyond a polite greeting, and don’t offer any encouragement towards regular contact.
It’s possible that it won’t be possible to fix their behavior and that you won’t want to banish the offender. If, for example, the offender is your mother (Not you, Mom!), you may feel a sense of obligation to maintain contact, or even be a primary caregiver at times. This is a line nobody else can draw for you. At some point, the current bad behavior could overwhelm the past obligations. When that happens are you prepared for it? That can be a traumatic break.
The other option, as cold as it sounds, is to wait it out. Nature will take its course, eventually. Can you wait that long, while maintaining your sanity and emotional equilibrium?
Professional toxic people include customers, vendors, and coworkers, none of whom are easy to get rid of.
If you own the business, you can fire your problem customers if the hassle outweighs the benefits you get from the relationship. You can find a new vendor, and you can fire the problem employees.
What happens if you are an employee?
If the problem is your boss, your options are to suck it up, talk to his boss, or find a new job. If the first is intolerable, and the second is impossible, it’s time to polish your resume.
If the problem is a vendor, you’ve got some options. Document the problems, first. Does he make inappropriate jokes, or badmouth you to your customers? Then, research the alternatives. Does one of his competitors offer an equivalent product or service? Take the documentation and research to your boss, or whoever makes that decision, and see if you can get your company to make the switch. The other option, is to request someone new to deal with at the vendor’s company, but that may not always be possible.
Finally, we come to the problem of toxic coworkers.
Some coworkers have the same problems as a toxic boss. Is the company vice-president the boss’s baby brother? You’re probably not going to find a win there. You’ll have to suck it up or move on.
Is the problem person working in an unrelated department doing unrelated tasks? It may be possible to start taking breaks at different times and leave him where he belongs: in the past.
Is the difficult individual sharing an office with you, demanding everything be done his way, and throwing daily tantrums? This is the one that has to be dealt with. He’s the one sucking the life out of you every single day.
First, start making use of a voice recorder. If you’ve got a smartphone, you’ve probably already got one. Otherwise, drop the $20 to buy one. This lets you document the evil. When his behavior goes hinky, record it.
Second, stand up for yourself. If he’s making unreasonable demands, tell him it’s inappropriate. He’s a bully, and bullies tend to back down when they are confronted.
Third, make sure the boss knows about the behavior. Yes, this is tattling. Get over it. If he wasn’t acting like he was a spoiled 4 year old, you wouldn’t have to tell the boss that he was. If the boss doesn’t know there’s a problem, he can’t deal with it.
Fourth, for any problem that isn’t directly aimed at you, ignore it. If he makes a habit of throwing a tantrum because somebody emptied the coffee pot, or because the company switched health plans, let him. Only get in the way if it’s directed at you. Over time, the tantrums will get more noticeable and out of hand, forcing the boss to deal with it, preferably by handing him a pink slip.
Your goal is documentation, awareness, and avoidance. Make the worst of it go elsewhere so you can be as productive as possible, document what you can, and let the boss become aware of the situation and how bad it has become. And be patient. This isn’t an overnight fix.
How do you deal with the toxic people in your life?
There are two options to choose from.
Skip to the bottom if you’re familiar with PRISM and don’t want to hear any political talk and rampant violations of our Constitutional rights, but still want to protect your privacy.
For those of you who haven’t been paying attention, the PRISM program is an NSA program to monitor electronic activity.
Lots of electronic activity.
The companies identified to be working with the NSA in this grand overreach include AOL, Apple, Facebook, Google, Microsoft, PalTalk, Skype, Yahoo! and YouTube. For most people, that is the definition of “the internet”. If you’re doing it online, the NSA is–or could be, at their leisure–watching.
This isn’t a crazy conspiracy theory. This is happening, and the government has admitted it. In fact, when this broke, the executive branch’s response was along the lines of, “Don’t worry, we’ll find the guy who leaked this information.”
On top of that, the government has been demanding phone records from at least Verizon on a daily basis.
In addition, the Justice Department was just busted wiretapping Associated Press phones.
Seriously, if you put this in fiction, nobody would buy it, because it’s ridiculous in the land of the free.
As far as the people who say I’ve got nothing to worry about if I’m not doing anything wrong: shut up. You can speak again when you give me your email passwords, bank records, and let me install a toilet cam in your house. What are you trying to hide?
Seriously, there is such a mess of non-legislative administrative regulations that are considered felonies that the best estimate is that most people commit three felonies a day, without realizing it.
When we live in a system with so many rules that have never been voted on and our legal system refuses to consider legitimate ignorance of the law to be a defense and we have a collection of secret laws that are a felony to disclose or violate, government spying gets far more dangerous.
The Foreign Intelligence Surveillance Act of 1978(FISA) is the law the NSA is using to justify all of these data requests. The law, that we all must obey, is being overseen by a small subcommittee in Congress, and the FISA courts are just a small subset of the judges. The judges are signing warrants allowing the wiretaps and massive surveillance, but that is clearly unconstitutional and, hence, illegal.
The text of the Fourth Amendment to the Constitution, the supreme law of the United States is: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”
Any warrant that cannot name a place to be searched is illegal.
Any warrant that cannot describe the person to be monitored is illegal.
Any warrant that is not backed by probable cause is illegal.
Tell me how “I want to watch what everyone is saying on Facebook and seize all of the data” meets any of those criteria.
Bueller?
Wiretapping the AP is a serious violation of the First Amendment, too. “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.”
“Congress shall make no law…abridging the freedom of speech, or of the press..and to petition the Government for a redress of grievances.”
Monitoring the press in case somebody breaks a story the government doesn’t want broken is crap.
How can we petition the government for redress of grievances that they call a felony if the company discloses the violation to us? It’s self-serving circular crap.
When you throw the IRS harassing charities working for the “wrong” politics, you start to pine for the good old days of Nixon-level fair play and integrity.
To be fair, FISA got nasty with the Patriot Act, which was an abomination enacted by a different political party. Hey, Washington, next time try to remember that your laws will someday be administered by your political enemies, k? (NSA: I trust you’ll pass the message for me?)
There are four main pieces to discuss, based on the scandalous Constitutional violations reported recently.
1. Social media monitoring. There’s nothing to this. If you post things on Facebook, the government sees it and knows it’s you. Don’t post anything you don’t want broadcast to the police, your grandmother, and your priest.
2. Internet browsing. There is very little that is secure on the internet. The government can subpoena your ISP and get any records they keep. Unless you go anonymous and encrypted. Welcome to TOR. The Onion Router is a system that encrypts your internet traffic and bounces it all over the world. Once you enter TOR, nothing you do can be tracked, until your internet request leave the TOR system. The system is not centrally owned or controlled, so nobody in the system can track what you are doing.
For example, if I use the TOR browser to search Wikipedia, a snoopy NSA goon could tell I’m using it, and they could tell there was a request from the TOR system to Wikipedia, but they can’t tie one request to the other. If I’m dumb and log into Facebook, I lose that anonymous shield.
That’s solid protection from anyone watching your internet traffic.
How do you use it?
Easy. Just install the Tor Bundle. When you want the NSA to stop snooping over your shoulder because you want to do a search on erectile dysfunction, you launch TOR and the TOR browser and search without having to share your embarrassing secrets.
3. Email. Email is easily the least secure means you can communicate. When you send an email, that message is in plain text, and it bounces from server to server until it reaches the recipient. Any of the involved servers can keep a log of the traffic and read your email.
Never, ever, ever, ever put anything incriminating or important in an email. Don’t send credit card numbers, your social security number, or the address of your meth lab.
But what if you want to have a dirty conversation with your spouse without letting the sick voyeurs at the NSA listen to you ask your wife what she’s wearing and how would she like it torn off?
Use PGP. OpenPGP is a free software encryption program that is basically impossible to decrypt. It’s known as public-key encryption, which means that anybody can encrypt a message to you that only you can read.
It’s like magic.
To use PGP, the easy way(for Windows users) is to get Gpg4win. Install that, then open Kleopatra. This will let you generate your encryption key. You do that by:
You now have a set of PGP keys. To get your public key that others can use to send you messages, right-click your certificate and select “Export certificates”. Pick a path to save the certificate, then do so. You can open this file with notepad to get your public key, or you can email the file out. There is no need to worry about security with this file.
You will end up with something that looks like my public key here:
—–BEGIN PGP PUBLIC KEY BLOCK—–
Version: GnuPG v2.0.20 (MingW32)mQENBFGyPPkBCAC8zc5B7srG/ZyRMpokP3KyIMd9GA4n94wT89sP/yWFylbTKXDM
S2vC0yXh4zDJshJ1odj+spJGeYaXHCJM21buzKYf0gZsUGIbkVZWRy8ch16+umFl
DuTMaCN5Yue6ehGsjH8N+4q7pmXSlyRXRXzG0A4d9de4SQnfO65e1CMaQhFMpJu0
mXK8KFLqJ560efzlTTZvN3o5RfxYhtB3ODoDfkGeBLIxGVYn1kYbowTcvwymATOb
iSHwNfH+vY+kuTnrG9ilLyprDKwAF+ErD87WP0pLKVIQvoMV69VHEoRhHqK45iJG
j0ZhtTA4emnGZtCNsdfPLUdws1k9SNeIpd9pABEBAAG0H0phc29uIDxqYXNvbkB3
YWxiZXJnb25saW5lLmNvbT6JATkEEwECACMFAlGyPPkCGw8HCwkIBwMCAQYVCAIJ
CgsEFgIDAQIeAQIXgAAKCRDRFT/09vSoj10ECACVE/ngHyzX1lnMlucW4Rx8b8ii
KK8v/AmVkrJZgI3umuJn906sGGA8fNjxUGYH5fX6R7Diud4SEnZWADSq5pAImOv+
qZnPdpJKjMaY6qr+trr0DGsCoen+TxzM7rClBz3TTURI5SbySojHvQoEiCHHPBw1
yY3+leoUzLmso98ocA2lY4Iuvr7/fAzuQEFhBdxxLtS7mDWdmUca+A6GsrCr4LZ7
fpovRCNv07BoAa5ql+GrPOcsIcLwSoEtkhjCo4vPDeveqsnLT0W7N9YBPiGMpHPm
0oFxniC6/eWtI+3C8QFYO3X+CC5yTYpqJJ0BJWhXjiqYmr290d3AN+hYck3T
=fHba
—–END PGP PUBLIC KEY BLOCK—–
To get your private key, that you can use with any number of plugins for your email client, right-click on your certificate and select “Export secret keys.”
You can either use PGP as a plugin for your email client, or you can use Kleopatra’s feature “Sign/encrypt files”. To do that, write your message in a file, then select the feature inside Kleopatra. You’ll end up with an encrypted file you can attach to your email that snoopy government man can’t read.
4. Phone calls. This would appear to be harder, since your phone is largely out of your control. There’s nothing practical you do about a landline, except to avoid saying anything sensitive. On your cell phone, you have options, assuming you use a smartphone.
For Android users, it’s free an easy. Install Redphone. If you place a call with Redphone, it checks to see if the caller also uses Redphone. If he does, it places an encrypted call over your data plan to the other phone. Nobody can listen in to an encrypted call. The same company also makes a program for texting.
For iPhone users, you’re stuck with Silent Circle for $10/month, which may be a better option, since there is support for more devices, including Android. It was designed by the guy who designed PGP and handles texting and email, too.
There you are, the whats, whys, and hows of modern, hassle-light, private communications. Doing what we can to foil bad government programs is our patriotic duty.