Wednesday, December 28, 2011

jediSwift - chaos and agony - Passionate

[writer : jediSwift]
[anthology : chaos and agony]
[Style / Year : Hip Hop 2012]
[title : Passionate]
united we stand divided we fall
tonight we dance, tomorrow we brawl
the fight must end, the dead must talk
we fight till death, or end it all

i might just rest, in central hall
the strife at best, is in our hearts
stylize the vest, with bullet marks
survive the test, for a better tomorrow

untie their heads, as they fall off
denie their quest, to enslave our thoughts
rewrite their mess, until their gone
revive the cross, like an army of god

if i find life hard, i carry on
the struggle is ours, not any longer
the bubble is burt, our army is stronger
under the rubble, we have holy armour

the truth

Friday, December 23, 2011

Go Daddy Changes Position in SOPA Support in order to save face

“In changing its position, Go Daddy remains steadfast in its promise to support the security and stability of the Internet,” the domain registration company said in a plea to save face. “In an effort to eliminate any confusion about its reversal on SOPA though, Jones has removed blog postings that had outlined areas of the bill Go Daddy did support.”

The fact that the internet has the power to change the public position of an internet company is amazing reinforcement for the movement to save the interwebz. What I am afraid of is the fact that Go Daddy really didnt change their corporate mind because they had a change of heart and a moral realization. Go Daddy changed their mind PUBLICLY in order to try and save their own ass due to the internet masses pulling out their domains and registering with companies like and . The mini victory success only lies in the fact they forced a company to become even more deceptive then it already was. 

Go Daddy states in their news feed that "Fighting online piracy is of the utmost importance, which is why Go Daddy has been working to help craft revisions to this legislation - but we can clearly do better," Warren Adelman, Go Daddy's newly appointed CEO, said. "It's very important that all Internet stakeholders work together on this. Getting it right is worth the wait. Go Daddy will support it when and if the Internet community supports it." 

I have taken the liberty in Translating their statement from save-my-own-ass into English "fighting online piracy is important to our investors which is why we will continue to help reword and confuse the bill until it passes into existence, and we will maintain our position that we had yesterday, but publicly we will lie in order to keep customers from going to our competitors, leaving all the information on the back burner until it is passed because then we can censor those who talk bad about us. Right now you have the power but soon we will."

Go Daddy must think we are all retarded? They must not understand, what has been cant be unseen YET. The reality isnt 1984 YET.. So I am saying, the boycott should remain in place because their true feelings have remained in place. We already know how they really feel.

the truth

Wednesday, December 21, 2011

Facebook VS Google Plus

Facebook VS Google+ and my opinion.
The following status/stream updates were copy and pasted from my personal social networking accounts.

Facebook Status updates
"so hungry that im not even hungry anymore"



"Man i miss my Dawg :(( Free my brother please!!!! #AMIGO STIFF!!!!"

"Im in love wit a stripper"

"Temptations will lean on ur door bell but opportunity will only come knock once!!"

"Copy and paste this if you support da troops, cuz dey fitin fo yo freedoms"

Google+ Stream Updates
"Putting the 'Human' Back in Human Resources -"

"Verizon says service is returning to normal -"

"...the gop in general is no longer adult enough to hold decision making positions. It's official.  -"

"Will you call Speaker of the House John Boehner and Majority Leader Eric Cantor and ask them to reign in Judiciary Chairman Lamar Smith?

Speaker John Boehner: (202) 225-6205

Majority Leader Eric Cantor: (202) 225-2815"

"If you have never heard of the venus project spend a few minutes and tell me what you think."

Do you notice the difference?

Facebook is a place for mindless self importance ,personal appearance and uncited oppinion, where google+ is a place for cited news and intellectual importance. Dont get me wrong, there are the google+ users that post memes and animated gifs all day but even the level of intelligence of those far exceeds that of facebook. I can post something on facebook and get zero likes, and zero interaction. Copy the same status word for word and put this on google+ and get tons of interactions and +1's.

the truth

Sunday, December 18, 2011

North Korean Leader Kim Jong IL IS DEAD with pictures

URGENT UPDATE 3 S. Korean military declares emergency alert following death of Kim Jong-il

URGENT UPDATE 2 -- Yonhap: S. Korean government shifts to emergency footing on news of N.K. leader's death

URGENT UPDATE -- N. Korean leader died of physical fatigue during train ride, according to Yonhap. He was 69. 


SEOUL—North Korean leader Kim Jong Il has died, North Korean state television said Monday.
Mr. Kim died from fatigue during a train ride on Saturday, a weeping television announcer said.
State TV also announced that Kim Jong Eun will take over as leader.

upon my death, tell south koreans it was all for the lulz

North Korea is BEST KOREA

i ramemba u, u wuh weak 

Kim Jong IL | Kim Jong Ok

the truth

Jedi Swift new Viinyl and Zebra Girl Gif

I just released a new viinyl called It Aint Delivery its Home Made so check it out. Nothing new is really going on in the world. Google is still the same. Facebook.. also the same. When I get home from getting the baby mama from work ima write a long rant on how much its BS to have foreclosed houses go to waste.

Until then, enjoy the song up top.. and this zebra girl gif

the truth

Saturday, December 17, 2011

Let it Snow by Google

If you are bored, and wanna see a really cool easter egg that i found on Google follow this link OR Go to Google and Search "Let it snow". You should see a nice little snow effect like the one found at .. Screen Shots below.

Wordpress snow plugin screenshot

google let it snow easter egg. or christmas egg?!

the truth

Friday, December 16, 2011

Send a call from Santa Claus via GMAIL

So i was just cruising the interwebz on google+ while i seen a post come from Gmail titled "Send a call from Santa Clause brought to you by Gmail". I was skeptical that it would be anything more then just a way from some company to swipe my contacts phone numbers but hey, what the heck might as well. I went to filled out a little questionnaire that asked my who i was, who the person Santa was going to call was, what their relationship was to me, what they like to eat, where they live and what holiday they are celebrating then I listened to the output. It was great!!!! So cute. Google hasnt let me down when it comes to the innovative ways to show their geeky personalities. Google is a rather personable company when it comes to their little apps. Dont get me started on Adsense tho. Anyways.. Below is a screen shot of the landing page. Its nice too. ^_^

Thursday, December 15, 2011

my opinion of the facebook timeline with screenshot

So Facebook released Timeline today for our facebook profiles. I must say, I rather like it. It reminds me of a concept i seen from twitter competitor a while ago.. I like how the timeline goes from my birth, to the birth of my siblings, and the birth of my ideas.. Like the creation of MyOwnVerse the poetry network, and my company BriefCaseIT that offers Search Engine Optimization to Eastern North Carolina. And on top of that, i get to have a "Cover" image.. looks more like a header image to me, but wtf do i know. Facebook timeline offers a sleek and beautiful integration of your time spent on Facebook. If no other company dominates Facebook, then in the future, our facebook's will be how we are remembered. I wonder if Facebook would ever create (in the future of course) simulations of US from the things we posted and played alot. Wouldn't it be cool if our future kids and grand kids could have a conversation with their dead relatives. At different points in their life time. Im anxoius to see the evolution of the idea but what im afraid of is the idea.. "If you are getting a service for free then you are not the customer, you are the product" and facebook has proved this concept time and time again. We as facebook users are valued at $125 a piece. Shit just let me hold 5 dolla nig. Sadly, facebook isnt there to make our lives easier, or to encourage social interactions. Its there to aggregate data and sell said data to advertisers. All about that worthless fiat currency to enslave us all. LOL. Dont be evil says google but they do the same shit. Today ideas are born out of marketing abilities and not out of common good of the people. With my rant comming to an end here is a stupid screenshot.

Wednesday, December 14, 2011

ENetwork Final Exam CCNA 1 4.0 answers

CCNA 1 4.0 FINAL EXAM 201 thanks heiserz

1. A network technician has made a UTP cable that is terminated as T568A on one end and T568B on the opposite end. What type of cable has been constructed?

Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?

Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection?
The data is automatically encrypted.
A Telnet server process is running on PC1.
The connection is made through a VTY session on the router.
A GET request was sent to RouterB to retrieve data during this session.

4. Which three addresses belong to the category of public IP addresses? (Choose three.)

5. Which range of port numbers are reserved for services that are commonly used by applications that run on servers?
0 to 255
0 to 1023
1024 to 49151
49152 to 65535

6. Which prompt represents the appropriate mode used for the copy running-config startup-config command ?

7. Which two factors contribute to the increased throughput when all nodes of a LAN are connected to a switch instead of a hub? (Choose two.)
full-duplex operation
collision-free environment
logical bus media access
broadcast-free environment
point-to-multipoint topology

8. A network administrator is configuring several switches for a network. The switches have similar configurations and only minor differences. The administrator wants to save all commands that are issued on the first switch to a text file for editing. Which transfer option should be selected in HyperTerminal?
Send File…
Receive File…
Capture Text…
Send Text File…

9. An organization has been assigned network ID and subnet mask Which IP address range can be used for this organization? to to to to to

10. What is described by the network access layer of the TCP/IP model?
rules for packet acknowledgment, error recovery, and sequencing
rules for the handoff from the internet layer to the network access protocols
rules for how source and destination hosts exchange data between programs
rules for determining which processes can be used to route messages through an internetwork

11. A technician is setting up a workgroup for six users and wants to allow users to share files without setting up a server. Which application layer protocol will provide for peer-to-peer file sharing in a workgroup?

Refer to the exhibit. Which type of network design is shown?
wide area
dedicated server

13. Refer to the exhibit. A network technician wants to connect host A to the console of a Cisco switch to initialize the configuration. What type of cable is required for this connection?
straight-through cable
crossover cable
rollover cable
serial cable

14. What command can be used to troubleshoot domain name resolution issues?
arp -a

Refer to the exhibit. When host A sends a frame addressed for host D, which hosts will receive the frame?
only host D
only hosts A and D
only hosts B, C, and D
all hosts

The tracert command was issued on computer A. Computer A can ping other addresses on the local subnet. Computer A sent the first ICMP packet toward computer B with a TTL value of 1. A protocol analyzer that was running on computer B showed that the packet never reached its destination. Why did the packet not reach the destination?
There is a TCP/IP problem on computer A.
There is a routing loop between R1 and R2.
R1 does not have a route for the destination network.
The TTL for the packet was decreased to zero by R1.

17. A user enters in the address line of a browser. Which statement is true about this transaction?
The “http” portion indicates the protocol that is being used.
The “web1.htm” portion is the specific service name.
The retrieved web page will be displayed in URL code.
The “” is the name of the web page file that is called.

18. When must a router serial interface be configured with the clock rate command?
when the interface is functioning as a DTE device
when the interface timers have been cleared
when the connected DTE device is shut down
when the interface is functioning as a DCE device

19. Which option shows the PDU that contains the Layer 3 source and destination addressing for a packet?
Option 3

20. Which communication tool allows real-time collaboration?
instant messaging

Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address, and the destination IP address is At which point in the network was this packet captured?
leaving host A
leaving ATL
leaving Dallas
leaving NYC

Refer to the exhibit. Which application layer service was used to determine the IP address assigned to the URL?

23. Which router component will have contents erased when the command erase startup-config is issued?

24. Which prompt is associated with the privileged exec mode?

25. Which scenario describes a typical peer-to-peer network environment?
An employee downloads a file that is stored on a departmental file server.
An employee edits and reviews web pages on a web server that is located in the server farm.
A teleworker logs into a core router of the corporate network and makes a configuration change.
A user on one office PC sends output to a printer that is attached to the USB port of another PC in an adjacent office.

26. To enhance security in a network, the network administrator uses these commands:
Router(config)# line console 0
Router(config-line)# password j1mdi2
Router(config-line)# login
What two conclusions are evident from these commands? (Choose two.)
Users who attempt to connect to the console port of the router must enter a password.
The entries permit access through the console by the use of j1mdi2 as the password.
The entries eliminate the need for authentication.
Access through the console will be denied because the console configuration is incomplete.
The entries prevent passwords from being displayed as plain text.

Refer to the exhibit. Which option correctly identifies the network address, range of host addresses, and the broadcast address for the network that contains host A?–––––– ––

Refer to the exhibit. Host A is able to access resources on the local LAN but is unable to access any resources on the Internet. What is the likely cause of this problem?
The host subnet mask in incorrect.
The network uses private addresses.
The host address is a network address.
The default gateway is on a different subnet from the host.

29. A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error?
access point

Refer to the exhibit. For connecting two routers with an Ethernet crossover cable, which interface should be used?

31. Which option represents a point-to-point logical topology diagram?
Option 4

32. Which OSI layer manages data segments?
application layer
presentation layer
session layer
transport layer

33. Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)
100 BASE-T
1000 BASE-TX
1000 BASE-SX

Refer to the exhibit. An employee wants to access the organization intranet from home. Which intermediary device should be used to connect the organization intranet to the Internet to enable this access?
wireless access point

35. How many host addresses may be assigned when using the network address with a subnet mask of

Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?
address translation
DHCP services
web server

37. Which application belongs to the category of the client/server model?
using Telnet to access a router
exchanging information via instant messaging
printing a document to a locally connected printer
scanning a document with a directly connected scanner

Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and internet layers of the TCP/IP model? (Choose two.)
application layer
presentation layer
session layer
transport layer
network layer
data link layer
physical layer

39. Which application layer protocol allows administrators to log into a server from remote locations and control a server as though logged in locally?

40. A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?
enable secret

Refer to the exhibit. What two facts can be determined from the session information that is displayed? (Choose two.)
The protocol is a connection-oriented protocol.
This exchange is part of the three-way handshake.
The SYN flag is representing the initial establishment of a session.
The destination port indicates that an FTP session has been initiated.
The source port does not support communication with the destination port that is listed.

Refer to the exhibit. RouterB is configured properly. The Ethernet interface Fa0/0 of RouterA is configured with the use of the commands that are shown. However, a ping from the Fa0/0 interface of RouterA to the Fa0/0 interface of RouterB is unsuccessful. What action should be taken on RouterA to solve this problem?
Use the description command on the FastEthernet interface Fa0/0.
Configure the clock rate of the FastEthernet interface Fa0/0.
Use the no shutdown command on the FastEthernet interface Fa0/0.
Reboot the router.

Refer to the exhibit. Communication for hosts X and Y is restricted to the local network. What is the reason for this?
Host X is assigned a network address.
Host Y is assigned a multicast address.
Host X and host Y belong to different networks.
The gateway addresses are broadcast addresses.

44. Which topology divides the collision domain and provides full media bandwidth to the hosts in the network?

Refer to the exhibit. The ping command is issued on the local host. What do the ping results indicate?
The local host can send packets on the local network.
The TCP/IP stack on the local host operates properly.
The local host has full connectivity to the default gateway.
The local host has full connectivity to the remote network.

46. A technician makes several changes to the running configuration on a router, but the desired results are not achieved. The technician issues the reload command. What action will be taken by the router?
All changes will be lost and the router will restart immediately.
Changes will be saved automatically and the router will restart.
The user will be prompted to save changes before the router restarts.
The router will detect changes to the running configuration and will reload using the configuration stored in RAM.

47. What is the effect of the command copy running-config tftp?
copies the configuration from a remote machine into RAM
copies the configuration from a remote machine into NVRAM
copies the configuration currently in RAM to a remote machine
copies the configuration currently in NVRAM to a remote machine

Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?
Host1 sends a segment with the ACK flag = 0, SYN flag = 0 to Host2.
Host1 sends a segment with the ACK flag = 1, SYN flag = 0 to Host2.
Host1 sends a segment with the ACK flag = 1, SYN flag = 1 to Host2.
Host2 sends a segment with the ACK flag = 0, SYN flag = 1 to Host1.
Host2 sends a segment with the ACK flag = 1, SYN flag = 0 to Host1.
Host2 sends a segment with the ACK flag = 1, SYN flag = 1 to Host1.

Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?
IP address:; Subnet Mask:; Default Gateway:
IP address:; Subnet Mask:; Default Gateway:
IP address:; Subnet Mask:; Default Gateway:
IP address:; Subnet Mask:; Default Gateway:
IP address:; Subnet Mask:; Default Gateway:
IP address:; Subnet Mask:; Default Gateway:

50. Which physical component is used to access and perform the initial configuration on a new unconfigured router?
Option 2

51. What can the user do from the command prompt, Router(config-line)# ?
Configure one of the network interfaces.
Configure one of the physical or virtual lines.
Verify the running configuration on the device.
Configure the parameters for one of the routing protocols.

Refer to the exhibit. Host A is unable to reach host B on the remote network. A technician attempted to ping the local gateway and the ping was successful. To verify the host configuration, the technician issued the ipconfig command. What is the likely cause of the problem?
The local NIC is incorrectly configured.
The subnet mask on host A is incorrectly configured.
The IP address on host A is incorrectly configured.
The default gateway on host A is incorrectly configured.


Saturday, December 10, 2011

Fuck the police meme

So today I went through a road block.. I think they should be illegal. Now i have to get a new license, a new tag, an inspection, pay a fine, and go to court, to get screwed a little more. QUOTAS ARE FUCKIN BULLSHIT! So now i bring you the FUCK THE POLICE meme.


Friday, December 9, 2011

My Schemer Beta Experience and thoughts

Ever wonder what to do next? Schemer can help.

Whether it’s exploring a new city, checking out a friend’s movie recommendation, or just finding new activities for your weekends, Schemer lets you discover new things to do, share schemes with friends, and make the most of your day.
Think you’re up for it? Join Schemer.

From a psychologist perspective.

The concept of schemer is "what do i want to do.. one day". So essentially you are creating your one day list in the concept of status updates. For example

I want to… be the president of the united states


I want to… try every flavor of mcdonalds dipping sauce

So why would this be important? Well, its a great way to aggregate data (get to know the person) through their dreams and aspirations. There for creating an effective way to market to them in the future. You are making the customer quiz themselves and then getting society involved with said created quiz. This information could be used for trend prediction, societal beliefs, and ultimately just to find out what people find admirable. There is always something sinister behind the scenes of a site that wants to know exactly what you want out of life and has the marketing potential to give you the illusion that you can have it, in order to drive conversions. BUT i still like it. ^_^

Here is a  few schemer screenshots of what the interface looks like.

"your schemes"

schemer profile

schemer home page

the hit the town icon seems to look like titties too, which is win.

Well this concludes the post on my SCHEMER experience. I think the site is neat, i like the concept, and i have always wanted to make my one day list lol. Perhaps when you use schemer you will inspire a revolution or someone to eat bacon ice cream. ^_^