Category Archives: pabulum

Pabulum– Stuff to Think About!

Thunderbird and Google Apps Address Book Sync

This assumes you use a something@gmail.com Email address or Google Apps or Google GSuite (can be Free for Non Profits)

That you use free THUNDERBIRD Email already set up using IMAP but realize your Contacts are not part of the clever syncing your Mail Folders use (Warning: Will NOT work with anything but Google!- No Yahoo!, Earthlink, etc!!)

So. your online http://www.gmail.com Contacts will not appear within Thunderbird’s own Address Book,
or at least not be In Sync…
You CAN see them at: http://contacts.google.com
But they are NOT the same in your Tunderbird Contacts.
Well, Thunderbird will collect the addresses of people you write or reply to, but this will NOT be the same set as the web based Contacts. SO! :

-0) If you ever Replied or Wrote to someone within Thunderbird, most likely they will end up in the address book called
“Collected Addresses”.
Start typing some part of the name on the To:, CC: or BCC: Line,
and the whole address collected should come up…
No?

0) In Thunderbird,  Search for, and reply to whoever it is you need to contact:
use: View.. Toolbars.. Quick Filter toolbar to be certain it is ON
(It’s incredibly useful anyway)
– Search for the Name of the person as Sender that you want to write to
– assuming they wrote you at least once, they will be there and you can use REPLY!

No? OK!

1) Just use gmail.com website anyway : )

2) Best of Both Worlds:
Use Thunderbird alongside: https://contacts.google.com
to get the best of BOTH worlds- Copy & Paste from that list into the TO: line, etc…

3) I use the GContactSync add on Application to pull contacts
FROM GOOGLE into THUNDERBIRD and merge them up.
You MAY and up with duplicates this way so an additional plugin is then used to remove the duplicates. A bit messy but ideal when complete. DO NOT install it from there– that’s just for Info.
In Thunderbird, click
Tools… Addons… Extensions..
And search for:
GContactSync

Then permit its use on your Google account
Be Vewwy Vewwy CAreful where you Go from here as you are likely to end up with Duplicates (for which there is a separate Fixer Extension).
Best is to look carefully at the GContact Sync settings on your Toolbar (after you have Re Started) and see offerings for which directions the sync is to go: BOTH ways is probably NOT a good idea at first- Set it to copy FROM Google TO Thunderbird first?

you have Backups, right?

Within Thunderbird, click Tools > Address Book.
Select the desired Address Book (s).
Note: Make sure that you are selecting a specific address book.
The selection by default is set as “All Address Books”
and exporting this way will result in a blank file.
Select Tools > Export…
Note: If you do not see the Export option, click View > Toolbars to turn this option on.

Select “LDIF” (Industry Standard that will allow you to re import)
from the Format drop-down box.
Choose where you want to save the exported file, give the file a name, and click Save.

Comments Welcomed!

Set Video File Name to Date Made

Using: Linux, exiftool, mediainfo
Requires- Intermediate LINUX skills and Google.
Further Reference: https://exiftool.org/filename.html
You MAY want to clean up file naming with DETOX

I have lots of small MP4 video files with arbitrary sequence numbers like:
dji_001.mp4, dji_002.mp4.. etc etc- making it hard to divide them into folders later for particular filmed events with maybe a dozen files with similar time stamps… The file dates themselves are unreliable as it may be much later and the date of the copy not the filming.
These video files contain realistic  internal metadata of all sorts tagged when the video was made that’s VERY interesting including GPS info, altitude and way more:
Hey, try it yourself!
exiftool myfilename.abc
or
mediainfo filename.xyz
for any movie
Note: that EXIF Timestamps are very reasonably in UTC so consider that when you wonder why your videos are tagged hours off–
Unless you are near 0 longitude (Western Europe..) ; )
My exif data DOES store lat/long but that’s another Project : )

To batch rename an entire folder of arbitrarily named files and recursively, everything below::
(No Line Break, BTW!)

exiftool “‘-filename<CreateDate” -d %Y_%b_%d_%a_@_%I:%M_%p%%-c.%%le -r -ext mp4 *
Result:
2018_Aug_13_Mon_@_07:49_PM.mp4

(I fear Spaces so tend to use the Underbar _ character)

exiftool “-filename<CreateDate” -d %Y-%b-%d-%a_@_%I:%M:%S_%p%%-c.%%le -r -ext mp4 *
gives:
2014-Jan-01-Wed_@_12:00:56_AM.mp4

(Note: If meant for Windows these filenames contain things like Colon “:” which it May NOT like)

exiftool “-filename<CreateDate” -d %Y_%b_%d_%a_%I.%M.%S_%p%%-c.%%le -r -ext mp4 *
gives: 2018_Aug_13_Mon_07.44.08_PM.mp4

the DATE/TIME variables can be studied by using:
man date
and:
man exiftool
will remind you the “-r” option is to be Recursive, which you may not want… and more.

exiftool can also work on still images. Very useful!

Linux RAID

  • This guide is a “nutshell” (Brief guides) script that assumes a reasonable level of Linux proficiency & understanding & is not geared to a particular Linux or specific instructions
    Lots of Googleable Entries such as green COMMANDS should help : )_
  • I am assuming an already running LINUX system of recent origin (I use MINT, an Ubuntu/Debian derivative) on a drive all its own, NOT RAID, possibly a small SSD of 64GB and the addition of 2 EMPTY identical drives to be put in RAID1 formation (Mirrored, that is 2 identical drives ‘combined’ redundantly into one for DATA use)
    NOT for Operating System Boot use in this guide.
  • Do not use BIOS RAID or  Hardware Raid this is all Software Raid done by LINUX
  • TEST ALL THE DRIVES that will be used including any Operating System drives using their S.M.A.R.T. facility. IE: GSMARTCONTROL GUI
  • If the drives are over 2TB in size (and perhaps even if they are not) they must be configured, partitioned and formatted using GPT not old style MBR (Master Boot Record) This works even on old PC architecture without EFI else you will not see outside the 2TB boundary : )
  • Using “PARTED” utility (Do not use FDISK) 
  • “label” the disk “gpt” as per instructions. Create conventional ext4 partition on EACH drive using the whole partition ideally,
  • Check whether you have RAID utility: “MDADM” and if not, get it.
  • Check What You Have Got: lsblk AKA: “LiStBLocK”
  • Check whether something raid like is around yet (Not as silly as it sounds while we are experiment:)
    cat /proc/mdstat
  • Know the Device Names then use this command:
    $sudo mdadm –create –verbose /dev/md0 –level=1 –raid-devices=2 /dev/sda /dev/sdb
  • above assumes devices were /dev/sda, /dev/sdb. But you knew that..
  • on another console, run : cat /proc/mdstat
  • This will show you the ongoing Mirroring Process-
  • a new ‘device’ will now exist: /dev/md0 as specified above. You can mount this like so on an existing Mount Point:
  • mount /dev/md0 /mnt/raid
  • I use no Options as things seem to get Auto detected nicely. 
  • TO make it auto mount add entry to /etc/fstab- Use “blkid” to find its UUID which is the correct way to Mount stuff in Linux
  • YOu can use the device IMMEDIATELY after issuing the last “mdadm” command above and mounting the array- It can simultaneously be written to while mirroring but the drives will be VERY VERY BUSY and in my case, overheated while doing so!
  • I use the “HDDTEMP” utility to check drive temperatures:
    Example: sudo hddtemp /dev/sd[a-b]  
  • Use advanced  features of SMARTMONTOOLS to Email or Notify you if SMART monitoring notices drive degradadtion,
    Not Covered Here
  • Use “NETHOG” to watch how the server is being used by the Network
  • To Be Continued. Enjoy!
  •  

Clean Up File Names

Cleaning up Funny File Names
Keep your Original files somewhere SAFE as a source to restart the project should it hiccup : )
Utilities Used: Google them for your Platform…
Examples are for Image Files- Suit Yourself here though.
Red is Commands- Green is My Results.

detox, exiftool, imagemagick, convmv, 

I copied a lot of cranky old 20 year old Floppy Disk image files into a Linux folder to clean up with the intention they should end up inside Apple Photos which would use their proper Image Timestamp to good effect : )

$ls -l
-rwxr-xr-x 1 sysop sysop 59993 Mar 29 2003 <A9>2002 12 19 Sunrise -5<B0> (21).jpg
-rwxr-xr-x 1 sysop sysop 78345 Mar 29 2003 <A9>2002 12 19 Sunrise -5<B0> (79).jpg
-rwxr-xr-x 1 sysop sysop 55210 Mar 29 2003 <A9>2002 12 31 Silvester (1).jpg
-rw-r--r-- 1 sysop sysop 55302 Mar 29 2003 ©2002 12 31 Silvester (2).jpg
-rwxr-xr-x 1 sysop sysop 190714 Feb 15 2003 20%20Mutterstuten%20mit%20Fohlen.jpg

Be Nice! Lets Set ’em all to reasonable Permissions:
$chmod -Rvc 644 *

This untangles ‘funny’ characters and irregularities:
$detox -r -v *

These three unify foreign language characters to standard UTF-8
(Note the final "." period meaning "Here")
$convmv -r -f windows-1252 -t UTF-8 .
$convmv -r -f ISO-8859-1 -t UTF-8 .
$convmv -r -f cp-850 -t UTF-8 .

Clean Em Up!! Lowercase names:
$for file in $(ls); do mv -i ${file} ${file,,}; done
Replace spaces in file names with underbar:
$rename ‘s/\s/_/g’ ./*.jpg

None of this so far changes the original Time Stamp on the file-
Its Creation date, only its access point: Its Name.
Which is Good. Could be useful.
Older digital Pictures did not use the EXIF metadata
that records when the Picture was taken, etc, so, this is all we have got: the File Creation Date listed by “ls -l “.

I wanted to standardize on .JPG files, as there were a mix  of GIF, BMP, etc etc.. Your choice however.
ImageMagick's MOGRIFY is good for that; Here, making all gifs into jpgs.

$mogrify -format jpg *.gif

*note* I found some animated GIFs and the result was an array of single .jpg's
as jpg does NOT have the ability to Animate! Ugh!
IE: This single file has 6 images within it. using ImageMagicks' "identify" utility.. Just a Warning...
$identify WdfAnimate.gif
WdfAnimate.gif[0] GIF 275x440 275x440+0+0 8-bit sRGB 256c 98.7KB 0.000u 0:00.000
WdfAnimate.gif[1] GIF 275x440 275x440+0+0 8-bit sRGB 256c 98.7KB 0.000u 0:00.000
WdfAnimate.gif[2] GIF 275x440 275x440+0+0 8-bit sRGB 256c 98.7KB 0.000u 0:00.000
WdfAnimate.gif[3] GIF 275x440 275x440+0+0 8-bit sRGB 256c 98.7KB 0.000u 0:00.000
WdfAnimate.gif[4] GIF 275x440 275x440+0+0 8-bit sRGB 256c 98.7KB 0.000u 0:00.000
WdfAnimate.gif[5] GIF 275x440 275x440+0+0 8-bit sRGB 256c 98.7KB 0.000u 0:00.000

The resulting new JPG output files have today’s timestamp,
not that of the original GIF, So! ::

$for i in *.gif; do touch -r "$i" "${i%.*}.jpg"; done

This ‘touches’; (Sets the Timestamp) as the SAME as a Reference file– the Original.
Now Let’s mess with the file “witch.gif” for Testing; Then apply to All..

$jhead -exifmap witch.jpg
File name : witch.jpg
File size : 67559 bytes
File date : 2000:02:16 08:35:32
Resolution : 398 x 300
JPEG Quality : 92

No EXIF data Present. Let’s create it with the current File Date:
$jhead -mkexif witch.jpg
Modified: witch.jpg

Now Look: Additional MAP file EXIF records the EXIF
Timestamp as if when Picture was Taken
regardless of what happens to the file’s timestamp from here on out:

$jhead -exifmap witch.jpg
Map: 00008-00038: Directory
Map: 00038-00058: Data for tag 0132
Map: 00058-00076: Directory
Map: 00076-00096: Data for tag 9003
Map: 00096-00126: Directory
Map: 00126-00126: Thumbnail
Map: 00126- End of exif
Map: 00000 49 49 2a 00 08 00 00 00 02 00
.. thumbnail data, I think?? ...
Map: 00120 00 00 00 00 00 00 00 00 11 04
File name : witch.jpg
File size : 67677 bytes
File date : 2000:02:16 08:35:32
Date/Time : 2000:02:16 08:35:32
Resolution : 398 x 300
JPEG Quality : 92
______________________

Use the Manual Pages for these Utilities here for much more useful stuff : )

 

Linux Server Breakin Attempts

Heads Up as I am notified my Virtual Linux Server logs have suddenly starting growing much faster than usual.
Also I got a warning that Virtual Memory was Low.

This is the image after things got fixed:
Looking through logs I see torrents of failed login attempts over the SSH (Secure Shell) and FTP port (yes I am trying hard to switch to SFTP but that’s another story) at the rate of 5 per second or more at times.
Several Issues to Note:
 I moved SSHD from default port 22 to 1066 years ago. 
That was not, I thought a ‘well known port’ unless of course someone figures it out.
Had not changed it since. 
– Server auto updates itself regularly and I scan and check it manually now & then.
and there does not appear to be a crack so much as brute force attacks perhaps combined with guesswork.

  • Hackers obviously scanned & found the (years old) ‘new’ port.1066. I since moved it again.
    – Hackers then launched a barrage of brute force attempts with various names and who knows what password on that particular port. (logins fails restricted to 3 per 600s session in /ec/ssh/sshd_config)
    – Interestingly, ‘root’ was never tried (It’s disabled anyway)
    I assume as this could trigger a default alert- But: admin, demo, test etc? Of course.
    – These attacks came from unique IP addresses all over the word. Yes, folks, mainly China and Asia. Russia did not show up per se but then why would it? : )
    Few came from the same source IP or even subnet more than once. RESPONSES:
    – I tried to Ban China in Iptables. Not so easy as it sounds and a poor solution anyway being a majority of the sources, but not all.
    Overfilling Iptables uses up kernel memory and exhausts Virtual Memory : (
    – I setup “fail2ban”, which examines pre determined  log files for fails and acts upon it to ‘ban’ the source using Iptables again.
    which is useless as each attempt was from a new IP. Oh Yes! From literally YEARS ago I suddenly recalled /etc/hosts.allow & /etc/hosts.deny which act on the initial service port connection and CAN check wildcard hostnames by name AND IP.
    So now my rules are: Deny from anywhere EXCEPT couple of my local ISPs. No-one gets in now, regardless, unless their reverse IP name matches ISPs in my area.
  • a good solution would be light on server resources lest the result be a Denial Of Service attack overwhelming the system with blocking rules. 
  • Judging by what’s happening recently  I fear a “Grey Goo Meltdown” of the Internet- I assume MOST of these attacking hosts have themselves been broken into and turned into ‘zombie bots’ attempting to propagate themselves. The ultimate purpose is to obtain a concerted powerful platform running software of the primary attacker’s choosing to launch denial of service attacks on target domains
    These services are For Hire on the Dark Web.Here is a sample log at the end of this post ,
    and I am thankful my slackadaisical  inattention was not more severely punished by the blackhats of the Internet.
    I used to use hosts.allow/deny on EVERYTHING with only minor inconvenience.Security is Interesting & entertaining much like a firework display until you get blasted… : )

Mar 1 03:44:54 s19410066 sshd[5235]: Failed password for invalid user aion from 49.235.69.80 port 55082 ssh2
Mar 1 03:44:54 s19410066 sshd[5237]: Received disconnect from 49.235.69.80: 11: Bye Bye
Mar 1 03:44:57 s19410066 sshd[5348]: Invalid user odoo from 211.193.58.173
Mar 1 03:44:57 s19410066 sshd[5349]: input_userauth_request: invalid user odoo
Mar 1 03:44:57 s19410066 sshd[5348]: pam_unix(sshd:auth): check pass; user unknown
Mar 1 03:44:57 s19410066 sshd[5348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.193.58.173
Mar 1 03:44:59 s19410066 sshd[5348]: Failed password for invalid user odoo from 211.193.58.173 port 34944 ssh2
Mar 1 03:44:59 s19410066 sshd[5349]: Received disconnect from 211.193.58.173: 11: Bye Bye
Mar 1 03:45:01 s19410066 sshd[5350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.79.168.244 user=root
Mar 1 03:45:02 s19410066 proftpd: pam_unix(proftpd:session): session opened for user willowsweather by (uid=0)
Mar 1 03:45:04 s19410066 sshd[5350]: Failed password for root from 202.79.168.244 port 58772 ssh2
Mar 1 03:45:04 s19410066 sshd[5352]: Received disconnect from 202.79.168.244: 11: Bye Bye
Mar 1 03:45:17 s19410066 sshd[5574]: Invalid user jose from 167.172.118.117
Mar 1 03:45:17 s19410066 sshd[5575]: input_userauth_request: invalid user jose
Mar 1 03:45:17 s19410066 sshd[5574]: pam_unix(sshd:auth): check pass; user unknown
Mar 1 03:45:17 s19410066 sshd[5574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.118.117
Mar 1 03:45:19 s19410066 sshd[5574]: Failed password for invalid user jose from 167.172.118.117 port 58284 ssh2
Mar 1 03:45:19 s19410066 sshd[5575]: Received disconnect from 167.172.118.117: 11: Bye Bye
Mar 1 03:45:20 s19410066 sshd[5576]: Invalid user admin from 139.59.13.223
Mar 1 03:45:20 s19410066 sshd[5577]: input_userauth_request: invalid user admin
Mar 1 03:45:20 s19410066 sshd[5576]: pam_unix(sshd:auth): check pass; user unknown
Mar 1 03:45:20 s19410066 sshd[5576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.13.223
Mar 1 03:45:22 s19410066 sshd[5576]: Failed password for invalid user admin from 139.59.13.223 port 59480 ssh2
Mar 1 03:45:22 s19410066 sshd[5577]: Received disconnect from 139.59.13.223: 11: Bye Bye
Mar 1 03:45:44 s19410066 sshd[5584]: reverse mapping checking getaddrinfo for 187-45-103-15.mhnet.com.br [187.45.103.15] failed – POSSIBLE BREAK-IN ATTEMPT!
Mar 1 03:45:44 s19410066 sshd[5584]: Invalid user time from 187.45.103.15
Mar 1 03:45:44 s19410066 sshd[5585]: input_userauth_request: invalid user time
Mar 1 03:45:44 s19410066 sshd[5584]: pam_unix(sshd:auth): check pass; user unknown
Mar 1 03:45:44 s19410066 sshd[5584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.45.103.15
Mar 1 03:45:46 s19410066 proftpd: pam_unix(proftpd:session): session opened for user artol by (uid=0)
Mar 1 03:45:47 s19410066 sshd[5584]: Failed password for invalid user time from 187.45.103.15 port 55849 ssh2
Mar 1 03:45:47 s19410066 sshd[5585]: Received disconnect from 187.45.103.15: 11: Bye Bye
Mar 1 03:45:58 s19410066 sshd[5589]: Invalid user demo from 49.234.60.13
Mar 1 03:45:58 s19410066 sshd[5590]: input_userauth_request: invalid user demo

Life n death

Happy New Year, I think!

Odds Of Death In The United States By Selected Cause Of Injury, 2017 (1)

I copied this data from the social security administration site for use in the Nevada county Altar Show– a commemorative exhibition for over 100 ‘artists’ to present what they thought was important.
i thought this was important as it commemorated a life as yet not over but Sure to Happen: But how?
Which way would you choose if you could?
“Natural Disasters?” “All Other CAuses”?
Just Saying,  as they say right here in California!

Cause of death

Number of
deaths, 2017

One-year odds

Lifetime odds

Accidental poisoning by and exposure to
noxious substances

64,795

5,027

64

     Drug poisoning

61,311

5,313

68

     Opioids (including both legal and illegal)

43,036

7,569

96

All motor vehicle accidents

40,231

8,096

103

     Car occupants

7,248

44,939

572

     Motorcycle riders

4,832

67,409

858

     Pedestrians

7,450

43,721

556

Assault by firearm

14,542

22,399

285

Exposure to smoke, fire and flames

2,812

115,832

1,474

Fall on and from stairs and steps

2,493

130,654

1,662

Drowning and submersion while in or
falling into swimming pool

723

450,511

5,732

Fall on and from ladder or scaffolding

569

572,441

7,283

Air and space transport accidents

385

846,024

10,764

Firearms discharge (accidental)

486

670,204

8,527

Cataclysmic storm (3)

132

2,467,570

31,394

Flood

27

12,063,673

153,482

Lightning

19

17,143,115

218,106

Earthquake and other earth movements

13

25,055,321

318,770

Bitten or struck by dog

36

9,047,755

115,111

(1) Based on fatalities and life expectancy in 2017. Ranked by deaths in 2017.
(2) Includes all types of medications including narcotics and hallucinogens, alcohol and gases.
(3) Includes hurricanes, tornadoes, blizzards, dust storms and other cataclysmic storms.

Source: National Center for Health Statistics; National Safety Council.

Facebook Ransom

[Draft: Money Matters, Aug 01 2019

Locked Out Of Facebook? Can I please reach a Human about this?
No. Here is Why, based on the ever valuable & interesting Statistics
Here, I am being conservative:
As of June 2019, there are 2.41 billion ‘active users’ (Define that though : ). 83 million of which are thought to be fake (but how?)
which though less than .03% has a disproportionate effect.
That’s also Instagram, WhatsApp and Messenger which Facebook operates.

I am using the USA definition of Billion (1000 million not the UK a million million) AND This Calculator to help me.
1.6 billion of whom log on average once per day.
I’ll use the larger Active User figure, just cos I can.

Facebook has about 40,000 employees worldwide which means in its crudest form, one employee per 6000 ‘active accounts’ which log in an average of 20 minutes a day.

Facebook is “Free” for you and me. If Facebook is not a commodity you pay for, then, as they say, you ARE the commodity. You will be engaged and monetized with ads, etc, but no one can afford the slim margins spread over a vast array of users to talk to you personally even at third world rates of perhaps a dollar an hour for Facebook Tech Support.

So, much of the Security about fake accounts, hack attempts etc are managed by AI (Artificial Intelligence) algorithms that are constantly being tweaked to look for unusual behaviors or reports.

Machine Learning (Big at Google!) is a different beast and ‘learns’ from Past Experience of hacks… and its own simulations.
Such a strategy has had the oriental game “Go!” beat the world champion written by programmers who do not know how to even play “Go!”!

What to Humans do that machines have trouble doing?
If you have been Locked Out of your account you will find out.
You are liekly to persist through a number of means:
“Use your registered cell phone to get a code and verify it’s you”
Well– that avenue has been cracked by script hackers with bogus Texting Accounts online.
So the Text never gets delivered. So you try a few more times.
Then FB wants you to uplaod drvier’s license, etc, all of which can of course be done by machiens and faked… I could go on…
EVENTUALLY the algorithm may then pass on your dilemma in a link to an associate in the Phillipines who may review the site according to strict guidelines with FAcebook>>>

But, how did oyu get locked out in the first place?

  1. By an algorithm, automatically, it thought something did not look right
  2. Automatically, for the hell of it, kind of like an IRS audit without any particular triggers (1%!)
  3. Complaints. Legitimate or Otherwise– FB Does Not Care.
  4. Bogus Complaints by cyber saboteurs.
    (Amazon experiences this!)
  5. Your own failed Login attempts etc.My Advice? Persist and Move On!
  6. Consider the huge fines wages against FB and how they make money and why:
    – their first obligation is to their shareholders
    – Their revenue is threefold:
    Targeted ads
    Aggregated data
    Personal Data. It’s this last one that got their wrist smacked with a $1B+ fine
    Shareholder tried to get rid of Mark Zuckerberg but as he is a majority shareholder– they cannot

Google Edible Websites

Basics of making your site Found By Google
This is technically called “SEO” (search Engine Optimizing) about which tomes have been written.
But without these basics below- None of that will help you.

You are wasting time and money buying Google Ad Words etc.
if you do not first make your website attractive to Google’s organic (free) search algorithms,   and by inference, most other Search sites.
You would not stick a costly billboard in a ditch or swamp-
so do the homework, and do it with your own site.
We assume you have some sort of website UP already.
So Let’s Check it

As of May 2019: (things change rapidly!)

1) – You cannot afford NOT to have an SSL/Secure site certificate installed. you ONLY need a free Domain Certificate issued by the likes of https://www.letsencrypt.com   regardless of what you are doing at the site, even if you are not taking payments or using any forms. CHECK YOUR SITE using the SSL link:
httpS://yoursite… *AND* http://yoursite.
Site must work whichever you use.
Your Internet provider will help.
If they cannot or will not help, then they ave no business selling pages or hosting. It should NOT cost much or even anything to do it
More from Google Here

2) Check Redirections– if the non secure site http://yoursite… is used it should REDIRECT (301) any page visited to the SECURE version
Here is Google’s take on that. Try My Site: http://artoflogic.com
(Opens a new tab- close it after test)
Note it starts: HTTP:/… But redirects to HTTPS://

3) Ideally site would treat usage the same whether or not “www..” is in front of the name by redirecting as above, normally to the SHORTER name, but either way will do. Mine goes to “www…” for historical reasons : )

4) The site must have robots.txt and a sitemap.xml.
Ideally files have some clever entries but first and foremost–
must EXIST.
They are publicly readable on any site that uses them  which will be most of them.
You can find yours by using your Base Site, removing all page URLs and adding a slash and /robots.txt IE for My site, it’s:
https://www.artoflogic.com/robots.txt

5) Site must use at least one “Sitemap” which is a friendly Directory Page to help Google know what’s new,  important,  relevant or changed rather than their having to ‘crawl’ you site as in the old days
The default name is: sitemap.xml and contains considerable technical blurb, and may look odd if you try to view it. But it should EXIST
Try yours by adding /sitemap.xml to the end of your domain name
Mine is here, for example:
https://www.artoflogic.com/sitemap.xml

6) If you are using the likes of WordPress, Joomla!, Drupal, etc. much, but not all of this trivia is taken care of FOR you.
But Check Check Check it anyway, and assume nothing.
Plug ins and add-ons like Yoast!
take care of much of but not all of this
Sites like WIX, SQUARESPACE  tend to do this for all you anyway with no action required, but CHECK IT ALL ANYWAY

7) Buying Google AdWords is IN ADDITION to all the above and is a bonus way to gain hits… But BEFORE you do this, Goggle provides many free tools with names like Google Analytics.
You should learn about how Google sees your site already.
It is NOT a cat and mouse game as it used to be–
Google is quite helpful about how to best interest their search algorithms, ergo Google users.
You will not surprisingly need a free Google account to do this,
https://myaccount.google.com after which you can sign up for the free Webmaster Tools
https://www.google.com/webmasters
From there on follow Google’s instructions on how to verify you own site you are offering to them and then Add your verified site to the google  “Search Console”.

8) *TIME*. a New Website will need to be around awhile before it has some provenance and interest for Google, it’s not easy to force this issue, not should it be.

9) Links In: Page & Brin’s first patent on google- ‘Page Rank’
Find ways to get people or pages to link *IN* to your site as an ‘authority’ referenced by other well ranked sites.
If they are well-respected it will rub off on you. and Don’t Cheat or pay shysters with Promises. Scamming De-Ranks You!
From here on out it is a dizzying array of tweaks and suggestions about INCREASING your ability to be found-
I ALWAYS try using Google in Anonymous Mode in Chrome (so Cookies will not be used and I shall see Searches as a fresh visitor would) and even use a free VPN proxy to appear to come from ‘elsewhere’  (Free 500MB per month) on the Internet as some searches involve regional/locale  factors and you can see things as ‘others’ see them elsewhere this way

Learn from the Google Webmaster Tools what words people are using to find you. Consider that most searches are fairly generic and will NOT be looking for your special “Celo Polka Cola” website,
(it does exist and it’s not mine!)
so that it Should be findable as “Unusual cola” “rare soda brand” etc “novelty pop” etc– you get the idea..!

That’s Enough For Now.
Suggestions Welcomed!

Cormorants at Hoover Dam

While looking down the 700 foot face drop of the Hoover dam from the top and squinting at the swirly water coming out of the turbines far below,  just where it continues down stream, I noticed some rather inconspicuous black birds with narrow wings.

They were swirling around In the updrafts and air eddys from the strong wind rushing upstream over the river in the gorge  and lifting up the concrete face of that there dam.

They do not seem to be very good flyers and flapped like crazy but the updraft of air took care of everything and their tatty looking bodies, Feathers all ruffled, were whisked in ever rising circles dramatically ever higher towards me at the top

The movements were too erratic and they were too tiny to Capture on film so I just enjoyed  trying to figure out what they were as the each of about four whirled into view…

About the point where they zoomed over the crest of the dam & over my head, I marveled  to see that they were actually cormorants,

Normally deep diving and fishing skinny black waterbirds, weak flyers not known to make good use of the their air mode of transport, and definitely not soaring birds such as condors gulls And Eagles.

Several of them then shot behind the dam then downward into the calm waters Of Lake Mead below where they continued peacefully fishing and diving there.

Ironically they don’t have oil in their feathers so they don’t even float very well as ducks might

This is what makes them great divers.

I thought “Jonathan Livingston cormorant” for a moment

And then rephrased that in my head :“against all odds “

How these birds learn to do this is anybody’s guess but my feeling is that flying anywhere over that water they inevitably get blown up the dam face by the powerful up currents ..

Yet I saw no other birds doing this.

So they might as well enjoy and the outcome is not bad.

I guess they fly out away from the dam face to get down again, but I didn’t see this.

I doubt theirs is a one-way journey.

The dam itself being artificial is very smooth and there’s very little turbulence, unlike there would be on a rugged natural cliff face where they would be spun to death by the air rotors..

Natural selection at work?

Be interesting to stick around to see!

They have had since the 1930s to Get selected 🙂

[April 2019]

Las Vegas Confusions

Las Vegas confusion

I parked my RV in the circus circus RV lot for $20 a night and set out on foot at dusk to go look at the Strip,

aiming for the Luxor, That giant pyramidal  black building about 4 miles up north Las Vegas strip, Which has a powerful beam shooting into the night sky above. It’s visible from everywhere – a good landmark.

Or so I thought.

I believe it used to be a green krypton laser but perhaps it accidentally shot some planes down so now it’s just a powerful Arc-light of some sort

I took in & easily entered  the Bellagio, the Venetian and all usual spots and was gradually unnerved & immediately disoriented to the extent that I could Neither picture which direction I was walking nor how to get out, even by backtracking.

I have a very good sense of direction so I felt quite thrown

Google maps was thrown too because it is not good in large pedestrian areas

I asked various staff for the exit and they seemed a bit confused too.

Knowing what fire marshals would have to say about this even in the state of Nevada, I followed green EXIT signs but the only effect of this was to take me into some other concrete skyway or laboratory  of human confusion.

Sometimes I looking down on the street below that I was trying hard to reach again.

I suppose the idea was that if a fire broke out you didn’t have to continue gambling in that particular building but could continue throwing the money away elsewhere,

MGM Appears to own everything so perhaps it just doesn’t matter anyway

More or less at random at some point I found  myself back on the street again, Totally turned around and the Alien beacon of the Luxor was in completely the wrong part of the sky. It was an unaccustomed act of faith to assume that that remained the correct direction to walk..

Yet the fun was not over.

Being on foot I had to cross a number of intersections that were railed off against foot traffic.

Very reasonably an overhead pedestrian bridge was provided in several places, Easy to locate and use. However, once exiting the skyway on the far side back we were inside among the slot machines..

(– no,  that’s incorrect none of them take coins anymore – They are now all video poker and fruit machines…)

And a further disorienting experience.

How does one get back  down to the street having crossed it?

I want to be outside!

The answer appears to be, “at random” Because following exit signs does not have the desired effect at all.

I was never so preoccupied that I did not have plenty of time to observe my fellow wanderers And environment..

It’s an enormously  eclectic blend of humanity who also seemed happily disoriented, nobody going in any particular direction as you might expect ants to do,

but rather randomly jiggling around to and fro back-and-forth and intersecting each other, Seemingly purposeless, but with an over arching urge to be fleeced and entertained.

Here I am thinking and writing about it when the words of Hunter Thompson came to mind where he described “gonzo journalism”

as being the observer and the observed one & the same rather than an objective judgment.

I was not about to be fleeced, except mentally, and I was definitely in the belly of the the exact same beast As my fellow jitterbuggers.

I would not say there is fear and loathing here now because the Las Vegas I visited 40 years before, hitchhiking on my second trip to the United States, Was the one that Hunter Thompson knew- a scruffy dry dump prominently operated by the mafia for the sole purpose of shady gambling and indulging the prostitution unavailable elsewhere

Now it has a Disneyesque  feel Where all neon has been replaced with stunningly impressive giant LED displays , Over-the-top stage shows, Solid national conferences all the time for everything you could imagine And the ever present brassy  posters for prostitution where, however, no naughty bits may ever even be hinted at visually Let alone be shown uncovered.

(Later on, off the strip somewhat I found pole dancing supply merchants, lap dancing trainers and my favorite- A Taoist  restaurant)

Las Vegas is plagued with innuendo about winning, sexuality, self assurance and celebrity.

A loudspeaker outside a casino proudly announces over & over  that they would give you $20 back of the first $100 you lost there. This simple mind bending illogicality Is still ringing in my head.
Good old fashioned Carny hawking and shystering in doorways– now gone.

A discrete law-enforcement shoos away the homeless & the bankrupt, And city fathers utterly gentrify–Yet somehow never lose-the remaining tasteless job of separating anybody from his, her or its money.

Alcohol used to be the drug of choice here; now there are cannabis ads everywhere.

14 miles walk later I return exhausted to my RV and a shower while marveling how many extra miles were added by the circumambulations My fitness watch shows.

I lie thinking how I love loathing Las Vegas
I loathe that I love it, I fear-

I fondle it. For it express is my very own confusion and disorientation, What I could not reveal to myself.

This place is my nemesis, my brain hacking tool.

My brain track wrecker and habit smasher. Nothing here is as it seems.

It worked, and I thank it. And will stay away for another few years, digesting. my temple visit of being turned upside down over,

Next day I return to starry eyed wanderings in the remote desert just a few dozen  miles away,

Going north again

With my now less challenged so called self,

whatever that self now is become,

Where I don’t have to think

quite so much any more.

April 2019