Technology

My PGP Public Key Block

—–BEGIN PGP PUBLIC KEY BLOCK—– Comment: GPGTools – https://gpgtools.org mQINBFf0TQEBEADMTC9IoSm1fflUeRrA+ltkIDabeziTIKbhREPb2V2tkKRiSDZk LOwJIZTZ/i80C4ONvARHBCW0id0i9nOZUsxnBdaQqY79WxTIgEvYaGZw5d+ECiQ9 EN1DwyE2FFsFAkIzylgS9hh8FONNu/2OeTCZplaTRm+fFYFvhzGQb8ik+S4oP9P7 yZA7V9KKKlJh6jSQFPWT0dVatm40SUbxIkoeQIeIRjAmsNFXZjWrcQm6a0R06V+B CfQEuu+SOg9EbY7nTe1TLnxHRH142ZeXKgmR8J7rwlojBIsseyfx0jctPqJbg91x 9ZMpmKLeoGcYoSaJfEsIrKWIGPN1ReEr2FiI5IvXPUZJCfl72xvU3jsIYJDw2fU6 a54dwE09wUP6hc+3bH2awRDAH4vNJlmOlxHdHUMqJ+UtIWIz53tZfKL6DmAYHRJY Ni8zNY7podrY9HchCMpOldNQxqFuq2W8MKe+Rrar2RzbNeVHrsiqrMExZuhlk4HI gS1l4HxdQUrsirD4HbwppSf3z/mRioyyPsasgV5pbNl/TD66N3UD5I1dGYSnKWU0 e7nyUL/T8upRwnVHzaRMSaYlFqcT8fRgRnhTMVY9ZtE40RiajQ7n6QS1jYM0ORYB muFeBJ02+uCtTiUSRaHi2F/EFwVVrAJUV3/m+Q8VOkYrzWId3Yssg5o0KQARAQAB tCZNci4gRGFtb24gQ2hldHNvbiA8ZGFtb25AY2hldGhlaW0uY29tPokCQAQTAQoA KgIbAwUJB4YfgAULCQgHAwUVCgkICwUWAgMBAAIeAQIXgAUCV/RNIwIZAQAKCRBR q2RYPzwj0YgDD/4wAwtXKjwqlD7JZMIeisjYhMcF3Bry2akuYTxqPQvXEFXh07l7 D3NBKeKoIlU4ItbzR+EUANqc6+ijj/2Zgwo9qDWvynuoYL49oNMIf1voEnSWc9bc WjtdsjioZ2MUUzZKtFJSPuhZOvOwY6L133C03teEoljEMouDixd4TueEj0c/z1jX YqwE8Jkg4iJe+Zf8vtqI0hVOWBhmR3+y5w6QvCxssLbVvi3/1rucHo/ZMK7b/6Cj XTiD82a73kZQ03z99YdWyqQWFYZ/4zCA4lHCntrDWHf4u8PL8gHZWqvqt3vdRxdX 1gWIEqu+d5dSl5dlIpdLIIAQXrIGzvWWxwimsp36Kfq08Us0Ye9jTYJZrXqz+jwW kmex8m5rocxKXk5tGCjOKBTM6lBoE443ckuqk6uixbLcVqqkLc0Rp7SLA7EyQJcR BzIXVTSqXlbZjiHa7zQ2nd4o8ZGVi0mj196riSzhkjhdnCTHWoFq25R1GDWMlugS mT2YaEZiUhQDWmU0xKanO0LXc7RAZxvxx8cmIbkNTN2ygS6VhHrS4/XhaTtI5Mi+ 2uOHopGJaAqcIt9GXqnm70fnvj7q6u9UA2B1cj6gclVVaXA+VHcVXO4KwMLSaL20 to+QwzGGSgf7Od+YG6AlxaWF9+iCglRP8jW//xe572dpjr+iDRi41u2g8bQlTXIu IERhbW9uIENoZXRzb24gPGRhbW9uQGNoZXRzb24uY29tPokCPQQTAQoAJwUCV/RN FwIbAwUJB4YfgAULCQgHAwUVCgkICwUWAgMBAAIeAQIXgAAKCRBRq2RYPzwj0dgG EACYvUVJXpsDufLCFvFfiCAXrsSng5vGdVR6r+4qhWgCs42vNUqNJF0F2sGyp+mr sH/69zdja+28EPpycs45pV/9SvAJcwcTvslSLjJ065/NRqnoc9F0T0raXYzRRfsF kKeTmIEOGYqobFl/ZRjWvDLvbggPsKeZvaBqFiHkKGK8FmlEQpYxoJkptCimpxE5 zKYZxTVGJ+S9aSYhR+Oq4XQ8WVqQU1ZN5J9MY8D1eI7y2zlGfyYpQ5WPCK4svKnf q7/GPGCnXquznfTg/ykDZvHp4Zrw2Z5KvB03TBDc1KO9Coroob+V1v09oTs7Jemj kRp1yu8XxBr7YbvwkaKdn0cYJGz3V53iCwI4pOkMoj/UPTyxFD+SQqlB4nRs8u51 W6TlMMImPua3TvH5jLx0a1tM/Yj8anQzm2+d9i4f4E0r+pc1QQuM5hCfLffrezq/ 1YkgkzPlkGBqEiQzR54AMU1ijH16m5dp63apoygYifWKwXHd94mFNDpjKE57VlYX rV2nPZoVe1q1olFuiv7gRp6/GVPJG1NXriP767sB/J4rgf4Uc995xa2oTF59ZX9u mEF09ebAwdKwVZo/w7CkS7WjwvZwAO+B0Xe8la2TSKKF9FbB/ouWFjDfQkTo80wx RLTnb7K+l9VnK2VAQ9iCJZAz3FirxflhRnR0JLJ2gb/9ebQ3TXIuIERhbW9uIENo ZXRzb24gKFBlcnNvbmFsIEVtYWlsKSA8ZGNoZXRzb25AZ21haWwuY29tPokCPQQT AQoAJwUCV/RNMwIbAwUJB4YfgAULCQgHAwUVCgkICwUWAgMBAAIeAQIXgAAKCRBR q2RYPzwj0WdmEACzlyYe8wsnK+kp7+HHERxMSUnS5RNGH+b1ciel6CxhCz5g6YvT tobkJ0U6G/wCXKCCPol3HH8BRge3LOCSMrsx8zhjf5pqdMYjwYcmNpK1YYL/3rL5 cK3wpcTfy4tR2qqOO7wduR1OudJE9ufNHX3bT6+9CIIPlkTq9N33lvDKkDvdQzi+ C9KzGRmlvU8XiAkcgp1fEbBildSl8Rin9oCM10/C9ScZCqfl1lVamqrLoNgxz/Yo tonEvRorJEOfF6VQf+0G9yED9DUBB+kTf+Qushf/VtE2dx6yBme7RTEWcFJSsrY8 i4jhpqY5T390amJYIXL3XW7uspqCnhjtNBnKF3zyGr+koAJj/Q1e+5BzULunrARN BxBVd0B5AhSyLep2/zdJUnq+ahKTPwIwZLDKJ6E7bKMICPqFoxO8C2AJ3FXFY/8E…

Read More

You are being watched

Tweets are tracking devices, and so are Facebook posts, and Google Plus comments, and text messages and on and on. The same technology that consumers have embraced to allow them to find products and get recommendations more efficiently often has geotagging. That picture you took so your cell phone probably has the location embedded in…

Read More

Only in California: Driving While Googling

A southern California woman was found not guilty of charges that she was driving in violation of California law prohibiting the use of video while driving. The CHP officer who gave the Cecilia Abadie the ticket for wearing Google Glass said that the device violated California State Vehicle Code 27602: A person shall not drive…

Read More

Repairing FindLaws Bad SEO Work

Let’s imagine you’ve paid FindLaw’s confiscatory rates for substandard web design and poor SEO practices. What can you do? Your FindLaw problems won’t be easy to fix. First of all, if you’ve made the mistake of “renting” a website from FindLaw, then leaving FindLaw is going to put you out of business web-wise. A rented…

Read More

FindLaw Getting Penalized for SEO Abuse?

Many lawyers have built their small office websites using FindLaw technology. The pricey, but push button technology, was attractive back in the mid-2000s, especially since FindLaw leveraged the power of its web network to generate immediate results for its clients. But FindLaw also has a major problem. And it’s that it deploys 2005 technology in…

Read More

The Internet, Convictions and Arrests

The internet allows us to do wonderful things – find information we need quickly, locate friends and family. But for someone accused of a crime, the Internet, search engines, and social media can be a nightmare, spreading news of an embarrassing and shameful event far and wide. This is particular true in Raleigh, which is…

Read More

Daylite 4: Huge Improvement, Excellent Interface

Since starting my private Raleigh criminal law practice in 2009, I’ve tested a number of different customer-relationship-management systems. I’ve tried RocketMatters, and Clio. I’ve also used a combination of Google products – Google Calendar, GMail, Google Voice, and Google Contacts – to maintain contact and client information. I’m fanatical about keeping accurate records – to…

Read More

Peer to Peer Software, LimeWire, and the Threat of Criminal Prosecution

The threat of criminal prosecution is very real in North Carolina, particularly if people use peer-to-peer based file sharing software and either intentionally or even inadvertently download pornography that includes child pornography. While few Raleigh criminal lawyers are familiar with the way this software works, it is important that any lawyer you hire be familiar…

Read More

Police Tracking of Cellphones

What was originally a very rare practice and largely limited to federal authorities – the tracking of cellphones by police – has now become more common, and has spread to state and local police agencies. The New York Times reports that: With cellphones ubiquitous, the police call phone tracing a valuable weapon in emergencies like…

Read More

What if Your Cell Phone Logged all of your Data?

What if everything you pressed on a cell phone was secretly recorded and logged on your cell phone, and saved to a log file that could later be accessed by anyone with access to the phone? Scary? YES! Turns out that some computer experts have discovered secret software on many Android phones called Carrier IQ…

Read More