Technology

My PGP Public Key Block

—–BEGIN PGP PUBLIC KEY BLOCK—– mQINBFmPNYMBEADRGWLpqy1iIlQBWsZ1RC0uG/c2yS4mRiGvU1awBVr/SDGENSLq Hhmz09t+75cPi8J1BfHYmqFt9Apy15UHy/sFpoqYjus7ZBDW/F9ErIroofI9uygQ ag43zuiOzq1bmNyxs3CLFwRwvarjHQF1Z3XVouau3lXNHR08In/J9MobKH40u5QB jSViNplZ6+MwHD388XMf6UiguEwKppKCw0SZyv7AEb//Xwcj21p8pQVlArH+6A5u 5U8AnLvOjWEc/cNC5Nn87sxkIhbtuMKsR4mzM+7swBCoBJJjBqAF1MnZmQVz6rYb obhqx54GVFWR8XnY6VP56JE6yRyTHDFYXR4Izl8bJdpRtO31JRGaY484PeWHc31A 02NxvxCwBcQXrtPf122GDbpCDDyQ5dopS8eiJsz/j/mf3AIYq1EmF89xQxFK39Nr qELbDcuLigXnwf/nSP70hZ7yPEkodKjaNpTvHx8XC+LZBFE68ttFk3zw3vllejCI k5b0yzdWEvrEBMMkYhFDdmlDOIXi+d/ZnzIPtYY1BehOpV6rq2uPiIZdoiChSjLB nT8Pw4bDYvu0IDTWLao70bMV5TloAdmL27ShZyzaVabiB1N/aeoG+9JFuBtdoito 0T4o8+R/GufWtEyohIFGLDT2hgBqrYODXPZiTQTTUSpASS1BfNBg9a4JtQARAQAB tCVNci4gRGFtb24gQ2hldHNvbiA8ZGFtb25AY2hldHNvbi5jb20+iQI9BBMBCgAn BQJZjzWDAhsDBQkHhh+ABQsJCAcDBRUKCQgLBRYCAwEAAh4BAheAAAoJEBnkoFOU 2OMdwVQP/RCX8+GOteO/KdnaDj8EQtwTbkFYGwUOFRnHDoH4xUgfVOFomNXOrmJX W17TIsAO2Oe3XwVAIc4ointWDor+OaBUtHpEJtCJVFzGNieYxBLr3nK2HFKLVqs2 bWXnve7m/v0yaYss4z4y0Ia+1pWKX1LINcAfxgtqTAqeWvfXGnyotKJGs6OyXvFE OO63/JNMGIiTUjPW9gkmY9WoBia0IWiNECw3I9JmJMaM2Gs2z5WpCpvkrDHHBUZw HDS6TYev1sPG5JWLt8/0WIaTg2CvympFekbic3tVItBTKJ8qKIWC8t0RjjJyp8pN 51eYw6a/cUAVT41s/gQtm8pAXfxLZiF+j5OJwSgOjiCumxVGgkgza0+MpjGg14aA g+1TJT6L8pp+DIflEVGBZH/dIqs5ZWfP7xUA19wa4IaOuIBnKbt43EhoOiHZrOGa 6rEyH81vJ5KSsAnnQcRpvD1FqyR78QePLzsLsqOFpHFDilRg5Ru9z9LPI1OSMteK OMjckYXvO1Cp92jQz6XDe00h4UkMAxaJpJ7FNHmGRAKRsmDjMg1GlhbnJBKG2BS7 9M5LC5langeOJg+hPnLqqqCP2wbMfuCAvvEDwHyPVGQSjn5/jOR9rUwEWMb/RIVv lJQ8QnQu3uHeY5UXRfariEn3uFzKNidPhe4uxpPOkvQsT7MjShTYuQINBFmPNYMB EADIXIHecp190RIhipGwk8rXdfvAjh/VSCWMjmH0nzug8qbuPw+/U0wYZC6lGzsk HB+/lo8vGdNWtR76qhxEH44CRN35Qx6m3/zdMh+0yS4fe/Tsht5jh0NV30AALIJB h5OlqD+7rCGIg6izb08gMGoHvadMxGnRfR5ikzvWxOSPhbn+qhnfWEejYQv+gTC2 uIvPDMVI1/RIN3JxMCRwvRuxTKFmVQnadnEvdStFmP8mf0o6iCyPDrrIYfNoLTzX ZNCBRl4dGGIzAmSHK10q+wgVMzRBZZUjRzj4IHzvRePybwAberwumrz+kC9D7QY8 j/v3qGO2T3e8yZKnuBSanRCJ432Lycxa2uszHwuf68ZMyWf0WINpI528GBHraqLt tkQ8qYI3s8QAUMdl/sLzo51DImF6nPoIEwJOSOv5/tXL5Qcpk4vWlINHS/oCYZFc 0uEhMmnEokGC01EGbPUtf2OgpLtf94yFhD20OOlw9ksfG3KZeB2AkEH19JORmzUK ARnp8U/2DGJmmNJH709s+nYpIj0tUAP6LBBkoZvBD7iigJHHG1Q8djbdwpgcf0o/ /vM3+h28z3aUT9kR7DIaRz8w5TgG+HTGSuMXhmxvJcaswCpaEolihAr7deYqW70+ T+oH2uSwZRldqzsQ4Zqh3euEDipvfCiDrGmXlqC1TLvm8wARAQABiQIlBBgBCgAP BQJZjzWDAhsMBQkHhh+AAAoJEBnkoFOU2OMdzRkQAK+66lcIqzXFNMcp1rbG9EQV z7tQUwhb35ViVd0fi+Ste7vtgbc/UvF/M+Ezhd9eQ+jYyx/ElcycP4U2JNQHsafg E9uJBaXgKxJsvcsD1IVwC+NAsv2So464M8oid/lYxGeGsr5a1Ufpj/8jB8wmnHfO YOSnnwZqfSjpuUWE7lbwR9PAxQOc+cpAhUppfz2dIXAneneLpyZn38CNf7COI9oO E5Mn8NQe3Wa7ErlY/ETWVWj9O28ci/BD8JeLb4ECLAnzMJQLeVv+s99FfDVbidzC qddBEk2zVIN2T0wDcK0HpfI9NAcezue1YC6YibtwYes8mWH6pdfzkdlWr34pgBMj 85bXzWnh5f1B0bOTUaV0h8C4S0P5wAIRfr2TIR7FIHuDzgKsTvO3G7Tnz8KS3EMt ZvD4siaN9v2q1rrDHMf/vIVhG6NMU0k7oG2Ao34DZ1dDxAYyO8DzIZHbbRSrHLid KsqwK/TJ5u/YHYRV9unb3d6PLWWxYsRBy3c4xmPN+BGN0blcMLsaKwOR83cB2bo7 QeJ7wdKABx5euQxuRDAqhgwTAy60khLjzQvZ3v3ihYgwRg6ME/lyEgFK9CkcHOgf vQOa+uW1rZoXRLxpNnawpOwzjFp+WYS9H9l8ScBnsoad7F8fR5hhyCNZ2O5x4nFM qjThEmkLzUUggA3DBqcK =qijO —–END PGP…

Read More

You are being watched

Tweets are tracking devices, and so are Facebook posts, and Google Plus comments, and text messages and on and on. The same technology that consumers have embraced to allow them to find products and get recommendations more efficiently often has geotagging. That picture you took so your cell phone probably has the location embedded in…

Read More

Only in California: Driving While Googling

A southern California woman was found not guilty of charges that she was driving in violation of California law prohibiting the use of video while driving. The CHP officer who gave the Cecilia Abadie the ticket for wearing Google Glass said that the device violated California State Vehicle Code 27602: A person shall not drive…

Read More

Repairing FindLaws Bad SEO Work

Let’s imagine you’ve paid FindLaw’s confiscatory rates for substandard web design and poor SEO practices. What can you do? Your FindLaw problems won’t be easy to fix. First of all, if you’ve made the mistake of “renting” a website from FindLaw, then leaving FindLaw is going to put you out of business web-wise. A rented…

Read More

FindLaw Getting Penalized for SEO Abuse?

Many lawyers have built their small office websites using FindLaw technology. The pricey, but push button technology, was attractive back in the mid-2000s, especially since FindLaw leveraged the power of its web network to generate immediate results for its clients. But FindLaw also has a major problem. And it’s that it deploys 2005 technology in…

Read More

The Internet, Convictions and Arrests

The internet allows us to do wonderful things – find information we need quickly, locate friends and family. But for someone accused of a crime, the Internet, search engines, and social media can be a nightmare, spreading news of an embarrassing and shameful event far and wide. This is particular true in Raleigh, which is…

Read More

Daylite 4: Huge Improvement, Excellent Interface

Since starting my private Raleigh criminal law practice in 2009, I’ve tested a number of different customer-relationship-management systems. I’ve tried RocketMatters, and Clio. I’ve also used a combination of Google products – Google Calendar, GMail, Google Voice, and Google Contacts – to maintain contact and client information. I’m fanatical about keeping accurate records – to…

Read More

Peer to Peer Software, LimeWire, and the Threat of Criminal Prosecution

The threat of criminal prosecution is very real in North Carolina, particularly if people use peer-to-peer based file sharing software and either intentionally or even inadvertently download pornography that includes child pornography. While few Raleigh criminal lawyers are familiar with the way this software works, it is important that any lawyer you hire be familiar…

Read More

Police Tracking of Cellphones

What was originally a very rare practice and largely limited to federal authorities – the tracking of cellphones by police – has now become more common, and has spread to state and local police agencies. The New York Times reports that: With cellphones ubiquitous, the police call phone tracing a valuable weapon in emergencies like…

Read More

What if Your Cell Phone Logged all of your Data?

What if everything you pressed on a cell phone was secretly recorded and logged on your cell phone, and saved to a log file that could later be accessed by anyone with access to the phone? Scary? YES! Turns out that some computer experts have discovered secret software on many Android phones called Carrier IQ…

Read More