The Lounge is rated PG. If you're about to post something you wouldn't want your
kid sister to read then don't post it. No flame wars, no abusive conduct, no programming
questions and please don't post ads.
Some time ago, I stumbled upon a page with all the WinKey commands. I'll list the ones I use...
• WinKey+D : show desktop (toggles hiding all windows - make sure you don't restore one or un-hiding them all again won't work)
• WinKey+M : minimise all windows
• Shift+WinKey+M : un-minimize all windows
• WinKey+R : Open Run (even in Win 7!)
• There's also the WinKey+L that some other dude mentioned, to lock the computer.
• Alt+7 in a regular editbox gives you a bullet point like I'm using here.
Click on Help and Support from the start menu, select offline help and type 'Keyboard' in the search textbox, the fourth item, like in my case is the list of all keyboard shortcuts available on windows and more. I learnt all from there when I was using Win Xp and not much have changed.
The first step in the acquisition of wisdom is SILENCE, the second is LISTENING, the third MEMORY, the forth, PRACTICE and the fifth is TEACHING others!
It's quite long. Excerpts: Diebold, then one of the primary manufacturers of voting machines, had left the 40,000 files that made up its Global Election Management System (GEMS) on a publicly accessible website, entirely unprotected. Diebold was never able to explain how its proprietary tabulation program ended up in such an exposed position. Harris downloaded the files, and programmers worldwide pounced, probing the code for weaknesses. “The wall of secrecy,” said Harris, “began to crumble.”
GEMS turned out to be a vote rigger’s dream. According to Harris’s analysis, it could be hacked, remotely or on-site, using any off-the-shelf version of Microsoft Access, and password protection was missing for supervisor functions. Not only could multiple users gain access to the system after only one had logged in, but unencrypted audit logs allowed any trace of vote rigging to be wiped from the record.
As recently as September 2011, a team at the U.S. Department of Energy’s Argonne National Laboratory hacked into one of Diebold’s old Accuvote touchscreen systems. Their report asserted that anyone with $26 in parts and an eighth-grade science education would be able to manipulate the outcome of an election. “This is a national security issue,” wrote the Argonne team leader, Roger Johnston, using the sort of language that would normally set off alarm bells in our security-obsessed culture. Yet his warning has gone unheeded, and the Accuvote-TSX, now manufactured by ES&S, will be used in twenty states by more than 26 million voters in the 2012 general election.
Johnston’s group also breached a system made by another industry giant, Sequoia, using the same “man in the middle” hack—a tiny wireless component that is inserted between the display screen and the main circuit board—which requires no knowledge of the actual voting software. The Sequoia machine will be used in four states by nearly 9 million voters in 2012.
We use pen and paper here in Oregon, and it was hacked, just this very election too.
Some election worker got caught filling in the bubbles, to their personal preference, for voters who had made no choice in a given race. Election officials want us to believe they even caught all the tampered ballots. After all, the culprit used a pencil whereas the voters had used a pen (its valid for the voters themselves to use a pencil).
Its all about money. The election officials don't want to call a re-do because it costs more than spin. And that's just over the costs of re-doing an election. Its gonna be much, much worse with electronic voting, because now one has large corporations with deep pockets against the fair election as a liability dodge. Allowing electronic voting to be poorly done like this is basically legitimizing election tampering.
We can program with only 1's, but if all you've got are zeros, you've got nothing.