Can't Speak For Everyone, But…

…clearly someone has dickstomped himself with the Hasty Generalization fallacy.

There is no general case to describe this.  Sometimes it’s a morbidly obese, mentally inferior, abusive needledick who prefers Japanese transsexuals that drove his wife into a bottle, then into the arms of a real man…


…and sometimes it’s not.


Question For BusPassOffice

In your encyclopedic collection of Shakey’s Greatest Hits, do you have any examples of the SEVERAL HUNDRED times he has said he never attacks wives and families?



Asking for a friend who sometime doesn’t measure potential consequences before hitting the POST button.


For teh EPIC Monkeydancing Dick Stomp You Perpetrated Today


And Another Suddenly Relevant Quote For Today

The devil (in mid-MonkeyDance) can cite Scripture for his purpose.
An evil soul producing holy witness
Is like a villain with a smiling cheek,
A goodly apple rotten at the heart:
O, what a goodly outside falsehood hath!

William Shakespeare
The Merchant of Venice
Act I, Scene III

And if you ever needed the proof of it – look no further than here.


Poor TJO

F5 Jackhammer

Poor TJO.

Poor, poor, TJO.

Poor, mayo-gobbing TJO.

Poor anal-rape obsessed TJO.

He’s all butthurt over a picture with his face photoshopped on a guy who he thinks is having anal sex. I wish the guy who made that had photoshopped a real forehead over the thing that actually sits up there in the picture.

Poor, TJO, who calls people “tard.”

Poor TJO, who posts a nearly naked picture of himself in S&M gear from work computers on work time. Naughty, naughty! I wonder which of his boyfriends took that picture? I hope I don’t ever have cause to re-post it under the Fair Use Doctrine of U.S. Copyright Law. I mean, yikes!

Poor TJO, who probably had a very great deal to do with getting @brainsrfood gulaged. Didn’t slow me down one bit.

Now he can’t find me. Boo hoo. Unintended consequences and all that.

Until a couple of days ago, I thought he had only been a complete online loser for a couple of years. Now I find that the EPIC LUSERHUD goes back almost a decade, and maybe even more?

What a STERLING REPUTATION you had…8 years before I ever heard of you.

Come and get me, LUSER. Ryan, theaprilfool, jtdude0 and all your pals that I found are waiting.



This Is Sooooo Very Difficult To Understand

Let’s begin with this little nugget…


Of course the harrassing cyberthug’s focus is quite narrow.  He wants to know “who sent the email?” And in his typical fashion, as soon as he gets the answer he likes (from the free lawyer chat room, the Christmas Eve Court Clerk, the African-tinged photo editor from NASA, the WordPress Happiness Engineer, the voices in his head, whatever), he determines that his confirmed opinion is truth from God, carved in stone from the mountaintop.  His focus narrows to a pinhole, and like an eclipse box, everything he sees through that pinhole is upside-down and backwards.

Plus, he fails to see anything else.  That apparent belief in his own infallibility, a belief betrayed by years of evidence and failure, so narrows his focus that he misses (or purposely ignores, that is distinctly possible) the suggestion immediately below the answer he’s fallen so in love with.

You can learn more about this here:

At that link, we find the following explanation of the pingback:

A pingback is a type of comment that’s created when you link to another blog post where pingbacks are enabled. The best way to think about pingbacks is as remote comments:

  • Person A posts something on his blog.
  • Person B posts on her own blog, linking to Person A’s post. This automatically sends a pingback to Person A when both have pingback enabled blogs.
  • Person A’s blog receives the pingback, then automatically goes to Person B’s post to confirm that the pingback did, in fact, originate there.

Check out the Introduction to Blogging article for a more detailed explanation.

Here’s an interesting angle to consider – what if I take that explanation and replace the names?  Would that make clearer the explanation which Monsieur Mayonnaise clearly did not bother to read?

A pingback is a type of comment that’s created when you link to another blog post where pingbacks are enabled. The best way to think about pingbacks is as remote comments:

  • John posts something on his blog.
  • Park, who is subject to a peace order requiring him not to contact John, posts on his own blog, linking to John’s post. This, Park’s affirmative action of posting a link to John’s blog, automatically sends a pingback to John when both John and Park have pingback enabled blogs, even if there is no way for Park to know whether John’s blog is pingback enabled or not.
  • John’s blog receives the pingback, like a mailbox receiving a letter from the postal service, then automatically goes to Park’s post to confirm that the pingback did, in fact, originate there.

Check out the Introduction to Blogging article for a more detailed explanation.


So if Señor Neckroll doesn’t link to Person A’s blog, an affirmative action taken by him, then Person A never gets a pingback.

Eh – what do I know?  I’m just an undead zombie. Your WordPress ways are strange and confusing.  Maybe if there was a way to find a “more detailed explanation…”


Oh, wait!

Check out the Introduction to Blogging article for a more detailed explanation.

I wonder if there is some clearly worded for a Luddite information at that link for someone who’s only been blogging with WordPress for several years?  Let’s find out.

The pingback is generally displayed on Person A’s blog as simply a link to Person B’s post. It is commonly believed that pingbacks do not send any content, as trackbacks do. This is not correct. If you get a pingback, you will see an excerpt from that blog in the Edit Comments section of your dashboard. The issue is that very few themes display these excerpts from pingbacks. The default WordPress themes, for example, do not display pingback excerpts.

In fact, there is only one significant difference between pingbacks and trackbacks: Pingbacks and trackbacks use drastically different communication technologies (XML-RPC and HTTP POST, respectively). But that difference is important because trackbacks have become the target of so much spam. The automatic verification process introduces a level of authenticity, making it harder to fake a pingback.

Some feel that trackbacks are superior because readers of Person A’s blog can at least see some of what Person B has to say, and then decide if they want to read more (and therefore click over to Person B’s blog). Others feel that pingbacks are superior because they create a verifiable connection (could a zombie call this a contact?) between posts.

There are even some technical specifications linked in that article, too.  Definitely not for Luddites.

5. Example

Here is a more detailed look at what could happen between Park and John during the example described in the introduction.

  1. Park posts to his blog. The post he’s made includes a link to a post on John’s blog. The permalink to Park’s new post is, and the URL of the link to John’s blog is
  2. Park’s blogging system parses all the external links out of Park’s post, and finds
  3. It then requests the first 5 kilobytes of the page referred to by the link.
  4. It looks for an X-Pingback header, but fails to find one.
  5. It scans this page fragment for thepingback link tag, which it finds:
    <link rel="pingback" href="">

    If this tag had not been contained in the page, then John’s blog would not support pingback, so Park’s software would have given up here (moving on to the next link found in step 2).

  6. Next, since the link was there, it executes the the following XML-RPC call to'', '')
  7. Park’s blogging system repeats step 3 to 6 for each external link that was found in the post.

There ends the work undertaken by Park’s system, none of which would have taken place without the first affirmative step: Park posts to his blog, including a link to a post on John’s blog. The rest of the work is performed by John’s blog.

  1. John’s blog receives a ping from Alice’s blog (the ping sent in step 6 above), naming (the site linking to Bob) and (the page Park linked to).
  2. John’s blog confirms that is in fact a post on this blog.
  3. It then requests the content of and checks the Content-Type of the entity returned to make sure it is text of some sort.
  4. It verifies that this content does indeed contain a link to (to prevent spamming of pingbacks).
  5. John’s blog also retrieves other data required from the content of Park’s new post, such as the page title, an extract of the page content surrounding the link to John’s post, any attributes indicating which language the page is in, and so forth.
  6. Finally, John’s post records the pingback in its database, and regenerates the static pages referring to John’s post so that they mention the pingback.

So even when you get down to the technical details, what do we learn, if we’re interested?

It all boils down to this: Idiots gonna be idiots.  If the Baron of Bloviation took 30 goddamn seconds to think about what he was doing, he wouldn’t be facing a show cause hearing and a possible contempt citation because he can’t follow a simple order from the court.

In other words, just your average day.


The Demented Freak Forgets His Place


Oh, William💩…

Poor, poor William💩…

Are you💩 finding that being left alone does not suit you💩?

Because we can always do something about that…


…and just to be clear? This is me being nice.

Now be a good freak and go back to being left alone. There’s a lad.


Ain't It Great to Have Friends?

This comment came in yesterday:


Notice the obviously fake e-mail address –

The IP address,, is registered to a New York City hosting firm called Digital Ocean, Inc. There is contact information at the link.

I find it difficult to believe that there are people out there who purposely go out of the way to try to put specific members of our military on the radar of jihadist enemies.

But then I remember who was responsible, and it’s not difficult to believe at all.

And I think of the people who associate with that individual and realize that this too does not surprise me.

Right, Neal?

The timing does pique my interest, though. Could it also be of interest to others with the authority to do something about it?

I guess we’ll have to wait and see.

UPDATE – Mr. Everything-Must-Be-About-Me-Because-Everything-Really-Is-All-About-Me has caught us all out. It really is all about him:


That tweet is from Friday October 10th, during that woefully brief period when he was active and unsuspended as @WmsDb. Ahh…good times, good times.


STOP CONTACTING ME, @mayberryville!

Screencaps are forever:

Links disappear sometimes:

If you don’t want someone to contact you, don’t contact him.

Shorter: “Don’t start nuthin’, won’t be nuthin’.”

Learn to think around a corner, dumbass.