Lisa Arbercheski – Feminism as Psychological Warfare, Harnessing Human Resources and Divide Conquer Strategy For Social Control


Also check this article:

Days of the week as people

days-of-weekThe other day I was reading Jamie’s blog and I was intrigued by the post she had written as an assignment for her writing group. She was asked to describe the days of the week as if they were people :)

I liked the idea, so here’s my version of characters I give to each day of the week as if they were employees in a big company.


A very motivated, creative and enthusiastic person. I know I may be tired from a long fun day from the day before, but I can’t wait to start creating something new. “Yes boss”, you can count on me. Continue reading

Sugar in products – A comparison

While going through my email archives, I stumbled about an email that contains a list of products and how many sugar cubes they contain. Pretty interesting comparison that I thought it is nice to share with you.

Here you go, click on the pictures to open the gallery:


You may also like:

How to remove the Windows 10 upgrade button from the tray icon

In a previous post, I spoke about the new Windows 10 update coming to Windows 7, Windows 8 or Windows 8.1.

With operating systems prior to Windows 10, you may noticed a new tray icon showing up like this:


This icon is used to update to Windows 10:


If you don’t want to update just yet, then just follow the steps below to remove the tray icon.

Removing the tray icon

The tray icon will remain and it can be annoying for some people, therefore to remove it, you can use various methods as described in these articles #1 and #2.

To make things simple, you may use the “Task Scheduler” and navigate to “Task Scheduler Library\Microsoft\Windows\Setup\gwx” as shown in the screenshot below and then delete the two entries there:


You may also like:

More about Yahoo Mail phishing

In a previous post, I explained about how Yahoo Mail accounts can be compromised by phishing.

In this blog post, I am going to be brief and just expose the phishing information and hosts used.

Step 1 – Looking at the email




Lots of red flags here, just by looking at the email:

  1. The email sender’s apparent address is weird
  2. The email’s subject is also unusual
  3. The email’s body is also fishy and not true

Step 2 – Revealing the real sender

Click on the sender to reveal the actual email address:









Now we can see that the real sender is “”. It could be this is the real malicious user or not, but anyway.

When I search for this email on Facebook, I found this profile:


Which in reality could be nothing.

Step 3 – Investigating the link in the email

In step one, the malicious email sender invited you to click on an address to fix the aforementioned “problem”.

Do not click, instead, hover the mouse over the link and look at your status bar. You will see something like this:


This is a shortened address. In this case, it is used to hide the malicious web address. Let us use the to reveal the real address:


The address is, obviously, not related to Yahoo! It is: “”.

I don’t advise you to go to that address, there could be a browser exploit or equally the phishing site.

The phishing site is supposed to look like Yahoo mail:

DO NOT enter your user name and password on that FAKE SITE!

You may also like: