Thursday, December 25, 2014

Jodi Arias Takes Final Selfie Photos of Herself in Rental Car 1 Day Before Killing Travis Alexander

https://www.youtube.com/watch?v=izZh3gUKENo

Jodi Arias - Guilty - Juan Martinez Wins again.

https://www.youtube.com/watch?v=RaGuuU-YEt0&feature=share

Video of some of the reactions on TA's family members faces as ja tells the jury to spare her life during the first sentencing phase.

In this video is "The VOMIT" that ja spewed to the jury trying to get them to spare her life.  The video shows the reactions of TA's family members that were present during ja's "show of manipulation."  ja NEVER counted on the jury finding her guilty of First Degree Murder with cruelty.  She actually thought that she had the jury convinced of her lies about her murdering TA in self-defense.  Recalling here the look of "shock" on her face when the guilty verdict was read in court, and the anger in her voice during her post trial interview with a member of the media.  NEWS FLASH:  Only idiots that drink the kool aid believe it was self-defense.  

ja will have you believe that while she was on television saying that she would rather be sentenced to death, than to live the rest of her life in prison, that she was being honest.  She wasn't being honest.  Honesty and ja are two words that should not be used in the same sentence.  While ja was making such claims that she'd rather die(DP), she was going behind the scenes trying to get a plea bargain.  She wanted the State and the Alexanders to agree to giving her a plea deal of Second Degree Murder.  That doesn't sound like someone that wants to die.  That sounds like someone that wants to get out of prison some day, even if it's in the far future.  It sounds like a manipulator and a liar when in front of her fan club and the public.  The claws come out when ja is behind the scenes.  (Which we already know what type of evil lurks inside of her.)  When the State and Alexander family wouldn't give her the plea deal that she wanted, things got even uglier.  ja began a smear campaign against TA's character.         

She NEVER tried to commit suicide.  That is MORE BS spewed by ja.  People that try to commit suicide don't "scratch" themselves with something.  That is all ja did or possibly didn't even go that far with doing.  ja is NOTHING but a liar, manipulator, sociopath, and narcissist.  

Now, ja and her DT have came up with another "strategy" for ja to try and escape the punishment that she deserves-the DP.  They are trying to make claim that porn, evidence of it found or not, should be considered "exculpatory evidence," that Det. Flores "allegedly" tampered with "exculpatory evidence," that JM lied about having knowledge of porn being on TA's PC, and that ja should be set free and/or the death penalty should be removed from the table.  At no time during the trial did JM state or lead anyone to believe that porn was the motive, or had anything to do with  ja murdering TA.  Porn had nothing to do with why she murdered TA.   It was/is ja and her DT that kept/keep trying to drag the issue of porn and making accusations that TA was a pedophile.  That just isn't flying with a lot of people.  A lot of people DON'T care about the porn issue.  A lot of people don't even care about TA's and ja's part time sexual activities.  The primary ones that seem to care about that are:  ja, the DT, and some of her supporters.      

IMO, watching and reading about this case, the ONLY reasons ja wanted "child pornography" brought into the equation is to gain sympathy and to cash in from/on everyone that hate pedophiles.  She wanted to smear TA's character.  As much as some people hate pedophiles(I'm NOT saying that TA was one...I don't believe ja),  ja must've "assumed" that if she could paint a picture that TA was a pedophile that would exempt her from her role of committing murder in the First Degree with cruelty.   I'm well aware that many of her supporters ride on the LIE that ja has told about TA haven been a pedophile, as to why some support her.   According to ja and her supporters, that believe that TA was a pedophile, they are telling people that it's okay to plan and murder an ex that dumps you.  They are telling people that it is okay for a man in a woman's life(ja) to be pedophile(liars), as long as they keep the woman(ja).  Where their minds are...who knows?  That is not the normal thinking of decent people.  ja is not a decent person.  

When all else fails, all of the lies that ja has told, ja will continue to play the victim act until the day she dies(of natural causes or the DP).  TRASH, such as ja is, will never take full responsibility for their actions.  Her "having been abused stories" have went from a little abuse having taken place to a grand scale of her almost being murdered by different exes in her life.  Right right...the only abuser many of us see is ja.  

I hope that ja has a horrible Christmas as she prays to her Father in Hell.        





https://www.youtube.com/watch?v=Ou3Hk0_wF5c

The Ultimate Jodi Arias Trial "Best Of" Video!

JM hits the nail on the head time and time again.  Why is it that ALL of ja's witnesses and ja, herself, have problems answering JM's questions?  All of them try to blame JM for them being unable to answer questions that anyone telling the truth could have answered without the type of BS that they stated and did. 

Maria De La Rosa laughs very loudly at LaToilette's stupid comment to JM.  The Judge had to speak up about Maria De La Rosa's outburst.  It was VERY UNPROFESSIONAL of her.   



https://www.youtube.com/watch?v=dWnAn9KOkVA

ja in THE tee shirt Photo by: Kim Lapara David

On the back of that tee shirt it says, "Be Better Blog," the name of TA's blog.   

IF TA would have had the tee shirt made to advertise his blog, why does it look like ja took a selfie from TA's PC?  Is this more proof of the shenanigans that ja pulled during one of her many times that she sneaked into TA's home, sneaked into his bedroom, and sneaked onto his PC?  If TA had this tee shirt made to advertise his blog, why wouldn't he have taken a picture of the back of the tee shirt?  It was said that TA had a friend that designed shirts.  The mess above was not done by any professional.  ja couldn't even get the letters straight on the items that SHE, herself, put on items of clothing to make it out like she belonged to TA.  This is another weak and failed attempt to make it out like TA was in love with her.  IMO, ja made this mess herself, took the selfie in TA's home on one of the many occasions that she sneaked into his home by way of his doggie door, and it didn't impress TA.  Clearly TA didn't post it on his blog to advertise it.    


Jodi Arias camera motions heard in court, mitigation specialist under scrutiny





http://www.examiner.com/article/jodi-arias-trial-camera-motions-heard-court-mitigation-specialist-under-scr

December 4, 2014 Written by: Jodi Swan (Looks to be another liar.)


Where do some idiots get their information at???  Besides coming from the lying lips of ja, who was it that stated that there were some pornography files that featured young boys found on TA's PC?   I read where ja's "PC expert" said that there were pornography files found on TA's PC, but he didn't show any proof that any of those "alleged" files contained "underage girls or boys."  He didn't show any proof that said "alleged" pornography files were put there by TA.  TA wasn't the "only" person that had access to his PC.  ja had access to TA's PC on numerous occasions when she hacked into his PC and when she was in his home when he was and when he wasn't at home.  I haven't read where any pictures of any of the porn was shown into evidence either.  Jodi Swan sounds to me like she's another idiot that drank the kool aid.

Amazing!  The amount of "blood money" that some of ja's supporters/fools claimed to have brought in went from $15,000, a total that was given out via internet a few months ago, to now $40,000.  smh...nasty!  

(I think that I posted about this mess before.  I know that I saw it shortly after Jodi Swan put it out there for everyone to see.)  



                 

Jodi Arias will get a video call for Christmas, Juan Martinez fights back


I don't know who made and/or took this picture but I think it's GREAT!  (Check out the cat in the corner lol)





Turn your speakers off or down so low that you can't hear it.  In the link below is the video of ja squealing the words to "O Holy Night."  Apparently the inmates that entered the contest felt sorry for her and let her win.  IMO, ja sounds like a dying rat in this video.  Who could "sing" worse than what she did here???  
ja has "ruined" the song "O Holy Night" for numerous people.   After numerous people heard ja, convicted of viciously murdering Travis Alexander, squeal the words, to a beautiful song, out of her evil mouth, it's hard for some to get the same joy from the song that they liked/loved before hearing ja sing it.     

Written in the link below are the words:  You will notice every lie or as Jodi likes to call them, abuse story, is more dramatic than the last. As the DSM 5 shows, that's an elevation technique narcissists use, especially when they meet with resistance. It is the classic, "Oh ok, you didn't buy that story? You will have to believe this one, because it's even more terrible." The narcissistic defense.

Typical BS coming from ja.  Even in her story about the ninjas, she tried to make herself out to be the victim.  Hence, "the woman wanted to kill me too," and "they threatened my family."  Everything is always about "themselves" when it comes to a narcissist and everyone else is always to blame for their own horrible behavior when it comes to psychopaths like ja.  

http://www.examiner.com/article/jodi-arias-will-get-a-video-call-for-christmas-jail-juan-martinez-fights-bac

http://ktar.com/22/1793790/MCSO-to-allow-inmates-free-video-calls-to-family-over-holiday

Wednesday, December 24, 2014

More of ja lies!

ONLY someone(s) completely stupid would believe this mess that the known liar and murderer is spewing now.  ja claimed to be a genius by saying that she has the IQ of AE.  Her narcissistic behavior speaks volumes about her having a very high self-esteem.   IMO, only a narcissist would worry about their hair and make up, knowing they are being arrested for murder, in regards to what their "mugshot" will look like to the public.  Her actions, before going to jail and now, also speak volumes, that she seems to think that she is very entitled to do and say anything that she wants to.   

Praying to God above that ja never has physical contact with any child ever again.   If they learn anything from ja that will be:  DON'T be like ja.  I'm sure that they'll learn a lot from a narcissistic, evil liar, and murderer, that acts and talks like she is above everyone else.  smh!       

True story and some information about Viruses.

I'm NOT a computer expert but I'm definitely not "ignorant" about how they work.  A few years back I ran into a bit of problems with someone that was using, had gained access, to my PCs.  I put in numerous anti-viruses to try and get the viruses out of them.  I tried every anti-virus that I could find!  It was that bad!  After all of the anti-viruses that I put into my PCs failed, I decided to "delete" the entire HDs.  After I deleted the entire HDs, big mistake on my part, it hit me that I'd need the information that was on them for legal purposes.  Thinking that a forensic lab could go into the HDs, bring up what I had deleted, I took them both to a State Police Station for their PC expert to look at them.  When the time came to pick them up, to my surprise, I was told that one HD was "ruined" to the point that they couldn't do anything with it.  I was asked if it had been exposed to a chemical...It hadn't been.  I did the same exact thing with both HDs; deleted them and placed them in clean bags.  I was told that the other HD had very little on it and it appeared to be NEW.  Unbelievable to me!  The forensic lab found a few "somethings" on it but not everything that had been deleted!  Granted that after that, I came to the conclusion that even what we might think are "professionals" at something, aren't always "accurate" at it.  

Here is some information about viruses. 

PS:  Don't ever download anything that will give someone remote access to your PC(sub seven).  Explained in Key logging.   




Key logging:

http://en.wikipedia.org/wiki/Keystroke_logging

Trojan horse(Virus):

http://en.wikipedia.org/wiki/Trojan_horse_(computing)

Timeline of PC viruses:  

http://en.wikipedia.org/wiki/Timeline_of_computer_viruses_and_worms#2000.E2.80.932009

2004:  Late January: The MyDoom worm emerges, and currently holds the record for the fastest-spreading mass mailer worm.
  • February 16: The Netsky worm is discovered. The worm spreads by email and by copying itself to folders on the local hard drive as well as on mapped network drives if available. Many variants of the Netsky worm appeared.
  • March 19: The Witty worm is a record-breaking worm in many regards. It exploited holes in several Internet Security Systems (ISS) products. It was the fastest disclosure to worm, it was the first internet worm to carry a destructive payload and it spread rapidly using a pre-populated list of ground-zero hosts.
  • May 1: The Sasser worm emerges by exploiting a vulnerability in the Microsoft Windows LSASS service and causes problems in networks, while removing MyDoom and Bagle variants, even interrupting business.
  • June 15: Caribe or Cabir is a computer worm that is designed to infect mobile phones that run Symbian OS. It is the first computer worm that can infect mobile phones. It spread itself through Bluetooth. More information can be found on F-Secure[33] and Symantec.[34]
  • August 16: Nuclear RAT (short for Nuclear Remote Administration Tool) is a backdoor trojan that infects Windows NT family systems (Windows 2000, Windows XP, Windows 2003).[35]
  • August 20: Vundo, or the Vundo Trojan (also known as Virtumonde or Virtumondo and sometimes referred to as MS Juan) is a trojan known to cause popups and advertising for rogue antispyware programs, and sporadically other misbehaviour including performance degradation and denial of service with some websites including Google and Facebook.[36]
  • October 12: Bifrost, also known as Bifrose, is a backdoor trojan which can infect Windows 95 through Vista. Bifrost uses the typical server, server builder, and client backdoor program configuration to allow a remote attack.[37]
  • December: Santy, the first known "webworm" is launched. It exploited a vulnerability in phpBB and used Google in order to find new targets. It infected around 40000 sites before Google filtered the search query used by the worm, preventing it from spreading.


2005[edit]
  • August 2005: Zotob
  • Late 2005: The Zlob Trojan, is a trojan horse which masquerades as a required video codec in the form of the Microsoft Windows ActiveX component. It was first detected in late 2005.[38]
  • Bandook or Bandook Rat (Bandook Remote Administration Tool) is a backdoor trojan horse that infects the Windows family. It uses a server creator, a client and a server to take control over the remote computer. It uses process hijacking / kernel patching to bypass the firewall, and let the server component hijack processes and gain rights for accessing the Internet.

2006[edit]
  • January 20: The Nyxem worm was discovered. It spread by mass-mailing. Its payload, which activates on the third of every month, starting on February 3, attempts to disable security-related and file sharing software, and destroy files of certain types, such as Microsoft Office files.
  • February 16: discovery of the first-ever malware for Mac OS X, a low-threat trojan-horse known as OSX/Leap-A or OSX/Oompa-A, is announced.
  • Late March: Brontok variant N was found in late March.[39] Brontok was a mass-email worm and the origin for the worm was from Indonesia.
  • Late September: Stration or Warezov worm first discovered.

2007[edit]
  • January 17: Storm Worm identified as a fast spreading email spamming threat to Microsoft systems. It begins gathering infected computers into the Storm botnet. By around June 30 it had infected 1.7 million computers, and it had compromised between 1 and 10 million computers by September.[40] Thought to have originated from Russia, it disguises itself as a news email containing a film about bogus news stories asking you to download the attachment which it claims is a film.
  • July: Zeus is a trojan that targets Microsoft Windows to steal banking information by keystroke logging.

2008[edit]
  • February 17: Mocmex is a trojan, which was found in a digital photo frame in February 2008. It was the first serious computer virus on a digital photo frame. The virus was traced back to a group in China.[41]
  • March 3: Torpig, also known as Sinowal and Mebroot, is a Trojan horse that affects Windows, turning off anti-virus applications. It allows others to access the computer, modifies data, steals confidential information (such as user passwords and other sensitive data) and installs more malware on the victim's computer.[42]
  • May 6: Rustock.C, a hitherto-rumoured spambot-type malware with advanced rootkit capabilities, was announced to have been detected on Microsoft systems and analyzed, having been in the wild and undetected since October 2007 at the very least.[43]


botnet

Zeus (Trojan horse):   ZeuS, or Zbot is Trojan horse computer malware that runs on versions of the Microsoft Windows operating system. While it is capable of being used to carry out many malicious and criminal tasks, it is often used to steal banking information by man-in-the-browser keystroke logging and form grabbing. It is also used to install the CryptoLocker ransomware.[1] Zeus is spread mainly through drive-by downloads and phishing schemes. First identified in July 2007 when it was used to steal information

http://en.wikipedia.org/wiki/Zeus_(Trojan_horse)the SpyEye trojan

Stealth strategies[edit]
In order to avoid detection by users, some viruses employ different kinds of deception. Some old viruses, especially on the MS-DOS platform, make sure that the "last modified" date of a host file stays the same when the file is infected by the virus. This approach does not fool antivirus software, however, especially those which maintain and date cyclic redundancy checks on file changes.[citation needed]
Some viruses can infect files without increasing their sizes or damaging the files. They accomplish this by overwriting unused areas of executable files. These are called cavity viruses. For example, the CIH virus, or Chernobyl Virus, infects Portable Executable files. Because those files have many empty gaps, the virus, which was 1 KB in length, did not add to the size of the file.[36]
Some viruses try to avoid detection by killing the tasks associated with antivirus software before it can detect them.[citation needed]
As computers and operating systems grow larger and more complex, old hiding techniques need to be updated or replaced. Defending a computer against viruses may demand that a file system migrate towards detailed and explicit permission for every kind of file access.[citation needed]
Read request intercepts[edit]
While some antivirus software employ various techniques to counter stealth mechanisms, once the infection occurs any recourse to clean the system is unreliable. In Microsoft Windows operating systems, the NTFS file system is proprietary. Direct access to files without using the Windows OS is undocumented. This leaves antivirus software little alternative but to send a read request to Windows OS files that handle such requests. Some viruses trick antivirus software by intercepting its requests to the OS. A virus can hide itself by intercepting the request to read the infected file, handling the request itself, and return an uninfected version of the file to the antivirus software. The interception can occur by code injection of the actual operating system files that would handle the read request. Thus, an antivirus software attempting to detect the virus will either not be given permission to read the infected file, or, the read request will be served with the uninfected version of the same file.[37]
The only reliable method to avoid stealth is to boot from a medium that is known to be clean. Security software can then be used to check the dormant operating system files. Most security software relies on virus signatures, or they employ heuristics.[citation needed]
Security software may also use a database of file hashes for Windows OS files, so the security software can identify altered files, and request Windows installation media to replace them with authentic versions. In older versions of Windows, file hashes of Windows OS files stored in Windows—to allow file integrity/authenticity to be checked—could be overwritten so that the System File Checker would report that altered system files are authentic, so using file hashes to scan for altered files would not always guarantee finding an infection.[citation needed]
Self-modification[edit]
Most modern antivirus programs try to find virus-patterns inside ordinary programs by scanning them for so-called virus signatures. Unfortunately, the term is misleading, in that viruses do not possess unique signatures in the way that human beings do. Such a virus signature is merely a sequence of bytes that an antivirus program looks for because it is known to be part of the virus. A better term would be "search strings". Different antivirus programs will employ different search strings, and indeed different search methods, when identifying viruses. If a virus scanner finds such a pattern in a file, it will perform other checks to make sure that it has found the virus, and not merely a coincidental sequence in an innocent file, before it notifies the user that the file is infected. The user can then delete, or (in some cases) "clean" or "heal" the infected file. Some viruses employ techniques that make detection by means of signatures difficult but probably not impossible. These viruses modify their code on each infection. That is, each infected file contains a different variant of the virus.

http://en.wikipedia.org/wiki/Computer_virus#Stealth_strategies


http://en.wikipedia.org/wiki/Application_programming_interface

http://www.mysql.repairtoolbox.com

http://lifehacker.com/393084/how-to-recover-deleted-files-with-free-software


http://www.linux.com/news/enterprise/storage/8257-how-to-recover-lost-files-after-you-accidentally-wipe-your-hard-drive