Matthews Picture, One more from the Appalachian Trail

Appalachian Trail, Roan Mountain

Appalachian Trail, Roan Mountain

The last post was about the inspiration I get from the people I meet on the trail. The other reason is the inspiration I get from my friend Chris (the other Chris).

A large part of why we hike the AT every year and the catalyst that got it started was the loss of Chris’s son. We hike to raise money and to heighten awareness of HCM (Hypertrophic cardiomyopathy). HCM took the life of Chris’s son Matthew 5 years ago. The money we raise goes into a scholarship fund in Mathew’s name. The scholarship is going in to its fourth year.

One of our goals on each hike is to pick a spot to leave Matts picture. It is usually a high spot with a commanding view. Chris places it in an unobtrusive spot where it can’t be seen or bothered. Every time we do it there is a lot of emotion and now is a tear filled ritual. The mission is not complete until we place the picture.

The inspiration I get from Chris is amazing. He takes a beating and just keeps on ticking. The AT hike is a good example. He took the loss of a son and turned it into something good. He keeps Matt’s memory alive by providing opportunity for others through the scholarship and building awareness of HCM. Matt is with us every time we go out.

For donations contact Chris Rush,

Posted in Content, Ranting | Tagged , , , , , | Comments Off on Matthews Picture, One more from the Appalachian Trail

Charlie Horse, Inspiration from the Appalachian Trail

Appalachian Trail, Beauty Spot TN.

Appalachian Trail, Beauty Spot TN.

People who do not backpack do not really understand why we do it. And, honestly there have been a few times when I wondered that myself. But inspiration is a large part of why I do and I’m not just talking scenery I’m talking people. There are many people walking the AT for their own reasons and from them I realize my challenges are not so bad. Charlie Horse (trail name) is a good example.

Our First day was an easy one because we knew that tomorrow was going to be a workout. From the map and data book we knew it was going to be a long day. It was getting dark and we were settling down for the evening.

Kind of quietly and very slowly this gentleman came up to the shelter from the direction we were heading in the morning. He looked petty frail, the three of us looked at each other with the same question “What is he doing out here”? I mean frail. He needed his poles just to move around.

Turns out Charlie Horse was 82 and he just covered the 13 miles we had to go. On top of that this was his fourth attempt. Except this time he was doing it south bound. We learned why the next day.

It was a quiet night and we parted ways in the morning but Charlie Horse left us impressed. After that several times during the day when my legs were screaming I thought of an 82 year old doing it and if he could I could. And that is one of the biggest reasons I do it, walk for hours in the rain, scramble up mountain sides, and climb inaccessible ridges to meet people who give me inspiration to carry on. People who are not afraid of risk. People who don’t say can’t. People who get up and hit it again if they do not succeed the first time. Can you think of better reasons?

Posted in Content, Ranting | Tagged , , , | Comments Off on Charlie Horse, Inspiration from the Appalachian Trail

Life on the Food Chain Hiking the AT

bear300As reported widely bears have been pretty active this year in certain areas. Where we were was one of those areas. But follow the rules, stay aware and you will be safe. An EMT recently told me that when they rescue someone off the trail it is more likely to be a snake or spider bite. Mostly Copperheads and Brown Recluse. Kick that rock or branch before you pick it up.

We didn’t see any bear this trip though we did see plenty of sign including a pile of still warm scat in the trail one morning. We carry whistles and Chris (the other Chris) feels safe with a can of bear spray. With the new movie coming out there is going to be a lot of want – to – be’s and inexperienced hikers maybe the bears will eat well and leave the rest of us alone.

Posted in Content, Ranting | Tagged , , , | Comments Off on Life on the Food Chain Hiking the AT

Power on the Appalachian Trail

The one thing about hiking with iPhones is you need power. Last year we carried a rechargeable battery pack and a solar panel to charge it. We had two kits. I carried one and Chris (the other Chris) carried one. The battery pack is good for two charges and we carried the small solar panel on the back of the pack while hiking.

lastyrNow first I have to say the equipment worked great the problem was, most of the time we were hiking under canopy and they didn’t get enough sun. When we hit clear spots and camp at nights we could put them in the sun but they still didn’t get enough time to charge fully.
This year a different approach, carrying pre-charged power packs. Goal Zero had a new product that you charge ahead of time and holds 3 charges (iPhone6). Takes the sun out of the equation completely. I’m carrying one of the new charge packs, one of last year’s charge packs (precharged) and a pencil I had for a while.

3-packsThat gives me enough for 6 charges total and less than a pound. I’m going to use the Goal Zero and pencil and tuck the battery pack away for emergency. Chris will carry a charge pack similar to the new Goal zero and Carol is carrying a pencil.
We each are carrying an iPhone and have enough for 10 charges, more than enough for a six day trip.
The other thing we learned last years is you can have all the power you need but no signal is no signal and where are going is supposed to be some of the most remote on the whole AT. I will post when I can say stay tuned.

Posted in Ranting | Tagged , , , | Comments Off on Power on the Appalachian Trail

Careful Whom You Trust or Other Ways Your Info Gets Out

I originally sat down to write about a series of items recently in the news. It was to be about the need to be careful of what you say in front of your appliances. I’m referring of course to the Samsung story of their TVs spying on you. But I thought I would check my email first.

I was greeted by several notices from Tweeter that my account was hacked. My password was changed and Tweets sent out to my followers. Twitter shut my account down until I get it straightened out. I apologize to all who were blasted from my account.

I’m taking this as an opportunity for a learning moment. This serves as a good example of other ways your information can get out. What happened? I brought someone new on board to help with social postings. They just purchased a brand new Win8 HP laptop and I just assumed it was safe. Apparently not. This person was in that old mindset that updates are bad and didn’t keep the old laptop up to date. The infection was simply transferred to the new computer. They put my information on that new computer just yesterday and by the following morning my socials were hacked. Now it’s going to be a day of changing passwords, updates, and scanning.

This is a good object lesson. It proves that no matter how diligent you are with your own equipment your info can get out through a third party. This brings up a liability question, who is responsible. Is the third party responsible because the breech was from their equipment or yours because you granted them access?

I’m thinking it is something we now need to add to our vendor agreements. I was lucky this time, it was just one account compromised but it could have been worse. The take away from this is:
1. Keep your software up to date
2. Scan regularly
3. Check out who you give your info to
4. Assign responsibility

Posted in Content, Ranting, Web Design | Tagged , , , , , | Comments Off on Careful Whom You Trust or Other Ways Your Info Gets Out

Quality Hits Verse More Hits … Time To Change Your Thinking

For years everybody has been focused on getting to Google’s first page and getting a zillion hits. I know because I get a lot of  “I have all these hits but nobody is buying.“  Well it’s time to change your thinking. It is not how many hits but the quality of the hits. Let me share something I learned from Gene Simmons of KISS fame and also a very wealthy entrepreneur. You do not have to have a number one hit to make a lot of money. What KISS did is also at the heart of Internet marketing, find your market niche!

SEO (Search Engine Optimization) and Internet marketing have changed quite a bit in the last two years. More I think than it had in the previous 5. Why? Simply, mobile connectivity. Accordingly, how you market has changed. We live in an ‘everything now’ world and you can no longer wait for people to find you. You need to get in front of them and interact and engage them or wham, they are off to the guy doing it better than you.

The first step in this process is to find those people you need to get in front of, find your niche. Next design your site, copy and marketing to address this niche. Do the research, don’t rely on just what you like. And when it comes to your Keyword / phrases don’ skip on the research this is a critical step. These words and phrases are how you will target that market niche and these words will follow you from file names through your content and advertising.

For the purpose of this article the last step is addressing your target market. This is going to include everything from print advertising right through AdWords campaigns and your socials. Now listen carefully, it is very important to optimize your website properly but for more reasons than just Google placement, pay more attention to conversion.

This new marketing is something I coined as “Driving” and that is using all available methods to get my name and web address In front of my audience. I’m looking for people who search for exactly what I have and not broad search terms. I would rather have 5000 hits and 250 sales than 10,000 hits and a high bounce rate, know what I mean.

Lone Bird Studio is Asheville’s choice for mobile web design, mobile apps, and mobile marketing. But use cautiously, results may be overwhelming.


Posted in Content, Mobile Web Design, Web Design | Tagged , , , , , | Comments Off on Quality Hits Verse More Hits … Time To Change Your Thinking

Are we losing Control of the internet?

Hack, hack, hack. This morning it is Home Depot earlier this week it was Apple last week it was Morgan Chase, add to this the long list of major hacks this year and you can see a definite pattern. So that leads to the question has Internet / computer security completely broken down and have we lost control of the Internet to criminals and terrorists?

Think about it. Pretty much nothing is safe, especially with this new “Cloud” mentality. Once anything leaves your computer, tablet or phone it is open to anything and anybody. How bad is it? Bad enough that Safe Lock has changed their advertising to “stopping MOST threats”, not all threats like they used to.

So exactly what is the “Cloud”? In reality it’s a server farm in Kansas or Texas or Bulgaria for all you know. You are trusting your safety and security to somebody you have no idea exists.

Redundancy and distributed information storage. This simply means that in order to prevent lose data is routinely backed up and spread across a number of servers. This is true for medical records, financial records, email, photos anything that makes it way to the Internet

The side effect of this is when you delete something it can still be out there sitting alone waiting for somebody to find it. Think of these server farms as huge orchards with tons of fruit hanging there waiting for someone to figure out how to pic it and there is nothing you can do about it.

The answer? Obviously there is some personal information that you cannot control like medical records as an example, try telling a doctor he can’t put your info into a database so he can get paid. But you do control other info like passwords and the data you upload like pictures, posts, emails etc. Follow the rule that if you don’t want your mother to see it than don’t do it.

Posted in Ranting | Tagged , , , , | Comments Off on Are we losing Control of the internet?

What I Learned on the Appalachian Trail

As most of you know I took the first 3 weeks of June to hike the AT with a friend to raise money for a scholarship setup in memory of his son and to bring awareness to HCM (Hypertrophic cardiomyopathy). I thought we were alone in hiking the AT with a cause but I was wrong. I quickly learned there are a lot of people on the trail for a lot of reasons.

We met Kinder, her trail name, a 63 year old woman. She suffered a stroke two years ago and was hiking the trail to help get over it both physically and mentally and she was doing it by herself. We shared a campsite one rainy night.

We met the professor, a 68 year old man hiking the trail in memory of his wife. They had talked about doing it for years but she recently passed away. He started in Georgia and had no idea how far he was going to make. He just knew he had to go as far as he could. We shared a campfire at Jerry Cabin shelter.

There was Fire starter, a 28 year old man who was lost. Lost in life not on the trail. He had no job, could not get into school, didn’t not know what he wanted or where he was going in life. He was going to walk until he figured it out.

We met a grandmother who was on the trail with her granddaughter. There was Roger Rabbit who was on his third attempt to make it, oh yeah he was 62. There was Buck, six years in the Navy and had to get the military out of his head.

So what did I take away from this, inspiration and self-confidence. There were days that were seven hours of uphill, if Kinder could do it so could I. The next time I have a challenge I’ll remember climbing those hills.

I learned it is about the weight, the more baggage you have the tougher it is to move forward, true in life too. I learned that my problems are small compared to others. And most important I learned to not be so afraid of the unknown.

Chris and I did 84 miles in about 3 weeks, we crossed 17 named peaks, covered some of the highest elevations on the east coast. Matt had a motto “Act as if it is not impossible”. Wise words from someone so young. We left a picture of Matt high on Black Stack Cliffs with a beautiful view overlooking the flatlands of Tennessee.

Posted in Ranting | Tagged , | Comments Off on What I Learned on the Appalachian Trail

Friendly Advice to Deal with the Heartbleed Breech

Everyone has seen news about the Heartbleed virus but here is what they are not telling you.
1- This is probably the largest most offensive hack in the short history of the internet.
2- They do not know for sure how long it has been out there.
3- They have no idea of who or how many people or companies have been affected.
4- It was a beautiful piece of software that left no trace as to its activity.
5- ALL OF US AT SOME POINT HAVE BEEN ON SECURE SITES (https://) which use OpenSSL. Whether shopping, paying bills, accessing everything from Amazon through your bank we have been on sites secured by OpenSSL.
6- What to do. Because there is no way to actually tell how many or who has had information compromised they cannot put a number on it. They do know it is in the millions and chances are good you are one. It is HIGHLY recommended that you as an average person, change ALL YOUR PASSWORDS and please use “Strong” passwords (a combination of upper and lower case letters numbers and symbols).

Posted in Designing the code, Ranting, Web Design | Tagged , , , , , | Comments Off on Friendly Advice to Deal with the Heartbleed Breech

Rant About Internet and Computer Security

A few words about computer and Internet security, there isn’t any! This is especially true with email. Email is the single largest spreader of malware and phishing (getting pieces of information) on the planet. Some information is out of your control, like when you swipe that card at Target.

According to CNN Money there are at least two major data breeches a day: department stores, online stores, banks, motor vehicles, Facebook, Gmail the list goes on. What they do is called Profiling. It is just what it says. Somewhere out there someone is building a profile just about you.

First they got your name, address, bank account number and a PIN from data they purchased from someone who hacked a department store, say Target. The next day they meet a guy for coffee and purchases a ton of fresh Facebook data. They took it home and ran it against the first batch and behold they have a match. That match is you and a million others. Now added to what they have is your user name, photos, friends, pets, birthdays, contacts, emails, everything and anything you posted. They will even know when you are not home.

Now with this new data they run an algorithm against your email address and naturally you used a birthday for the password and wham they are in your email account … but hold this thought. What happened to the first batch of information they collected?

While they were working on breaking your Gmail, a Russian mobster came along and paid a boat load for that banking and address info and is off to print credit cards, open accounts, pretty much whatever they want and you would be screwed for years. Back to your Gmail.

First they hit your contacts and address book so your friends and acquaintances can all be infected. Then they scan your email folders, see who you have been talking to. Maybe some account information. Next YOU get an email from Aunt Jen who’s in jail in the UK and needs bail money so naturally you open it. At this point assuming your virus and malware software is up to date it should catch it …. But not always why, ‘cause most of you don’t keep it up to date is the main reason. Same is true with operating systems and browsers and second security is reactive at best.

Did you ever wonder why there are so many updates? Simple every time a security hole is patched the hackers find or build a new one.  But back to Aunt Jen’s urgent email. You open it because it takes a moment to realize that there is no way Aunt Jen could be in jail in the UK.  At this point it is too late. Their little piece of malware has free run. Passwords, user names, account numbers including credit card and banking.  Maybe they installed a key logger. Pretty much whatever they want is all there for picking.

All this information is added to what was already collected and all you can do is sit back and wait for something to happen. Think about it, they could get a passport in your name if they wanted to, get credit, buy a car, get a nose job all on you or are there steps you can take?

The short answer is this, don’t put the information out there in the first place. Next would be, not to store certain information on the computer. Now I know that there are practicalities in place but there are steps you can take to limit your exposure.

Lets’ start with the first, using your credit card for shopping both in a store and online. Do not use a credit card! Instead get a debit card with a set limit. After this past year many credit card issuers have limited store charges anyway. Using a debit card will give you an early warning and a level of damage control.

Now the second one your online personal information. This is a tough one, a lot of fine lines here but for now we are talking usernames and passwords. It is hard not to talk about the kids or birthdays but you do not need to use them for passwords. This is a case where being lazy can really cost you. For me the best passwords are what are called “Strong” passwords. A random mix of numbers and symbols right off the keyboard. Nothing related to my life in any way shape or form. Given that most logins use your email as the user a strong password is your only defense. Use strong passwords for everything but do not use the same one password for all logins. Now how to remember those passwords leads us to the information on your computer.

How can you not store information on your computer isn’t that what they are for? Well yeah and for the most part what is on your computer is of no interest except certain little pieces. And these pieces are usually kept in neat easy to find folders.

Your first line of defense should be your virus and malware filters. This is very important and it is very important to keep them up to date. The same is true with operating systems and software.

Next are those passwords. Rule one, if your computer offers to save or to auto fill SAY NO. This just saves everything into one neat pile. Forget about the software that promises to keep it all safe. So where do you keep all these passwords, banking information, and account logins? Flash drives. Good old cheap flash drives. Save your data to simple word or text files to the flash drive. Only insert the drive when you are going to use it. They are great for backing up data too.

You can load Firefox onto a flash drive and keep your browsing private when using strange machines.

You cannot do this with most mobile devices so you have to careful what you store on your phone. Never store critical information or banking on a mobile device besides hacking they are vulnerable to theft and lose. While we are talking mobile a couple of words about some of the most dangerous places for getting hacked, public hot spots. Coffee shops, airports, down town. It is so easy to spoof a hotspot it is incredible. You could be giving your data to the person at the next table and never know it.

So this is my security rant. So many people are getting hit and it’s not necessary. Just open your eyes to the world we live in and take some simple steps. Make it harder for someone to get your valuable information.



Posted in Ranting | Tagged , , , | Comments Off on Rant About Internet and Computer Security