The Reuters IP address that was used to send us a death threat has visited LGF 15 times today. This doesnt necessarily mean that Reuters has not really suspended the person responsible (as they told me), but something odds going on here because the hits from this address are not random at all. All of them go either directly to the post about the death threat, or to one of the other LGF entries linked at the Guardians page with Inayat Bunglawalas article. There are no visits from this IP address to any unrelated LGF pages.
The most recent hit was at 6:31:09 pm Pacific time, and it went directly to the death threat post.
For the full story: A Death Threat from Reuters (Bumped).
Hey, Bunglawala, go listen to the Rants about you at Bairn Surgery With Spoons!
Meanwhile, at 11:40 pm last night, someone used an anonymous remailer in the Netherlands (with the address nobody@dizum.com) to send the following email:
You are a blathering titted weenie-man. Your whining and mewling amuses us so. If youre representative of what stands between the West and Islam, Islam cannot lose.
At the Guardian, Inayat Bunglawala responds again: link: 360 comments "I notice that we appear to have attracted some rather unpleasant Muslim-haters via the detestable LGF website.
Dear Mr. Bunglawala,
We are not Muslim-haters. We despise beheadings, mutilations, honor-killings and other sundry gross affronts to humanity in the name of God. It's not all that complex. Inhumanity to humankind will not be tollerated. Got it? "
Last night I requested more information about the person Reuters says they suspended for sending me a death threat, but so far there has been no response.
Meanwhile, the Reuters IP address 192.165.213.18 (from which I received the threat) has hit LGF 9 times today, most recently at 8:48:04 Pacific. And these arent random page hitsthey all go to the entry about the threat. For the full story: A Death Threat from Reuters (Bumped). link: 150 comments
Charles gets his props from Powerline...
What struck me most about this episode is how technically skilled Charles is. The poor buffoon from Reuters who sent the email never knew what hit him. Charles was able to trace his IP address around the globe, and it quickly emerged that the miscreant was Inayat Bunglawala. [The] column by Bunglawala--an extraordinarily silly column, postulating that Christians and Muslims can get along if Christians just give up on the divinity of Christ--was apparently the source of the problem.
See below for important updates...
Amazing what one can find by doing a simple google search of the following terms;Bunglawala death threat. Indeed, al-Reuters has employed a Radical Islamic Fundamentalist. From Daniel Pipes
Seems Bungholio has a colorful past. link: 548 comments
In January 1993, Mr Bunglawala wrote a letter to Private Eye, the satirical magazine, in which he called the blind Sheikh Omar Abdul Rahman "courageous" - just a month before he bombed the World Trade Center in New York. After Rahman's arrest in July that year, Mr Bunglawala said that it was probably only because of his "calling on Muslims to fulfil their duty to Allah and to fight against oppression and oppressors everywhere".
Five months before 9/11, Mr Bunglawala also circulated writings of Osama bin Laden, who he regarded as a "freedom fighter", to hundreds of Muslims in Britain.
http://tinyurl.com/jwy3v
Now THAT'S a 'gotcha'.
backhoe, just excellent work. Thank you, I'd like to send this out to my email list if OK with you.
What Inayat Bunghole and alReuters don't understand is that now, at 15 people who don't use the internet for news but like to receive my emails about unreported and underreported stories, have been alerted to the photo fakery, the alReuters retraction and Bungholes impotent death threat.
And those 15 people will email or tell the stories to their relatives and friends who will email and tell others.....and round and round we go. The real story spreads. Unlike the lies of alReuters, the driveby media and Bunghole.
And I'm overjoyed to do send this stuff out. Thanks again backhoe.
Sorry to burst your bubble, but that's just not going to work. First off, you can change the MAC address using software that's probably on your computer right now (within the network drivers). But you won't need to: You see, if there's a bridge or router between the source and destination, then the source MAC address is gone, and the destination MAC address no longer matters. Wiped away. The IP protocol couldn't care less about the MAC address. In fact, even if it knew what it was, it wouldn't know what to do with it. The MAC address is only useful in identifing a network interface on a local network.
Mark
Buckhead Lives!