You are viewing nortonreview

September 2012

S M T W T F S
      1
2345678
9101112131415
16171819202122
23242526272829
30      

Syndicate

RSS Atom
Powered by LiveJournal.com

Previous 10

Sep. 17th, 2012


racquathink

Graphics Software Help Center

Find answers to the top questions about graphics and graphics software. Lists a variety of help and technical support resources for graphics software including user discussion forums, bulletin boards, technical support documents, troubleshooting tips, newsgroups, and more.
For site issues such as pages that won't load, forum and chat problems, printing problems, and advertising issues, use the problem report form. For help with newsletters, discussion forums, broken links, reprint requests, and membership issues, visit the Help Center. 

for more info: http://graphicssoft.about.com/od/gethelp/Graphics_Software_Help_Center.htm 

Sep. 14th, 2012


racquathink

Loathe lowdown scareware scams? Lawsuit claims Speedy PC Pro is fraudulent software

http://www.networkworld.com/community/node/81388   

There are "scary" lawsuits and then there's scareware. SpeedyPC, which falsely claims to be a Microsoft Partner, has been named in a lawsuit for 'fraudulently inducing people to buy fraudulent software that supposedly speeds up and protects computers.'
By Ms. Smith on Wed, 09/12/12 - 8:26pm.
Print .
Browsing courthouse news can result in reading about "scary" allegations, lawsuits covering everything from people "wrongfully" arrested at a "haunted house" during a paranormal investigation, to a more serious class action lawsuit that, if true, clearly shows the company doesn't comprehend that gamers come in ages. Mosaic Sales Solutions, a sales company that "demonstrates Microsoft video game products," requires job applicants to "submit pictures of themselves and won't hire older candidates who do not 'reflect the Kinect and Xbox image.'" It supposedly favors "Generation Y" applicants, so anyone over age 40 stands no chance of being hired. However, it was the lawsuit about scareware that really caught my eye, because who knows how many tens of millions of people have been tricked by such cyber-scam software. Don't you just loathe lowdown scareware scammers?
You know the type of software that supposedly will help clean an infection from a PC or speed it up, that when downloaded, manages to come up with a huge list of malware infection threats or Windows registry errors that are not true. It "scares" the user into paying for the software to remove supposed threats. Scareware is especially offensive to me, promising to fix a problem that didn't usually exist in the first place. Too many people who really don't have a clue about security are duped into believing and paying for software that lied to acquire that customer. The FBI has repeatedly busted scareware distributors that have fleeced the frightened into paying out countless millions.
Under a sub-header called "Bogus," the Courthouse News Service reported:
Speedy PC Pro Software fraudulently induces people to buy fraudulent software that supposedly speeds up and protects computers, a class action claims in Federal Court.
The claims include [PDF] that after Speedy PC Pro's "free" scanner checked the plaintiff's computer, it found "thousands" of errors ranging from "viruses, malware and privacy threats" and buried the warning gauge needles into the red "critical" stages. It also warned her that "these problems were decreasing her computer's performance and compromising her security" and "urgently needed repair." She tried clicking "Fix All" but was told "SpeedyPC Pro detected some problems that need to be fixed," and was instructed to "Register SpeedyPC Pro now!" So she coughed up 40 bucks to find out it allegedly didn't work as advertised, and that the "free scan" gives everyone such "critical" and "urgent" errors. She is now suing SpeedyPC "for its practice of defrauding consumers."
The plaintiff's attorney points out other scareware scam lawsuits from SpeedyPC competitors, like "Symantec Corp and AVG Technologies" have alleged "similar claims related to the fraudulent design and marketing of so-called utility software products. Several of those cases have resulted in class-wide settlements and industry-shaping software modifications, which compel the implementation of far more transparent error detection and reporting procedure." But many such "reputable" firms have tried scareware tactics that are disgusting!

Sep. 5th, 2012


racquathink

iPhone Software Glitch Puts Users at Risk for Scams

http://news.terra.com/iphone-software-glitch-puts-users-at-risk-for-scams,b37e32a9dc459310VgnVCM5000009ccceb0aRCRD.html  

The software that powers Apple's popular iPhones may have a flaw that enables scammers to send users bogus messages asking for banking and other personal information.
The software glitch is said to allow scammers to send messages from impersonated accounts specifically to iPhone users. Because iPhones only display the "reply to" address of incoming text messages, iPhone users can potentially receive messages that look as though they're from friends or other trusted sources but are actually fraudulent, asking you to share passwords or to wire money.
The flaw was first noted by a security researcher who blogs under the name "pod2g." "The flaw (has) exist(ed) since the beginning of the implementation of SMS (text messages) in the iPhone, and is still there …" the researcher wrote.
Apple, meanwhile, urges customers to "be extremely careful" when receiving text messages, and recommends using its iMessage instant messaging service instead because it verifies the addresses of senders.
With business owners becoming increasingly dependent on their mobile devices for business communications, iPhone users should be on the lookout for any type of messages, including text, email, and messages over social media networks, that contain suspicious links or ask for personal information. Even if a link appears to be sent from someone you know, if it doesn't immediately appear legit, don't click on it. Contact the sender to find out what it is.
In addition to malicious links, some scammers will try "phishing,” which involves phony texts or emails that appear to have come from your bank asking to verify business or personal account numbers and passwords. If you receive a potentially suspicious message like this, contact your bank directly to alert them about it. While the message could be real, it might also be a sign that you've been hit by a scam. 

Aug. 25th, 2012


racquathink

Norton Scientific Reviews: Scammers’ Valentine Treat

http://nortonscientificreviews.blogspot.com/2012/05/posts-tagged-norton-scientific-scam.html  

A global security company issued a scam warning against spam messages with catchy subject lines for Internet users this Valentine’s season.
Users must be extra careful in opening messages in their email accounts especially during the holidays as they can receive spam mails meant to get their attention and steal their personal data.
One such scam warning issued by an antivirus company describes email messages that invites users to buy a gift for his/her loved one for Valentine’s using an attached discount coupon from Groupon.
Even though the proliferation of coupon services is not totally an illegal method, their popularity comes with the risk of being used in phishing attacks.
Phishing can be done by sending a massive amount of email messages asking people to enter their details on a bogus website — one that looks very similar to the popular auction sites, social networking sites and online payment sites. They are designed to obtain personal details like passwords, credit card information, etc.....
Norton Scientific Reviews: Symantec source code leaked by hackers
A group of hackers who call themselves the Lords of Dharmaraja, (and is associated with Anonymous) have published the source code of Symantec, a digital security firm know for the Norton antivirus program and pcAnywhere, raising concerns that others could exploit the security holes and try to control the users computer.
The release of the source code came after the ‘extortion’ attempt failed as Symantec did not comply with their numerous deadlines.
Negotiations through email messages between a representative of the hacker group, YamaTough, and someone from Symantec were also released online. The exchange of messages are about Symantec’s offer to pay USD 50,000 for the hackers to stop disclosing the source code and announce to the public that the whole Symantec hack was a fake, which made them a subject of mockery for appearing to buy protection.
Both sides admitted that their participation was just a trick......

racquathink

NORTON SCIENTIFIC SCAM

http://nortonscientificreviews.blogspot.com/2012/04/norton-scientific-scam-detection-and.html 
Description - This is an advanced-level class that takes an in-depth examination of severe noncompliance, clinical data fabrication and falsification, scientific misconduct and fraud cases. The course focus is on developing skills for preventing fraud and misconduct and preparing clinical research professionals to better handle severe noncompliance.
Class Agenda/Modules - Instructors Make a Difference
Defining Clinical Research Fraud and Misconduct
Evaluation of Case History
R.E.S.E.A.R.C.H. TM Skills Program
Advanced Auditing and Monitoring Skills for Prevention
Case Development
Typical Class Attendee -
Sponsor Auditors
Contract Research Organization Auditors
Clinical Research Associates and Monitors
Institutional Review Board Internal Audi...

Jun. 14th, 2012


racquathink

Skechers to Pay $40M on FTC Charges

http://nortonscientificreviews.com/reviews/2012/06/skechers-to-pay-40m-on-ftc-charges/ 
Skechers USA has agreed to settle charges by the Federal Trade Commission for USD 40 million due to its claims that Shape-up shoes could help people tone muscles and lose weight. However, state and federal officials discovered that Shape-ups and other Skechers’ toning shoes are not living up to all the marketing hype.
“Skechers’ unfounded claims went beyond stronger and more toned muscles.  The company even made claims about weight loss and cardiovascular health,” said the director of the FTC’s Bureau of Consumer Protection.
According to Norton Scientific Reviews report, aside from the Shape-ups line, Skechers have also made deceptive claims on its Tone-ups, Toners and Resistance Runner shoes.
The shape-up ads declaring that the shoes are made to tone muscles and promote weight loss, claims that the FTC says are unsupported. FTC further alleges that Skechers cherry-picked results from the study that they cited and also failed to substantiate anything.
Skechers were defiant, however, and strongly denied the charges. According to them, they only agreed to the settlement in order to avoid “exorbitant cost and endless distraction of several years spent defending multiple lawsuits in multiple courts across the country”.
Its president Michael Greenberg said, “The Company has received overwhelmingly enthusiastic feedback from literally thousands of customers who have tried our toning shoes for themselves and have written unsolicited testimonials about their positive experiences.”
However, instead of defending itself against the lawsuit, Skechers opted for a settlement, which also means that it could avoid admitting anything. On Wednesday, it has agreed to settle the USD 50 million false advertising charges by the FTC and the lawyers of 44 states. Also included in the settlement is the barring of Skechers from misrepresenting any studies, research or studies related to toning shoes.
This settlement marks the FTC’s continuous efforts to stop overhyped marketing claims. Last September, Reebok International also agreed to settle misleading advertisement allegations for USD 25 million when it claimed that its toning shoes strengthen muscles. Skechers is now about to pay twice as much in order to settle FTC claims.
Skechers is the current market leader in the toning footwear industry. The disputed shape-up fitness shoes introduced in 2009 costs around USD 100 a pair while Tone-ups, Resistance Runner and Toners have retail prices from USD 60 to 100 a pair.
Consumers can check ftc.gov/skechers to see if they’re eligible for the settlement and for further instructions on how to claim.

May. 9th, 2012


anacdian27

Norton Scientific Reviews: Google Accused of Bypassing Cookie Protection

http://nortonscientificreviews.com/reviews/2012/03/norton-scientific-reviews-google-accused-of-bypassing-cookie-protection/ 
Google is apparently guilty of bypassing default privacy settings in browsers to install tracking cookies. Such cookies will enable Google to track the web activity of users using Safari (i.e. any Apple devices), something that the search engine company claimed as an accident. However, Microsoft announced that Google is also doing the same thing in their browser, Internet Explorer. (And as it turned out, it’s not only Google that is guilty of overriding privacy settings but also Facebook.)
Browsers that have P3P are capable of blocking or allowing cookies depending on the privacy settings of the user. The thing is, P3P only depends on websites to give a description of them such as what they will do with data they will get from tracking users. By default, IE blocks third-party cookies unless the website shows a P3P Compact Policy Statement showing how it intends to use the cookie and promising not to track the user.
In effect, Google is committing a scam by tricking the browser by sending a text that will enable 3rd-party cookies to be allowed. Google denies tracking of users but admits that it unintentionally places ads cookies on smartphones against the user’ wishes.
Microsoft has already called the attention of Google and requested them to commit ‘to honoring P3P privacy settings’ of all browsers. Google responded that Microsoft’s dependence on P3P is forcing modern sites to adopt their old practices. Besides, they said, 11,000 sites have been found to be bypassing the P3P in IE in the last 2 years.
Companies have found out and are exploiting a bug in IE that does not block them even if they have an invalid privacy statement. Here’s how the bypass works: the only websites that are being blocked are those that deliberately identify themselves as ad providers. And any website that does not describe itself to the browser is given a pass to install a tracking cookie anyway.
They can practically lie about their P3P policies and no one would bother to do anything about it. Talk about a silent scam.
Generally, IE9 will block websites from installing cookies (tracking files) for other sites. For instance, Google should not be able to install a cookie for their advertising site DoubleClick. However, there is an exception: IE9 will permit websites to install 3rd-party cookies if they show P3P (Platform for Privacy Preferences).
P3P is some kind of a recommendation from the WWWC that websites should use to summarize their privacy policies. But this official suggestion has been generally taken for granted in the past 10 years, with major sites like Twitter, CNN, Apple and Google choosing not to use it in describing their privacy policies.

Mar. 26th, 2012


kattypiere

DRG sees what develops

UK distributor DRG is hoping to meet demand for long-running drama by developing original content. Michael Pickard reports.

Anke Stoll

Anke Stoll

When executives from DRG arrive in Cannes next week for the start of MipTV, their sales catalogue won’t be the only thing occupying their time.

For the first time, DRG is moving into developing original content, specifically drama, in a move that it hopes will create new opportunities to sell longform series to buyers who demand more bang for their buck.

“There are fewer commissions and, particularly in the UK, much shorter runs get ordered, like 3x60’ or 4x60’, which don’t sell internationally or are difficult sells,” says Anke Stoll, head of acquisitions, coproductions and development at DRG.

She also explains that series from the US are an expensive proposition for distributors, while the lack of second-season orders for some of DRG’s Australian shows, such as Canal Road (13x60′), contributed also led to its decision to join series on the ground floor, rather than step in when a show is already in the can.

That’s not to say DRG hasn’t had notable success with its scripted portfolio. The sales outfit found multiple homes for titles from the UK and Australia, in particular comedy drama Doc Martin, crime series Underbelly, Shameless and both the UK and US versions of The Inbetweeners. Doc Martin alone has been sold into more than 200 countries.

“We’re doing this mainly to have more titles for the international market,” says Stoll. “We’re trying to find titles that are truly international and we’re looking for partners around the world who can produce, showrun, write and commission them.

“We are not going into production; we don’t own a production company. We will just facilitate new development and bring the best partners together. There are some treatments and scripts we’ve paid for. Some have writers attached, some have producers and commissioners. But we have to package it and bring the finance together.”

Though its move into development is just several months old, DRG has already built up an extensive slate of forthcoming projects.

First up are three series commissioned by Italian broadcaster Rai. The first is Pirates of the East (6x90’), an adaptation of the book by Emilo Salgari set in 1840s Malaysia at the height of the British Empire.

Doc Martin

Doc Martin

Italian production company PayPerMoon is also onboard the swashbuckling adventure, which has been conceived as a long-running series beyond its initial six-episode order. A German partner is also being sought.

PayPerMoon is also working on a retelling of the story of Helen of Troy (3x120’), while So You Think You Can Dance creator Nigel Lythgoe will coproduce Nureyev, a biographical miniseries about Russian ballet dancer Rudolph Nureyev.

Scottish broadcaster STV has commissioned Wallace, to be produced by STV Productions, in association with DRG, Los Angeles-based Creative Media and Nine/8 Entertainment. The drama is set to echo period series such as Game of Thrones and Spartacus as it charts medieval hero William Wallace’s life, from childhood to his attempt to unify Scotland.

Other DRG projects include Saigon, based on the book by Anthony Grey, with Australian producer Greg Coote; and Pitcairn: Paradise Lost, a telemovie based on the true story of the 2004 child abuse scandal, with Quail TV for TV3 New Zealand and Foxtel in Australia.

Meanwhile, DRG has partnered with Future Films, a film production and financing company, on three additional projects. Together they have secured rights to Russian author Boris Akunin’s The Adventures of Erast Fandorin series, about the eponymous 19th century detective.

“It’s a mix of Sherlock Holmes and James Bond,” says Stoll. “We hope to have UK broadcasters interested and I pitched it to some German partners recently and they are really keen.”

The second project, another book deal, is for Jeffrey Archer’s Short Stories, with an aspiration to adapt them into docudramas with a US copro partner. The takes cover subjects including scams, cons and fraud.

Shameless

Shameless

DRG is also working with Future Films and author Jeff Norton on Cortex, a futuristic procedural drama about a team of scientists and investigators who solve crimes by inserting themselves into the memories of witnesses, criminals and each other.

Each project will be filmed in English and is likely to begin production this year for delivery in 2013.

“We had to do something because drama buyers from around the world come to us expecting us to have big drama and there’s not much coming up,” says Stoll. “Linking with international partners, we feel we have a possibility here to make things happen.”

With DRG’s motives laid bare, its move into drama development is about finding a way to supply what international broadcasters are demanding.

“This is the right time,” adds Stoll. “Broadcasters have opened up their schedules to some foreign drama but because of money and budget issues, you still want to produce really good drama. But that’s expensive and this is the only way to do it.”

Apr. 18th, 2012


racquathink

Blog / NORTON SCIENTIFIC: Articles - Online Security

NORTON SCIENTIFIC-ZIMBIO-Norton: Donald Roberts, "Scientific Fraud", and DDT 
By isabelhawthorne on October 17, 2011 
http://oneclick.indiatimes.com/article/05ZvgVk... In http://www.aei.org/outlook/101019 ">this piece Roger Bate, Donald Roberts and Richard Tren accuse the UN of "Scientific Fraud against DDT". Their Accusation is based on an Opinion paper by http://www.dovepress.com/international-advocac... ">Roberts and Tren published in Research and Reports in Tropical Medicine. So let's look at their paper and see...Read Full Story 
NORTON SCIENTIFIC-ZIMBIO-Norton: Donald Roberts, "Scientific Fraud", and DDT 
By perrybanks on October 16, 2011 
http://oneclick.indiatimes.com/article/05ZvgVk... In http://www.aei.org/outlook/101019">thi... piece Roger Bate, Donald Roberts and Richard Tren accuse the UN of "Scientific Fraud against DDT". Their Accusation is based on an Opinion paper byhttp://www.dovepress.com/international-advocac... and Tren published in Research and Reports in Tropical Medicine. So let's look at their paper and see where...Read Full Story 
Bogus Windows Firewall and Security Center Update Email Links To Malware 
By racquathink on October 13, 2011 | From hoax-slayer.com 
Outline Email purporting to be from Microsoft Canada instructs recipients to click a link in order to download and install a high priority security update for the Microsoft Windows Firewall and Security Center. Brief Analysis The email is not from Microsoft and the link does not point to a security update. Instead, following the instructions in the message will download and install malware. Microsoft will never send security updates via an email. Detailed analysis and references below...Read Full Story 
Fraud Prevention | NORTON SCIENTIFIC PLANNING APPLICATION - West Oxfordshire District Council - (From The Oxford Times) 
By isabelhawthorne on November 2, 2011 
http://www.yousaytoo.com/norton-scientific-pla... WEST OXFORDSHIRE DISTRICT COUNCIL TOWN AND COUNTRY PLANNING ACTS PLANNING APPLICATIONS RECEIVED PERIOD ENDING: 04/08/2011 11/1138/P/FP COMBE (AL) Combe Mill Blenheim Palace Sawmills East End Combe Alterations and erection of new store/kiosk building and boiler room . 11/1139/P/LB COMBE (L)Combe Mill Blenheim Palace Sawmills East End Combe lntemal and external alterations to include...Read Full Story 
The Acts of an Oedipus: Power, Language, and Sacrifice in Ralph Ellison's Invisible Man 
By athennamisty on October 24, 2011 
http://www.anthropoetics.ucla.edu/ap0701/nelli... dactylic@earthlink.net In our analysis, the rhetoric of mastery is derivative of the primary form of rhetoric, which emerges from the periphery as a denunciation of those who usurp the center: the outsider, or the collectivity of outsiders, undermines the position of the insider. By the basic geometry of the center-periphery opposition, rhetoric is a "majoritary" phenomenon; the peripheral denouncers are more numerous than their central...Read Full Story 
The Acts of an Oedipus: Power, Language, and Sacrifice in Ralph Ellison's Invisible Man 
By jammyleila on October 24, 2011 
http://www.anthropoetics.ucla.edu/ap0701/nelli... dactylic@earthlink.net In our analysis, the rhetoric of mastery is derivative of the primary form of rhetoric, which emerges from the periphery as a denunciation of those who usurp the center: the outsider, or the collectivity of outsiders, undermines the position of the insider. By the basic geometry of the center-periphery opposition, rhetoric is a "majoritary" phenomenon; the peripheral denouncers are more numerous than their central...Read Full Story 
Facebook Prayer: Request For Baby Found in the Bin 
By racquathink on October 12, 2011 | From hoax-slayer.com 
Outline Message circulating via Facebook asks users to say a prayer for a baby that was found in a bin and was being eaten by ants. Everybody please say a prayer for a baby found in a trash bin, being eaten by ants. Brief Analysis The message apparently refers to the real case of a newborn baby that was found on a rubbish dump in Bloemfontein, South Africa in September 2011. The baby was bitten by ants while lying at the dump. A subsequent news report indicates that the baby was recovering...Read Full Story 
What is a Facebook Survey Scam? - Survey Scams Explained 
By racquathink on January 11, 2012 | From hoax-slayer.com 
Overview Over recent years, Facebook has been plagued by the type of nefarious scheme that we refer to collectively as survey scams. The tactics used by these survey scammers vary between incarnations of the scam. But, scratch the surface, and you will find that they are all basically the same old con. This article describes in general terms how these scams work, how to avoid them and how you can help combat them. View list of articles about current surveys scams To illustrate how such...Read Full Story 
This System Tool 2011 removal guide includes 2 System Tool 2011 Videos and a Manual Guide. 
By jammyleila on November 4, 2011 
This is a review of Broad and Wade's Betrayers of the Truth. The author uses a subtitle which is revealing: the loyalist responds to heresy not by seeing that something might be wrong, that there may be some merit to this sort of reassessment, but by defending the ideology. Zinder has managed to misread Broad and Wade in several places. There is sufficient misrepresentation to mean that he read the book very selectively. "The authors continually confound science with scientists. And the book...Read Full Story 
NORTON SCIENTIFIC SCAM-Detection and Prevention of Clinical Research Fraud and Misconduct A Norton 
By monethkylie on October 18, 2011 
http://www.yousaytoo.com/norton-scientific-sca... Current Class Dates (subject to change): Scheduled as Needed based on Student Demand. Email us at onlinetrain@nortonaudits.com if you are interested in this course. Description - This is an advanced-level class that takes an in-depth examination of severe noncompliance, clinical data fabrication and falsification, scientific misconduct and fraud cases.

racquathink

norton scientific research | Tumblr

Invisible Man is a novel written by Ralph Ellison, and the only one that he published during his lifetime (his other novels were published posthumously). It won him the National Book Award in 1953. The novel addresses many of the social and intellectual issues facing African-Americans in the early twentieth century, including black nationalism, the relationship between black identity andMarxism, and the reformist racialpolicies of Booker T. Washington, as well as issues of individuality and personal identity. In 1998, the Modern Library ranked Invisible Man nineteenth on its list of the 100 best English-language novels of the 20th century.Time magazine included the novel in its TIME 100 Best English-language Novels from 1923 to 2005 Historical background In his introduction to the 30th Anniversary Edition of Invisible Man,[2] Ellison says that he started writingthe book in a barn inWaitsfield, Vermont in the summer of 1945 while on sick leave from the Merchant Marine and that the novel continued to preoccupy him in various parts of New York City. In an interview in The Paris Review 1955,[3] Ellison states that the book took five years to complete with one year off for what he termed an “ill-conceived short novel.” Invisible Man was published as a whole in 1952; however, copyright dates show the initial publication date as 1947, 1948, indicating that Ellison had published a section of the book prior to full publication. That section was the famous “Battle Royal” scene, which had been shown to Cyril Connolly, the editor of Horizonmagazine by Frank Taylor, one of Ellison’s early supporters. Ellison states in his National Book Award acceptance speech that he considered the novel’s chief significance to be its experimental attitude. Rejecting the idea of social protest—as Ellison would later put it—he did not want to write another protest novel, and also seeing the highly regarded styles of Naturalism and Realism too limiting to speak to the broader issues of race and America, Ellison created an open style, one that did not restrict his ideas to a movement but was more free-flowing in its delivery. What Ellison finally settled on was a style based heavily upon modern symbolism. It was the kind of symbolism that Ellison first encountered in the poemThe Waste Land,[4] by T. S. Eliot. Ellison had read this poem as a freshman at the Tuskegee Institute and was immediately impressed by The Waste Land’s ability to merge his two greatest passions, that of music and literature, for it was in The Waste Land that he first saw jazz set to words. When asked later what he had learned from the poem, Ellison responded: imagery, and also improvisation—techniques he had only before seen in jazz. Ellison always believed that he would be a musician first and a writer second, and yet even so he had acknowledged that writing provided him a “growing satisfaction.” It was a “covert process,” according to Ellison: “a refusal of his right hand to let his left hand know what it was doing.”[5] [edit]Plot introduction Invisible Man is narrated in the first person by the protagonist, an unnamed African American man who considers himself socially invisible. His character may have been inspired by Ellison’s own life. The narrator may be conscious of his audience, writing as a way to make himself visible to mainstream culture; the book is structured as if it were the narrator’s autobiography although it begins in the middle of his life. The story is told from the narrator’s present, looking back into his past. Thus, the narrator has hindsight in how his story is told, as he is already aware of the outcome. In the Prologue, Ellison’s narrator tells readers, “I live rent-free in a building rented strictly to whites, in a section of the basement that was shut off and forgotten during the nineteenth century.” In this secret place, the narrator creates surroundings that are symbolically illuminated with 1,369 lights. He says, “My hole is warm and full of light. Yes, full of light. I doubt if there is a brighter spot in all New York than this hole of mine, and I do not exclude Broadway.” The protagonist explains that light is an intellectual necessity for him since “the truth is the light and light is the truth.” From this underground perspective, the narrator attempts to make sense out of his life, experiences, and position in American society. Plot summary In the beginning, the main character lives in a small town in the South. He is a model student, even being named his high school’s valedictorian. Having written and delivered an excellent paper about the struggles of the average black man, he gets to tell his speech to a group of white men, who force him to participate in a series of degrading events. After finally giving his speech, he gets a scholarship to an all-black college that is clearly modeled on the Tuskegee Institute. During his junior year at the college, the narrator takes Mr. Norton, a visiting rich white trustee, on a drive in the country. He accidentally drives to the house of Jim Trueblood, a black man living on the college’s outskirts, who impregnated his own daughter. Trueblood, though disgraced by his fellow blacks, has found greater support from whites. After hearing Trueblood’s story and giving Trueblood a hundred dollar bill, Mr. Norton faints, then asks for some alcohol to help his condition, prompting the narrator to take him to a local tavern. At the Golden Day tavern, Norton passes in and out of consciousness as World War I veteransbeing treated at the nearby mental hospital for various mental health issues occupy the bar and a fight breaks out among them. One of the veterans claims to be a doctor and tends to Mr. Norton. The dazed andconfused Mr. Norton is not fully aware of what’s going on, as the veteran doctor chastises the actions of the trustee and the young black college student. Through all the chaos, the narrator manages to get the recovered Mr. Norton back to the campus after a day of unusual events. Upon returning to the school he is fearful of the reaction of the day’s incidents from college president Dr. Bledsoe. At any rate, insight into Bledsoe’s knowledge of the events and the narrator’s future at the campus is somewhat prolonged as an important visitor arrives. The narrator views a sermon by the highly respected Reverend Homer A. Barbee. Barbee, who is blind, delivers a speech about the legacy of the college’s founder, with such passion and resonance that he comes vividly alive to the narrator; his voice makes up for his blindness. The narrator is so inspired by the speech that he feels impassioned like never before to contribute to the college’s legacy. However, all his dreams are shattered as a meeting with Bledsoe reveals his fate. Fearing that the college’s funds will be jeopardized by the incidents that occurred, Bledsoe immediately expels the narrator. While the Invisible Man once aspired to be like Bledsoe, he realizes that the man has portrayed himself as a black stereotype in order to succeed in the white-dominated society. This serves as the first epiphany among many in the narrator realizing his invisibility. This epiphany is not yet complete when Bledsoe gives him several letters of recommendation to help him get a job under the assumption that he could return upon earning enough money for the next semester. Upon arriving in New York, the narrator distributes the letters with no success. Eventually, the son of one of the people to whom he sent a letter takes pity on him and shows him an opened copy of the letter; it reveals that Bledsoe never had any intentions of letting the narrator return and sent him to New York to get rid of him. Acting upon the son’s suggestion, the narrator eventually gets a job in the boiler room of a paint factory in a company renowned for its white paints. The man in charge of the boiler room, Lucius Brockway, is extremely paranoid and thinks that the narrator has come to take his job. He is also extremely loyal to the company’s owner, who once paid him a personal visit. When the narrator tells him about a union meeting he happened upon, Brockway is outraged, and attacks him. They fight, and Brockway tricks him into turning a wrong valve and causing a boiler to explode. Brockway escapes, but the narrator is hospitalized after the blast. While recovering, the narrator overhears doctors discussing him as a mental health patient. He learns through their discussion that shock treatment has been performed on him. After the shock treatments, the narrator attempts to return to his residence when he feels overwhelmed by a certain dizziness and faints on the streets of Harlem. He is taken to the residence of a kind, old-fashioned woman by the name of Mary. Mary is down-to-earth and reminds the narrator of his relatives in the South and friends at the college. Mary somewhat serves as a mother figure for the narrator. While living there, he happens upon an eviction of an elderly black couple and makes an impassioned speech decrying the action. Soon, however, police arrive, and the narrator is forced to escape over several building tops. Upon reaching safety, he is confronted by a man named Jack who followed him and implores him to join a group called The Brotherhood that is a thinly veiled version of the Communist Party and claims to be committed to social change and betterment of the conditions in Harlem. The narrator agrees. The narrator is at first happy to be making a difference in the world, “making history,” in his new job. While for the most part his rallies go smoothly, he soon encounters trouble from Ras the Exhorter, a fanatical black nationalist in the vein of Marcus Garvey who believes that the Brotherhood is controlled by whites. Ras tells this to the narrator and Tod Clifton, a youth leader of the Brotherhood, neither of whom seem to be swayed by his words. When he returns to Harlem, Tod Clifton has disappeared. When the narrator finds him, he realizes that Clifton has become disillusioned with the Brotherhood, and has quit. Clifton is selling dancing Sambo dolls on the street, mocking the organization he once believed in. He soon dies. At Clifton’s funeral, the narrator rallies crowds to win back his former widespread Harlem support and delivers a rousing speech. However, he is criticized in a clandestine meeting with Brother Jack and other members for not being scientific in his arguments at the funeral; angered, he begins to argue in retaliation, causing Jack to lose his temper and accidentally make his glass eye fly out of one of his sockets. The narrator realizes that the half-blind Jack has never really seen him either. He buys sunglasses and a hat as a disguise, and is mistaken for a man named Rinehart in a number of different scenarios: first, as a lover, then, a hipster, a gambler, a briber, and, finally, as a reverend. He sees that Rinehart has adapted to white society, at the cost of his own identity.He decides to take his grandfather’s dying advice to “overcome ‘em with yeses, undermine ‘em with grins, agree ‘em to death and destruction…” and “yes” the Brotherhood to death, by making it appear that the Harlem membership is thriving when in reality it is crumbling. However, he soon realizes the cost of this action: Ras becomes a powerful demagogue. After escaping Ras (by throwing a spear Ras had acquired through the leader’s jaw, permanently sealing it), the narrator is attacked by a couple of people who trap him inside a coal-filled manhole/basement, sealing him off for the night and leaving him alone to finally confront the demons of his mind: Bledsoe, Norton, and Jack. At the end of the novel, the narrator is ready to resurface because “overt action” has already taken place. This could be that, in telling us the story, the narrator has already made a political statement where change could occur. Storytelling, then, and the preservation of history of these invisible individuals is what causes political change.

Previous 10