Conversational Terrorism
Edit Page
Report
Scan day: 09 February 2014 UTC
-141
Virus safety - good
Description: A list, with examples, of ways that people can commit verbal violence during ordinary conversations.
Conversational Terrorism: How NOT to Talk! All of the techniques listed in this document have actually been witnessed, told to us by someone else, or dreamed up. They are described in first person for clarity of motive.
Size: 219 chars
Contact Information
Email: —
Phone&Fax: —
Address: —
Extended: —
WEBSITE Info
Page title: | Conversational Terrorism: How NOT to Talk! |
Keywords: | Debate, Analysis, Conversation, Techniques, Manipulative, Dialog, Manners, Debate, Rules, Logic, Persuasion, Ploys, Charm, School Teaching, Education, Resources, Speech, Tactics, Cheap Shots, Ad Homonym, Fallacies, Distorted, Journalism, Cheating, Politics, Jokes, Mind, Manipulation, Teachers, Resources, Interviewing, Politicians, Political, Techniques, Spin, Control, Humor, Funny, Fun, Jokes, Curmudgeon, Argumentation, Ideas, Verbal, Terror, Etiquette, Manners, Explanation, Answers, Questions, Advice, Tips, Articles, Examples, Mediation, Peace, Negotiate, Negotiation, Marriage, Counseling, Expose, Talk, Talking, Speaking, Communication Breakdown, Human, Communication, Society, Culture, Pointless, Illogical, Polemic, Quarrel, Contention, Acrimony, Discussion, CatalinaDog |
Description: | An expose of conversational terrorism cheap shot tactics to notice and avoid. HOW NOT TO TALK! Read 'em and laugh - or weep if you must. |
IP-address: | 97.74.215.141 |
WHOIS Info
NS | Name Server: NS3.SECURESERVER.NET Name Server: NS4.SECURESERVER.NET |
WHOIS | Status: clientTransferProhibited |
Date | Creation Date: 04-dec-1997 Expiration Date: 03-dec-2015 |