– Difference Between #SIM vs #AIM vs #CIM vs #DPM

The AIM module accepts the credit card info directly on your site and then passes it securely to the gateway in the background.

It has a tighter handshaking between your store and the gateway service than SIM, and typically has faster response times.

How Advanced Integration Method (AIM) work

How Advanced Integration Method (AIM) work

Advanced Integration Method (AIM)

Developer’s Checklist

Design and Build:

  • Cart Page
  • Payment Page
  • Thank You Page
  • Error Pages
  • Form Handler to Leverage SDK


AIM does not redirect the user to the site while SIM does

AIM requires that you have an SSL certificate while SIM does not

AIM allows for better site design than SIM

AIM is better for bigger sites while SIM is more appropriate for smaller sites

SIM – should only be used if your site doesn’t have any SSL support. Strongly recommended to use AIM instead.

AIM sends the card data back to your server. Your server then “turns around” and sends the card data onward to Essentially, your server acts as a proxy to the servers. Even if you never store the card data in a database, the card data is still present on your server. This means, according to current PCI, that your server is in the PCI envelope. It used to be that if your server merely transited the data–using AIM or equivalents from other gateways–that your server was not covered  by PCI.  But that is NO LONGER the case! PCI folks are not dumb, they realize that if your system is compromised, the card data could be intercepted.)

There are still lots of people laboring under the impression that if they use AIM, their server is not covered by PCI. They are all wrong.

An alternative is to use CIM–but only if you use the new CIM option of “Hosted CIM”

Use CIM if you want to store the customer’s credit card so they don’t have to re-enter it the next time they want to purchase something. I use CIM for re-billing my customers monthly. — I can’t use ARB since the billed amounts vary.

SIM allows the credit card number to be passed on the site, the main site does not have to be as secure. When choosing to utilize AIM, you would need to ensure that your site is secure enough. Among other things, you need to have an SSL certificate, which identifies that the site is not a spoof.

Although SIM is rather great as it removes the complexity from your site, it does have its own drawback. Since the user is redirected to another site, there is some loss of continuity to the flow of the site. And despite the ability to configure the page, the user doesn’t have complete control of the page as it is located in the site. This may be enough to turn off some customers to the site and doubt its authenticity.

Both AIM and SIM works perfectly for online payments and it does not really matter much in the end. You can have either and still have a fully functional payment portal. But one can be better suited than the other for a specific site. For smaller sites, SIM is better as it can offload much of the security requirements off the site. For bigger sites, AIM is better as a higher level of security is already expected anyway.

Quick Links

Cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction.

20 kids questions that adults cant answer

20 kids questions that adults cant answer

20 kids questions that adults cant answer

Brain Teasers and Witty Riddles for Kids and Adults

The Questions:

1) Q: What 5-letter word becomes shorter when you add two letters to it?


2) Q: Find a number less than 100 that is increased by one-fifth of its value when its digits are reversed.


3) Q: A farmer is trying to cross a river with a bag of corn, a hen, and a fox. The farmer’s boat is only big enough to take himself and one other item per trip. The hen cannot be left alone with the corn or she will eat it. Likewise the fox cannot be left with the hen, or the hen will be eaten. How does the farmer get all three items across the river?


4) Q: A bat and a ball cost $1.10. The bat costs one dollar more than the ball. How much does the ball cost?


5) Q: What letter comes next in the following sequence? D R M F S L T_


6) Q: Johnny’s Mother had three children. The first child was named April. The second child was named May. What was the third child’s name?


7) Q: A clerk at a butcher shop stands five feet ten inches tall and wears size 13 sneakers. What does he weigh?


8) Q: If you were running a race and you passed the person in 2nd place, what place would you be in now?


9) Q: How many times can you subtract the number two from the number fifty?


10) Q: It’s a stormy night and a plane takes off from JFK airport in New York. The storm worsens, and the plane crashes – half lands in the United States, the other half lands in Canada. In which country do you bury the survivors?


11) Q: In British Columbia you cannot take a picture of a man with a wooden leg. Why not?


12) Q: What word in the English language is always spelled incorrectly?


13) Q: Given these equations, what does 4500 equal?
















14) Q: What’s full of holes but can still hold water?


15) Q: Can you think of a common word that contains double C, double S and double L? Can you think of a second one?


16) Q: What number comes next in the following sequence? 2 4 8 10 20 _


17) Q: Without it, I’m dead. If I’m not, then then I’m behind. What am I?


18) Q: If you wrote all of the numbers from 300 to 400 on a piece of paper, how many times would you have written the number 3?


19) Q: You are in a place called Jack’s World and there is only one law. There is a mirror, but no reflection. There is pizza with cheese, but not sausage. There is pepper, but no salt. There is a door, yet no entrance or exit. What is the law?


20) Q: I come in different shapes and sizes. Parts of me are curved, other parts are straight. You can put me anywhere you like, but there is only one right place for me. What am I?

The Answers:

1) A: Short

2) A: 45 (1/5 of 45 = 9, 9 + 45 = 54)

3) A: The farmer takes the hen across first, and leaves her on the other bank. Next, he comes back, loads the fox onto his boat, and takes him back across the river. He drops off the fox on the opposite bank, picks up the hen, and brings her back to the original bank. He swaps the hen for the corn, and returns to the far bank with the corn – leaving it with the fox. Then, he returns once more to the original bank to get the hen. Once he brings her across, all four are happy to be on the other side!

4) A: The ball costs 5 cents. One dollar more than 5c is $1.05. The sum of which is $1.10.

5) A: D – each letter represents one note in the diatonic musical scale: Do, Re, Mi, Fa, Sol, La, Ti, Do

6) A: Johnny

7) A: Meat

8) A: 2nd Place

9) A: Once. After that, you’d be subtracting from 48.

10) A: You don’t bury survivors!

11) A: You can’t take a picture with a wooden leg; you need a camera.

12) A: Incorrectly

13) A: 2 – Each answer given equals the number of circles present in the numbers. So, 5699 would equal 3 and 4444 = 0

14) A: A sponge

15) A: Successfully. Unsuccessfully.

16) A: 22 (the sequence alternates +2, x2)

17) A: Ahead.

18) A: 120 (100 threes in the hundreds place + 10 threes in the tens place + 10 threes in the ones place)

19) A: Everything (each word) in Jack’s World must contain double letters.

20) A: A jigsaw puzzle piece (how appropriate!)


Optical Illusion: What Do You See in This Picture

Optical Illusion: What Do You See in This Picture – The Camaeleon by Johannes Stoetter. Must credit


20 детских загадок, которые ставят взрослых в тупик.

И где тут логика?!

Многие родители с ужасом признаются, что даже если у них за спиной
есть три высших образования, участие в интеллектуальных играх аля «Что?
Где? Когда?», степень доктора наук, все знания резко куда-то
улетучиваются, когда садишься делать с детьми домашнее задание.

Иногда задачи, шарады, ребусы и загадки, помещенные в школьные учебники,
загоняют в тупик даже именитых знатоков. Всё дело в том, что дети
воспринимают окружающий мир абсолютно не так, как взрослые. Они
смотрят совершенно под другим углом на то, как решить задачу, которая
предстала перед ними. Детишки не ищут специальных схем,
закономерностей, они не сильны в сложных вычислениях, им незнакомы
многие законы, теоремы и аксиомы. Может именно поэтому они щелкают как
орешки те загадки, над которыми взрослые часто сидят битый час.

Сегодня интернет-издание подготовило для тебя уникальную
подборку обычных детских загадок, с которыми малыши справляются в два
счета. А вот взрослые иногда зависают надолго над этими заданиями.
Кажется, у меня сейчас мозг расплавится. Интересно, а ты со всеми
загадками справишься?

Загадки, от которых у взрослых кипит мозг:

  1. Что можно встретить один раз в минуте, два раза в моменте и ни разу в тысяче лет?
     2. Какое колесо не крутится при правом развороте?
  2. Это не живое существо, но у него есть 5 пальцев.
  3. Какое слово начинается с трех букв «Г» и заканчивается тремя буквами «Я»?
  4. Какое слово в словаре написано неправильно?
  5. Грузовик ехал в деревню. По дороге он встретил 4 легковые машины. Сколько машин ехало в деревню?
     7. Мы раним, не двигаясь, мы отравляем, не прикасаясь. Мы можем принести и ложь, и правду, нас никогда не судят по размеру. Кто мы?
     8. Какой рукой лучше размешивать чай?
  6. Накорми меня, и я буду жить, но напои меня – я умру. Кто я?
  7. Кто ходит сидя?
  8. Рождаются – летят, живут – лежат, умирают – уплывают.
  9. Что намокает, пока сушит?
  10. Чем больше из нее берешь, тем больше становится… Что это?
  11. Я всегда где-то между небом и землей, всегда на расстоянии. Если попробовать ко мне подкрасться – я буду удаляться.
  12. Шел муж с женой, брат с сестрой да шурин с зятем. Сколько всех?
  13. Я живу только там, где есть свет, но как только он светит прямо на меня – я умираю.
  14. Что может путешествовать по свету, оставаясь в одном и том же углу?
  15. У какого слона нет хобота?
  16. Вечером мне дают задание наутро. Я всегда его выполняю, но меня все равно ругают. Кто я?
  17. Что всегда увеличивается и никогда не уменьшается?

1. Букву «М»
2. Запасное
3. Перчатка
4. Тригонометрия
5. Неправильно
6. Одна
7. Слова
8. Лучше всего ложечкой
9. Огонь
10. Шахматист
11. Снежинки
12. Полотенце
13. Яма
14. Горизонт
15. Трое
16. Тень
17. Почтовая марка
18. У шахматного
19. Будильник
20. Возраст человека

Быстро справился со всеми этими задачками? Признаться честно, мне
пришлось хорошенько попотеть над некоторыми из них. Если не веришь,
проведи дома такое эксперимент: попробуй сам отгадать эти загадки, а
затем попроси это сделать ребенка.

Уверен, малыш справится с ними намного быстрее и совсем не напрягаясь! Эх, мы, взрослые, всё только
усложняем. И это касается не только решения поставленных задач. Нам бы
всем детскую непосредственность, и жизнь была бы намного проще.
Поделись этими загадками со всеми друзьями.

Пусть расскажут потом о своих впечатлениях и успехах.

Mind Teasers : Tricky Question Of Website Names

Mind Teasers : Tricky Question Of Website Names

1. Facebook
2. Skype
3. Four Square
4. Google +
5. Yahoo
6. Youtube
7. Book my show
8. Ibibo
9. Hotmail
10. Wikipedia

Someone send it by email.

How to apply #CSS #styles only to IE? CSS #Hacks for #IE

CSS Hacks for IE6,IE7,IE8,IE9,IE10,IE11

CSS Hacks for IE6,IE7,IE8,IE9,IE10,IE11

Hack for Internet Explorer (IE) Conditional Comments to fix Internet Explorer when it fails to render content (positions, padding and margins) the same way other modern browsers does


add to .....
<link rel="stylesheet" type="text/css" href="all-ie-only.css" />
.... area of your HTML code.

2)IE conditional comments.

this is an more info on how to target IE6 to IE10.

See specific CSS & JS hacks beyond IE.


/***** Attribute Hacks ******/

/* IE6 */
#once { _color: blue }

/* IE6, IE7 */
#doce { *color: blue; /* or #color: blue */ }

/* Everything but IE6 */
#diecisiete { color/**/: blue }

/* IE6, IE7, IE8, but also IE9 in some cases :( */
#diecinueve { color: blue\9; }

/* IE7, IE8 */
#veinte { color/*\**/: blue\9; }

/* IE6, IE7 -- acts as an !important */
#veintesiete { color: blue !ie; } /* string after ! can be anything */

/* IE8, IE9 */
#anotherone  {color: blue/;} /* must go at the END of all rules */

/* IE9, IE10 */
@media screen and (min-width:0) {
    #veintidos { color: red}

/***** Selector Hacks ******/

/* IE6 and below */
* html #uno  { color: red }

/* IE7 */
*:first-child+html #dos { color: red }

/* IE8 (Everything but IE 6,7) */
html>/**/body #cuatro { color: red }

/* Everything but IE6-8 */
:root *> #quince { color: red  }

/* IE7 */
*+html #dieciocho {  color: red }

/* IE 10+ */
@media screen and (-ms-high-contrast: active), (-ms-high-contrast: none) {
   #veintiun { color: red; }


3)Internet Explorer style hack:

hack via:

    color: #999; /* shows in all browsers */
    *color: #999; /* notice the * before the property - shows in IE7 and below */
    _color: #999; /* notice the _ before the property - shows in IE6 and below */


ol,ul {list-style:none;}
caption,th {text-align:left;}
abbr,acronym {border:0;}



/* Self-clearing Containers /
#container:after, #menu:after {content:”.”;display:block;height:0;clear:both;visibility:hidden;}
#container, #menu {display:inline-block;}
Force IE7 to respect generated content /
Hide the next declaration from IE Mac /
* html #container, * html #menu {height:1%;display:block;}
IE box model hacks */
* html #left, * html #right {width:178px;width:159px;}
* html #center {width:400px;width:380px;}
* html #menu {height:2em;}


About #Poodle #Hack of #SSLv3 and How to Secure Online Business

Poodle Hack of SSLv3New Security Vulnerability Named POODLE was discovered recently.


  • What is poodle stand for sslv3 hack?

    Padding Oracle On Downgraded Legacy Encryption
  • Poodle, which stands for Padding Oracle On Downgraded Legacy Encryption (PDF), is a problem because it’s used by both websites and Web browsers. Both must be reconfigured to prevent using SSL 3.0, and Poodle will remain a problem as long as SSL 3.0 is supported.
  • Google exposes ‘Poodle’ flaw in Web encryption standard …


POODLE Vulnerability: Frequently Asked Questions.

What is the SSLv3 POODLE Vulnerability?
On October 15 Google published details of vulnerability in the design of SSL version 3.0. This vulnerability
allows the plaintext of secure connections to be calculated by a network attacker. The new vulnerability,
named ‘POODLE’, compromises encryption, by forcing a browser or client to use the less secure SSLv3
encryption protocols instead of TLS protocols (eg TLSv1.2). It then carries out a BEAST (Browser Exploit
Against SSL/TLS) attack to obtain information from the encrypted stream.
Is This Really Such a Big Issue?
Yes. Although SSL 3.0 is nearly fifteen years old, support for it remains widespread. Most importantly, nearly all
browsers support it and, in order to work around bugs in HTTPS servers, browsers will retry failed connections
with older protocol versions, including SSL 3.0. Because a network attacker can cause connection failures,
they can trigger the use of SSL 3.0 and then exploit this issue.

Who does Poodle Affect?
Any merchant using Internet Explorer 6 (IE6) to access secure online payment gateways system pages or any merchant whose site or solution uses SSLv3 to post transactions to Authorize.Net.

What should I tell my customers if they ask about POODLE?

You can instruct any concerned customers to visit to confirm if their browser supports SSLv3. It includes instructions on how to disable SSLv3 for all modern browsers.

What to do if i Use Internet Explorer 6?

If you are using a version of Internet Explorer older than 7.0, please visit to upgrade.

Firefox, Safari and Chrome users should not be affected.

Important announcement about POODLE and payment security.

In general I see 3 area where fix needed

1) Server – big or not so big computer called server, where your personal or business website is hosted.

2) Web site, online shopping cart, CMS’s script

3) End user computer’s “user agent” which Browsers.

Ex: Chrome, Firefox, Internet Explorer, Opera, Safari and whatever else you may use.
Most of them need to be fixed manually or you need to wait for provider’s update. While waiting for update you are at rick of being sending unsecured personal information over SSLv3 – in very simple words

1) Server side.

While on server level cpanel, WHM you suggested use this fix:

2)  eCommerce, Shopping Card fixes.

Depend on the online store scripting you need to find line where it say something like this:

curl_setopt ($ch, CURLOPT_SSLVERSION, 3);

and comment it in php code:

//curl_setopt ($ch, CURLOPT_SSLVERSION, 3);

in zen-cart depend on releases it can be in different places

if you have early releases you may also find it here:


between bunch of curl_setopt statmenrts like those:

  curl_setopt ($ch, CURLOPT_SSLCERT, $key);
  curl_setopt ($ch, CURLOPT_CAINFO, $key);
  curl_setopt ($ch, CURLOPT_SSL_VERIFYHOST, false);
  curl_setopt ($ch, CURLOPT_SSL_VERIFYPEER, false);
  curl_setopt ($ch, CURLOPT_SSLVERSION, 3);
  curl_setopt ($ch, CURLOPT_RETURNTRANSFER, true);
Affected files depend on your software releases:
 /includes/modules/payment/paypal/paypal_curl.php around line 58
 /includes/modules/payment/authorizenet_aim.php around line 600
 /includes/modules/payment/authorizenet_echeck.php around line 589
 /includes/modules/payment/paypaldp.php around line 2342
 /includes/modules/payment/linkpoint_api/class.linkpoint_api.php around line 309
 (Line numbers may differ depending on what Zen Cart version you're using)

in x-cart



and others depend on activated modules and releases of your shopping cart.

3) What to tell customers about Browsers on end user computer, “user agent”.

If, as stated by many sources, attack works only on traffic sessions using SSLv3 then transaction with payment gateway cush as Verysign, Google checkout,…  may go throw in case without errors if 1) server side, and 2) CMS scripting level fixed.

But user may/will see unsecured massage on local computer browsers.

it is better then red Error massage Like this: “An error occurred when we tried to contact the payment processor. Please try again, select an alternate payment method, or contact the store owner for assistance. ()(35) error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version number

But still not peasant for user experience on your site.

as for online sellers it will be all over unless end user manually fix or will wait for Browsers to be updated.


How to check your end user’s computer browser to make sure it is not vulnerable?

Open this link in all your browsers and see what it say:

vulnpoodle“If you see a poodle below, then your browser supports SSLv3 via block ciphers, and you may be vulnerable. If you see a Springfield Terrier below, your browser doesn’t support SSLv3, or only supports SSLv3 using stream ciphers.”

If vulnerable every single user may need to consider to manually fix it or being unsecured with all your online payment, form submitting proses.

How long to wait to update browser?

FireFox announce it will update by November 24-26 2014, some other browser next year, some did not announse SSLv3 at all, like Apple always does.

Poddle SSLv3 safesite

Poddle SSLv3 safesite

Random Notes for more read about Poodle Hack of SSLv3

Please notice underline some phrases which important to think about.

  • Vulnerability in SSL 3.0 Could Allow Information Disclosure

    List of affected Microsoft software:

    One of the sugessted solutions form Microwoft is to “FIX” your local computer, which is only up to you and you can do it on your own rick.  I will do it after November 4 when some payment gateway processors will stop supporting SSLv3.
    If i will have problem i will try this solution:

    For Client Software

    You can disable support for the SSL 3.0 protocol on Windows by following these steps:

    1. Click Start, click Run, type regedt32 or type regedit, and then click OK.
    2. In Registry Editor, locate the following registry key:HKey_Local_Machine\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\ClientNote If the complete registry key path does not exist, you can create it by expanding the available keys and using the New -> Key option from the Edit menu.
    3. On the Edit menu, click Add Value.
    4. In the Data Type list, click DWORD.
    5. In the Value Name box, type Enabled, and then click OK.Note If this value is present, double-click the value to edit its current value.
    6. In the Edit DWORD (32-bit) Value dialog box, type 0 .
    7. Click OK. Restart the computer.

    Note This workaround will disable SSL 3.0 for all client software installed on a system.

    Note After applying this workaround, client applications on this machine will not be able to communicate with other servers that only support SSL 3.0.

  • The attack works only on traffic sessions using SSLv3. Although this is an old protocol that has been replaced in many client and server configurations with TLS (Transport Layer Security), many browser clients and web servers that use TLS for connections still support SSLv3.
    Some products and browsers, like Internet Explorer 6 for Windows XP, only use SSLv3. There are also clients that support SSLv3 as an alternative to use whenever a TLS connection to a web server fails.
    An attacker could exploit this compatibility to downgrade a connection to SSLv3 and then conduct the POODLE attack to hijack your session.Google’s security team has recommended that systems administrators simply turn off support for SSLv3 to avoid the problem. But this will mean that some users trying to connect securely to a web server using SSLv3 will have trouble connecting if they’re using a client that only supports this protocol.
  • SSL 3.0 is nearly 18 years old, but support for it remains widespread. Most importantly, nearly all browsers support it and,in order to work around bugs in HTTPS servers, browsers will retry failed connections with older protocol versions, including SSL 3.0. Because a network attacker can cause connection failures, they can trigger the use of SSL 3.0 and then exploit this issue.Disabling SSL 3.0 support, or CBC-mode ciphers with SSL 3.0, is sufficient to mitigate this issue, but presents significant compatibility problems, even today. Therefore our recommended response is to support TLS_FALLBACK_SCSV. This is a mechanism that solves the problems caused by retrying failed connections and thus prevents attackers from inducing browsers to use SSL 3.0. It also prevents downgrades from TLS 1.2 to 1.1 or 1.0 and so may help prevent future attacks.

    “This attack is really against clients—you have to worry about it if you’re in a place like Starbucks,” says Rob Graham, CEO of Erratasec. “If you’re at home there’s probably no one man-in-the-middling you except the NSA. So as a home user, you don’t need to panic. As a server [administrator], you probably don’t need to panic if your customers are coming in over home connections. Only if they’re coming in over [something like] a Starbucks Wi-Fi.”…Source:

More to come later

Find and Replace Text in MySQL Database

How to Find and Replace Text in MySQL Database using SQL query.

Find and Replace Text in MySQL Database

REPLACE is a function that returns the string text_string with all occurrences of the string from_string replaced by the string to_string, where matching is case-sensitive when searching for from_string.

text_string can be retrieved from the a field in the database table too. Most SQL command can be REPLACE() function, especially SELECT and UPDATE manipulation statement.


update TABLE_NAME set FIELD_NAME = replace(FIELD_NAME, ‘find this string’, ‘replace found string with this string’);

update customer_table set company_name = replace(company_name, ‘The Wolf of Wall Street”, ‘The Tiger of Wall Street’);

This MySql query/statement will replace all instances of ‘The Wolf of Wall Street’ to ‘The Tiger of Wall Street’ in the field of company_name of customer_table table.



One more small and useful query.

Rename or change name of MySQL table.

To rename an existing MySQL table, with or without data in it, it is no problem. One simple command will change the table’s name:


you can find more here too:

Heartbleed Security Update

Originally posted on News:

Last week, a very serious bug in OpenSSL was disclosed.  OpenSSL, a set of open source tools to handle secure communication, is used by most Internet websites.  This bug, nicknamed Heartbleed, allowed an attacker to read sensitive information from vulnerable servers and possibly steal things like passwords, cookies, and encryption keys.

Was vulnerable to Heartbleed?

Yes. servers were running the latest version of OpenSSL, which was vulnerable. We generally run the latest version of OpenSSL to enable performance enhancements, such as SPDY, for our users. The non-vulnerable versions of OpenSSL were over two years old.

Has fixed the issue?

Yes. We patched all of our servers within a few hours of the public disclosure.

Has replaced all SSL certificates and private keys?

Yes. Out of an abundance of caution, we have replaced all of our SSL certificates, along with regenerating all of the associated…

View original 98 more words

How to Avoid Answering the Questions? 9 ТЕХНИК УХОДА ОТ ПРЯМОГО ВОПРОСА

How to Avoid Answering Questions You Cannot Answer

How to Avoid Answering Questions You Cannot Answer

1. Ask the person who asked you the question another question. They’ll respond to your question and hopefully forget about their own.

2.  Take your cell phone out and pretend you got a call. Try to become so involved with it, they’ll forget about the question, or get bored and decide to find somebody else to talk to.

3. Be honest. Simply say, “I’m not sure how to answer that.” If it’s somebody that really cares about you, they will drop the question.



1. Можно задать встречный аналогичный вопрос или вопрос из совершенно другой области. Пусть вас посчитают плохо воспитанным – душевный комфорт дороже. Знаменитости и политики именно так поступают с навязчивыми вопросами репортеров.

2. Если вопрос не достаточно корректно поставлен, его можно оставить без ответа. Сделайте вид, что не расслышали или не поняли, о чем идет речь. Парируйте вопрос шуткой, юмор всегда уместен.

3. Если природа одарила вас даром красноречия, лейте воду. Чем больше слов, ни к чему вас не обязывающих, тем лучше. Отвечайте на прямой вопрос так, чтобы запутать собеседника. «Отзеркальте» вопрос, мысленно поставив собеседника на место.

4. На один вопрос задайте массу уточняющих вопросов. Делайте это с искренним выражением лица, чтобы убедить человека в заинтересованности. Это обескуражит оппонента.

5. Выясните, почему собеседник задает этот вопрос. Какую цель он преследует? Цели бывают благородными и низкими. Таким образом вы полностью переключите внимание на своего оппонента.

6. Если не хотите отвечать на прямой вопрос или не знаете ответ, польстите собеседнику, похвалив его за находчивость и ум. Между тем незаметно переведите разговор в другое русло.

7. Предложите обсудить постановку данного вопроса, переформулировав его и плавно переведя разговор из допроса в диспут.

8. Проигнорируйте неудобный вопрос или ответьте: «Не знаю, я не задумывался над этим». Нагло заявите собеседнику, что вам это не интересно и «Вместо этого поговорим о тебе».

9. Грубо оборвите собеседника, дав ему понять, что он переходит дозволенные границы приличия. В крайнем случае, можно повысить тон и пойти на конфликт – цель оправдывает средства.