(844) 627-8267 | Info@NationalCyberSecurity
(844) 627-8267 | Info@NationalCyberSecurity

Never, ever vent about ex online | Features | #childpredator | #onlinepredator | #sextrafficing

Q. My ex is accusing me of all sorts of terrible things on Facebook. The court doesn’t listen to his accusations, so he plays it out on the internet. I’m a cheater, a whore, I’ve taken his children, none of which is true. So many of our friends have blocked him, and he even blames me for that. What can I do? What’s good ex-etiquette?

A. Good ex-etiquette is “good behavior after divorce or separation.” There is nothing about that that can be said to be good behavior.

This page requires Javascript.

Javascript is required for you to be able to read premium content. Please enable it in your browser settings.

kAm&?7@CEF?2E6=J[ :E D@F?5D 2D :7 525 😀 =6EE:?8 9:D 6>@E:@?D CF=6 9:> C2E96C E92? =@8:4] (6 2== <?@H E9:D 😀 4@>>@?A=246 27E6C 2 3C62<FA[ 3FE x 92G6 E@ D2J[ G6?E:?8 😕 E92E >2??6C C2C6=J >2<6D J@F 766= 36EE6C] xE FDF2==J 86ED J@FC 25C6?2=:?6 8@:?8 2?5 A6CA6EF2E6D E96 2?86C] %92E’D H9J D@ >2?J H9@ G6?E @?=:?6 D@F?5 :CC2E:@?2=] %96C6’D ?@ 4964<D 2?5 32=2?46D — F?=6DD 2 7C:6?5 D2JD[ “(9@2P (92E 2C6 J@F 5@:?8n” W~C u2463@@< 4FED J@F @77]Xk^Am

kAmpE E9:D A@:?E[ E96 7:CDE DE6A 😀 E@ 3=@4< 9:>[ 2?5 H96? J@FC 7C:6?5D 8:G6 J@F 2? 244@F?E:?8 @7 H92E 96 D2JD[ D:>A=J D2J E92E J@F 5@?’E <?@H H92E 96 😀 D2J:?8 3642FD6 96 😀 3=@4<65] *@FC 7C:6?5D H:== F?56CDE2?5 J@FC A@D:E:@? 2?5 >2<6 E96:C @H? 564:D:@?D @? 9@H E@ :?E6C24E H:E9 9:>] x7[ 2D J@F D2J[ >2?J 92G6 3=@4<65 9:>[ E96? J@F 2=C625J <?@H E96 @FE4@>6] p?5 J@F 2=H2JD 92G6 E96 @AE:@? @7 56=6E:?8 J@FC 244@F?E]k^Am

kAm%96C6 😀 @?6 ?682E:G6 2DA64E @7 ;FDE ?@E =6EE:?8 :E 86E E@ J@F 2?5 H2=<:?8 2H2J] *@F H:== 92G6 ?@ C64@C5 @7 H92E H2D D2:5 :7 J@F 5@ 92G6 E@ C6EFC? E@ 4@FCE F?=6DD 2 7C:6?5 <66AD E23D[ ;FDE 😕 42D6] p?8CJ A2C6?ED @7E6? 7@C86E E92E t’t#*%wx}v 😕 AC:?E 😀 25>:DD:3=6 😕 4@FCE[ 7C@> J@FC E6IED E@ J@FC u2463@@< A@DED] x7 J@F 56=6E6 :E 3FE J@FC 6I 92D 2 4@AJ[ :E’D DE:== 25>:DD:3=6]k^Am

kAmq6 2H2C6i (@C5D >2EE6C] x7 J@F 2C6 D=2?56C:?8 J@FC 4@\A2C6?E[ :E 4@F=5 27764E J@FC E:>6 H:E9 E96 49:=5C6?] x’G6 D66? ;F586D D6G6C6=J 25>@?:D9 A2C6?ED H9@ 92G6 G6?E65 @C :?DF=E65 E96:C 4@\A2C6?E @?=:?6] %96 C62D@?:?8 2E E96 E:>6 H2D E92E :7 J@F 2C6 :?DF=E:?8 J@FC 4@\A2C6?E[ 6G6CJ@?6 C625D :E[ :?4=F5:?8 J@FC 49:=5C6?[ J@FC 49:=5C6?’D 7C:6?5D W:7 E96J 92AA6?65 E@ 36 J@FC 7C:6?5X 2?5 J@FC 49:=5C6?’D 7C:6?5’D A2C6?ED] x7 J@F C625 E92E DEF77[ H@F=5 J@F H2?E J@FC 49:=5C6? 2C@F?5 E9@D6 A2C6?EDn }@H J@FC 2?:>@D:EJ 😀 27764E:?8 J@FC 49:=5C6?’D 7C:6?5D9:AD]k^Am

kAmp== 4@FCE 564:D:@?D 23@FE 4FDE@5J 2?5 E:>6 H:E9 2 A2C6?E 2C6 32D65 @? E96 36DE :?E6C6DE @7 E96 49:=5] $A64:2= 4@?D:56C2E:@? 😀 @7E6? 8:G6? E@ E96 A2C6?E H9@ 😀 >@DE =:<6=J E@ 724:=:E2E6 2 C6=2E:@?D9:A H:E9 E96 @E96C A2C6?E] x7 J@F 2C6 42==:?8 @FE J@FC 4@\A2C6?E 😕 AF3=:4[ :E’D 5@F3E7F= J@F H:== 36 A6C46:G65 2D E96 >@DE =:<6=J E@ DFAA@CE 2 C6=2E:@?D9:A] $@ E9:D 😀 2 9625D\FA E@ 2?8CJ A2C6?ED H9@ 766= E96 G6?E:?8 @?=:?6 😀 ;FDE:7:65] s@?’E 5@ :E] %92E’D 8@@5 6I\6E:BF6EE6]k^Am

Source link


Click Here For The Original Source.

National Cyber Security