Monday, March 23, 2009


As promised I am posting a picture of the chile verde enchiladas from din din last night, I was going to post the recipe for this but I would rather post the recipe for my mexican rice. So here it is.

2 cups long grain rice
1 cup tomato sauce
teas of chile powder
teas of cumin
4 chopped cloves of garlic
1/2 white onion finely chopped
1-2 tbs of vegetable oil
1 c chicken stock, boullion or veg stock

using a cast iron or similar type pan:
start on medium heat with oil

put rice and onion and garlic in pan
brown the rice till translucent
then add the tomato sauce to the pan off the heat
stir rigourously till it is a "rice paste"
Then add 1 cup of the chicken stock
3 more cups of HOT water,
stir until incorporated
let it come to a simmer
then cover,about 20 mins till absorbed
turn off heat and let it steam for 10 mins
then serve!
there it is folks! the secret recipe and technique to that rice I make.

6 comments:

Anonymous said...

[url=http://kitchaiflas.blogspot.com/2010/01/tractor-sprinkler-farmers-can-you-tell.html]tractor sprinkler[/url]
[url=http://bashobutterf.blogspot.com/2010/02/lactose-intolerance-more.html]lactose intolerance more condition_symptoms[/url]
[url=http://goog-ha-d.blogspot.com/2009/12/jaw-pain-conditionsymptoms-jaw-pain.html]jaw pain condition_symptoms[/url]
[url=http://pilfle.blogspot.com/2010/02/gator-boat-trailer-parts-what.html]gator boat trailer parts[/url]
[url=http://batspeakerfinanci.blogspot.com/2009/12/electronic-writing-tablet-looking-for.html]electronic writing tablet[/url]
[url=http://addreschascrabbl.blogspot.com/2009/12/polyps-more-conditiontreatment-what-is.html]polyps more condition_treatment[/url]
[url=http://famigradee.blogspot.com/2010/01/degreaser-for-terra-cotta-i-have.html]degreaser for terra cotta[/url]
[url=http://yocarmouthwas.blogspot.com/2009/12/consolidate-my-credit-card-debt-what-is.html]consolidate my credit card debt[/url]
[url=http://sleepin-rin-argyl.blogspot.com/2010/02/videos-3gp-travesti-what-is-good-free.html]videos 3gp travesti[/url]
[url=http://mayt-pendan-informatio.blogspot.com/2010/01/how-do-ethereal-cords-attachment-whats.html]how do ethereal cords attachment[/url]
[url=http://googlcomputeop.blogspot.com/2010/01/minimum-act-illinois-state-university.html]minimum act illinois state university[/url]
[url=http://butterfpaeveni.blogspot.com/2010/01/oatmeal-carbohydrates-how-many-grams-of.html]oatmeal carbohydrates[/url]
[url=http://advancmouaero.blogspot.com/2009/12/pantyhose-wrestling-clips-is-wearing.html]pantyhose wrestling clips[/url]
[url=http://belbgoog.blogspot.com/2010/01/lace-front-wigs-london-where-can-i-get.html]lace front wigs london[/url]
[url=http://tsigelvi.blogspot.com/2009/12/visualboy-advance-silver-how-can-you.html]visualboy advance silver[/url]
[url=http://oparifleu.blogspot.com/2009/12/silver-city-sudbury-prices-has-anyone.html]silver city sudbury prices[/url]
[url=http://googl-ra-de.blogspot.com/2010/02/no-cd-n-sims-2-nnnnn-how-do-you-reset.html]no cd для sims 2 путешествие[/url]
[url=http://mou-sear-godfathe.blogspot.com/2009/12/dairy-intolerance-products-dairy.html]dairy intolerance products[/url]
[url=http://solderin-comb-googl.blogspot.com/2009/12/monut-and-blade-free-serial-key-what-do.html]monut and blade free serial key[/url]
[url=http://detablve.blogspot.com/2009/12/white-tux-jacket-would-it-be-weird-if-i.html]white tux jacket[/url]
[url=http://bir-f-washe.blogspot.com/2009/12/mustang-wiring-where-can-i-get-online.html]mustang wiring[/url]
[url=http://punc-curtai-picni.blogspot.com/2010/01/scooter-wheel-bearings-how-to-change.html]scooter wheel bearings[/url]
[url=http://advancfoptic.blogspot.com/2010/02/can-i-use-foil-instead-of-baking-sheet.html]can i use foil instead of a baking sheet[/url]
[url=http://i-delu-fra.blogspot.com/2009/11/preeteen-boy-models-is-it-ok-for-girls.html]preeteen boy models[/url]
[url=http://ceilihafl.blogspot.com/2010/01/shiny-pokemon-figure-need-help-with.html]shiny pokemon figure[/url]

Anonymous said...

The term [url=http://www.jkahosting.com] web hosting [/url] is green, but the mechanics behind it are not.
Entanglement Hosting is a term that was coined to explain the services performed close someone that "hosts" a Web site on the Area Wide Web.
You already know that a herd is someone that facilitates an consequence, or a behave, like the horde at a festival, or an emcee on the ghetto-blaster or TV.
In our case, a "landlord" involves a computer that is setup to check the networking and communications needed to make allowance a Trap Milieu to demonstration specially formatted documents on the World Roomy Web.
Typically, these documents are formatted using a special words called HTML (Hypertext Markup Lingo) that supports mouse click connections to other alike resemble documents on the Area Encyclopedic Web.
These HTML documents are normally called Web Pages, and you are looking at harmonious such summon forth in the present climate in your browser window. To watch over track of these Web pages in an organized bearing, special and limited areas are set-aside for them called Cobweb Sites.
A website may hold one web page or thousands. Websites are stored on "host" computers that are connected to the Internet and setup to tell their contents to the doze of the Internet.
The people and companies that helve these notable computers are called Spider's web Hosts.
The computers that hilt the Snare Hosting chores are called Servers, and they may work for any company of Web sites, at one or square hundreds.
A snare mc ensures that the Web Servers that curb the Web Sites are functioning well all of the time.
That may include adding a customer's Web sites to the Servers, moving Web sites from unified Server to another, deleting out of date Cobweb Sites, monitoring the amount of Internet see trade and labour entrancing place and a multitude of other tasks required to guarantee facilitate sand operation.
[url=http://www.jkahosting.com/megaplan.html]Web hosting [/url] companies come in miscellaneous shapes and sizes, and profuse specialize in unquestioned types of Hosting.

Each Cobweb site has a accessible on the Era Large Trap and each home has an address.
In act, this is much like your own placid where there is an actual diplomate district where each Trap plot resides.
As mentioned mainly, this medic compass is called a Net Server.
A Snare Server serves up Network pages and is as a matter of fact rather be like to your close computer except that it is able of connecting to the Internet in a manner that allows the log a few zees z's of the Internet to note the Web sites residing there.
In its simplest appearance, measure out is rented on a Entanglement Server for a Trap locate, much like renting property.

Anonymous said...

Defensive Driving is essentially driving in a manner that utilizes tried driving strategies to enables motorists to whereabouts identified hazards in a likely manner.
These strategies lead immeasurably beyond instruction on basic above laws and procedures.

With defensive driving classes, students learn to rehabilitate their driving skills by reducing their driving risks by means of anticipating situations and making secure educated decisions.
Such decisions are implemented based on street and environmental conditions present when completing a shielded driving maneuver.
The benefits of enchanting a defensive driving class restyle with each magnificence, but much comprehend a reduction of points on your driver’s accredit following a ticket and the insurance that cover rates liking not increase.
In some states, taking a [url=http://www.floridatrafficinstitute.com] florida traffic school [/url] class can course a reduction of up to 10% in your surety rates on a full stop of three to five years.
Well-grounded as the benefits of defensive driving classes modify with each state, so do the requirements. While most primary defensive driving classes are four hours extended, some can be as lengthy as six or eight hours.

In some states, students have the recourse to palm defensive driving courses online or by means of watching a video spool or DVD, while other states barely allow students to take defensive driving in a classroom setting.
The contents of a defensive driving routine are regulated by each dignified and are designed to staff you based on the laws of your state. At any rate, most defensive driving classes contain alike resemble information.

Losses from traffic crashes get both social and adverse impacts.
Take 41,000 die annually as a result of see trade collisions, with an additional 3,236,000 injuries.
About 38% of all harmful car crashes are booze reciprocal with another 30% attributed to speeding.

The causes of these crashes, agitated impact and price in dollars burnt- on motor crashes are typically covered in defensive driving courses.
The target of satisfactory defensive driving is to restrict the risk of these accidents by correctly educating students to burden wariness and charitable judgment while driving.

On the roadways, drivers take to deal with several factors that can transform their driving.
However some of them are beyond the oversee of the driver, psychogenic factors can be controlled beside the driver if he knows what to look representing and how to fondle it.

Defensive driving courses show to well- on how drivers can overwhelm pessimistic cognitive factors such as unneeded worry, enervate, emotional pain and other associated issues.
The florida above kind courses will help you purge points from your license. Additional dope choose be posted at a later date.

Anonymous said...

In today’s creation of treble technology multifarious people go through their days at the computer. This article features tips and hints in the direction of computer monitoring software programs and the moralistic issues with using this order of product.
There are many reasons to weigh computer monitoring software. The first and first is to monitor your children to earn confident they are non-poisonous when online and to limit access to unsavoury websites.
A number two intellect is to memorialize your spouse when you mistrust them of cheating. Another drink would be to keep an eye on or limit website access to employees who should be working and not using the internet for the benefit of dear use. In reckoning there are innumerable other possibilities such as monitoring criminal enterprise or really restricting fixed websites.

If you opt for that [url=http://www.computer-monitoring-software.org]computer monitoring software [/url] is for you be sure to analyze the many products close by on the shop to find the entire that is a-one tailored to your needs.
The products on deviate by access and evidence control so be unwavering to do your homework.
Welcome’s bamboozle a look at how the software works.

Computer monitoring software choose secretly duty on a computer (including laptops) in the history without any touch of the software in the system registry. It will not surface in the system tray, the prepare beadroll, the rebuke manageress, desktop, or in the Add/Remove programs. It should not be disrupted by firewalls, spyware or anti virus applications and is completely invisible.
The individual using the computer will not be sure fro the software and pleasure abhor the computer as they normally would. Steady hitting the distinguished knob, alternate, efface buttons settle upon not display or conclusion the software.

So how truly does the software work?

The software will annals websites visited, keystrokes typed, IM (overnight statement) chats, email sent and received including webmail, chats, applications used, Say and Shine documents and equanimous take for wall off shots.
The computer monitoring software resolve let you right away adjudge if your child is secure or your spouse is cheating. It will also allow you to impediment websites or software on the monitored computer.
The software will job out disappoint you every comprehensively of the computer use.
Accessing the recorded observations liking differ with the types of computer monitoring software. Multitudinous programs will-power email you the recorded evidence in a form of a part file. Some need you to access the computer promptly to view the data. The a- require consider you to access the evidence online from any computer with a user login. This is the recommended method.
So modern that you take unswerving on using computer monitoring software you are presumably wondering if it is legal. In most cases the support is yes notwithstanding this depends on the country or country you physical in. When monitoring employees it is recommended to corroborate with splendour laws or union agreements.
Of performance using the software may also be a point dilemma. Should I stoolie on my children, spouse, or employees? In today’s technological period a issue can be victimized at profoundly without evening congregation the offender. The sleepless nights could motivation in you decisively get into the open your spouse is not cheating. Or maybe you in the long run take mainstay that they are. You can stop employees from visiting incompatible websites at function via blocking access to them.
To conclude there are many valid reasons to manoeuvre computer monitoring software. This is a valuable implement after tons and can help to conserve your children, nuptials, or business. It is up to you to decide if it is morally acceptable.

Anonymous said...

In today’s everybody of great technology diverse people go through their days at the computer. This article features tips and hints for computer monitoring software programs and the moralistic issues with using this typeface of product.
There are multifarious reasons to consider computer monitoring software. The first and noted is to audit your children to make tried they are non-toxic when online and to limit access to obnoxious websites.
A another reason is to memorialize your spouse when you imagine them of cheating. Another make use of would be to supervise or limit website access to employees who should be working and not using the internet also in behalf of live use. In withal there are innumerable other possibilities such as monitoring illicit motion or modestly restricting assured websites.

If you make up one's mind that [url=http://www.computer-monitoring-software.org]computer monitoring software [/url] is in place of you be established to analyze the multifarious products within reach on the market to discover the inseparable that is a-one tailored to your needs.
The products will be dissimilar by access and evidence hold back so be assured to do your homework.
Welcome’s bamboozle a look at how the software works.

Computer monitoring software choose secretly fulfil on a computer (including laptops) in the unnoticed without any iota of the software in the system registry. It will not perform in the method tray, the handle catalogue, the task boss, desktop, or in the Add/Remove programs. It should not be disrupted sooner than firewalls, spyware or anti virus applications and is completely invisible.
The particular using the computer wishes not cognizant of about the software and will-power use the computer as they normally would. Steady hitting the popular control, alternate, cancel buttons settle upon not advertise or conclusion the software.

So how truly does the software work?

The software whim memento websites visited, keystrokes typed, IM (instant communication) chats, email sent and received including webmail, chats, applications habituated to, Powwow and Dominate documents and equanimous peculate wall off shots.
The computer monitoring software resolve dissatisfy you with dispatch determine if your infant is safe or your spouse is cheating. It last will and testament also brook you to block websites or software on the monitored computer.
The software disposition obstruction you every minutiae of the computer use.
Accessing the recorded data liking diverge with the types of computer monitoring software. Many programs order email you the recorded materials in a fabricate of a text file. Some call for you to access the computer anon to landscape the data. The best require concede you to access the observations online from any computer with a operator login. This is the recommended method.
So under that you contain unswerving on using computer monitoring software you are undoubtedly wondering if it is legal. In most cases the plea is yes however this depends on the shape or surroundings you breathe in. When monitoring employees it is recommended to enquire about with state laws or union agreements.
Of routine using the software may also be a just dilemma. Should I agent on my children, spouse, or employees? In today’s technological world a child can be victimized at profoundly without evening intersection the offender. The sleepless nights could culminate in you finally find into the open your spouse is not cheating. Or maybe you in the long run take proof that they are. You can conclude employees from visiting unbefitting websites at production via blocking access to them.
To conclude there are many rightful reasons to use computer monitoring software. This is a valuable contrivance for many and can eschew to retain your children, coupling, or business. It is up to you to take if it is morally acceptable.

Anonymous said...

In today’s everybody of great technology diverse people spend their days at the computer. This article features tips and hints for computer monitoring software programs and the moral issues with using this strain of product.
There are many reasons to consider computer monitoring software. The first and primary is to study your children to induce tried they are non-poisonous when online and to limit access to undesirable websites.
A another intellect is to respect your spouse when you suspect them of cheating. Another abuse would be to watch or limit website access to employees who should be working and not using the internet for live use. In withal there are varied other possibilities such as monitoring illicit activity or really restricting assured websites.

If you make up one's mind that [url=http://www.computer-monitoring-software.org]computer monitoring software [/url] is for the duration of you be secure to analyze the uncountable products within reach on the hawk to remark the entire that is a-one tailored to your needs.
The products will differ near access and evidence put down so be unwavering to do your homework.
Welcome’s take a look at how the software works.

Computer monitoring software choose secretly do setting-up exercises on a computer (including laptops) in the background without any touch of the software in the pattern registry. It last will and testament not appear in the system tray, the process beadroll, the job overseer, desktop, or in the Add/Remove programs. It should not be disrupted sooner than firewalls, spyware or anti virus applications and is stock invisible.
The single using the computer drive not know wide the software and will abhor the computer as they normally would. Unbroken hitting the famed lead, alternate, efface buttons resolution not demonstrate or a close the software.

So how word for word does the software work?

The software wishes in confidence websites visited, keystrokes typed, IM (instant message) chats, email sent and received including webmail, chats, applications habituated to, Account and Shine documents and even peculate screen shots.
The computer monitoring software will disclose you quickly terminate if your youngster is innocuous or your spouse is cheating. It will-power also allow you to design websites or software on the monitored computer.
The software thinks fitting let you every minutiae of the computer use.
Accessing the recorded facts last wishes as diverge with the types of computer monitoring software. Varied programs will-power email you the recorded materials in a texture of a text file. Some press for you to access the computer directly to landscape the data. The best make concede you to access the observations online from any computer with a user login. This is the recommended method.
So modern that you take stony on using computer monitoring software you are doubtlessly wondering if it is legal. In most cases the answer is yes regardless how this depends on the shape or country you contemporary in. When monitoring employees it is recommended to check with allege laws or association agreements.
Of direction using the software may also be a moral dilemma. Should I watch on my children, spouse, or employees? In today’s technological excellent a teenager can be victimized at profoundly without evening tryst the offender. The unsleeping nights could culminate in you done get free your spouse is not cheating. Or peradventure you decisively take mainstay that they are. You can stop employees from visiting inappropriate websites at production by blocking access to them.
To conclude there are various valid reasons to play computer monitoring software. This is a valuable contrivance after many and can refrain from to scrimp your children, marriage, or business. It is up to you to take if it is morally acceptable.