Sunday, 25 September 2011

Demand Non-Hackable Operating Systems NOW (and Don't Excuse Them)!!!

Just demand non-hackable Operating Systems right away because you can, of course, by fairly simple means, control every stream of information going in and out of your computer (to the internet). Thus, most dubiously and most exposed, even the snippet on the pornsite that requests outgoing information can be blocked!
Heck, it may not even need to be allowed to do anything in particular either because it's not taking part in safe conventions of programming! Ultimately, you need to explicitly want the malware, virus and spyware and nobody wants that!

The internet should become very safe in near future if corruption isn't insisted upon and crucial services like ISP, services servers (like your bank) and general routing (leave the "telephone-centrals" alone, uttered by the French!) are safe (guaranteed)! It really takes high level intervention to make this corruption work and it should become obvious every time it happens!!!

So why is this, the information in and out of the system, mixed into an inoperable pool of idiocy by Mozilla Firefox and others? When indeed this could have been laid out nicely and orderly!

Just like Microsoft is adding thousands of services and snippets of programming and offering these for free when indeed crucial, but small programs are being ignored! This is nothing less the subversion of the population at large!

No wonder nowadays then that when one orders 50$ of firewall and anti-virus/-malware/-spyware it feels like sponsoring employment programs for idiots!

(I'm having problems with listing Microsoft as a tag on this post! Is the publicity? :-) )
(Also, concerning some mal-delineation, my host is being generous with the editor that I'm writing this into.)

39 comments:

  1. One is usually very eager to point out "good hacking" or "the possibility to get the bad guys", but the lesson is this, it should first be private _before_ it becomes public and it usually takes a felony and the action of legitimate Police force to deal with it! Generally, the vigilante argument therefore falls and also, usually, it should take an inside job, social action of the seducive kind, to open it, burst an illegitimate activity/server!

    ReplyDelete
  2. Just to mention some tricks for removing some corruption: you need "clean" "Code Blocks" in order to make a "clean" Firefox (because you need to _know_ that no illicit code is added in the coding process)! The time has come for demanding hard reporting criteria from these "well-meaning" IT-advocates! (And seeing to it that these reports are open enough to ensure what should happen next!)

    ReplyDelete
  3. I've posted this to Free Software Foundation and Mozilla Foundation on Facebook by its entire writing (incl. comments)! Every important person should be able to know about it in a few days time!

    ReplyDelete
  4. Also put to: https://answers.launchpad.net/launchpad/+question/172290 !

    ReplyDelete
  5. There are good possibilities for making the very datastreams analysable by the very plug-in or program or snippet that want information in or out! You can also make this requirements! There will be no excuses of the kind "...but it's port 80!" or "...it's a separate part of the program!" or "...it's not clear what it is doing!". Generally, thus, everything that's not transparent to the user (including the notification that it's code relevant for security to https or other security protocol as this is indeed plausible for this or these website(s)!

    ReplyDelete
  6. _All_ programs, by code, no matter how small, should be identified by the Firewall by it's wanton to let a stream of information go out into the internet! This can and should be done!

    ReplyDelete
  7. The above includes snippets of all kinds, all plug-ins, all API and the rest! (No exceptions are made!)

    ReplyDelete
  8. Now an essential question: What do we need from the Internet? The answer should be graphics, video, audio and all sorts of texts! So why is it that in order to produce this, we are met with all sorts of techno-babble and word-dressing (just so these people can pass as smart)! No, these idiots are laying ordinary consumers (of IT) bare for the sake of exploiting people's personal data and what have you! I, thus, share this first question and its answer with other people who have voiced it! The World isn't right! Class action lawsuit now?! So as you set up your internet connection, you should be given three options out of this:
    -Wired (router or not) - always safe
    -Wireless (closed network, possible physical adm. setting) - safe
    -Wireless (open network and unsafe settings) - unsafe (only for experts and IT curious people?)
    Agree?

    ReplyDelete
  9. And don't you tell me that Microsoft sits there and "oinks itself like a sh*thead pig over troubles with Excel-sheets and safe internet integration" as we are supposed to believe in their BLATANT lies! Like we are supposed to believe certain scopes of programming "were open by accident", you filthy f*cks!

    ReplyDelete
  10. Just a tip for the common user in this world, by protection from US American interests: You can now, in Windows 7, use a Netstat worthy program by the built-in Firewall, to _block_ and all else certain programs that lit up as _outgoing_ without having an excuse to do so. Even then, if you think you're not worth attention, just think you ARE, and begin to block them, who you choose to block, fx. Realshare, and then your work can proceed more predictably! Enjoy! We have delivered them the first blows because I think they've been pushed to make the users reclaim their autonomy! Good?

    ReplyDelete
  11. There are other points too, like not trusting the Firefox with your bookmarks, indeed for the Firefox, I go totally blank, there is nothing there that is particular and I try to use the safest mode all the time, considering they're part of the U. S. American iron-grip club "against the World", so to speak! We need to fight these idiots and make World symmetry and World autonomy happen! Good?

    ReplyDelete
  12. Besides, there is a standing and urgent (as much as Amnesty Int.) that you mirror and monitor (to approve for your country) all the stuff Mozilla and other "good"/"well-meaning" U.S. American club entities and others are doing to the World! Make sure you follow them, and DON'T leave them your blindside, please!

    ReplyDelete
  13. Sorry, correction for the above concerning "Windows Netstat", Resource Monitoring. It lies on this path: Controlpanel\All elements...\Information about and tools for monitoring performance\Advanced tools . Good?

    ReplyDelete
  14. Besides, I'm thinking about CPU monitoring because there you can identify some "illegal" processes that are 1. net-specific and 2. you haven't explicitly _allowed_ them to run! One way to go: KILL THE RELEVANT processes (and give the company a tab too)! Alright?

    ReplyDelete
  15. On Updating Programs
    If you consider Updates for computer programs then don't. They use Updates for replacing the settings file with an "open mode" settings file, fx., that allows for unwanted information flows, whether directly for hackers to enter or more innocent, like obtaining a bit of information! A 1. point for now: be very conscious of your firewall program and learn to configure it correctly and also _remove_ the Telnet and remote "help" and protocols options (usually some RPCSS or so, Remote Procedure Call) from the set-up of your firewall! Surf yours! Cheers!
    (One funny and highly dubious detail with (my) Windows 7 is that Microsoft insists on two accounts of "system users" to be present, Service and Interactive, without giving any reasoning for such, like a simple message at start of Update to open for these two accounts in case they are deactivated! They may just as well be semi-criminal, the way they do business!)
    Please, remember the main message of this text: don't update naively! Be also quick to configure each and every program you install. This may be stressful in the beginning, but the rewards are great in the long run! Alright?

    ReplyDelete
  16. There is a large list as parallel over at the other blog as well, controversial777.blogspot.com ! Be (internet-)aware, please!

    ReplyDelete
  17. It may be also that Microsoft allows/"allows" for internet users to utilise Wubi or partition tool of other kind to _destroy_ the dual boot-up systems of competition, i.e., largely Linux partitions! Take them, take them! Make them pay! Cheers!

    ReplyDelete
  18. I think this happens through the Microsoft partition! That they use the Microsoft partition to get to the Linux partitions!

    ReplyDelete
  19. I read that Adobe wants you too "always update" because may be attacked _through PDF files_! How the heck is that possible? Could be attacked through DOC file, RTF file and TXT file (not to mention the Open Office files)? There is something strange going on here and I think this lingers on borders between the corporate secrets, the engineering groups working on standards and how the various systems work together, i.e., lack of communication (of the honest kind)! Check it out yourself! Cheers! (Note on the U. S. American Club!)

    ReplyDelete
  20. _you_ may be attacked through PDF files... Sorry for the typo.

    ReplyDelete
  21. 1. Don't forget your own easily accessible tools: run... -> cmd -> ping/ipconfig/_nslookup_/netstat [domain/IP]. You can also check this webpage: http://maketecheasier.com/fix-network-problems-in-windows-7/2011/02/08 !
    2. You /can/ also block, by Resource Monitoring under Computer Administration, Adobe Acrobat Upd. Serv. (abbr.), MobileDeviceService (by Apple), Bonjour Service, Spooler Subsystem App. (abbr.), Google Installer, Java (TM) Upd. Sched. (abbr.), iTunes Helper, iPod Service, Windows Media Player Netw. Sharing Service, RealNetworks (this or that app.) and finally Windows Driver Foundation - Host... Once you have done this you have committed yourself to a more active and _demanding_ system where you need to enable some of these to make certain services run again, like iTunes. What I find rude, is that these processes insist on running _the whole time_! Why do they do that??? There's probably no answer because they like to hide the fact that they moping about (with their programming or more... Sociop...?)! Do your own, please and take care! Cheers!

    ReplyDelete
  22. Be hard on the fact that you are _the God_ of your computer! Nothing happens without your direct command, by approval of "yes, execute!"

    ReplyDelete
  23. Shared by/gotten by people by "words on the winds", one can also envision a "purge" command button that strips the system of ALL unusual activities, even down to the bare system demands incl. browser and some more! What do you think?

    ReplyDelete
  24. Be careful with the Microsoft Windows Live ID Service. This can halt your internet-browsing! You can, however, stop the Mic. Win. Live ID Serv. _Monitor_ w/o too much problems...

    ReplyDelete
  25. Besides, is there any progress on the Case (in the Courts) against Microsoft, "we the people of Europe CHARGE Microsoft with..."??? Be sure to double-check the progress and also make some public if you care, please!

    ReplyDelete
  26. It's incredible also how Microsoft *dis*allows the obvious opportunity to block domain address or IP address from this monitoring tool of resources under Computer Administration directly. No, when you sit there and see your services-protocol begin f*cked with, they actually *DENY* you the opportunity to BLOCK it! I just say, THERE IS MORE THAN ENOUGH TO TAKE MICROSOFT *NOW*!!! Let them pay up and let us elsewhere in the World provide something better without their extrovert *subversion*!!!

    ReplyDelete
  27. But let's do it again! -> http://commandwindows.com/tcpiputil.htm They are simple tools, but they are VERY useful!
    Nslookup , Netsh , Netstat , Pathping , Tracert , Ping , IPConfig . Just enter these commands directly in there without fear. It can be great fun to see what you get! Cheers!

    ReplyDelete
  28. The final nail to this case: within two years I will have the definite answer for the above, including the integrity of it, to make its user able to gain oversight over every internet connection and the respective protocols being used without any particular problem. I must assert this, though, that I'm given fair working space including personal security! Do you agree that you can do it if you're given the programmer's prize from the best university in the World? Cheers!

    ReplyDelete
  29. The above is given by my relatively little programming experience (Red Hat 5.1, 1998, Win 3.1, 1995(?)) against THE most successful IT-company in the World with its full choice amongst the absolute best IT-brains in the World! They've had the luxury to pick the best from everywhere in the World, yet they claim "code". This is pathetic for a number of reasons! Cheers!

    ReplyDelete
  30. Coming in from Facebook, first written there, guns blazing, like a fighter of WW2:
    From Wikipedia, let's correct the Win 3.1 to 1992. Sorry.
    I must also admit possession of C64/128, of the Commodore brand. (*blush*, but it was a nice toy for a boy, not yet 16) This was a version of Commodore with a particular whitish design, the back of it, elongated and sliding down a little... Ahh... those were the days... (space invaders *blazing lasers and the other typical sounds*) Cheers!

    ReplyDelete
  31. From the posting on the other blog and further down:
    Just to provide a _clear_ pathway to the "Netstat" equivalent: Controlpanel\All elements in Controlpanel\Administration -> Performance -> The first link in the first section -> Open Resource Monitoring (or something thereof) and that's it! You should now see 4 possible sections further: CPU, Disk, Network and Memory! Good?

    ReplyDelete
  32. You may be greatly rewarded by disabling the Service user that's automatically set up by Microsoft, under Users under Computeradministration. I believe now that Microsoft is doing damage-control! EU Courts, beware, and put the cuffs on as soon as possible! (But I believe we have them by historical events and also the contemporary flow of events. We'll see where this goes!)

    ReplyDelete
  33. It may be also that Microsoft allows/"allows" for internet users to utilise Wubi or partition tool of other kind to _destroy_ the dual boot-up systems of competition, i.e., largely Linux partitions!
    I think this happens through the Microsoft partition! That they use the Microsoft partition to get to the Linux partitions!
    Take them, take them! Make them pay! Cheers!

    ReplyDelete
  34. One notice more:
    when Adobe claims a format for documents, PDF-files, they have an obligation to trust an encryption/encoding _only_ and _not_ these two: 1. passive code called upon by a system - a passive "worm" and 2. active code used by a system - an active "worm". If they insist otherwise, they are dubious, undoubtedly, just another "crack-head" enterprise from USA to the World!
    Later in history, Adobe has come to incorporate java-scripts to the files, and likewise, they have the _explicit_ duty to keep these java-code to the package of Adobe Reader and _not_ with the files themselves. So, _optionally_, when the files open, the _program_ can look for the fields to change by a mere _identifier_ code in the files and _not_ the active/passive code within the files themselves! Any good? Cheers!

    ReplyDelete
  35. Concerning Adobe Acrobat Reader: Why don't they simply use the message channel or email instead of an update channel, constantly running on the processor? (Eh... eh... too little corruption then, eh... eh...? Hah-hah, you've been taken again!!!)

    ReplyDelete
  36. This goes for all other update agents. At least some of them require the user to approve when they should run!!!

    ReplyDelete
  37. Another solution for remote-service Wi-Fi computing to any workplace:

    Usually, the hook-up has gone directly to the work-place server, but I think a different solution can be to hook-up indirectly to a server-in-between so that all input gets qualified by exactly this server. This makes it impossible to change critical server-settings/configuration (by fx. new installment of software, illicitly). And routine work can be done relaxed from distance at your convenience without much risk. Like it?

    Note: This follows the robot-programming of these generators that has strict programming attached to them, making them virtually impossible to set to overdrive and other because the /qualified/ input information doesn't allow it to happen! No, the hackers are defeated for sure!
    Note2: AppArmor has initially been set up in addition to various other efforts. The excuses from Microsoft and others are about to run out!

    PS: So much stress for some registries, text, accounting program, pictures, audio and video! A personal computer and people become hysterical!

    ReplyDelete
  38. The thing is that all of us on the early server age for internet, i.e., have had most of it coming down to earth as we've been sitting there and discussing all of this, concluding that, given the minimum of computing standard of quality, all hacking would be gone and one issue remaining, the legal matters of transmitting information to which Java would be set up. The server-archives can be checked for this, just go and see for yourself... The Firewall, the security protocols, the e-mail on the clients, the rest...

    ReplyDelete