Wednesday 25 April 2012

Various Designs (Temporary - Delete?)

"Text to ignore: A kind of dump, follows: Various Designs This whole (web-)page of my writings belongs to my person, i.e., © Terje Lea 2006 - 2011. Make no mistake about it! The Arc - The Leap Fun-park mechanics, beauty of architecture and mechanics combined While the original drawing has been lost, I've made this, a new one: Note: this is only a temporary drawing until I've produced something better which is obviously needed. The texts on the drawing read: "Transfer of hinge point from top to bottom" Various small ones: "Drawings", "Side profile", "vehicle", "vehicle landing" "Front profile", "structure supporting front and rear rails/carriers", "supporting legs/structure" "Can be fitted with a natural swinging "wheel", making 2 turns to complete the leap, using "old-fashioned"(?) wiring with a single drive system! Good?" I have made a drawing of this. It is like an arc that you can jump through. You do not exactly jump, you are lifted up by machinery into maximum speed a quarter through the arc and glides over the top at almost no speed and taken down with full speed again a quarter before the other side of the arc. You land as you took off, at almost stand still. Construction is like the following. The vehicle is attached at the top for the first half and at the bottom at the second half. Some of the security rail intersects so the vehicle safely travels through the transformation point of being attached at the top to the bottom. By Terje Lea, April 17, 2006 with a small update of drawing and comment, 26.12.2010. Texts of the drawing added 16.01.2011. Songtext: "I Found God Today" Inspired by the song text by Aha and some lyrics re-used. Inspired also by the music by Diva thus this is a kind of a twist on "The Sun Always Shines on TV". I think the music can be brushed quite a deal compared to the music by Diva, but the rhythm is reflected in my own lyrics presented here. The Lyrics for the song: Unreal what I see How can it be? You must believe me! The sun always shines on TV I reached inside myself and found God today The energies of my mind flies away I leave my worries afar Hold me Close to your heart Together we find God! Touch me Give yourself to me Unreal what I see I reached inside myself and found God today The energies of my mind flies away I leave my worries afar The reflections gaze at me in remembrance of yesterday as I drift through time, I have found a way to keep my troubles down Unreal what I see The sun always shines on TV By Terje Lea, April 24, 2009 and May 6, 2011. Your Basic Explorer Tools of Internet Investigation! I'd like to make a neat graphical interface to the usual tools of Traceroute, Ping and the others. This interface should as well as being useful, be a powerful tool for educating people about the tools offered. By Terje Lea, January 29th, 2010. Serve Your Friend! A simple container for transfer of files on a Peer-to-Peer basis. You dump files into a container/folder and ship it off to a contact. The program is supposed to have the usual buttons and it doesn't really represent anything new. It's just on the background of the Pirate Bay-case in Sweden that you may do this in the similar manner you switch calling cards or phone number or email addresses beyond the possibility of profit to any party except as a black market tool on a strictly private basis. A kind of the idealistic file transfer option of Skype. By Terje Lea, January 29th, 2010. Equip Your Computer! A kind of software white list firm for supervising approved software and advising identifiable social groups in making ready to use software on an effective, economic basis, balancing those two factors. Possibly with personal advise-service on a VIP basis. This is supposed to be mediated through a website. By Terje Lea, January 29th, 2010. AI Browser Companion, Title for program isn't determined. This is meant to be an AI client running in parallel with the user's own browsing and possibly as long as the internet connection is working. This can be viewed both as a computer science experiment for Turing-learning of the user's browsing pattern and for producing a kind of reports based on that pattern. This can represent a great chance for investigating machine-learning software of syntactic kind to produce semantic content for the user. The other side represents a more effective internet connection use and browsing session by generating content while the user wants to relax and read a book. The AI runs the pattern and generates reports on general topics of f.x. "contemporary philosophy", "processors", "IBM company" and whatever else you can think of and be interested in. By Terje Lea, January 29th, 2010. Personal Browser Assistant, Title for program isn't determined. This is slightly some of the same as the AI browser companion, but without the AI machine. This is more an archiving program to run in connection to the browser of generating reports on general topics of f.x. "contemporary philosophy", "processors", "IBM company" and whatever else you can think of and be interested in. In deleting the browser history in the browser, but keeping the browser history in this Assistant, you can build up a large memory bank of your interests archived in a nice way (to be determined). It's basically the same reporting as the AI, but it is supposed to work only toward the browser itself, never undertaking independent browsing as it takes the links and some of the content from the browser and the browsed pages. I think this represents an increased security feature because you can describe and define the datastream to and from the Assistant much more strictly than you can for the browser to the internet. The connection to the Assistant can be almost foolproof, I think, by a very conservative regime. By Terje Lea, January 29th, 2010. Medicine, Regrowing/Regenerating Limbs and Tissue in General I think one should begin with making a mold and fit it so that contact with blood-filled veins can eat at it, allowing cells to form in accordance to phantom feelings and regrow/regenerate the limb or whatever. These cells would form just as cells divide, bursting out the template of a companion cell. Blood actually, by nature, eats away left-overs from wounds and organic material, at times, that is wrongly produced by the body, fx., benign cancers in some cases. This may not be well known. I certainly think there are good biodegradable substances that can be fitted with a biodegradable outer layer, skin, that make sure the whole thing grow as planned, emphasising to lesser degrees the matrix involving pigs' bladders, utilising the inherent capacity of the human body of regrowing/regenerating. I've seen a report on CBS 60 Minutes about the molds of regeneration medicine. In addition, I've also seen a report on the possibility of regrowing/regenerating tissue in the breast by making a special implant. By Terje Lea, February 7th, 2010, February 8th, 2010 and February 21st, 2010. Software, True to Code Linux, possibly Ubuntu based I'm thinking it can be useful to make slight alterations to the Ubuntu system so that it generates a parallel logging process for everything/selected processes. This can be terminal sessions, system to UI firewall, system to browser, system to OSSEC, system to whatever. In this way, learning Linux/Ubuntu can be inspiring and transparent and has the possibility of generating greater interest and more developers to the system. I certainly encourage this to be done! It's meant to be done by simultaneously generating a standard text-type document where the code is displayed that runs the process in question. The whole "True to Code Linux" can very well be only an option in the OS, a program running at start-up or integrated in the system itself with parameters set for it. The created output of the feature shouldn't produce much size on the harddisk either, being only a kind of simple text-type. It should also generate a quick way of copying and pasting code one may find useful or perhaps a kind of code-lookup file. There should be many ways of incorporating this. As a beginner with Ubuntu, at least with code, I find the use of code somewhat "demanding"/"time-consuming" until I'm properly familiar with it, which may take quite a long time (years?). But by this, you get the document produced and recorded where you can go back and pick up what has been used in the past. Perhaps one can also incorporate a kind of option in it that marks the code you'd like to store for future uses in a new document (most conveniently building a code book of your most used codes, to the terminal or otherwise). I mean the actual code that runs. I see problems (obviously) with expressing code for a new process (starting the firewall) because it necessarily isn't displayed in the "parallel text registry (PTR)" in true time, but can rather be displayed as "firewall start-up [not true time]" then . So yes, possibly all the code that's relevant both to the specific program and to the system in some limited way (because I do think there may be problems of getting it all shown in parallel text. The most promising may be in expression of selected processes, only one or a few at a time, but potentially all. I want to see all the code running for a specific process. If you choose to display the terminal session and you type in something that initiates another process, then this other process requires another "display of code"/PTR. This is the suggestion that all code is potentially displayed (and registered and recorded for later uses)! Is there a problem with displaying the actual code before it is compiled? I think there should still be a fine possibility for carrying the project through by making displayed equivalents to the compiled computer/machine code language. Isn't this so? I've tagged this thread with "code transparency" and I really think that it should be beneficial to have those 6 million lines, not in true time, but after you've logged on as a "code report [not in true time]". I agree to some objection, but there may be benefits of having ticked off an option in "True to Code Linux"-feature, you can have the review as you like, specified down to the process you like and all the rest. It may take very hard work, but I still think there are great rewards to be reaped by doing it this way, possibly, not necessarily. It's alright! I just like to share the idea with people that it may be nice to have the "code-equivalent" in a text-file, going one process at the time, carefully, and having the possibility to review all the processes in this fashion, by ticking off the option. It should come with great benefits. I see this possible specific uninterest, but think about the other processes, everyone of them, not in a pile of code in a dump of ".zip"/".tar"-file, but neatly put there, yours, (lovely) code report of "process X"! Mmm... yes, a cup of Ubuntu coffee! By Terje Lea, February 9th, 2010 and February 10th, 2010. Poem: "At a Loss" You have always looked so good in blue The sun shining at you so sweet You always have seemed to understand the light beams Let me kiss you I think you're so neat But now you have gone away I have lost you By Terje Lea, February, 20. 2010. Song: "Vi er gode" Melody: "Vi er røde, vi er hvite" og "engelsk sang, ukjent" Vi er gode / Vi er glade / Og alt synger på vår vei / (to be continued, lalalalala) By Terje Lea, February, 22. 2010. Computing: "Anti-hacking of wi-fi routers, designation of IP-address to existing and pre-approved/designated clients only" I've seen a report of hacking of a wi-fi network that has been made by a Danish producer. I think in large parts this can be avoided by setting log-in attempts to 3, perhaps a few more, and to designate/send IP-address by the wi-fi router wirelessly to existing and pre-approved/designated clients only. Possibly, if the administrator somehow fails the log-in attempts, then one can set the system to require physical access to ensure physical security. By this, you deny any incidental hook-ups to the network even by chance, making the system very safe. You should be able to design this system this way, optionally or as default to ensure security. You can also open a time frame for logging on new users for authentication and then close this frame by ticking off the box for existing users in a TTL - time to live, manner. Fx. you allow a 1/one hour window for a new user to log on to this wi-fi router. In this time frame, everyone can attempt to log on, but this window will only primarily be known to the administrator and the new user. Not only will a potential intruder have to be in physical range to this wi-fi router, but the intruder will also have to use the correct user-name and password and I believe that all these options combined will make this virtually impossible to hack/make illegal entrance to. In essence therefore, I'd like there to be four/4 box options: 1. Allow only pre-approved users. 2. Allow only 3 (or more) attempts for log-in. 3. Allow only existing users to log on in addition to new users within a time frame. 3.1/4. Once new users have logged on, close the appropriate number of IP-addresses for log-in possibility/authentication. Fx. 1 new user is opened for to the wi-fi router. Once this user has logged on/been identified as user the wi-fi router closes for all other detected wi-fi unknown/unwanted users. A possible intruder will either then be presented with a false log-in possibility or a page announcing no log on possibility/closed wi-fi router. By Terje Lea, April, 23. 2010 and April, 24. 2010. Economy: A Suggestion for Financial Instruments to European Economies Belonging to the Euro System A suggestion for financial instruments to European economies belonging to the Euro system: all debt to the Euro countries are controlled by the EU Commission. As the EU Commission respond to the requirement of additional resources (money), it oversees the repayment of the loans back into the ECB/Euro/EU treasury. So I don't see the problem why any economy in the Euro-zone should have to pay expensive rates on their loans unless it's in the interest of the Euro-zone. Therefore, in a sense, the EU Commission can control the levels of debt, economic sanctions of each Euro member state and the inflation of the Euro itself, parallel to ECB's interest rate control! Cheers to Europe! (I see no reason why this can't be applied to all EU states, just slightly differently.) Note: this has first been written on my blog, http://www.angelfire.com/realm/t_daemon_lea/blogT/ and on the Philosophy Now forum. By Terje Lea, April, 29. 2010 and April, 30. 2010. Det Kriminelle Norge - Hyllest til Black Debbath Tittel: Det Kriminelle Norge - Hyllest til Black Debbath (Title: The Criminal Norway - Tribute to Black Debbath (transl. Black Debate, loosely, can also play on the dipping of children into the iron cauldron, a bath), a Norwegian band) Notat: Det er meningen at denne sangen skal synges på norsk slik som Black Debbaths vokalist synger sangene (Note: It's the intention that this song is to be sung in Norwegian like the lead singer of Black Debbath sings the songs) Det kriminelle Norge vil ha verden i dets hand (The criminal Norway wants the world in its hand) Og det gjør vi ved tortur av barn og menneskehandel! (And we do that by torturing our children and human trafficking) Våres praksis er mer korrupsjon enn profesjon! (Our practice is more corruption than profession!) Det kriminelle Norge vil ha verden i dets hand (The criminal Norway wants the world in its hand) Våre lover og vårt demokrati er bare formalitet! (Our laws and our democracy is just formality!) Det kriminelle Norge vil ha verden i dets hand (The criminal Norway wants the world in its hand) Og kjøper vi ikke verden, dere tullinger, med vårt kriminalitetsfremmende oljefond?!! (And don't we buy the world, you fools, with our crime promoting oil fund?!!) Det kriminelle Norge vil ha verden i dets hand (The criminal Norway wants the world in its hand) Slutt (for nå) End (for now) (Det er mulig jeg skriver mer på denne sangen!) (It's possible I write more on this song!) Two examples of Black Debbath performance: Mongo Norway. Mongo in Norwegian is a scornful remark alluding to an idiot/dumbass and in the past also to people with Down's Sydrome because of their facial features in similarity to the people of Mongolia. Even though he's singing smuget means danger in Norwegian, it's actual meaning is back alley (assumably where dirty things take place). Mongo Norway (A Guide To Nightlife In Oslo) is the title of the song and Smuget is a former pub/nightclub in Oslo. Det er problemer innad i Høyre! (There are many more, just search for the band name.) By Terje Lea, May, 6. 2010 and May, 8. 2010. Computing, Lock Network Connection on Completed Download or by Default Set by Rule Let's imagine this can be done in Firstarter, as there already is a fine lockdown option there: A kind of RULE: on [program/service] exit/completion of download - then lockdown connection [usually the eth0]. [Edit:] Or for that matter, put a lockdown action on any premise like inactivity on port 80 or such... (all the rest). Note: this has first been written by myself under the pseudonym Aetixintro (as usual) on Ubuntuforums.org, 02.10.2010. By Terje Lea, 14.10.2010 Computing, Arbitrary or Generic Folder Names in Operating Systems I think there is a possibility for making all the folder names in an operating system generic (and thus enhancing security) by making a central folder registry that updates on changes in the folder structure. Even this central registry can be placed arbitrarily by deploying it as a registry with an agent that reports itself to the proper place in the operating system. I mean, a person new to the Operating System would not have a chance going into this unknown "sea" of folders over the internet (from where, you know, everything begins with an unknowing starter). Generative names can applied to the folder tree by the input of some crazy user preferences for names or dates or whatever. On upgrading or updating, one can simply relay the location of this central registry. Or if one has lost the position of this registry, one can perform a search for it on beforehand to get its location. It may be that this registry has to have a certain name or belong to a special kind of files, ie. exe, reg, whatever... Note: this has first been written by myself under the pseudonym Aetixintro (as usual) on brainstorm.ubuntu.com today. By Terje Lea, 14.10.2010 Computing, An Alternative to User Accounts - User Levels I find one can set password priorities against run-levels, ie. system critical, security, system utilities and so forth. Classification of programs can be set on a user-preference basis, specifying possibly programs for the upper level passwords. Higher level user accounts can be set with the default set of prok"

Various Designs

This whole (web-)page of my writings belongs to my person, i.e., © Terje Lea 2006 - 2011. Make no mistake about it!
The Arc - The Leap
Fun-park mechanics, beauty of architecture and mechanics combined

While the original drawing has been lost, I've made this, a new one:


Note: this is only a temporary drawing until I've produced something better which is obviously needed.
The texts on the drawing read:
"Transfer of hinge point from top to bottom"
Various small ones: "Drawings", "Side profile", "vehicle", "vehicle landing"
"Front profile", "structure supporting front and rear rails/carriers", "supporting legs/structure"
"Can be fitted with a natural swinging "wheel", making 2 turns to complete the leap, using "old-fashioned"(?)
wiring with a single drive system! Good?"

I have made a drawing of this. It is like an arc that you can jump through. You do not exactly jump, you are lifted up by machinery into maximum speed a quarter through the arc and glides over the top at almost no speed and taken down with full speed again a quarter before the other side of the arc. You land as you took off, at almost stand still.

Construction is like the following. The vehicle is attached at the top for the first half and at the bottom at the second half. Some of the security rail intersects so the vehicle safely travels through the transformation point of being attached at the top to the bottom.

By
Terje Lea,
April 17, 2006 with a small update of drawing and comment, 26.12.2010. Texts of the drawing added 16.01.2011.
Songtext: "I Found God Today"

Inspired by the song text by Aha and some lyrics re-used.
Inspired also by the music by Diva thus this is a kind of a twist on "The Sun Always Shines on TV".
I think the music can be brushed quite a deal compared to the music by Diva, but the rhythm is reflected in my own lyrics presented here.

The Lyrics for the song:
Unreal what I see
How can it be?
You must believe me!
The sun always shines on TV

I reached inside myself and found God today
The energies of my mind flies away
I leave my worries afar

Hold me
Close to your heart
Together we find God!
Touch me
Give yourself to me

Unreal what I see
I reached inside myself and found God today
The energies of my mind flies away
I leave my worries afar
The reflections gaze at me in remembrance of yesterday
as I drift through time,
I have found a way to
keep my troubles down

Unreal what I see
The sun always shines on TV

By
Terje Lea,
April 24, 2009 and May 6, 2011.
Your Basic Explorer Tools of Internet Investigation!

I'd like to make a neat graphical interface to the usual tools of Traceroute, Ping and the others. This interface should as well as being useful, be a powerful tool for educating people about the tools offered.

By
Terje Lea,
January 29th, 2010.
Serve Your Friend!

A simple container for transfer of files on a Peer-to-Peer basis. You dump files into a container/folder and ship it off to a contact. The program is supposed to have the usual buttons and it doesn't really represent anything new. It's just on the background of the Pirate Bay-case in Sweden that you may do this in the similar manner you switch calling cards or phone number or email addresses beyond the possibility of profit to any party except as a black market tool on a strictly private basis. A kind of the idealistic file transfer option of Skype.

By
Terje Lea,
January 29th, 2010.
Equip Your Computer!

A kind of software white list firm for supervising approved software and advising identifiable social groups in making ready to use software on an effective, economic basis, balancing those two factors. Possibly with personal advise-service on a VIP basis. This is supposed to be mediated through a website.

By
Terje Lea,
January 29th, 2010.
AI Browser Companion, Title for program isn't determined.

This is meant to be an AI client running in parallel with the user's own browsing and possibly as long as the internet connection is working. This can be viewed both as a computer science experiment for Turing-learning of the user's browsing pattern and for producing a kind of reports based on that pattern. This can represent a great chance for investigating machine-learning software of syntactic kind to produce semantic content for the user. The other side represents a more effective internet connection use and browsing session by generating content while the user wants to relax and read a book. The AI runs the pattern and generates reports on general topics of f.x. "contemporary philosophy", "processors", "IBM company" and whatever else you can think of and be interested in.

By
Terje Lea,
January 29th, 2010.
Personal Browser Assistant, Title for program isn't determined.

This is slightly some of the same as the AI browser companion, but without the AI machine. This is more an archiving program to run in connection to the browser of generating reports on general topics of f.x. "contemporary philosophy", "processors", "IBM company" and whatever else you can think of and be interested in. In deleting the browser history in the browser, but keeping the browser history in this Assistant, you can build up a large memory bank of your interests archived in a nice way (to be determined). It's basically the same reporting as the AI, but it is supposed to work only toward the browser itself, never undertaking independent browsing as it takes the links and some of the content from the browser and the browsed pages. I think this represents an increased security feature because you can describe and define the datastream to and from the Assistant much more strictly than you can for the browser to the internet. The connection to the Assistant can be almost foolproof, I think, by a very conservative regime.

By
Terje Lea,
January 29th, 2010.
Medicine, Regrowing/Regenerating Limbs and Tissue in General

I think one should begin with making a mold and fit it so that contact with blood-filled veins can eat at it, allowing cells to form in accordance to phantom feelings and regrow/regenerate the limb or whatever. These cells would form just as cells divide, bursting out the template of a companion cell.

Blood actually, by nature, eats away left-overs from wounds and organic material, at times, that is wrongly produced by the body, fx., benign cancers in some cases. This may not be well known.

I certainly think there are good biodegradable substances that can be fitted with a biodegradable outer layer, skin, that make sure the whole thing grow as planned, emphasising to lesser degrees the matrix involving pigs' bladders, utilising the inherent capacity of the human body of regrowing/regenerating.

I've seen a report on CBS 60 Minutes about the molds of regeneration medicine. In addition, I've also seen a report on the possibility of regrowing/regenerating tissue in the breast by making a special implant.

By
Terje Lea,
February 7th, 2010, February 8th, 2010 and February 21st, 2010.
Software, True to Code Linux, possibly Ubuntu based

I'm thinking it can be useful to make slight alterations to the Ubuntu system so that it generates a parallel logging process for everything/selected processes. This can be terminal sessions, system to UI firewall, system to browser, system to OSSEC, system to whatever. In this way, learning Linux/Ubuntu can be inspiring and transparent and has the possibility of generating greater interest and more developers to the system. I certainly encourage this to be done! It's meant to be done by simultaneously generating a standard text-type document where the code is displayed that runs the process in question. The whole "True to Code Linux" can very well be only an option in the OS, a program running at start-up or integrated in the system itself with parameters set for it. The created output of the feature shouldn't produce much size on the harddisk either, being only a kind of simple text-type. It should also generate a quick way of copying and pasting code one may find useful or perhaps a kind of code-lookup file. There should be many ways of incorporating this.

As a beginner with Ubuntu, at least with code, I find the use of code somewhat "demanding"/"time-consuming" until I'm properly familiar with it, which may take quite a long time (years?). But by this, you get the document produced and recorded where you can go back and pick up what has been used in the past.

Perhaps one can also incorporate a kind of option in it that marks the code you'd like to store for future uses in a new document (most conveniently building a code book of your most used codes, to the terminal or otherwise).

I mean the actual code that runs. I see problems (obviously) with expressing code for a new process (starting the firewall) because it necessarily isn't displayed in the "parallel text registry (PTR)" in true time, but can rather be displayed as "firewall start-up [not true time]" then .

So yes, possibly all the code that's relevant both to the specific program and to the system in some limited way (because I do think there may be problems of getting it all shown in parallel text. The most promising may be in expression of selected processes, only one or a few at a time, but potentially all.

I want to see all the code running for a specific process. If you choose to display the terminal session and you type in something that initiates another process, then this other process requires another "display of code"/PTR. This is the suggestion that all code is potentially displayed (and registered and recorded for later uses)!

Is there a problem with displaying the actual code before it is compiled? I think there should still be a fine possibility for carrying the project through by making displayed equivalents to the compiled computer/machine code language. Isn't this so?

I've tagged this thread with "code transparency" and I really think that it should be beneficial to have those 6 million lines, not in true time, but after you've logged on as a "code report [not in true time]". I agree to some objection, but there may be benefits of having ticked off an option in "True to Code Linux"-feature, you can have the review as you like, specified down to the process you like and all the rest. It may take very hard work, but I still think there are great rewards to be reaped by doing it this way, possibly, not necessarily.

It's alright! I just like to share the idea with people that it may be nice to have the "code-equivalent" in a text-file, going one process at the time, carefully, and having the possibility to review all the processes in this fashion, by ticking off the option. It should come with great benefits.

I see this possible specific uninterest, but think about the other processes, everyone of them, not in a pile of code in a dump of ".zip"/".tar"-file, but neatly put there, yours, (lovely) code report of "process X"! Mmm... yes, a cup of Ubuntu coffee!

By
Terje Lea,
February 9th, 2010 and February 10th, 2010.
Poem: "At a Loss"

You have always looked so good in blue

The sun shining at you so sweet

You always have seemed to understand the light beams

Let me kiss you

I think you're so neat

But now you have gone away

I have lost you

By
Terje Lea,
February, 20. 2010.
Song: "Vi er gode"
Melody: "Vi er røde, vi er hvite" og "engelsk sang, ukjent"

Vi er gode / Vi er glade / Og alt synger på vår vei / (to be continued, lalalalala)

By
Terje Lea,
February, 22. 2010.
Computing: "Anti-hacking of wi-fi routers, designation of IP-address to existing and pre-approved/designated clients only"

I've seen a report of hacking of a wi-fi network that has been made by a Danish producer. I think in large parts this can be avoided by setting log-in attempts to 3, perhaps a few more, and to designate/send IP-address by the wi-fi router wirelessly to existing and pre-approved/designated clients only. Possibly, if the administrator somehow fails the log-in attempts, then one can set the system to require physical access to ensure physical security. By this, you deny any incidental hook-ups to the network even by chance, making the system very safe. You should be able to design this system this way, optionally or as default to ensure security. You can also open a time frame for logging on new users for authentication and then close this frame by ticking off the box for existing users in a TTL - time to live, manner. Fx. you allow a 1/one hour window for a new user to log on to this wi-fi router. In this time frame, everyone can attempt to log on, but this window will only primarily be known to the administrator and the new user. Not only will a potential intruder have to be in physical range to this wi-fi router, but the intruder will also have to use the correct user-name and password and I believe that all these options combined will make this virtually impossible to hack/make illegal entrance to.
In essence therefore, I'd like there to be four/4 box options:
1. Allow only pre-approved users.
2. Allow only 3 (or more) attempts for log-in.
3. Allow only existing users to log on in addition to new users within a time frame.
3.1/4. Once new users have logged on, close the appropriate number of IP-addresses for log-in possibility/authentication. Fx. 1 new user is opened for to the wi-fi router. Once this user has logged on/been identified as user the wi-fi router closes for all other detected wi-fi unknown/unwanted users. A possible intruder will either then be presented with a false log-in possibility or a page announcing no log on possibility/closed wi-fi router.

By
Terje Lea,
April, 23. 2010 and April, 24. 2010.
Economy: A Suggestion for Financial Instruments to European Economies Belonging to the Euro System

A suggestion for financial instruments to European economies belonging to the Euro system: all debt to the Euro countries are controlled by the EU Commission. As the EU Commission respond to the requirement of additional resources (money), it oversees the repayment of the loans back into the ECB/Euro/EU treasury. So I don't see the problem why any economy in the Euro-zone should have to pay expensive rates on their loans unless it's in the interest of the Euro-zone. Therefore, in a sense, the EU Commission can control the levels of debt, economic sanctions of each Euro member state and the inflation of the Euro itself, parallel to ECB's interest rate control! Cheers to Europe! (I see no reason why this can't be applied to all EU states, just slightly differently.)

Note: this has first been written on my blog, http://www.angelfire.com/realm/t_daemon_lea/blogT/ and on the Philosophy Now forum.

By
Terje Lea,
April, 29. 2010 and April, 30. 2010.
Det Kriminelle Norge - Hyllest til Black Debbath

Tittel: Det Kriminelle Norge - Hyllest til Black Debbath
(Title: The Criminal Norway - Tribute to Black Debbath (transl. Black Debate, loosely, can also play on the dipping of children into the iron cauldron, a bath), a Norwegian band)
Notat: Det er meningen at denne sangen skal synges på norsk slik som Black Debbaths vokalist synger sangene
(Note: It's the intention that this song is to be sung in Norwegian like the lead singer of Black Debbath sings the songs)

Det kriminelle Norge vil ha verden i dets hand
(The criminal Norway wants the world in its hand)

Og det gjør vi ved tortur av barn og menneskehandel!
(And we do that by torturing our children and human trafficking)


Våres praksis er mer korrupsjon enn profesjon!
(Our practice is more corruption than profession!)

Det kriminelle Norge vil ha verden i dets hand
(The criminal Norway wants the world in its hand)


Våre lover og vårt demokrati er bare formalitet!
(Our laws and our democracy is just formality!)

Det kriminelle Norge vil ha verden i dets hand
(The criminal Norway wants the world in its hand)


Og kjøper vi ikke verden, dere tullinger, med vårt kriminalitetsfremmende oljefond?!!
(And don't we buy the world, you fools, with our crime promoting oil fund?!!)

Det kriminelle Norge vil ha verden i dets hand
(The criminal Norway wants the world in its hand)

Slutt (for nå)
End (for now)

(Det er mulig jeg skriver mer på denne sangen!)
(It's possible I write more on this song!)

Two examples of Black Debbath performance:
Mongo Norway. Mongo in Norwegian is a scornful remark alluding to an idiot/dumbass and in the past also to people with Down's Sydrome because of their facial features in similarity to the people of Mongolia. Even though he's singing smuget means danger in Norwegian, it's actual meaning is back alley (assumably where dirty things take place). Mongo Norway (A Guide To Nightlife In Oslo) is the title of the song and Smuget is a former pub/nightclub in Oslo.
Det er problemer innad i Høyre!
(There are many more, just search for the band name.)

By
Terje Lea,
May, 6. 2010 and May, 8. 2010.
Computing, Lock Network Connection on Completed Download or by Default Set by Rule

Let's imagine this can be done in Firstarter, as there already is a fine lockdown option there:
A kind of RULE: on [program/service] exit/completion of download - then lockdown connection [usually the eth0].

[Edit:] Or for that matter, put a lockdown action on any premise like inactivity on port 80 or such... (all the rest).

Note: this has first been written by myself under the pseudonym Aetixintro (as usual) on Ubuntuforums.org, 02.10.2010.

By Terje Lea, 14.10.2010
Computing, Arbitrary or Generic Folder Names in Operating Systems

I think there is a possibility for making all the folder names in an operating system generic (and thus enhancing security) by making a central folder registry that updates on changes in the folder structure. Even this central registry can be placed arbitrarily by deploying it as a registry with an agent that reports itself to the proper place in the operating system.

I mean, a person new to the Operating System would not have a chance going into this unknown "sea" of folders over the internet (from where, you know, everything begins with an unknowing starter).

Generative names can applied to the folder tree by the input of some crazy user preferences for names or dates or whatever.

On upgrading or updating, one can simply relay the location of this central registry.

Or if one has lost the position of this registry, one can perform a search for it on beforehand to get its location. It may be that this registry has to have a certain name or belong to a special kind of files, ie. exe, reg, whatever...

Note: this has first been written by myself under the pseudonym Aetixintro (as usual) on brainstorm.ubuntu.com today.

By Terje Lea, 14.10.2010
Computing, An Alternative to User Accounts - User Levels

I find one can set password priorities against run-levels, ie. system critical, security, system utilities and so forth. Classification of programs can be set on a user-preference basis, specifying possibly programs for the upper level passwords. Higher level user accounts can be set with the default set of processes that are needed for running the system, much like the user/root system of Linux except that the naming of account groups are set by user levels instead.

By Terje Lea, 18.10.2010
Computing, Idea for Firefox, (Primarily): Agent Checking by Plug-In or a Kind of Agent

I think one should equip the Mozilla Firefox, fx., with an optional page (on the web) where you can make a certain deletable plug-in that enables an agent from this webpage to check if your Firefox has been hacked or if there are any malwares or dysfunctional aspects with it!!!

Further comment: I think it's quite a complex matter to check if your browser has the correct integrity, that it works as it should! To work around these complexities, you can possibly just ask the user by this webpage that the user installs this plug-in and thus the nature of the plug-in solves all the settings needed for the browser to be correctly checked (rather than asking the user to perform all sorts of minor and major adjustments for the webpage to do this by ordinary webpage interaction that also, as you may know, incorporates a kind of defence for the user to begin with). Consequently, I see no easy way out making this kind of check without asking the user to install a type of plug-in. Implication: the user installs a given plug-in.

This has first been written on the Philosophy Now forum, today. The further comment has also first been written on this forum.

By Terje Lea, 24.01.2011 and 04.02.2011.
Mechanics for Medical Use, Design for Cosmetological Scalpel

The text: The different types of skin are shaped to the scalpel and can be statistically considered by measurement and thus the blade can be shaped accordingly.

The sowing takes place on the underskin/leather-skin and natural healing is preserved the upper skin, possibly helped by medical tape or a kind of medical glue. The sowing required by the work-"hand" is also a requirement to how long the extension should cut underneath the overskin. Healing is yet to be confirmed to how effective it becomes by this particular design.
(I think I originally have been thinking about this design in 2004, yet it's only published now.)

The text that hasn't made it quite in on the picture, says: bow of blade, extending behind the specifically shaped blade.
Note: I hope to make the picture better, with or without text. I've also made a better title.

By Terje Lea, 23.02.2011.
Note: missing text has been added 27.02.2011.
Medicine, Idea by Tele-medicine - The Medical "McDonald's" or Cheap Service

I have an idea over tele-medicine! Why just not have the office/"booth" with the nurse in it and have the doctor to administrate 5 of them or so as much of the actual medicine can be carried out by the nurse/secretary? This can be much more efficient and lower the threshold for seeking the services, i.e., a kind of "medical McDonald's". Hush, don't tell the grumpy doctors!

By Terje Lea, 05.03.2011.
Originally published on Twitter 01.03.2011.
Engineering, Design for Kid's Combined Slide and Stretch

Description: Moderated and not so steep steps leading up to higher ground from which the slide slides moderately downward so that the slide makes it possible for the kid to lean the feet to the ground and laying in the slide to relax in. Thus, you need to anatomically consider the scope of the slide for the kids' group to use it. It's important that the slide is NOT higher than the level that makes it possible for the kid to touch the ground so that the kid reclines in it better and more easily. Also, when the slide is moderately sloped it, it can trigger a reaction that stops the kid from falling entirely into sleep. Thereby, the kid relaxes in a reclined position.

By [name, for protection!], represented by Terje Lea, 12.03.2011.
Note: the wording and drawing are by myself, Terje Lea, but they are his ideas.

Saturday 21 April 2012

Why Your Mobile Phone Can Be Completely Secure Without PUK!

This requires a user-set code for Telephone Lock and Recovery Code (perhaps also an own "internet"/"smart" phone security code against internet intrusion on a "handcuff-"basis (the password is coded securely within the mob.phone as well as with the user, making up a set of "handcuffs". This alone should normally give very good security... along with the usual options for security. However, there's another option that gives even harder protection and this is to "define data types" to enter the mob. phone on harder premises, fx. only stnd. html, https, only approved "white list" apps. and so on... This can be seen as rolling by to a more advanced WAP-programming and making the World less US American dependent, that is "Creative Programming Allowed (In)" -> Unchecked! I don't accept robot-arguments/subversive arguments from the mob. phone companies themselves, that is, how they have "this "God"-ability to do this and that and that therefore all that I say is invalid" (thi-hi-hi-hi). You know what I mean... Also, you may call this kind of mob.phone the (motherf**king, excuse me) DUMB phone!!!

This should also leave that "special" necessity "for security forces, special operatives and /the/ very agents and other important people, like some business people... to themselves and who can well set up and USE those good /robot/ phones which they are probably very fond of"! Besides, no-one of us normal people are really that important and with some good back-up routines with software to follow, there is no more problem than buying a new phone and /recycle/ the old and lost one!

Remember that the (old) chip holding your phone number is still very important in this in linking your subscription uniquely to your subscription scheme, by address and possibly bank-account for "not holding a criminal phone line" so to speak, that you're a responsible phone owner... (Police state or not, there's a solution on my blogs for dealing with this "problem" by itself...)

Friday 13 April 2012

Over Traditional Communication - And not /that/ nonsense of subjective character...

I will accept NO duty that's based on (loose) claims "that I've sent you, mr. Olsnes-Lea, a signal (of the telepathic nature) and that you therefore should have done this and that!" No, only duties that are based on traditional communication are committed to (and acted upon) and it is /defined/ to be speech and the written word, "usually", you know, the peaceful, physical meeting, the mail, the email and the phone call! Other than that, there's NOTHING! Now, I do hope you understand what "nothing" means! Alright? I leave you to it! Cheers!

Note: This should really have been unnecessary and it only relates to the many Jangling Jacks and Janes, of this country in particular, who are unable to determine what a relation is and what a /friendly/ relation is, i.e., people with many deficiencies!

Tuesday 10 April 2012

An Idea for an Austrian Movie - Continued Love to USA from Europe

In danger of sending this to the wrong address, I suggest following (of S. B. Cohen, stuffed with "European life"): (over "Brüno (pronounced as Bruno) is a 2009 British mockumentary comedy film directed by Larry Charles and starring Sacha Baron Cohen, who produced, co-wrote, and starred as the gay Austrian fashion journalist Brüno. The film is the third based on characters from Da Ali G Show, following Ali G Indahouse and Borat: Cultural Learnings of America for Make Benefit Glorious Nation of Kazakhstan." - Wikip.) - As response to Sasha B. Cohen's "Austrian Affairs" on the black side of life (or not), I hereby launch the idea for an Austrian movie on "pink CIA" (I believe S. B. Cohen now lives in "honest and just" LA, USA), inspired by Top Secret, that has a central character "Grosse" in it and a special "Black Operations Department" with fat basement areal also (read: catacombs) and training of Dungeon Rats a la (carte, French?) Femme Fatale, i.e., newly filmed Nina Simone with ever loving Bridget Fonda! Cheers!

The above is inspired by fresh suspicions (and a /bit/ of personal pain) of Echelon and firmness of proof of "shoving" the World! We miss you before the UN-GA (Ghalil Arms?) Tschuss! (Of naivite - I still love your "White Angel"!) - To be blogged under An Idea for an Austrian Movie - Continued Love to USA from Europe (on top of the SCRAMJET pass. plane)!
CIA has a bit of farce to it as well and we persistently try to discipline you as best as we can!!! "We hope the patient improve!"

Note: First published to Facebook some minutes ago.

PS: I like film-making too. I have indeed a continued interest in developing 5 or 6 specific ideas "for us". Now here is another /for you/... (Some people know this liking of mine damn well!)
PS2: The whole thing for the title line should say: "An Idea for an Austrian Movie - Continued Love to USA from Europe (on top of the SCRAMJET pass. plane)!"

Wednesday 4 April 2012

Over Victor and Victim - Contribution to English language or not...

This is a notice on the distinction of "victim" and "victor"/"victory": Now many people view victims as losers, but regarding the character and these low-life scum who risk /nothing/ I must say it is both character and honour to DIE for something. Thus, as opposed to brute idiots, I find that victim and victor splits into honour ("vict"), but the victim in /less/ honour than the victor (given some ceteris paribus considerations).
Also note that "e-vict" is to throw somebody out and that "vict" in English thereby suggests to "throw" oneself into something, to make an effort toward some goal...
Thus you have it, don't live like that coward imbecile, please!!!

Note: First posted to Facebook at 28 March at 04:02 and 31 March at 06:55, with a slight alteration.
Note: This comes in addition to "Code" vs. Malapropisms (1775?, mrs. Malapropism), De Dicto contribution and The technical removal of "Ought" in two or three lines only, not the normative notion of the word, but the mere presence of the word itself, by a normative equivalent (within the context we consider, relatively speaking). Thus 4?

Over Attacks on the Idea of Multiculturalism - Futile and Mistaken

One note, 2 points, on Ethnical Conflicts, the "controversy" over multiculturalism: To be unable to cooperate (directly on own soil) with other cultures is to be an inferior culture, i.e., multiculturalism has come to stay!
To cite (physical) power as a point to the rest of the World is to have disposed off the best of what we are supposed to be, intelligent! This suggests inferior intelligence to other parts of the World and a kind of scarecrow to the dumb that for us to prosper, other people need to stay poor!
Even then, we, ourselves, struggles with fundamental questions such as legal practice and overpopulation! So long to that fantasy of that "dominant, white culture", one that's heavily mixed (now) in USA, having the most poweful military in the World! Pathetic!
Note: I don't deny that there exist "hate-games" and that "police code" play a good part of instigation. One is of course also encouraged to add the usual "dubious" Erich Fromm considerations to this, as human nature as carnivorous!

Note: Posted to Facebook minutes ago.
Note2: I believe I have written somewhere on multiculturalism earlier, but for now, I've failed to identify the writing. Let me try to connect later, please!