Thursday 29 September 2011

Demand Non-Hackable Operating Systems NOW (and Don't Excuse Them)!!!

Just demand non-hackable Operating Systems right away because you can, of course, by fairly simple means, control every stream of information going in and out of your computer (to the internet). Thus, most dubiously and most exposed, even the snippet on the pornsite that requests outgoing information can be blocked!
Heck, it may not even need to be allowed to do anything in particular either because it's not taking part in safe conventions of programming! Ultimately, you need to explicitly want the malware, virus and spyware and nobody wants that!

The internet should become very safe in near future if corruption isn't insisted upon and crucial services like ISP, services servers (like your bank) and general routing (leave the "telephone-centrals" alone, uttered by the French!) are safe (guaranteed)! It really takes high level intervention to make this corruption work and it should become obvious every time it happens!!!

So why is this, the information in and out of the system, mixed into an inoperable pool of idiocy by Mozilla Firefox and others? When indeed this could have been laid out nicely and orderly!

Just like Microsoft is adding thousands of services and snippets of programming and offering these for free when indeed crucial, but small programs are being ignored! This is nothing less the subversion of the population at large!

No wonder nowadays then that when one orders 50$ of firewall and anti-virus/-malware/-spyware it feels like sponsoring employment programs for idiots!

(I'm having problems with listing Microsoft as a tag on this post! Is the publicity? :-) )
(Also, concerning some mal-delineation, my host is being generous with the editor that I'm writing this into.)

Formerly written by Leonardo F. Olsnes-Lea at 9/25/2011 01:41:00 PM with 8 comments!

20 comments:

  1. Just a tip for the common user in this world, by protection from US American interests: You can now, in Windows 7, use a Netstat worthy program by the built-in Firewall, to _block_ and all else certain programs that lit up as _outgoing_ without having an excuse to do so. Even then, if you think you're not worth attention, just think you ARE, and begin to block them, who you choose to block, fx. Realshare, and then your work can proceed more predictably! Enjoy! We have delivered them the first blows because I think they've been pushed to make the users reclaim their autonomy! Good?

    ReplyDelete
  2. There are other points too, like not trusting the Firefox with your bookmarks, indeed for the Firefox, I go totally blank, there is nothing there that is particular and I try to use the safest mode all the time, considering they're part of the U. S. American iron-grip club "against the World", so to speak! We need to fight these idiots and make World symmetry and World autonomy happen! Good?

    ReplyDelete
  3. Besides, there is a standing and urgent (as much as Amnesty Int.) that you mirror and monitor (to approve for your country) all the stuff Mozilla and other "good"/"well-meaning" U.S. American club entities and others are doing to the World! Make sure you follow them, and DON'T leave them your blindside, please!

    ReplyDelete
  4. Sorry, correction for the above concerning "Windows Netstat", Resource Monitoring. It lies on this path: Controlpanel\All elements...\Information about and tools for monitoring performance\Advanced tools . Good?

    ReplyDelete
  5. Besides, I'm thinking about CPU monitoring because there you can identify some "illegal" processes that are 1. net-specific and 2. you haven't explicitly _allowed_ them to run! One way to go: KILL THE RELEVANT processes (and give the company a tab too)! Alright?

    ReplyDelete
  6. Just to provide a _clear_ pathway to the "Netstat" equivalent: Controlpanel\All elements in Controlpanel\Administration -> Performance -> The first link in the first section -> Open Resource Monitoring (or something thereof) and that's it! You should now see 4 possible sections further: CPU, Disk, Network and Memory! Good?

    ReplyDelete
  7. You may be greatly rewarded by disabling the Service user that's automatically set up by Microsoft, under Users under Computeradministration. I believe now that Microsoft is doing damage-control! EU Courts, beware, and put the cuffs on as soon as possible! (But I believe we have them by historical events and also the contemporary flow of events. We'll see where this goes!)

    ReplyDelete
  8. It may be also that Microsoft allows/"allows" for internet users to utilise Wubi or partition tool of other kind to _destroy_ the dual boot-up systems of competition, i.e., largely Linux partitions!
    I think this happens through the Microsoft partition! That they use the Microsoft partition to get to the Linux partitions!
    Take them, take them! Make them pay! Cheers!

    ReplyDelete
  9. I read that Adobe wants you too "always update" because you may be attacked _through PDF files_! How the heck is that possible? Could be attacked through DOC file, RTF file and TXT file (not to mention the Open Office files)? There is something strange going on here and I think this lingers on borders between the corporate secrets, the engineering groups working on standards and how the various systems work together, i.e., lack of communication (of the honest kind)! Check it out yourself! Cheers! (Note on the U. S. American Club!)

    ReplyDelete
  10. Also note the additional comments by the same header, but on whatiswritten777.blogspot.com!

    ReplyDelete
  11. One is usually very eager to point out "good hacking" or "the possibility to get the bad guys", but the lesson is this, it should first be private _before_ it becomes public and it usually takes a felony and the action of legitimate Police force to deal with it! Generally, the vigilante argument therefore falls and also, usually, it should take an inside job, social action of the seducive kind, to open it, burst an illegitimate activity/server!

    ReplyDelete
  12. Just to mention some tricks for removing some corruption: you need "clean" "Code Blocks" in order to make a "clean" Firefox (because you need to _know_ that no illicit code is added in the coding process)! The time has come for demanding hard reporting criteria from these "well-meaning" IT-advocates! (And seeing to it that these reports are open enough to ensure what should happen next!)

    ReplyDelete
  13. I've posted this to Free Software Foundation and Mozilla Foundation on Facebook by its entire writing (incl. comments)! Every important person should be able to know about it in a few days time!

    ReplyDelete
  14. Also put to: https://answers.launchpad.net/launchpad/+question/172290 !

    ReplyDelete
  15. _All_ programs, by code, no matter how small, should be identified by the Firewall by it's wanton to let a stream of information go out into the internet! This can and should be done!

    ReplyDelete
  16. The above includes snippets of all kinds, all plug-ins, all API and the rest! (No exceptions are made!)

    ReplyDelete
  17. Now an essential question: What do we need from the Internet? The answer should be graphics, video, audio and all sorts of texts! So why is it that in order to produce this, we are met with all sorts of techno-babble and word-dressing (just so these people can pass as smart)! No, these idiots are laying ordinary consumers (of IT) bare for the sake of exploiting people's personal data and what have you! I, thus, share this first question and its answer with other people who have voiced it! The World isn't right! Class action lawsuit now?! So as you set up your internet connection, you should be given three options out of this:
    -Wired (router or not) - always safe
    -Wireless (closed network, possible physical adm. setting) - safe
    -Wireless (open network and unsafe settings) - unsafe (only for experts and IT curious people?)
    Agree?

    ReplyDelete
  18. And don't you tell me that Microsoft sits there and "oinks itself like a sh*thead pig over troubles with Excel-sheets and safe internet integration" as we are supposed to believe in their BLATANT lies! Like we are supposed to believe certain scopes of programming "were open by accident", you filthy f*cks! [Them, that is! Yes, I don't treat my readers like that, i.e., filthy f*cks!]

    ReplyDelete
  19. One notice more:
    when Adobe claims a format for documents, PDF-files, they have an obligation to trust an encryption/encoding _only_ and _not_ these two: 1. passive code called upon by a system - a passive "worm" and 2. active code used by a system - an active "worm". If they insist otherwise, they are dubious, undoubtedly, just another "crack-head" enterprise from USA to the World!

    ReplyDelete
  20. Later in history, Adobe has come to incorporate java-scripts to the files, and likewise, they have the _explicit_ duty to keep these java-code to the package of Adobe Reader and _not_ with the files themselves. So, _optionally_, when the files open, the _program_ can look for the fields to change by a mere _identifier_ code in the files and _not_ the active/passive code within the files themselves! Any good? Cheers!

    ReplyDelete