Are you new to blogging, and do you want step-by-step guidance on how to publish and grow your blog? Learn more about our new Blogging for Beginners course and get 50% off through December 10th.
WordPress.com is excited to announce our newest offering: a course just for beginning bloggers where you’ll learn everything you need to know about blogging from the most trusted experts in the industry. We have helped millions of blogs get up and running, we know what works, and we want you to to know everything we know. This course provides all the fundamental skills and inspiration you need to get your blog started, an interactive community forum, and content updated annually.
1) If you use VPN Software you cannot see anything. Everything can be interfered, your handshake protocol, your encryption, even your login ID and password if your connection is not masked.
2) How to check your connection is masked or not? I use speedtest.net to check my internet connection. If it shows your origin ISP means it is not masked.
3) I prefer to use manual method as I can connect to any VPN server in the world and if it is masked I have no fear.
4) Administrator of VPN Servers please take note, if your client does not accept the first connection, everything is not masked and subject to attacks.
5) So to prevent this you can do the configurations of your VPN server with auto login with ID and password, later to force everyone to change their password for every session, to prevent VPN hacking. Yes, every session will have problems if you do not update your configurations and it will drop off and cannot connect again even if you reboot your client.
PS I solved the issue without the administrator using a Proxy server to hide my login. Why I do not recommend setting a VPN server on your router because you need to setup all the connections for all individual clients to login to your VPN Server and it is very troublesome, on top of that if you have connection issues you always need to switch VPN Servers which happens all the time, it is better to use VPN Client software where you have hundreds of choices with any kinds of connection possible, so nobody knows your routing mapping and cannot attack you.
If your VPN provider cannot even mask your connection, it has nothing to do with technical issues, it is purposely done because others give them even more benefits than your subscription, I would ask you to terminate as they cannot be trusted, if you cannot provide an independent service you are not reliable at all.
1) (Recent Files) in windows is created to give hackers a view of what you are doing, not for your use.
2) It is important to use your rubbish bin, but it is the second place I will look, clear all your rubbish all of the time.
3) A way a hacker attacks is using all your temp files, never leave it forever, always clear all these files, (temp), (%temp%), Software Distribution (Temp), Windows Update (Temp), and if possible if you know how to do it, Virtual memory, paging files, and what you allocate for virtual memory, there is currently no tools to do this.
4) The registry tells me all the history of every programs you install, and it is not encrypted, and it will always leave a residue.
5) In the browser there are so many other folders that are at risk like (History) (The sites you visit)(The files downloaded) and even your (password) and (Forms) that you fill. If possible, never fill in your credit card details here.
6) I purposely do not want to give the exact location or else hackers will have a field day, and everybody will get hacked. Those in the security industry already knows exactly what I am talking about.
7) The biggest issue there is no way to track all your programs running and background services, and if a code is run like java or others in your browser you do not know what the hell is going on, Task Manager only gives you a glimpse of your components but nothing else, it should be improved with the above.
8) All windows drivers are not secured, even if there is a way to rollback to the previous version, for me as a hacker I will have a field day to crash your components and cause havoc to your OS.
9) All kinds of spyware uses unallocated ports that are not secured and if possible protocols that is unknown to install screen shots, monitor text inputs and even access programs communication like Whatsapp which is encrypted. There is no way to secure this with today’s technology, and I do not know the exploit of the future where technology will prove all things are possible, because our old Internet is not secured.
10) One of the biggest risks is WiFi, without a new Algorithms based secret without keys, it can always be hacked and no way to secure it.
11) Even with database it is impossible to secure it with encryption, it is a matter of time someone exploits it, even for Bitcoin we are coming close with firepower to break crypto encryption methods.
12) For critical infrastructure like banks, hospitals, power grids, nuclear etc, my advice is kept it out of the internet and only allow 1 or 2 to access, and isolate it in a DMZ zone.
I really do not care. DNS and IP address are old technology which will soon be replaced by Blockchain, get ready to know all the secrets why I say it is totally not secure.
Methods used to mask IP addresses:
1) VPN Servers
2) Proxy Servers
3) Brand Protect Servers
4) Masking IP address
How to check on the internet.
DNS Propegation Checker https://whatsmydns.net
Connection to VPN. You can see if your original ISP IP address is masked or not. https://speedtest.net
What is 188.8.131.52?
184.108.40.206 is a fast and private way to browse the Internet. It is a public DNS resolver, but unlike most DNS resolvers, 220.127.116.11 is not selling user data to advertisers. The implementation of 18.104.22.168 makes it the fastest resolver out there.
What is DNS?
The Domain Name System (DNS) is the phonebook of the Internet. Humans access information online through domain names, like nytimes.com or espn.com. Web browsers interact through Internet Protocol (IP) addresses. DNS translates domain names to IP addresses so browsers can load Internet resources.
What makes 22.214.171.124 more secure than other public DNS services?
Some other recursive DNS services may claim that their services are secure because they support DNSSEC. While this is a good security practice, users of these services are ironically not protected from the DNS companies themselves. Many of these companies collect data from their DNS customers to use for commercial purposes. Alternatively, 126.96.36.199 does not mine any user data. Logs are kept for 24 hours for debugging purposes, then they are purged.
188.8.131.52 also offers some security features not available from many other public DNS services, such as query name minimization. Query name minimization diminishes privacy leakage by only sending minimal query names to authoritative DNS servers.
What makes 184.108.40.206 the fastest recursive DNS service?
The power of the Cloudflare network gives 220.127.116.11 a natural advantage in terms of delivering speedy DNS queries. Since it has been deployed on Cloudflare’s 1000+ servers worldwide, users anywhere in the world will get a quick response from 18.104.22.168; in addition to this, these servers have access to the over 20 million+ Internet properties on the Cloudflare platform, making queries for those domains lightning-fast.
In computer terminology, a honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. Generally, a honeypot consists of data (for example, in a network site) that appears to be a legitimate part of the site that seems to contain information or a resource of value to attackers, but actually, is isolated and monitored and, enables blocking or analyzing the attackers. This is similar to police sting operations, colloquially known as “baiting” a suspect.
1) When use a DropBox, the link to the original files is listed, so you do not need to transfer the entire file when the original file is already there, so in fact you transfer the link for the DMA to access that file.
2) Even large storage systems can use this technology, as the original is never lost, you do not need to transfer the entire file but a link to that file which is contained in a memory address of the DMA.
3) So you do not need to transfer duplicates, this can be embedded in Meta Data of the site address, so everything can be given a Memory address in DMA of a storage SSD system, which is as fast as sampling a huge database to find all the answers for a CPU.
4) This technology can be used in a system or a network, but if you want to use it across the entire internet, there is always a risk of data loss eg a for a network of computers for search engines.
5) So this SSD is designed in this way, Original files can only be read but cannot be written unless you have superuser status, and others DMA memory links can have backups but only can delete their own files which contain the links but can never delete the original files, it is locked up in a container. If I add a 3D encrypted database what will I have? Trillions of data for less than a few hundred dollars.
6) So how will the files look like? You can easily see the actual file when you create a link to that actual file, and the actual file that does not contain the link, and it will be stored in different partitions.
7) This technology is meant for huge data files beyond 1GB as it will take away the time for download, it is not meant to replace the Operating System, however you can use this as a link in your network to deploy or backup your data.
8) This technology also use a technology to verify your data to show that it is exactly as the original but this is just a link, so there is no data corruption.
9) Microsoft use a link to the actual files but I use a DMA Address in memory and Microsoft technology is meant for the OS but mine is meant for a portion of the storage.
10) A lot depends on if you are downloading a file which uses the FTP protocol or streamng a video, both technologies are different.
This is how I can make the Neuromorphic CPU even 100x the competition of a Supercomputer.
*Patent due to United Nations China
1) Pre-nuptial agreement. All my income will be used to fund my business and charities I support. My will will consist of all my companies and Non Profit, where all the shares will be equally distributed, if your sons are not willing to work, their full education and marriage will only be paid and funded.
2) All my wives will get S$10k monthly income until they die. I will also take care of their retirement if they chose not to work.
3) When they give birth to a child, I will buy a house worth at least S$1 million and put it under his name.
4) All household expenses will be paid by me. I do not need your income.
5) Nobody can hold me to ransom, I do not need sex, I can easily afford test tube babies.
6) You have a choice to continue my charity work and I will pay you a salary, even director fees if you are capable.
7) By June all who screw around will have no more chance. I chose you and I remember, not you chose me. WARNING : Nobody can lie to me, or else you are the first one I boot out.
8) No use to talk, see all the actions. My life is my life, and I chose a simple life, but I do not need my wives to follow me, it is their choice.
Leave so much money for my family will only get everybody in trouble, I will not have any peace from everybody, no need to teach me anything, I have enough nonsense from the world. I easily got another 10 years of my life until retirement and I can easily recreate what I gave away, I have no regrets in fulfilling God’s plans. I do not intend to be a King. I am here to give the first installment to pave the way for the return of my Lord, who has the power to give you even more.
1) Write off the entire US Debts.
2) The corona virus bill for all nations.
3) The bill to create liquidity for all Central Banks.
4) Invest in the Next Generation Internet including all technologies.
5) Future fundings of UN programmes, part payment first, there will be more funds available once the global economy recovers.
*The above bill does not include the implementation of Universal Basic Income.
Now tell me, there is no other way to solve this problem without using God’s resources, you can never reach the Perfect Economy. So God has shown me the future, and nobody in the whole world can deny God;’s hand in it. Who will pay the bill? If I am not able to complete my work where is the money coming from? Delay me and you delay the entire global recovery, you are talking about millions of jobs worldwide. So Mr Trump, want to carry on, because US debts are the greatest of all.
Do not ask me to ask my God to make money fall down from the sky, it is never meant to be that way, my God has already given me all the capabilities, there is no need to ask for anything more, moreover I have taken more than 10 years to prepare for everything, whatever I sow I am going to reap everything as the harvest is due, everything will be done within 2 months from tomorrow onwards. So what is there to fear? Another S$5k my goals of reaching S$100 Billion is complete. I can see every bridge I need to cross, the goals I need to reach, and finally the time needed, with all the resources I need. This is how the Kingdom of God is like that.
So I am not afraid what the entire world throws at me, the FED throwing trillions does not get to the root of the problem, it will be gone in days, but I can easily solve the problem, by getting to the root of the problem, if you follow God’s plan it will be perfect, every country’s development is like musical chairs in various stages of development, unless you are totally bankrupt with no money then I cannot help you, but it is impossible for a country to be bankrupt when you have all the citizens, other than that, with a 10 year plan I can help you achieve all your goals, get funding and maximise all your assets, in any markets, in any industry, if you are willing to work towards your goals. If you follow the fundamentals of the New Economy, you can never be wrong. Avoid Destructive competition and you can control Demand and Supply with Price The brain with the most advanced supercomputer.
1) LiFi Technology will disrupt the entire global economy.
2) The next generation internet will be Blockchain on peer to peer on distributed networks.
3) All ISPs and communications companies will be affected by very disruptive technologies. Data and devices will be everywhere. The Neuromorphic computer will bring new appplications and capabilities with the Intelligent OS.
4) Wireless Charging will be everywhere.
5) Self driving cars, planes powered by electricity will change drastically the entire landscape.
6) Energy and all the energy production will be low costs like solar, wind and oil will be the most expensive, where it only be used only for commercial aircrafts.
7) Due to very disruptive technologies, water membrane technologies will be embraced by every country as it will be the cheapest form of production where sea water is easily available everywhere.
8) Food production will be totally changed and the massive move to lab grown vegan meat will disrupt the entire food industry, and traditional farming methods for chicken, pork, beef will gradually be trabsformed.
9) The change is so drastic that everybody’s lifestyle will be changed, bring new rapid growth especially to the global economy.
10) Welcome to the Perfect Economy, the Economy of Abundance. Everybody’s lives will change for the better with a Basic Universal Income and a One World Government. No more Global poverty in 10 years and no more wars. Peace and prosperity for everybody.
11)Robots will be built to assist humans and will power factories of the future for industrial revolution 4.0
12) Work will be totally changed with tele-commuting and everybody can work with just a basic internet access, and with a Basic Universal Income everybody’s needs can be easily taken care of, the is no pressure to be slaves to work and leisure activities like sports and travel will increase as everybody adopts a healthy lifestyle.
13) The greatest change will be in education, where everybody adopts a life long learning experience and knowledge will be easily available, where memories and knowledge can be easily transferred like a harddisk of a computer, so basically the future there will be no more class system in society, everybody will be equal.
14) Everybody will be given a choice to vote for their local governments and the freedom to chose their religion, no more persecution anywhere.
15) No more crime in the entire world, because there is no way you can escape with DNA, Facial, Fingerprint and Voice ID. No more ICs or passport anymore.
16) Airports of the future will be totally changed and you can easily pass customs with self checking kiosks and it will appear borderless for all goods and passengers.
Do not expect me to build everything myself, it is never meant to be this way, I will take my entire lifetime and still cannot achieve it, I am a catalyst and I am best at doing my own job, everyone must co-operate to bring my vision come true. All these virus fears are they real when they already have the cure? The real news is now the entire world has changed with technology and all the world leaders do not dare to face up to God and is hiding the news from everybody. Now I become the richest man on earth and they are charging all the virus bill to me.
Psalm 25 Of David. 1 To you, O LORD, I lift up my soul;2 in you I trust, O my God. Do not let me be put to shame, nor let my enemies triumph over me.3 No one whose hope is in you will ever be put to shame, but they will be put to shame who are treacherous without excuse.4 Show me your ways, O LORD, teach me your paths;5 guide me in your truth and teach me, for you are God my Savior, and my hope is in you all day long.6 Remember, O LORD, your great mercy and love, for they are from of old.7 Remember not the sins of my youth and my rebellious ways; according to your love remember me, for you are good, O LORD.8 Good and upright is the LORD; therefore he instructs sinners in his ways.9 He guides the humble in what is right and teaches them his way.10 All the ways of the LORD are loving and faithful for those who keep the demands of his covenant.11 For the sake of your name, O LORD, forgive my iniquity, though it is great.12 Who, then, is the man that fears the LORD? He will instruct him in the way chosen for him.13 He will spend his days in prosperity, and his descendants will inherit the land.14 The LORD confides in those who fear him; he makes his covenant known to them.15 My eyes are ever on the LORD, for only he will release my feet from the snare.16 Turn to me and be gracious to me, for I am lonely and afflicted.17 The troubles of my heart have multiplied; free me from my anguish.18 Look upon my affliction and my distress and take away all my sins.19 See how my enemies have increased and how fiercely they hate me! 20 Guard my life and rescue me; let me not be put to shame, for I take refuge in you.21 May integrity and uprightness protect me, because my hope is in you. 22 Redeem Israel, O God, from all their troubles!
This psalm is an acrostic poem, the verses of which begin with the successive letters of the Hebrew alphabet.