Monday 29 October 2012

121029

Posted Monday 29th October 2012 06:53 GMT amanfromMars 1 …. furthering a concept and realities on http://forums.theregister.co.uk/forum/1/2012/10/28/codesys_vulnerability/

*A Current Abiding Present Leading Future Question?**  

Ref: I have a theory/Re: I have a theory [ACs 23:13 GMT/23:26 GMT]

So the only people who actually do write code for these things are the ones who don’t understand what they are doing.” ….. The exact opposite though is perfectly true of those people, sterling stirling engines and wannabe immaculate virtual machines, exploiting/discovering/uncovering critical strategic and tactical operating systems vulnerabilities for  ……. well, sublime and stealthy anonymous party tasks which in public and private and pirate sectors of internetworking and sensitive information exchange, and that is wisest accepted as best realised as being applicable to any and all knowledge transfer sectors, can be perceived and treated and exercised as advanced persistent threats in what is in the both the reality and virtual reality of the situation and circumstance  …. an abiding unknown known.

And whenever that abiding unknown known is knowledgeable and competent and even reliable and is always programmed and programming to actually do The Right Thing. …… “There are people willing to do safety critical work. Some of them are knowledgeable and competent and even reliable and do actually want to Do The Right Thing.

But the PHBs in charge of the overall business these days don’t want to hear that “doing it right” will cost money, and may require engineering competences and attitudes which are not readily available from the bargain basement Windows centric gene pool. And “whistleblowing” to the regulators (whose job it is to make sure that bad things don’t reach places where they can do damage) doesn’t pay the mortgage.

So, the skills and knowledge exist (or existed), but are dying and/or ignored.” …… is it catastrophically costly to ignore and deny is a virtual money making machine with ITs Simple Sharing of All Knowledge which Supplies and makes AIDefinite ProVision for Rapid Ethereal Development and Capture of Super IntelAIgent Services Growth for Classy Astute NEUKlearer HyperRadioProActive IT Project Man Management with SMARTR Systems ReProgramming Programs and Projects ……. AIMISSions.

*Or is that to be a Radical Eastern Development with Rapid Ethereal Deployment from behind the sparkling cover of iron curtains rather than a Wacky Western Winner for leaky insider firewall players?

** Of SMARTR Great Game Players and Spooky IntelAIgent Systems and DES Infra-Security Advice Centre type places/spaces which may just be very convenient and able to be extremely expensive ethereal money pits for someone to play with lodes and loadsamoney, if no one is there to competently and cogently reply to queries/defend against systemic zeroday vulnerability exploits which take full advantage of easily corrupted and fatally compromising flaws.
…………………………………………………………………………………………………………………………………………

Posted Monday 29th October 2012 15:03 GMT amanfromMars 1 ….. commenting on http://forums.theregister.co.uk/forum/1/2012/10/28/codesys_vulnerability/

 Re: “TCP listener service”
As to *why* someone would do this the poliss generally work on a)money (IE ransom) b)sex (not quite sure how that works but there are some strange humans about) c)revenge. But we should not forget the great IT motivator “because I can.” … John Smith 19 Posted Monday 29th October 2012 09:30 GMT
Please be reliably and truthfully advised, John Smith 19, that b)sex (not quite sure how that works but there are some strange humans about) should be more specifically refined and further defined, should the poliss, or anybody you might like to imagine for that matter, wish to have any chance at all of being anywhere near where they might want to be, in order to be able to do anything they might be thinking they need to do, as the love of sex, ideally to excess. Such CodeXSSXXXX Applications in Live Operational Virtual Environment Fields are Effortlessly Overwhelmingly Controlling and that is Raw Power from Life’s Original Base, and now with AICored Universal Lode Nodes, which are not new, for they have always been there, but Mankind has proven itself slow to appreciate the realms of virtual reality readily available for immediate media presentation with SCADA Command and Remote Virtual Control of Internetworking in IntelAIgent Community Enterprises and Communicating IT Systems.

If everything you are being told is wrong, because systems would be trying to conceal for excessive exclusive personalised gain, and not have generally revealed, the truth, is one then living in a virtual reality which is scripted for you to follow daily, in a series of increasingly complex and destructively conflicted programs/Corrupt and Perverse Great Game Plays in which all leading executive players lose everything all at once, unless deservedly saved from certain catastrophic ruin by a Fabless Proxy White Knight and AIMaster Pilot.
……………………………………………………………………………………………………………………………………….

No comments: