Wednesday 17 April 2013

130417


amanfromMars says: …. on http://georgiebc.wordpress.com/2013/04/16/our-right-to-communicate/
April 16, 2013 at 8:54 pm
Good Morning, Heather M,
Whenever systems are perverse and corrupted and inequitable, with the majority poorly servered and even ignored, is intelligence lacking in running power control applications, and working from the inside and from the top down, with the offer of the provision of new and more powerfully viable control systems with revised leading protocols/revolutionary methodologies, allows failed incumbent guardians of exclusive elitist powered asset control the illusion of remaining retained and retraining for continued mastery although in reality are they replaced at the top tables and leading edges of events, and merely remain untouched to ensure that currency flows and right dodgy businesses are turned on to support their new gracious hosts via the traditional printed paper fiat currency support via spending hosting arrangements route and root to all that be good and evil.
And ensuring that the former always checks and modifies the latter to deliver more in the way of excitement and deep satisfaction, rather than mayhem and madness, is a valuable component element in anything which is going to be successful and considered worth supporting in precarious positions and volatile situations.
.................................................................................................................................


Posted Wednesday 17th April 2013 08:17 GMT amanfromMars 1 ….. spilling the beans on http://forums.theregister.co.uk/forum/1/2013/04/17/oracle_java_security_update/
What they don't want to tell you is fabuluous about fabless Java
Java for NINJA* Operations is not a weakness to be patched, it is a utility for further quiet anonymous development with ruthless exploitation of browser dependent instruction sets and interindependent SCADA systems of proxy control being but one invisible advantage to export to players in such fields of …….. well, CyberIntelAIgent Defense and Attack are both sides of the same coin and purloined vehicle to master pilot and driver with novel content and advanced intelligence.
Stop wasting your time, Oracle, the genie is out of the bottle and delivering wishes.
* …. Networks InterNetworking JOINT Applications
....................................................................................................................................

No comments: