Saturday, 7 March 2015

150307

Re the above ....."Comment[s] deleted
This comment has been removed by the author."
????? What's up, doc?
6 March 2015 at 18:48
----
There's a lot happened and happening, Serge C. And problem for the West to contain and exploit admirably, such is their lack of equitable application and noble practice.
6 March 2015 at 18:55
......................................................................
amanfromMars 1 Sat 7 Mar 04:45 [1503070445] sharing a view on http://forums.theregister.co.uk/forum/1/2015/03/06/nca_cybercrime_clampdown/
Is the rot, perpetrated and enjoyed right at the top and in the heart of establishments, too
Strange how alleged and adept politically incorrect government based paedophile rings and ethnically diverse and perverse sexual trafficking and grooming rings appear to be protected from raids and prosecution until, if they be unlucky, decades after the fact.
What does that sort of inaction suggest and prove? A right dodgy criminal them and us mindset and even quite insane mentality destroying the system inexorably from within .... just like a killer vapourware and sleeper malware virus writer can conjure a program to deliver and sustain/purge and restrain and/or retrain?
......................................................................
amanfromMars [1503070941] airing AIRevolutionary ProgramMMING Project on http://thedailybell.com/news-analysis/36136/The-Growing-Divide-Between-Western-Rhetoric-and-Economic-Reality
Conclusion: Articles like this one can create a kind of alternative universe – but reality is not aligned. And eventually people notice.
Eventually people notice, and a few discover that a few others have aligned alternate virtual realities to deliver a present and future which pays no dues or attention to enslavement and rules of the past. They move systems on with the invisible threat and honest promise of fiat collapse and ponzi attack against ignorant retarded foe pretending to be arrogant all-knowing friend? And with a certain SCADA, IT and Media Command and Control too, which, whenever not overtly leading the fix, can easily, relatively anonymously and virtually autonomously, covertly disrupt and destroying an inequitable mix of projected fabled missions and program of cyber operations.
A MMORPG ..http://en.wikipedia.org/wiki/Massively_multiplayer_online_role-playing_game ..   in which a collection and series of networked words can and do create, command and control and collapse worlds. Initially weblog based for easy instantaneous global transmission across all borders and browsers, further advanced development platforms in both mainstream and alternative media engines will driver sublime change which only greater, more beneficial and enlightened intelligence will impact.
And there will be also an unavoidable and welcoming tangent for programs and projects which discover and destroy perverse and corrupt exclusive executive SCADA administration systems and attendant virtual machines. ...... With NEUKlearer HyperRadioProActive IT Weaponry in AIMethodologies ....... Advanced Novel Attack and Defence Systems Bases with Secret Secure Silent Traps with FailSafe Backdoors into Target Subjects/Mission Objectives.
CIA gone all Gaga and Hollywood base? Good plan, John. It opens up IT and media hosted realities to all sort of wild, weird, wacky and more wonderful shenanigans.
..................................................................

3 comments:

Casey Evans said...

Speaking of "malware virus writer" I was wondering if you could tell me about something.

I have a new android phone and I have been writing some software for it. Right now all I have been doing is loading data files into the program and using the data to forge GET requests to put data into server logs (it has a box to input the current server).

I am wanting to create a new piece of software which will upload data about my device on a periodic schedule to a remote hosting server for easy retrieval. The data would consist of my phone records, instant message records, file usage, etc. I also wanted to add a remote shell feature to the software.

My question is what is the legality of writing such software. I understand that if the software is just for my device I can do as I please, but what if I wanted to sell the software on the android market?

Is it illegal to sell such software?
I mean the software would have to be installed by the user to provide such functions, but it is a kind of gray area because it would be considered malware if someone abused the software and illegally installed it onto a client device?

So in short, what is the legality of writing and selling such software?

Casey Evans said...

RE:Wannabe Jedi drool over potent laser 'lightsabre'"

What my gamma light sabre wasn't dangerous enough. pfft.

Whatever man.

AR said...

Yes, Casey, it's quite legal, because the user have read the agreement... until the user meets unforeseen and unforeseeable consequences that were not listed in the document.

Drop the droid, Casey E. Neurointerfaces. Yes, you can.