Sunday, 21 June 2015

150621

amanfromMars 1 Sun 21 Jun 07:13 [1507210713] ..... having a say on http://forums.theregister.co.uk/forum/1/2015/06/19/security_roundtable_may_2015/
NEUKlearer HyperRadioProActive IT for the Sublime Spearing of Phish in Phormations
Dominic, Hi,
Thanks for that most probably highly accurate presentation of the current global vulnerability state of play in the fields of interest to those and/or that of a certain peculiarly defensive and particularly offensive ilk, whether registered and flying in the colours of public and/or private and/or pirate practice or not.
Outside the world of critical national infrastructure, sharing of experiences and data is still too ad-hoc for many reasons, none of them good. The execs shared that their contracts of employment explicitly forbade them from sharing security or other important proprietary information.
Methinks though, and it is no small matter and therefore well worth sharing, it is wiser to realise that even inside the world of critical national infrastructure, sharing of experiences and data is still too ad-hoc for many reasons, none of them good. And one imagines especially there, in the virtual realities that driver and deliver the myriad madnesses of mayhem for collapsing orders into chaos with CHAOS, that execs would share that their contracts of employment explicitly forbade them from sharing security or other important proprietary information.
Clouds Hosting Advanced Operating Systems are where IT is at in the Dynamic Vector and AI Sectors with Global Operating Devices.
....................................................

2 comments:

Casey Evans said...

RE:"execs would share that their contracts of employment explicitly forbade them from sharing security or other important proprietary information."

Interesting.
If one was in such an environment they would follow the rules.
I for instance am not in such an environment.
I am jobless.

Casey Evans said...

RE:"Buh bye fakers? Amazon revamps customer product reviews system"

Last time I checked, everything on Cool Fuion was accurate.

I could be wrong, but are you not the snake oil salesman yourself?
Your the one claiming the simple use of amplitude modulation (a system with uses coils of different sizes too might I add, which may amplify the occurrence of an electromagnetic moment) can extract the keys from a personal computer.

Last time I checked, my cpu is running stuff all the time, and this method is like a what do you call it: "Joke"?

I would think to even use the fluxuation of the field like you said you would more equipment.
Just a guess, but what do I know - I a snake oil salesman.

And who was it that posted the correct info when you posted an assembly dump of the apple phone?
You wanted people to believe you needed some pro freakin jihadi type message to trigger the bug when it was really NULLS that were required.

Guess I am just not cut out to be a working man in your society.