#msg: hacker
Explore tagged Tumblr posts
Note
it’s ok sometimes i forget i even sent an ask LOLOL
i’m okay though, school gets me tired soo fast but also i started stardew valley recently and i keep going back to it (unfortunately). how’s ur senior going for u so far?
—hacker
lol its also possible that tumblr eats it. its been so long since ive been chronically active on tumblr, idek if thats still an issue on tumblr or not lol.
stardew valley tho omg,, i finally married sebastian and then i just havent played again HAHA shit was so annoying though, i stg i got him to ten hearts on the fiRST DAY OF WINTER and then it didnt rain until like the last week of spring so i couldnt buy the stupid marriage thing </3 i need to either finish that world or make a new one though haha. its like minecraft to me i swear; ill get really into it unhealthily for a week or two and then not touch it for a week.
and my senior year has been good! i have somewhat easy classes this year save for pre-calc my behated but the good news is i thought i made a 63 and actually made a 73 bc she wrote it wrong 💀 anywho i love love love my eng professor he has decided that he likes me methinks so he gives me good grades lol.
how about you, how has school been? :D
2 notes
·
View notes
Note
praying that u survive those 7 hrs of boredom 🙏
my friends and i are having a friendsgiving tmr for thanksgiving (^ν^) and my family is doing smth on thursday, but i still have to buy the snacks for the party tmr LOL
hbu?
—hacker
I DID 🙏 and that sounds fun!! i’m with my boyfriend’s family for the week n i’m super excited hehe. i go back on saturday i believe tho :( tell me how the party goes :3
2 notes
·
View notes
Text
Okay with the 2024 Player Appreciation Week in march I really want to do something, and i think my best way back in is with a pt.2 to the fic I wrote for it wayyyy back in 2022. I have some ideas on where to head with it but then it's the issue of the expandability of such and which I think will work the best.
I'll link the orginal fic here incase anyone wants a refresher and the 2024 Player Week post but here are my thoughts for a continuation of the fic:
Day 2 - Parents: Direct continuation of Pt.1
Once arriving in Argentina, Players mum finds it difficult to accept letting go of her only child, and after a while (and accidental encouragement from Player himself) ends up phoning and messaging him multiple times a day, always at the worst times, aka all the time. It all culminating in almost ruining an important mission thanks to the eventual escalation. A nice resolution, naturally, but a story about the difficulties of separation and how ignoring/distancing in contrast to the almost obsessive inability to let go, one extreme to the other, isn't the best way to process it at all.
Player POV. Players mother & Carmen, then new team ACME Ivy and Zack and possibly Julia, Chase.
Day 5 - Loyalty: Can be a separate fic or direct continuation of Pt.1
(If a seperte fic, based sometime after the 2 year jump) Chief attempts to poach Player to join her ranks now that he's officially legal to actually hire and back out after the hiatus. Chief assigns Zack & Ivy to get the 'job' done, unbeknownst to them of her actual plans. After an official approach from her senior Agents Julia and Chase and sending him all the ACME merch one could possibly need, unsurprisingly, leads to no avail. Hijinks ensue.
Player POV. Carmen vs Chief + New ACME Zack & Ivy, brief Chase and Julia.
Alt. 3 - Hacker + Day 6 - Abandonment: Direct continuation of pt.1
Due to some self reflection, Player is determined to spread his wings with his new found 'adulthood' and separate himself from being a 'simple hacker' after Carmen unintentionally gets in his head about his role in the team and maybe his lanky physique, truly, she didnt mean it. Its hard being a young adult in the big wide world, trying to make or reinvent a name for yourself. He attempts to cultivate a new 'field agent' identity, eager to get out there one-on-one and in his words; "if Zack can do it, how hard can it be?". Unfortunately underestimated the true training, experience and skill development it takes to do what Carmen does, and do it well. He ends up, quite literally and accidentally, abandoned in a foreign country after failing to make it to the pick up location. With Player on the ground and off his perch, his tech destroyed, AI failing to fill his 'old' position, Player has to hope that he can either turn the drastically crappy situation around, manufacture a 'run in' with ACME or he will probably fall into the remnants of VILE's grip he barely avoided to dodge in the first place.
Player POV. Carmen, non disclosed VILE agents & Maybe ACME.
This is what I got. Or at least the best ideas I have that have a bit a meat to em. I'm open for a discussion on what y'all would want to read the most. I'm open for anything, Rbs, direct msgs on the post or to be me are totally welcome. ♡
#player appreciation week#csplayerweek2024#csplayerappreciationweek2024#playerappreciationweek#carmen sandiego#cs 2019#carmen sandiego netflix#carmen sandiego 2019#cs Player#player bouchard#disfordevineaux#chase devineaux#julia argent#cs ivy#cs zack
19 notes
·
View notes
Note
yo do any of your sides have typing quirks 👀 wentz strikes me as someone who’d use leet speak (wentz is your creativity’s name right? sorry, trying to memorize all of them and struggling jajdjdjf) - @girlboypatton
Well i actually used 2 have a typing quirk (& still do), so when I used 2 type silly & strange, all my sides did 2
i typed liek diz !!11!!! Or svmtiemzz iid dovble mqii lttrzz & qdd rqndom qz evrywherezz
(I typed like this! Or sometimes id double my letters and add random qs everywhere)
My typing quirk has adapted in2 something more accessible 2 screenreaders, ppl w/ dyslexia, & other disabled ppl.
ANYWAY. Wentz (creativity) 100% uses a typing quirk occassionally and, quite literally, speaks little emoticons like xD and :3 (how does nya do that? Thats 4 woof 2 know & u 2 find out). It is a running joke in my Swapped AU, that cos uses random faces & c!Thomas is Terrified.
There is a very specific way scene kids typed back in the early 2000s & it was not leet speak (leet speak originated 4 hackers & evolved more 4 gamers, if i rmbr correctly), so Wentz doesn't use leet speak.
Wentzz typez liek DIZ x3 o3o probzz liek da way da author of mai immortal typd thru out da seriezz. Phull of miszpellz & bd grmmr & tking out rando lttrz cuz it waz KEWL xD (@ da tiem!) -_-;;
(Wentz types like this x3 o3o probs like the way the author of my immortal typed through out the series. Full of mispells and bad grammar and taking out rando letters because it was cool xD (at the time!) -_-;)
Memphis (egotism) doesn't necessarily use a typing quirk, in the way that word means now, but she does shorten every single word if she can (& even when she cant). Uses every abbreviation & acronym under the sun. He has things 2 do!!! Like.... continue 2 text & b on his phone.
Both him & wentz r probably the 2 ppl u do NOT want 2 text w/.
Memphis wll shrtn vrythng 2 spnd less time typng. probs uses LOL & OMG & TTYL in daily cnvrs. & hates making his wrds easier 2 read
(Memphis will shorten everything to spend less time typing. Probs uses LOL & OMG & TTYL in daily conversation. & hates making his words easier to read)
On the other hand, Wentz will gladly drop his scene speak 2 make his text accessible.
Maven doesn't like 2 text or call... or talk, or be around people, but when they do text they don't use a typing quirk, they're just always tired & it affects their writing. A million misspells and missing letters and— how did you even sleepily misclick so badly you ended up in the emojis??
& then everyone else is somewhat normal. They either type w/ 2 much punctuation (see: Melvin Compassion) or refuse to even respond 2 ur text message (see: Mercury Paranoia) or responds 2 all of ur msgs w/ some form of vulgarity & middle finger emojis (see: Maddox Impulse)
4 notes
·
View notes
Text
people here are... strange. that's coming from someone who's literally seen at least ninety-percent of their galaxy. she lifted herself onto the edge of the boardwalk's handrail, looking down at the people playing around in the sand. that looked physically taxing, she'll pass. this was like starting at level 1 in a really crappy mmo. the hacker awkwardly shifts in her seat, man she wish she had her phone. she tilts her head over her shoulder, spotting the person next to her. " hey, you. " silver wolf calls out. she makes eye contact and leans forward, holding the edge of the railing. they seemed easygoing enough to just answer her question without hesitation. " what do you think of this place? do you find it fun? "
send msg : @etargus !
#etargus#▹ SYSTEM: // [ ( run : log in ) ]#▹ SYSTEM : // [ ( load data : archer ) ]#▹ SYSTEM : // [ ( load data : etargus01 ) ]
2 notes
·
View notes
Text
If you can't print them on paper, PDF them and find a way to save them. Email to your non-work mail, maybe. (There'll be a record on their servers, but the issue isn't to prevent them from knowing you kept a record; it's to have it available.)
I have yet to see an office security system that completely prevented the ability to send files outside of the system. A lot of them lock access to gmail but not Google Drive, where you could drop files. (Use a private browser window so it doesn't show up on the computer's records; it's still going through the work ISP but that's less likely to be noticed - because that's tracking every bit of internet activity across their network.)
If you suspect work's IT group is reviewing external emails & attachments, name them something like "benefits notes" - so it looks like you're sending the company benefit plan info to your personal account so you can review them at home. You might be able to password-lock the PDFs, depending on what software you have available. Pick something easy to remember, not high-security - you're not trying to block hackers; you're just trying to make it difficult to notice.
In case of extreme lockdown: You can save emails as individual .msg files, which will be at least outside of the email program that may be under their control.
Do Not Let HR do this to you. It is not illegal to talk about wages in the work place. I did and got a 12% raise!
73K notes
·
View notes
Text
Major Cybersecurity Breach at Leidos Holdings Inc., Pentagon Contractor
Leidos Holdings Inc., a leading IT services provider for the U.S. government, has fallen victim to a cybersecurity breach. Hackers have leaked internal documents from the company, raising serious concerns about the security of sensitive government data managed by third-party contractors.
Leidos: A Key Player in Government IT Services
Leidos, formed in 2013, has established itself as a crucial player in national security through its IT services and solutions. In the 2022 fiscal year, Leidos was the largest federal IT contractor, with $3.98 billion in contract obligations. The company's client roster includes high-profile organizations such as the Defense Department, Department of Homeland Security, NASA, and other U.S. and foreign agencies. Notably, 87% of Leidos' revenue comes from contracts with the U.S. government.
The Breach: Origin and Scope
The leaked documents are believed to have been stolen during two separate breaches of Diligent Corp. in 2022, a platform used by Leidos. According to a Bloomberg News report, Leidos used the Diligent system to host information gathered in internal investigations. https://twitter.com/ShadowofEzra/status/1815866536206426468 The Cyber Press team investigation revealed that the stolen data comprises one gigabyte of files in various formats, including zip, msg, doc, jpg, png, xls/x, and pdf. These files are associated with Leidos technical assistance and its customers. The leaked data is divided into two parts: part one contains 451 files representing credits, while part two includes 6,500 files representing bitcoins or dollars.
Post on BreachForums leaking the data
Potential Impact and Ongoing Investigation
While the nature and sensitivity of the stolen documents remain unclear, the leak underscores vulnerabilities in the cybersecurity frameworks of companies handling critical government information. Leidos has confirmed its awareness of the issue and is actively investigating the extent of the breach. However, the company has not yet made a public statement regarding the specifics of the leaked documents or the steps it is taking to mitigate the impact.Some Redditors are claiming this data was stolen over a year ago, but just released today: https://www.reddit.com/r/BB_Stock/comments/1eak5cp/comment/lemtgo5/?utm_source=share&utm_medium=web3x&utm_name=web3xcss&utm_term=1&utm_content=share_button
Broader Implications for Cybersecurity
This incident has sparked a broader discussion on the security measures and protocols employed by government contractors. Cybersecurity experts warn that breaches of this nature can lead to severe consequences, including financial losses, reputational damage, operational disruptions, and legal complications. Moreover, such incidents can erode consumer trust and subject organizations to intense scrutiny from regulators and customers.
Next Steps and Future Concerns
The threat actor responsible for the breach has indicated plans to sell the data in two different types, further exacerbating concerns over the potential misuse of sensitive information. This development has prompted Leidos to take immediate action to evaluate the extent of the damage and strengthen its defenses against future attacks.As the investigation unfolds, the cybersecurity community and government agencies will be closely monitoring the situation. The incident serves as a stark reminder of the ongoing challenges in protecting sensitive data in an increasingly complex digital landscape, particularly when it involves critical national security information. Read the full article
0 notes
Text
como tirar msg vpn
🔒🌍✨ Ganhe 3 Meses de VPN GRÁTIS - Acesso à Internet Seguro e Privado em Todo o Mundo! Clique Aqui ✨🌍🔒
como tirar msg vpn
VPN grátis
Um VPN (Virtual Private Network) grátis é uma ferramenta que proporciona anonimato e segurança ao navegar na internet sem a necessidade de pagamento. Existem diversas opções de VPN gratuitas disponíveis no mercado, cada uma com seus próprios recursos e benefícios.
Ao utilizar um VPN grátis, o usuário pode ocultar seu endereço IP real, proteger seus dados de possíveis hackers e manter sua privacidade online. Além disso, uma VPN gratuita pode permitir o acesso a conteúdos restritos geograficamente, como serviços de streaming e sites bloqueados em determinadas regiões.
É importante ressaltar que, embora as VPNs gratuitas ofereçam diversos benefícios, algumas delas podem apresentar limitações em termos de velocidade de conexão, quantidade de dados disponíveis e número de servidores disponíveis. Além disso, é fundamental escolher uma VPN confiável e segura, a fim de garantir a proteção adequada de suas informações pessoais.
Antes de optar por um VPN grátis, é aconselhável pesquisar e comparar as opções disponíveis, considerando aspectos como reputação da empresa, políticas de privacidade, protocolos de segurança utilizados e avaliações de outros usuários. Dessa forma, será possível escolher a VPN gratuita que melhor atenda às suas necessidades de privacidade e segurança online.
Acesso bloqueado
Quando nos deparamos com a mensagem "Acesso bloqueado", significa que não temos permissão para acessar determinado conteúdo, seja em um site, rede social ou aplicativo. Esse bloqueio pode ocorrer por diversos motivos, desde restrições de idade, configurações de privacidade, violação de termos de uso até questões de segurança cibernética.
Muitas vezes, os websites utilizam bloqueios de acesso para proteger informações sensíveis ou garantir que apenas pessoas autorizadas tenham permissão para visualizar o conteúdo. Já em redes sociais, o bloqueio de acesso pode ocorrer se a conta for denunciada por violar as diretrizes da plataforma, resultando em restrições temporárias ou permanentes.
Quando nos deparamos com a mensagem de "Acesso bloqueado", é importante respeitar as políticas e normas estabelecidas pelo fornecedor do serviço e verificar se há alguma orientação ou processo para contestar o bloqueio, caso consideremos que foi realizado injustamente.
Em casos de bloqueio por questões de segurança cibernética, como sites suspeitos que podem conter malwares ou phishing, é fundamental não tentar acessar o conteúdo bloqueado, para proteger nossos dados e dispositivos de possíveis ataques.
Portanto, ao nos depararmos com a mensagem "Acesso bloqueado", é essencial agir com responsabilidade, compreendendo as possíveis razões por trás do bloqueio e seguindo as orientações adequadas para resolver a situação, garantindo uma navegação segura e protegida na internet.
Configuração VPN
A configuração VPN, ou Rede Privada Virtual, é essencial para garantir a segurança e privacidade dos dados transmitidos pela internet. Uma VPN cria um túnel criptografado entre o dispositivo do usuário e o servidor VPN, impedindo que terceiros interceptem as informações transmitidas.
Para configurar uma VPN, o usuário pode optar por diferentes métodos, como utilizar aplicativos de provedores de VPN confiáveis ou configurar manualmente as configurações de rede do dispositivo. O primeiro passo é escolher um provedor de VPN respeitável, que ofereça uma boa variedade de servidores em diferentes localizações e protocolos de segurança robustos.
Após escolher o provedor, o usuário deve baixar e instalar o aplicativo da VPN em seu dispositivo. Em seguida, é necessário criar uma conta e fazer login no aplicativo. A partir daí, basta selecionar um servidor VPN disponível e conectar-se a ele. Muitos aplicativos de VPN oferecem opções avançadas de configuração, como escolha de protocolo de criptografia e ativação de medidas de segurança extras.
É importante configurar a VPN corretamente para garantir a proteção adequada dos dados transmitidos. Além disso, é fundamental atualizar regularmente o aplicativo da VPN e manter-se informado sobre as melhores práticas de segurança digital. Com a configuração adequada de uma VPN, os usuários podem navegar na internet com mais privacidade e segurança, protegendo suas informações pessoais de possíveis ameaças online.
Privacidade online
A privacidade online é um tema cada vez mais relevante nos dias de hoje, à medida que passamos cada vez mais tempo a navegar na internet. Com o constante avanço tecnológico, a nossa atividade online está cada vez mais exposta, levantando preocupações sobre a segurança e proteção dos nossos dados pessoais.
É fundamental compreender a importância de proteger a nossa privacidade online, uma vez que informações sensíveis podem ser facilmente comprometidas se não tomarmos medidas adequadas. Existem várias formas de garantir a nossa segurança online, tais como utilizar passwords complexas, evitar partilhar demasiadas informações pessoais em redes sociais e manter os dispositivos e programas atualizados.
Além disso, é essencial conhecer a política de privacidade dos websites que visitamos e das aplicações que utilizamos, de forma a entender como os nossos dados são recolhidos, armazenados e utilizados. Optar por ferramentas de segurança, como antivírus e firewalls, pode ajudar a proteger os nossos dispositivos de ameaças online.
É importante estarmos conscientes dos riscos associados à falta de privacidade online e adotar práticas seguras ao navegar na internet. Proteger a nossa privacidade é essencial para manter a segurança dos nossos dados pessoais e garantir uma experiência online livre de preocupações. Lembre-se sempre de que a sua privacidade é valiosa e deve ser protegida.
Proteção de dados
A proteção de dados é um tema de extrema importância nos dias de hoje, visto o aumento constante do uso da internet e das tecnologias digitais. Garantir a segurança das informações pessoais dos usuários é essencial para evitar possíveis violações de privacidade e vazamentos de dados.
No contexto atual, as empresas e organizações precisam estar em conformidade com leis e regulamentos que visam proteger as informações sensíveis dos usuários. Um desses regulamentos é o GDPR (Regulamento Geral de Proteção de Dados), que estabelece regras claras sobre o tratamento de dados pessoais e impõe sanções para aqueles que não cumprem suas diretrizes.
Além disso, a proteção de dados não se limita apenas às empresas, mas também aos indivíduos. É fundamental adotar práticas de segurança digital, como o uso de senhas fortes, a ativação da autenticação em dois fatores e a atualização constante dos sistemas operacionais e softwares.
Ao navegar na internet e utilizar serviços online, os usuários devem estar cientes dos riscos e adotar medidas preventivas para proteger suas informações. Evitar clicar em links suspeitos, utilizar redes Wi-Fi públicas sem proteção e compartilhar dados sensíveis em sites não seguros são algumas das precauções que podem ser tomadas.
Em resumo, a proteção de dados é um assunto que deve ser levado a sério por todos, tanto por empresas quanto por indivíduos. A conscientização e a adoção de boas práticas de segurança digital são essenciais para garantir a privacidade e a integridade das informações pessoais no ambiente virtual.
0 notes
Text
Sequel- Log-blog of Some Reality fr. manifesto-fact.blogspot.com
凡走过必留下痕迹。历史的先声往往被忽略,历史的后声会层出不穷且会检视出满目疮痍的厚黑于留下之痕迹。
2024-1-28-P.S. More paragraphs added at the end.
2024-1-3 有人听到我说的法学院绝非市面上普通法学院,那是有关天地人神密切相交的法度,真理,真道。 受益于台湾宋七力教授发明的所谓“分身”假说之冒牌者需要被提醒- 没有掂量台湾周董事长承仁先生的人间法度- 连女婿也不认识(前述拿女婿做球给你看)-非佛教主义者,吃了这个便宜饭,后果更严重。 如果是拥有真光真道的真先知真教授,比方说以赛亚在以赛亚书38章中有真神的能力(时空法度),就不会为耶稣做反见证;无情无义的现实告诉大家,伪类已经导致了他人走不好路,也制造了耶稣所说的offense-Woe to the world because of the causes of sin. For the stumbling blocks must come, but woe to the man by whom the offense comes! (Matt.18:7);deliberately letting truth be failed(e.g.指鹿为马),要接受divine remedies/corrections (Isaiah 59:13-15 & 18),Holy Bible rule of truth can't be forfeited. Yesterday texting to Harbinger's Daily msg. board: I'm a donor of Harbinger's daily and a recipient of email Sunday Edition, but last Sunday it was missing or encountered malicious hacker- those insidious kleptocrats out of ulterior motivation are afraid of my reading top story "Divine judgment-One of The Bible's Most ‘Offensive’Teachings?", really fall into "Being a thief, feeling untenable". What happened to me is totally offenses(regarding deer as horse, installing stumbling blocks etc., which Jesus predicted), divine justice/judgment is not only appropriate but also much-needed.
manifesto-fact.blogspot encountering issue, shysters are so unscrupulous that they deter my posting and enjoy themselves being the cushion of the strict press censorship of Chinese Communist party.
没有法度,人世间没有人世间,你懂的, God must speed Isa.51:6. 有关耶稣基督在大白宝座scenario之一,2023-NOV-9-10 log-blog 提到时空压缩成麻花,数理逻辑上temporal-spacial dimension 变成一坨Non-Euclidean topology even iso-topology.
2024-1-8 Revised this morning Rev. Lewis Johnson did hermeneutics on propitiation(from SLJ institute)-God's plan for the ages-the finished work of Christ, I try to summarize in my understanding: which is the perfect solution through Jesus, Son of God/Son of Man's sacrifice on the cross to provide atonement as a paragon and free gift to transform the humanity sins into a state of being forgiven and to re-create humanity, which satisfies the Holy Father. AS for his mentioning "when God looks down from heaven upon men, he does not see human distinctions such as we see", I think God is immanent and omniscient ,cf. Luke 12:7 God knows how many hairs you have on your head. 新约教徒万世一系于order of Melchizedek:Genesis 14:18-20 and Hebrews Ch.7,且是旧约的延续(Melchizedek 是祭司及君王), 耶稣集先知,祭司,君王于一身。摩西法规君王与祭司不能相容-防止绝对权力绝对腐败(历代志下26章,撒母儿记上10:8&13:8-11,Pastor Dean Dwyer在HB Daily强调),看来,只有地球上无父无母的Melchizedek作为son of God,非从属人类私欲,才有资格. 吴祚来 @wuzuolai 民主政治,争权是为了分利。 主要是个人利益,国家利益分配问题,但左派喜欢赋予国家宏大的使命,譬如拯救世界,要影响气候变化。 左边的政治实用原则是用福利拉票 又用��大的政治使知识人大学生们追捧 与中共一样,高的比你高,低的破底线。 境界很高 手段卑劣 玩宣传玩权术炉火纯青。 某种意义上是 理想主义进步主义革命主义 与 实利主义保守主义价值主义 博弈交锋 11:58 AM · Jan 7, 2024 改变思想的还有利益。 共产党人打天下时的思想与坐天下时的思想是不同的,为什么,因为权力带来利益,他们很快从革命变成反革命。 这就是,共产党苏联与中共,等,从国际主义很快就退回到国族主义,最后变成党派,变成黑社会一样的小团伙。 是权与利益改变了他们思想。… Lucia🍊🍊fight for Trump顶流川粉 @ChooLucia 美国著名物理学家李.斯莫林说:“当思想改变你的思想,那就是哲学,当上帝改变你的思想,那就是信仰,当事实改变你的思想,那就是科学,当一个人既没有思想又不信宗教还罔顾事实的时候,远离他!不要浪费你的宝贵时间!8:59 PM · Jan 6, 2024
前阵子海外非中共中文网路上在播一个很古早的台湾新闻- 高级物理学家叶企孙在1950年代蒋中正治下的台湾被沦落至街头,不知是从台湾淘宝还是周恩来的新闻官早就定向攫取在对内外文宣中-有关万恶的资本主义阴暗面,关键点是其生存权决不是失去于指鹿为马与无法度,而是财产事务没有被妥善打理,有人别有用心推出,那是illuminati godfather 马戏团左手右手为了cope with the debunking of their conspiracy- 当今民贼盗国贼自编自导自演自我伟光正地通过指鹿为马奸诈贪婪豪夺民脂民膏,演戏给你看,装猪装逼来吃人。 最近几天居然有新版的叶企孙(江苏江阴人员)在纽约被报道沦落街头,今天看到follow-up报道,原来此人是自作孽的赌棍输光身家,绝非美国社会与政府亏待他.
2024-1-15 Posted, 2024-1-14 updated 路德先生与郭文贵先生所提的“九层妖塔”应该就是那九层蛤蟆叠罗汉成一坨怪兽于台海风水要津之地,形成��大能量场,在“这黑水沟,你懂的”地方不时卷起阵阵阴风阴火,可翻江倒海,企图一手遮天,予取予求。 在台湾的中国人教授李敖与宋七力已经教会了对岸Chinese Communist Party toad-master authority how to be “Shysteracy as Humanity/Manliness”(李宗吾语)& "Ugly Chinaman and Crisis"(柏杨Google book-English)- 通过“横着走路(李敖语)”的“分身(宋七力发明)”来“吃人够够(陈致中语)”。 鄙人在log-blog中一再强调我的身份证- 成为一仆一主的大英帝国女王陛下子民, 此汉非彼汉,汉学家的汉,不要让汉学家“汉贼不两立”。 最近网路上又出现对文革负面记忆的回忆,引发我对文革重灾区(Mao's stronghold)有关人与事的进一步述评,被拥有1948年第一届南京国府中央研究院强大阵容的前几名大学DQ的人(前述陈敏章,杭州赶走郁知非教授的两黄),1949年后,是毛方针野蛮登堂入室的既得利益者,毛政策的使徒行传,行毛国柞之礼数-公牛闯进瓷器店 = 我的见证-亲眼目睹毛分子打砸光我祖母珍藏的景德镇有皇家纹路的瓷器。 In the case of OBSI, accompanying the end-time phenomenon,mainly godless/lawless(圣经贴撒罗尼亚后书 2 Thess. Ch.2); what Jesus regarded (Pharisee) is reinforced; 台湾李敖影响力无国界,不仅只教会毛国祚的贪官国贼民贼“横着走路”(李敖变成毛国祚一部分,难怪对号入座Ezekiel Ch.24 scum)。such situation means the kingdom, power and glory belongs to CCP-Chairman Mao's scoundrel movement which was greatly promoted in China- no different from the organized crime. Please convey my msg. to them: Long live your great leader Chairman Mao not enough or Your great leader Chairman Mao long live not enough.
2024-1-17
有些事务不能搭错界。我不知当年那位有些基督教信仰的Wong大夫是否知悉圣经中对于vision/dream是提示式,与预言的生成有关,请参阅Joel 2:28/Acts 2:17, 于是在我的大命小命问题上就不会出现令人遗憾的被中共轻易利用的摧毁人生的孽缘(精神分析上医患搭错界),
另一个例子是吴弘达先生的第一任太太陈XX女士(曾为中华民国在UN口译员,像以前的华航小姐背着国旗)与一度所雇佣的助手搭错界- 毛泽东亲家的养子/继子 Li, Qian-wei居然可以在美国莫逢杰先生处政治庇护(说是萌生反毛意念,是林立果的分身?),但是在我面前又表现出毛周的mentality- 对于大洛杉矶侨界有人张显中华民国国旗极度反感(连对中华民国国旗国歌国徽没有好感的绿色侨界人员也在举-外交礼仪使然,e.g. 李故总统登辉先生过境L.A.逗留Ritz-Carlton期间),好像是CCP外交官在国际官方场合看到一样. 还有可以令人探究的是,他一个劲儿在我面前说莫逢杰先生与伍凡先生是死对头- 我与伍凡先生从未谋面过。 中国的“乡讪”是有名的,去问鲁迅先生。
2024-1-19 有关这条大命小命,继续Been thinking about随笔。1990‘s 前半叶,我祖父母拥有的中华民国光洋时期债券已寄到台北,时任Lee Teng-hui Administration财政部长的是新党王建瑄先生;令人遗憾的是连“庚子赔款换学费”都没有,无法继续我的MBA生涯规划(cf.foregoing & 同��期朱云来),让这条大命小命无辜地被marooned;对于南京中央国府遗留(沦陷)大陆人员享受美蒋特务叶常棣待遇熟视无睹,还侈谈什么新党信念- 中华民国简称中国(宪法一章一节),主权涵盖整个秋海棠地图。 Illuminati-KGB-godfather-circus gamer always gaming- e.g. 毛国柞马戏团左手右手经常玩游戏给你看,反右急先锋邓小平当年杀气腾腾,等到文革后,扮猪吃老虎(华国锋下台),霸王硬上弓(胡耀邦赵紫阳事件),子系中山狼,得志便猖狂,得了便宜再卖乖,见不到他人好,两面三刀典型,让“烈火见真金”彰显在三个没有被平反的右派-authentic/genuine右派(其余都redress,remedies,reparations)。毛国柞的商君书愚民/驭民术叹为观止,让达摩克里斯之剑永远悬在有思想的知识分子头上,迫害-利用-再迫害。 1989-64镇压后像李敖进入大陆的要靠镇压64的最大既得利益者江世俊��子的肩膀发洋财(cf.foregoing),赚得杯钵满盆,我必须向他们学习致敬,多拍马屁才有生存可能,所以要坚决拥护双手赞成江世俊父子在南京唱“支那之夜”,网上在重温海参威前世今生,1995年到期,江总裁让给了普京,有人大加鞭挞,在我看来,哪里哪里,那是沙俄帝国罗曼诺夫王朝固有领土,应该礼让整个东三省。
2024-1-22
接19日Log-blog, 无独有偶,像那位江总裁一样是苏俄帝国的爱国者,中共开国政治局常委元老高岗先生曾提議將東三省併入蘇聯 :https://www.epochtimes.com/b5/24/1/21/n14163583.htm, 显然是伟大的CCP光辉历程一部分; 鄙人只是发言致敬他们的嗜好。
2024-1-23
一则网闻引人注目: 手举五星旗 小粉红对英国钢琴家耍混 竟以为是在中国 https://www.soundofhope.org/post/786889
Let's do further analysis in neutral stand: Scenario one, 不排除是有些小粉红们意犹未尽前二年的白纸运动,继续在海外街头行为艺术- political pastiche/parody/burlesque/behavior arts to satirize Beijing regime in the name of PRC law. Scenario two,与左翼小资产阶级费边社马戏团(装蒜+编码)如出一辙,施展truculence伎俩,testing the bottom-line of western civilization. Scenario three, 大清帝国官轿出行,衙役打头阵高举“肃静回避”牌,让一切小民百姓退避三舍,在CBD弹钢琴的就像街头拉二胡卖艺的,岂容损害官威;on the other hand.只是露出尾巴-欲盖弥彰CCP大清帝国达官贵人显要进入商城的不方便(要被非我类照镜子)。果如此,则可以探究这个现代大清帝国的CCP力量是如何被壮大的:The last glimpse of the sunset in the horizon was captured in 1989 before the TAM-SQ massacre that the BBC London was broadcasting documentary “From Plato to NATO” to demonstrate the value of western civilization(the Greco-Roman culture, the rule of law based upon Christianity), unfortunately, since H.W. paid tribute to Deng Xiao-ping TAM-SQ massacre(Brent Scowcroft and Lawrence Eagleburger as his envoy),the entire value of the west has been increasingly prone to be overwritten by such "Dragon at the Door" phenomenon(cf. Ottawa MLI project trying to fend off it),the landscape of civilization and political spectrum tend to be homogenized by Beijing's influence/arrangement. The red dragon has thrusted the West into abysmal dimension. Please refer to Mr. Matthew Pottinger's testimony: American know-how and capital are seeds and fertilizer from which China’s formidable military might has sprouted.-Pottinger https://docs.house.gov/meetings/FA/FA00/20240117/116738/HHRG-118-FA00-Wstate-PottingerM-20240117.pdf ,and you can understand why.
2024-1-26
【百年真相】鐵證:中共最早倡導「台獨」 https://www.epochtimes.com/b5/24/1/17/n14160607.htm , which means CCP is the origin of the dynamics and incentives in regards to pro-independence movement in Taiwan, 这当然是一贯伟大光荣正确的中国共产党这个百年老店的光辉历程之一,全宇宙理当坚决拥护双手赞成一贯标榜掌握宇宙真理的CCP这个光辉点数。
2024-1-27
洛杉矶小台北不简单,前述1993年从小台北寄航空信到大台北发生麻烦. 前几年连英国《卫报》都报道了某位在民运圈有头有脸的人物被FBI逮个正着-dubbed No.1 co-conspirator(其轨迹上海-香港-夏威夷-基隆-洛杉矶,周日也常去教会), 为了几万元钱,出卖自我,出卖他人(要改朝换代毛国柞的仁人志士), 敬请参阅传教士写的 《The Enemy Within: An Eyewitness Account Of The Communist Conquest Of China》byRaymond J. de Jaegher & Irene Corbally Kuhn . 还有一件事不得不提, 大约近一个decade前,上海新民晚报前后不到半年揭弊了两家公司“中晋公司” 与“钧遥公司”,他们事后怎么不还钱? 前述(1/15/2023)的九层妖塔=九阴妖塔=九只蛤蟆红魔发出邪魔功力九阴白骨爪,黑吃黑,这个厚黑程度不知超过李宗吾与柏杨描述多少倍,只是不要搭错界圆山俱乐部南京中央国府相关交互点,你懂得。
多年前陶XX本来要还债的20万美元据说也在民运圈生发了混世魔王- 要知道一个人的大命损失痛苦指数及物价上涨指数加权起来,债务累计是几何级数/指数函数计量的;至于在台北被刑事起诉开庭的“团练”20万美元碰巧是镜像? Better off not to be seen through by foreign sinologist that the possibility that yellow peril. dragon peril and Xenu peril are easily generated is taken for granted.
2024-1-28 P.S. 在教会中对上述FBI描述对象是知人知面不知心,毛国祚白莲教三合会CCP如影随形似鬼(偏偏尼克松基辛格就是着迷中共盗国官员有天文数字财产),搞sabotage得心应手,wherever you go. 无独有偶,the DVD "Enemies Within the Church""composed by Cary Gordon 可以帮助解答问题- 完全配套延申上述已故传教士写的《The Enemy Within:An Eyewitness Account Of The Communist Conquest Of China 》, the kingdom , power and glory of western civilization could be handed over to quasi-白莲教white lotus evil cult if current trend deepened; the only way to cope with evil tidings is God speed divine intervention.
1 note
·
View note
Text
If you haven't read Greg's articles... Perhaps you should. He's a very nice person as well ;)
Matt, why don't you add his LinkedIn profile in the infosec spreadsheet?
Fucking with all of us around the world, you might not make it alive
Take a peak and make sure ain't nobody inside.
Honestly, with all respect to the Dark Tangent, I don't know how he deals with the invasion of all the crass stupid people in his Vegas con. I wouldn't like it if a project of mine evolved into a bad quality gathering.
Quality over quantity is my motto.
Jeff, should we meet at the Raffle around a Singapore Sling? :) It seems you need a good philosophical discussion to understand the financial benefits of true luxury.
If Joe and Dave want to join us they're welcome 😁 I'm sure Justin W. would love it too, to understand his son, and Claire K. as well, to talk about her grandfather's profession with Dave.
We could stream our Salon sponsored by LVMH on Twitch to educate your lame gross followers.
I would personally invite Count Zero, as he's the most stylish and advanced hacker I know, and he's been my loyal follower since the beginning.
His last text msg to me "you're an extraordinary woman".
Thank you John, the first semester of 2023 wasn't easy, and I'm forever grateful for your moral support 😘
🔓He's the one who sent me the cute staffie GIF, pinned on this Tumblr, to cheer me up.
0 notes
Note
omg u already went to ur prom, yay!! mine is this saturday and i’m so excited 🙌 i’m probably taking pictures with my bsf too before we go. did u take ur bf?
—hacker
AWW I HOPE U HAVE FUN !!! mine was super fun, took my shoes off when i got there and someone stepped on my feet but i’m alive somehow 😔 it was nice, i don’t remember if i told you or not but i got to crown one of my bsfs as prom king it was really nice
and no unfortunately he couldn’t make it :( he had like exams or state testing or something last week and it would’ve been super hard for him to come. i ended up going by myself but i has people to hangout with so it wasn’t too bad. but he’s gonna come for my senior prom, i made him promise lmao.
what are you wearing? :0 and lmk how it goes hehe and also if you go to an after party hehe. just be safe !!
4 notes
·
View notes
Note
hi lore (*゚▽゚*) sorry i disappeared again haha
how was ur thanksgiving w ur bf?? (even tho it’s alr halfway thru dec LOL)
and hru? :D
—hacker
omg no its ok beloved <3 it was good! he came back here like a week later but im not gonna see him until mid february so that sucks but it could be worse! and im alright. honestly i've had a bad week but i'll survive lol. how are you bb? what have you been up to ^-^
0 notes
Text
Anonymous hackers display shocking "Goatse" image on Sphere in Las Vegas
LAS VEGAS — Hackers from Anonymous gained access to the world’s largest display screen, the MSG Sphere in Las Vegas, shocking tens of thousands of gamblers, tourists, and citizens with the disgusting image only known as “goatse.” In a statement to the press, spokesperson for Anonymous Barrett Brown told reporters, “We’re back and we’re meaner than ever. We don’t give a fuck about morals or…
View On WordPress
0 notes
Text
Not sure if I'm getting this texting anxiety or I'm just really lazy to reply. I finally whipped out my phone and started replying these 1 week overdue whatsapp and instagram messages with voice texts (gotta be laziness) and then crashed.
I woke up, to my dismay, discovered that all the people whom I texted yesterday already responded. Okay, to my defense, the longest voice message was fifteen minutes. Fifteen bloody minutes. And when did I become some sort of love guru? I haven't dated myself for over 4 years for crying out loud. Like I understand I'm cold hearted and I'm rational so i can give sensible judgement... but please... leave me alone...
So I decided to ignore it. For a little while anyway. I've also considered switching it to a business whatsapp account with an automated response feature where it will instantly respond to anyone who texts me with the following:
Dear valued friend,
Due to the high volume of messages, the current response time is 2 weeks. Thank you for your patience.
Yours Truly,
Joyee
Fast forward to today, which is only two days after, my jaw dropped to the ground when I received an i-msg from one of the messengers on whatsapp. The only platform I had the notification unmute. I don't know why but I felt like there's a hacker who's robbed my privacy and is now invading my peace.
May be I'm being very dramatic here or may be it's part of aging. Before I started on this rant, I was reading a book, sipping tea and enjoying Charlie's company on my lap.
0 notes
Text
Gitea 推出 Actions
Hacker News 上看到 Gitea 出 1.19 的消息:「Gitea 1.19 (gitea.io)」,在討論裡面就有人提到 Gitea Actions,從名字就知道是抄自 GitHub Actions,算是 Gitea 開始建立自己的 DevOps 生態系的一個重要功能。 目前這個功能還被掛在 EXPERIMENTAL 上,預設是關閉的,而且我自己試了一下也的確試跑不太起來,出現這樣的錯誤訊息,暫時也沒空去細追: time="2023-03-28T17:36:37Z" level=info msg="poller: request stage from remote server" func=pollTask time="2023-03-28T17:36:37Z" level=error msg="cannot accept task" error="unknown: rpc…
View On WordPress
0 notes
Text
Price: [price_with_discount] (as of [price_update_date] - Details) [ad_1] Secure your digital life with Quick Heal Total Security that allows you to enjoy safe online banking, secure Internet surfing, and robust protection for your laptops and PCs against external threats. Enjoy safe banking and shopping without the fear losing your valuable data .Manage and control Internet and computer access for your kids .Keep your passwords safe from hackers. Block all kinds of unwanted access to your device through webcam 1500 viruses/minute 800 million threats in last 10 months After ordering, for activation code check Buyer/Seller messages under message center at amazon.in/msg or check your amazon regd. email ID. Fulfillment will be done within 2 hours of ordering E-mails will be sent only to e-mail ID registered on amazon.in. If you have not registered your e-mail ID, please do so before purchasing this product Easy to use, automatically detects and removes viruses, Trojans, malware; Keeps your device safe, secure, protects against malicious virus attacks Parental Control lets you manage and control Internet and computer access for your kids [ad_2]
0 notes