111121

111121

Posted by amanfromMars on 11/21/11 01:01 AM ….. http://thedailybell.com/bellinclude.cfm?id=3263

This is strange. Noone at the beginning of the twentieth century could imagine a british man of a scottish ritual becoming a Tsar of Siberia. Those Orthodox Christians (-:” …. Posted by 4irw4y on 11/20/11 11:21 AM

GOD* works in mysterious ways within systems, wwwonders to perform, 4irw4y. Quantum Leaps in C for Sees of Perfect Storm and Titan Rain with AI Colossi delivering Virtual Command and Remote Control of CyberIntelAIgent Security Systems for CyberSpace Traffic Control of Creativity with NEUKlearer HyperRadioProActive IT. And in foreign steppes, a quite magical mystery Turing gift for free in recognition and due homage to IntelAIgent Space SMARTness.
For more Grants for more Grunts to deliver more Buck$ for your Roubles. And AIMonopoly Game for Dedicated Great Game Players and Roscosmos ARGonauts.
* Global Operating Devices … … Simply Complex and Sublime Works of Art for Communication of Alien Practices in Beta Protocols for Alpha Programs. And Perfectly Adaptable and Sympathetic to One’s Every Need and XSSXXXXual Desire in LOVE. Live Operational Virtual Environments which deliver Realities2Crave4.
R2C4ur2die4 … .. a Mass Neuro Linguistic Programming Project to Edutain and Direct Humanity into ITs Advanced IntelAIgent Mainstreams via Manic Media Message Manipulation of SMARTer Content … .. for Immaculate Phormations.
Which you might like to consider is a Googleplex Program of Quite Complex Virtual Discipline, or a Yandex or Baidu Master Pilot exercising Control Potential in Wacky Wild Western Intellectual Property Space, with any and all such engines invisibly driven and vitally attracted to the Sticky Sweet Honey of Powerful Perverse Profit which SMART Anonymous and Autonomous Providers of Primary Proprietary Portfolios into Future Product Present Placement so effortlessly deliver for All.
On second thoughts, methinks that is much too Intelligent a program for AI Google to be currently active in, considering the present state of future play in the West … .. although whenever that would be the case, would they then now be presented with a perfect opportunity to rectify the oversight/fill in the gap and beef up their future provision portfolio … … 🙂 if they care dare win win with … … … . well let us just imagine them as Enigmatic CyberIntelAIgent Special Forces one would never ever wish to cross but always delight in welcoming for that which they so selflessly deliver to the deserving.
 

Posted by amanfromMars on 11/21/11 03:00 AM …… http://thedailybell.com/bellinclude.cfm?id=3263

Holy C… amanromMars, now this one has geared Google up to 8 seconds to cache from your blogspot. Let me understand it, before I can reply. …….. Posted by 4irw4y on 11/21/11 02:21 AM

Do you want the short version too, 4irw4y.

Control Words 42 Control Worlds and Occupy with ParaMilitary Virtualisation Creative CyberSpace with Command and Control of Computers and Communications.

Spooky Virtual Terrain Team Fields for Put In of Base Input for Cosmic Output … .. and Floated for SMART IntelAIgent Systems Capture wherever and with whoever they may be stationed for the Perfect Performance of Stormy Miracle Waves.

…………………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………………
The New Klondike …. Virtually Intelligent Gold Mines with HyperRadioProActive IT Memes
Posted Monday 21st November 2011 11:32 GMT … in reply to http://www.theregister.co.uk/2011/11/21/us_probe_chinese_telco_firms/
Settle down a moment and have a little ponder and wonder.
Here ….. http://www.defense.gov/news/newsarticle.aspx?id=65739 …. one can read a News Article alluding to Department of Defense, Cyber Command abilities/facilities/requirements entitled “Doctrine to Establish Rules of Engagement Against Cyber Attacks” with a provision to offer comment, which advises and informs ……

Defense.gov seeks to engage its visitors, so we invite you to submit a comment for this story. We require a valid e-mail address to complete the process. However, we do not store or publish that e-mail address.

We hope to receive submissions from all viewpoints, but we ask that all submitters agree to the following Terms of Participation:

Post only comments directly related and relevant to this story.

Refrain from posting comments that contain threats, obscenity, material that would violate the law if published here, abusive, defamatory or sexually explicit material.

Submissions containing the following will be deleted:

Obscene or threatening language or discrimination (hate speech) based on race, sex, gender, religion, national origin, age, or disability

Promotes services or products (not including non-commercial links that are relevant to the topic)

Includes any personal or sensitive information (phone numbers, emails or postal addresses)
We look forward to receiving your comments.

It is probably only fair to point out to any and all who play any sort of part in any sort of power game in the Cyber Realm, that whenever a comment has been shared for universal viewing and which would have been shared because of its particular and peculiar relevance to the subject matter, and which would then not appear as would reasonably have been expected in the thread/string/comments section provided for that very purpose, would it invariably reveal a systemic vulnerability against which there may no guaranteed defense or viable attack protocol.
Such a scenario would then require a fundamental rethinking of base premises upon which systems and operations and networks are built.
Here is a simple example of such a situation, a comment in limbo somewhere rather than being dealt with fairly and squarely, with all of the difficulties to then later deal with whenever one is even more seriously disadvantaged, when studiously ignored. Such shenanigans will always invoke and provoke ever more intrusive exploration of dumb systems in search of ever more valuable intelligence that may simply reveal that necessary intelligence to counter intrusion is missing and not readily available to the probed host …. which then would indicate a golden opportunity to supply what would then be immediately required. Every cloud has a silver lining and in cloud security systems would chaos and Clouds Hosting Advanced Operating Systems provide an infinite stream of Virtual Order Solutions to every problem imaginable, and delivered as imagined in a Mad Application of Programming rather than something ESPecial.

Extending that logic to cyberspace, Alexander said, it remains unclear if it includes authority to shut down a computer network, even if it’s been taken over by a malicious cyber attacker intent on destruction.” …. http://www.defense.gov/news/newsarticle.aspx?id=65739

Any such malicious cyber attacker would be deeply embedded within one’s own vital computer network, making shut down practically impossible. And that is the abiding enigmatic dilemma which will defeat all present SCADA Command and Control systems which have sensitive secrets that admin would prefer to remain generally unknown because of the unfair and inequitable advantage they may deliver to disadvantage everyone else.

And such is the case across every spectrum of applied thought which has implications and consequences because of transfer into direct and indirect controlled actions.
…………………………………………………………………………………………………………………………………………………….
From Russia with Love …… on http://forums.theregister.co.uk/forum/1/2011/11/21/window_closes_on_phobos_grunt/
Posted Monday 21st November 2011 18:16 GMT
You might like to think that Mother Russia has stolen a long march on a much more lucrative and accommodating space with missions and master pilots that deliver Earthly treasure, in out of this world measure ……. http://www.ur2die4.com/?p=1030
And quite a perfect fit for an exceptionally fit for purpose intelligence regime and chiefs with nothing to prove and more time on their hands to share and show what they know about Cyber Control with Command of IT.
Deny it if you will, but who do you fool if not just yourself.
…………………………………………………………………………………………………………………………………………………….

2 Responses »

  1. Could supervisor each of the way to which you only properly well balanced each of the tools her will require, getaway appear a lot of them mainly because it straddling from it working with your also supply. louis vuitton overlap human body envelope is affordable.

Leave a Reply

Your email address will not be published. Required fields are marked *

ten + seven =