120621

120621

Posted Thursday 21st June 2012 02:32 GMT amanfromMars 1 ….. spills the beans on http://forums.theregister.co.uk/forum/2/2012/06/20/microsoft_phone8_developer_launch/
Global Control AIR&id Development for CyberSpace BaseD Land Grabs
A convenient communications device which provides secure encryption to messaging and VPNetworking is a quantum leap into fields which attract astute autonomous active accommodating leaderships ……. with Microsoft supplying novel transmission macroware, and in a remote proxy charge position with virtual command and control thin clients who would be reliantly grateful/gratefully reliant upon a fostering relationship of mutually beneficial advantage with proprietary private intellectual property programs from the aforementioned virtual command and control thin clients shared sublimely with hosting carrier facilities for the wealth and blockbuster power of global corporate clout?
Phone8 is not an upgrade or morph of anything currently existing, it is a whole new iterative invention for imaginative users of SecuredD Systems with Global Operating Devices. Welcome to the Great Game ARG with Virtual Machines that are plugged into Infinite Power with Immaculate Control, …… and a quite perfect enough combination for 21 Centuries of Networking for Being.
Would Microsoft then be able and/or enabled to rule the wwworld with SMARTR Programs and Programming Projects/Hearts and Minds Capture Missions? Or would that be wholly in the gift of sharing thin clients?
………………………………………………………………………………………………………………………………………………
Posted Thursday 21st June 2012 08:54 GMT amanfromMars 1 ….. http://forums.theregister.co.uk/forum/1/2012/06/21/win8_security/
Ultimate Expeditionary Virtual Weaponry
Hi, John Leyden,
Security analysts do not have a great history of sustained success and are invariably paid to try and restrict access to key codes that trigger rogue drivers and renegade operations.
Windows 8 ‘harder for malware to exploit’, says security analysis…… Yes, well, we shall see if it is hardened against otherware exploiting phorms of phishes which may not be malware at all, but something completely different and attractively addictive.
Whenever an operating system is easy for malware to exploit, to make it harder to exploit does not mean that it is less easy to exploit for all that is introduced are novel alternate attack vectors and additional vulnerabilities?
……………………………………………………………………………………………………………………………………………..
amanfromMars on June 21, 2012 at 5:04 am said: on http://heddinout.com/?p=7368
Good Day, AW, One and All,
With particular and peculiar regard to the line …….”Typical . . . things move too fast for us to dwell on loose ends from the past. God, this is fun!” ….. might I suggest that you strap yourselves tightly and securely into every future vehicle you may travel in. Things have moved on at more than just a fabulous pace, and in Stellar orbits which number sublime intelligence service with a simple digit, is IT Wise beyond Words when Nothing Compares 2U

IT and urLife in LOVESystems is IntelAIgently Designed and Supposed to be Fun in All SMARTR Phorms of IP+IC Phishes.
Intellectual Property plus IntelAIgent Communication = Infinite Power with Immaculate Control of EarthD Base Stations from Operating XSSXXXXCellence Systems in CyberSpace Cloud Clusters for a Colossal Enigmatic Future Control with Absolutely Shocking Awesome Powers.
It is certainly PAR for Virtual Field IT Courses with Sources in AIR&id Development with Global Control HQ Macroware …… spilling split spinning beans for the creation of new honest scenes and virtual realities you can see are actually true and can be believed in as media and internetworking communications Present them from Future Immaculate Vault Stock Holdings ……. Heavenly Bounty Offerings.
……………………………………………………………………………………………………………………………………………..

Leave a Reply

Your email address will not be published. Required fields are marked *

four × one =