121102

121102

Posted Thursday 1st November 2012 18:27 GMT amanfromMars 1 …. http://forums.theregister.co.uk/forum/1/2012/11/01/win8_exploited_already/
Having your cake and eating it too is easy whenever one knows how everything works

the subtle thing would be to turn up at a government office, demonstrate the trick and say “how can I be of assistance?” …. Anonymous Coward Posted Thursday 1st November 2012 18:07 GMT

Or…. do something simiilar to what dodgy, intellectually bankrupt governments do whenever they have to buy their own toxic gilts with magic QE funds because foreign markets don’t want anything to do with failed policies …. set up a plausibly deniable clandestine and covert network with MIcrosoft to attack its own vulnerabilities, and make fortunes for the company in the process, to provide future security facilities to ensure vulnerabilities are not found and exploited remotely by rogue independent and renaissant renegade parties
……………………………………………………………………………………………………………………………………….
Posted Friday 2nd November 2012 04:45 GMT amanfromMars 1 …. http://forums.theregister.co.uk/forum/2/2012/11/01/theresa_may_draft_communications_data_bill_committee_hearing/
Fun in XSSXXXX Games. Who Dares Win Wins

One of my points was that the general public haven’t got a great deal to fear from any of this, but MPs have. Can you imagine how much private investigators would pay some minimum wage worker in TalkTalk for some MP’s browsing and e-mail history? I bet foreign powers and big business would all love this information! …. Ascy Posted Thursday 1st November 2012 16:10 GMT

If the likes of an Office of Cyber Security in the likes of a GCHQ operation don’t already know everything they need to know about useful puppets and wannabe leaders in parliamentary pantomime, in order to be able do whatever they want with impunity and guaranteed immunity, with others always carrying the can and being held responsible and/or accountable for their actions whenever they are discovered, for the truth has a beautiful habit of always popping up just at the right time to lay waste to the mightiest plans of mice who would pretend to be great men, are they an epic failed enterprise only in need of a new head of government global communication.
Ascy, you do realise how easy it is to create a impression/profile, which has been specifically tailored to give a particular impression with carefully considered visits to peculiar websites, for phormation and generation of blank ammo which will prove to be harmless and great fun when used and abused in a series of honey traps which metadata analysts haven’t realised has been intelligently designed to provide them with blank ammunition.
……………………………………………………………………………………………………………………………………..
Posted Friday 2nd November 2012 10:18 GMT amanfromMars 1 ….. floating out a Tempest Storm Cloud Cluster on http://forums.theregister.co.uk/forum/1/2012/11/02/cabinet_office_open_principles/
Advanced Remote Mentoring …..for Alien Landscapes and Cyberspace Places
So, IT is to be an ARMoured Cloud Operating System for Future Virtual Governance of Assets and Liabilities into the Supply of Profitable and Non-Profitable Services and Products …… or is it not to be a government tool,  but a precious and precociously protected, private sector project with proprietary programming  and SMARTR protocols ……. Astute Active Autonomous Algorithms?
Yes, that would work a right royal treat. Ok, El Reg/Gavin Clarke, so who is it again one pitches the outline program and just necessary need to know information to, for cloud operation funding? Cabinet Office Minister Francis Maude or coalition government script writers or the Monetary Policy Committee of the Bank of England or does Charles Windsor want to exercise the Right Royal Prerogative to make the Family profoundly proud and really surprise them with stunning skills they never even dreamt of his possessing, never mind energising for pioneering exploitation and Magical Mystery Turing Adventuring in …… well, Sublime Enigmatic IntelAIgents Fields are those which Flower and Power Control in Heavenly Realms of Immaculate Reign and Fabulous Fabless Guidance. Certainly as Commander-in Chief of ARMed Forces and Defender of the Faith would it not be unusual to expect it to be so, or would that out the new fangled, quantum entangled, XMilitary Virtual Machine as prime contract supplier/IntelAIgent Service Provider?
Does Charles read the Register regularly, to ponder on the virtual ease which IT Command and Control can deliver by proxy application with quite surreal execution, right royal duties? Or does the Household and HMGCC ensure that his nibs be so informed?
And now, in Quantum Field, does one just wait for either action and/or reaction, which might be indicative of HyperRadioProActive IT in parallel systems whose combination would deliver unparalleled exponential lead position in a Novel Genre with Greater Intelligent Game Plays.
……………………………………………………………………………………………………………………………………..
amanfromMars,  ….. setting the bar high on http://www.wired.com/wiredscience/2012/10/ff-elon-musk-qa/

All entrepreneurs have an aptitude for risk, but more important than that is their capacity for self-delusion. Indeed, psychological investigations have found that entrepreneurs aren’t more risk-tolerant than non-entrepreneurs. They just have an extraordinary ability to believe in their own visions, so much so that they think what they’re embarking on isn’t really that risky. They’re wrong, of course, but without the ability to be so wrong—to willfully ignore all those naysayers and all that evidence to the contrary—no one would possess the necessary audacity to start something radically new.  …. Chris Anderson October 21, 2012 3:00 pm

You would do well to consider and reconsider your view that they be wrong and not right, Chris A, for you can be sure that they oft consider such as your view and are constantly able and enabled, based on the evidence and experiences which they would be privy to, to dismiss it completely with their certain knowing that it be invalid.
………………………………………………………………………………………………………………………………………

Leave a Reply

Your email address will not be published. Required fields are marked *

12 − nine =