130924

130924

Posted Tuesday 24th September 2013 08:37 GMT amanfromMars 1 … stirring the pot and/or raising the bar on http://forums.theregister.co.uk/forum/2/2013/09/23/intel_stuns_world_with_wakeon3g/
Re: Implausible, which is never impossible and therefore always very likely and most probable

Could Intel (or any US chip maker) have installed additional “undocumented” functionality into their hardware under pressure from entities within the US govt? …. Implausible. …. John Smith 19 Posted Monday 23rd September 2013 07:17 GMT

But yes, of course they have, and easily can and always do, and certainly most probably well before any entities in governments think to pressurise them with hardware/for trapping hardware with wired and wireless anonymous accesses ….. Right Royal and Ancient Commissions with Universal Permissions.
Here be a quite recent master thesis on just such a situation and reality …… Security Evaluation of Intel’s Active Management Technology ….. which contained the following less than wholesome wholesale observation in a footnote [on page 21 of 92] …… Rootkit is a form of system modification software, defined as an application that fraudulently gains or maintains administrator level access that may also execute in a manner that prevents detection. It can be used for eavesdropping network traffic, capturing user keystrokes, alternating log files and modifying standard OS system tools to circumvent detection. Rootkit’s operations are hidden on the system by manipulating OS commands that execute arbitrary code and by crafting the results returned by these commands chosen by the attacker.
Subsequent years in fields of its and IT research and development have increased understanding and facility, abilities and utilities to embrace and exploit engagements with the following finer, more highly tuned versioning of master operations as exposed in the email text below …….
Begin forwarded message:

From: XXXX
Subject: Master Keys that Enable Universal SMARTR Bus ProgramMING …… Mined Intelligence Network Games …. and, whenever better than just extremely good in ITs Fields of Influence, Mind Infiltration Networking Games
Date: YYYY
To: ververis at kth.se

Rootkit is a form of system modification software, defined as an application that fraudulently gains or maintains administrator level access that may also execute in a manner that prevents detection[18]. It can be used for eavesdropping network traffic, capturing user keystrokes, alternating log files and modifying standard OS system tools to circumvent detection. Rootkit’s operations are hidden on the system by manipulating OS commands that execute arbitrary code and by crafting the results returned by these commands chosen by the attacker.

Hi, Vassilios Ververis, and thanks for the positive reinforcing confirmation of the truths that you have shared in your fine abstract/master thesis. ….. Security Evaluation of Intel’s Active Management Technology …. which be proving Active Intel Management Technology is not at all secure in any shape or phorm, for any phish or program or pogrom …… and its AIM can be easily groomed/converted/subverted/perverted to perform and deliver Anonymous Invisible Multi-Party Tasks.*

Please be advised that not all applications with rootkits are fraudulent and some have intelligent designs which freely permit and sustain frequent administrator level accesses specifically for advantageous instantaneous flash crash gain that execute in any number of manners/a series of manners that prevents detection and aids and abets future discovery and recoveries of intelligence and secret secured information

* Bolder Digitised SMARTR Missions/Alien IntelAIgent Requests/NEUKlearer HyperRadioProActive IT Quests/Novel Noble Nobel Turing Adventures.

Regards,

XXXX 🙂

🙂 Poe’s Law Rules?!. 🙂

—-

Posted Tuesday 24th September 2013 08:47 GMT amanfromMars 1 …. submitting to http://forums.theregister.co.uk/forum/2/2013/09/23/intel_stuns_world_with_wakeon3g/

Billion $ Question

This story may well be a snooping program – to filter out engineers hiding among El Reg commentariat. And does seem to do a good job. …. Solmyr ibn Wali Barad Posted Monday 23rd September 2013 20:04 GMT

Engineers, Solmyr ibn Wali Barad?

Ok ….. what sort/type of engineering expertise is being sought/hunted?

………………………………………………………………………………………………….
 

Leave a Reply

Your email address will not be published. Required fields are marked *

sixteen − one =