D
diozarn
Here are some product flaws that are currently in the software. here are some old classic solutions that have never come around.
Microsoft Edge has a integrated flaw in which can be hijacked and freezes he personal computer of the target, not allowing them to disengage their internet connection (wireless intergrated system) This flaw as much as its a good feature for integrated wireless system in hardware specs. The inability to stop a hijacking from occurring once it is occurring without a HARD boot is significant problem for the user. I still recommend that all solid internet conenctions can be disconnected and all wireless integration has am annual release. Solutions to solve this through software is system overflow recognition, so that user is not locked out, ie over ride protocols of some sort could be enabled through software or hardware, or recognizes system halt. ETc. In some form. Disconnecting from a wireless service, if the hang up form the itnernet is logner then 60 second pause ofa ddos attack. Something alogn those lines.
Antimalware Service and Desktop Windows I and the mentioned above Microsoft edge, should be analyzed by a real group of huans that do care about security, it would seem they all have open access foreign controls for back door enry, in which can cause the same lockout. It really isn't a friendly world in a world of at war.
As also another example of security stepping up. I was looking at old NES security features for the cartridge, in which took another company 3 months to hack, to sell games openly on the market for the nes without forced license but japan controlled the court and maintained monopoly over their console and rights to that security feature and thus that company had ot payout 7 mil back in the day. It wasn't until further along the community nearly 35 years later cracked it. Why am I stating this.
This comes at a problem with manufacturing of goods that the software windows will be operating on. it should be noted any system purchased form a mass producer may contain the same type of switch base system that oculd circumnavigate any system. This si why any nation should among good folk control their product in their nation ,and allowing a wild mrket has created a massive security flaw and hole in the system at large utiling any software as like in acer hardware there are chip set with a interesting security features. Since the advancement of components my DOoGee product form china, has a microarray and subnet and double login while booting. Its pretty strange so I would state that a additional layer of scanning ie identifying terriost, because it is a act of sabotage in a technical sense of corrupt hardware, which is hardware not doing what the inetended users want, this thenalso damges microsofts reputation, and or security features when hardware of the actual device is ladneed with tools and nefarious means to hijack the system and bypass any security. Which is why the only solution is to have a ability ot manual turn off the wireless communication, this being a dongle/usb not an switch but removal of the device.
There is no point to cracking security when one can just bypass it. thieves manual. Jokes.
The additional scan can also alert the client using the os, of the potential danger of the system they purchased. However the google, edge and chrome cross over annoyance is also a design implemented by the same nefarious group ie with microsft edge and chrome. Regardless of which one you use they attack the user by displaying a message constantly to use chrome is using edge and vice verse this a metnal afare technique, to polarize poepel and ultimately force people to look for other os systems. This is a problem when the name Microsoft is utilized as such. It would seem that major part of Microsoft is infiltrated, by most likely the same ilk that like sony buying the first microporcesser form a guy that left cali to navada. It's probably why the most used operating system isn't microsoft in California, because its not upholding a product of integrity.
This is justa question and statement of the security flaws still operational in hardware components and software related issues. However, software could solve the issue by tracking all packet and netflow data over any network in a user friendly app. Better informing the indivudal and also sus, programs operating in the background and storing or recording information, ie keylogger is all utilizing operational feedback of the hardware and should be easy to recognize in any system.
How secure is an os, or data encryption when it can be bypassed. Most information is sent encrypted but does one need credentials when hardware logs the information set in a internal component nad can bypass it at any time. there are other ways also to bypass login infomraiton. Ther are also ways to capture data from the air and from the wired system also. What is security.... It seesm to get worse this also includes websites that have heavy compromising fucntions, I would put youtube on the level fo porn sites with its RF hijacks and vid capture that could compromise people dn their security. Although on the side not e I would state porn sites probably a good training ground for security and traingin grounds. jokes.. ugh.. man.. anyways that's my beef about security.
Continue reading...
Microsoft Edge has a integrated flaw in which can be hijacked and freezes he personal computer of the target, not allowing them to disengage their internet connection (wireless intergrated system) This flaw as much as its a good feature for integrated wireless system in hardware specs. The inability to stop a hijacking from occurring once it is occurring without a HARD boot is significant problem for the user. I still recommend that all solid internet conenctions can be disconnected and all wireless integration has am annual release. Solutions to solve this through software is system overflow recognition, so that user is not locked out, ie over ride protocols of some sort could be enabled through software or hardware, or recognizes system halt. ETc. In some form. Disconnecting from a wireless service, if the hang up form the itnernet is logner then 60 second pause ofa ddos attack. Something alogn those lines.
Antimalware Service and Desktop Windows I and the mentioned above Microsoft edge, should be analyzed by a real group of huans that do care about security, it would seem they all have open access foreign controls for back door enry, in which can cause the same lockout. It really isn't a friendly world in a world of at war.
As also another example of security stepping up. I was looking at old NES security features for the cartridge, in which took another company 3 months to hack, to sell games openly on the market for the nes without forced license but japan controlled the court and maintained monopoly over their console and rights to that security feature and thus that company had ot payout 7 mil back in the day. It wasn't until further along the community nearly 35 years later cracked it. Why am I stating this.
This comes at a problem with manufacturing of goods that the software windows will be operating on. it should be noted any system purchased form a mass producer may contain the same type of switch base system that oculd circumnavigate any system. This si why any nation should among good folk control their product in their nation ,and allowing a wild mrket has created a massive security flaw and hole in the system at large utiling any software as like in acer hardware there are chip set with a interesting security features. Since the advancement of components my DOoGee product form china, has a microarray and subnet and double login while booting. Its pretty strange so I would state that a additional layer of scanning ie identifying terriost, because it is a act of sabotage in a technical sense of corrupt hardware, which is hardware not doing what the inetended users want, this thenalso damges microsofts reputation, and or security features when hardware of the actual device is ladneed with tools and nefarious means to hijack the system and bypass any security. Which is why the only solution is to have a ability ot manual turn off the wireless communication, this being a dongle/usb not an switch but removal of the device.
There is no point to cracking security when one can just bypass it. thieves manual. Jokes.
The additional scan can also alert the client using the os, of the potential danger of the system they purchased. However the google, edge and chrome cross over annoyance is also a design implemented by the same nefarious group ie with microsft edge and chrome. Regardless of which one you use they attack the user by displaying a message constantly to use chrome is using edge and vice verse this a metnal afare technique, to polarize poepel and ultimately force people to look for other os systems. This is a problem when the name Microsoft is utilized as such. It would seem that major part of Microsoft is infiltrated, by most likely the same ilk that like sony buying the first microporcesser form a guy that left cali to navada. It's probably why the most used operating system isn't microsoft in California, because its not upholding a product of integrity.
This is justa question and statement of the security flaws still operational in hardware components and software related issues. However, software could solve the issue by tracking all packet and netflow data over any network in a user friendly app. Better informing the indivudal and also sus, programs operating in the background and storing or recording information, ie keylogger is all utilizing operational feedback of the hardware and should be easy to recognize in any system.
How secure is an os, or data encryption when it can be bypassed. Most information is sent encrypted but does one need credentials when hardware logs the information set in a internal component nad can bypass it at any time. there are other ways also to bypass login infomraiton. Ther are also ways to capture data from the air and from the wired system also. What is security.... It seesm to get worse this also includes websites that have heavy compromising fucntions, I would put youtube on the level fo porn sites with its RF hijacks and vid capture that could compromise people dn their security. Although on the side not e I would state porn sites probably a good training ground for security and traingin grounds. jokes.. ugh.. man.. anyways that's my beef about security.
Continue reading...