compassion, collaboration & cooperation iN transistion
gregory shephard has not received any gifts yet
TRUE HERMETIC transmutation IS INDEED a SPiRALogic 'Mental ART'.
I said to Margaret Thatcher's I.T. Minister, Kenneth Baker M.P. in 1982 - during the period of establishing the BBC Computer Literacy Project - THAT the archives of the BBC were worth more to the British nation than all the country's coal deposits and that in order to "mine" this wealth, an appropriate industrial infrastructure and facilities would have to be established - before the information could be put into IT (Information Technology) and subsequently distributed in a form which would be useful to ALL potential users.
In the [GREENWICH]meanTIME, information technology has transmuted into a system which has the very capability of establishing "The WORLD GAME" policemen in a position of TOTAL Control of Spaceship Earth let alone the USA; and ALL at the behest of Big Business and Wall Street, with a plan to exclude every potential competitor, BRICS and all, in a USA/EU Trade[block], at the expense of the wishes of the people, who don't even understand that it is happening under their feet and before their very eyes !!!
Deception technology is a category of security tools and techniques that is designed to prevent an attacker who has already entered the network from doing damage. The technology uses decoys to misdirect the attacker and delay or prevent him from going deeper into the network and reaching his intended target.
Deception technology products work by distributing deception decoys that mimic genuine IT assets throughout the network. The decoys run either a real or emulated operating system (OS) and provide services that are designed to trick the attacker into thinking he has found a way to steal credentials or escalate privileges.
Deception technology is intended to enhance rather than replace the other security products an organization uses.
Because deception technology is designed to detect inside-the-network threats - e.g. IN THE DEMOCRATIC CAMPAIGN - and their lateral movement, alerts are always event-driven and automatically supported by forensics that can be analyzed with other log data from the organization's SIEM system should the need arise. Should even more information be required during an attack, some advanced deception systems can even open communications with the attacker's command and control (C&C) server to learn more about the attacker's methods and the tools he is using.
ALL of the juxtaposed articles at TheNATION.com for march 7th 2016, including the particularly relevant one on the EU, in the context of the USA having assumed the role of WORLD GAME "Policeman", are indeed about game changers to end ALL [IN]equality; such that a BIG STATEMENT - to present y[our] project and its specific concrete design plan/purpose to make the 'connessione' no one else is making between inequality and how time is measured and has been used as a weapon historically - IS of paramount importance !!!
© 2024 Created by Michael Grove. Powered by