2022年12月31日星期六

How to browse Internet at the first step correctly? Important now and future

 Deprecated and Obsoleted skill - not preferred skill


Use bing.com to search yahoo news or Hong Kong news and choose news tab to browse news without click any link and only browse summary words.

When you can keep your history record only have bing.com or google.com , then you can successfully prevent hacked.





First class skill - the only skill you need now

1. Do not browse any news in mobile phone and computers

2. Do not search any things in mobile phone and computers

When history record is empty over years, you are successful.

When you are a girl and want to get married with me, you have to use first class skill  prevent military level video change your future and keep your trust in me who is a boy.

There is a basic requirement of first class skill is that not use apple device. If possible, do not use mobile phone. When you can achieve these, you can achieve matrix movie level and gain back the nature of time line.

Another basic skill is not to use and not buy Japanese products. Then your intelligence can be better.



Remark: when you want to find attacker spy , they sometimes at Room 1350 or neighbours room. Usually between 8:00pm to 10:00pm , the EMF sniper spy at opposite building waiting bathing time.

Room 1350 has a guy look like never go to work , he always follow the sound like have ability to see through wall , he always available in the morning when I am at home. There are spy share the room they use. You may find different people at these rooms. There had sound in room 1350 dig the floor and is like hide something in the floor. He or one of them may be electrician spy. 

Some people said Room 1350 is a short height family look like normal people. Depends on time and which people go in. It may be different. 

If you have interest, you can find them.




2022年12月24日星期六

Wish List of products - Important in Future and Now

 1. Radio and wireless Jammer , one for install at home door and another one for portable handheld

 2. Water pool wall ceiling and floor and glass wall with warm water and can replace with new water , a few inches water pool at ceiling and wall and floor when decoration.

 3. No GPS and No Camera and No microphone port and no holes in mobile phone and glasses has no chips and no camera chips and no battery and only solar powered that power can phone for 20 minutes call. No android OS and No iphone OS, no apps and no backdoor and made in Europe and US only.

4. Another looks impossible wish is buying three houses , one house is for playing smart home products, another house is for sleep and eat only , third house is for brother use.

 

Basic Qualification when using mobile phone when can not avoid.

1. Never use NFC

2. Never use Bluetooth

3. Do not enter credit card number in mobile phone

4. Use computer edge browser to use internet banking and amazon instead of mobile phone and iPad

5. Forward first mobile phone number to home and then home telephone forward to second mobile phone to use white list only that means second mobile phone number only accept mobile number from home number.

6. Do not search things and do not use search engine and do not browse news.


First class level.

1. Forward mobile phone number to home telephone and store mobile phone in bank safer.

2. Never bring and own mobile phone in new house, simply say, no mobile phone at home

3. Never watch TV channel in new house

4. Never use Wifi and use cable router and power off after use. Better have two cable routers one is for power off internet router and another cable router without wifi is for intranet use only isolated from internet cable router


Remark: figure out where are attackers spies coming from before migration and choose correct country.


2022年11月24日星期四

Begin from the first house I buy in coming future

 


Modern man house design - new house decoration in next 50 years

  1. 1 meter height at side wall and 1.82 meters height rail handle made of wood or steel from bed to washroom
  2. 1 meter height at side wall and 1.82 meters height rail handle made of wood or steel from bed to main room main door
  3. A wheel chair can go in and out bedroom and along the rail handle and slope design in bath and washroom and main door. And bath room ceiling install a water spray for bathing without take water sprayer.
  4. Long light install at height 1.8 meter height at wall vertically or horizontally instead of ceiling and transparent computer monitor with touch screen install at glass wall which is at one of middle area  in main room and second bed room have a hospital level bed.
  5. No Television and No mobile phone and No wifi and Philips brand smart face recognition and hand and finger print door lock and handle at front door. Inner side has another traditional door lock. If big house, it should use man trap door design.
  6. Air conditioner water pipe to outside pipe correctly without need to clean and without need to replace to prevent water leak
  7. Only cable intranet network isolated from Internet to remote control electronic device with LAN cable network
  8. Use water pool ceiling and floor with glass wall and even water pool wall with glass, around three inches of water cover the ceiling and floor.
  9. Still thinking telephone cable install to where is safe when telephone is only cordless.
  10. After using water wall , the electricity cable should install as less as possible and go through behind the water wall but it need to think how this is easy to replace in future.
  11. Can have 55 inches TV but never connect TV channel and it only used with NUC intel box which should check number that is manufactured in Europe or US. 
  12. First firewall check VPN down link and DOS attack, second layer is a router with NordVPN, third layer is application firewall monitor the inside traffic of VPN.

2022年11月21日星期一

Today confirmed a hacker using phone call



Today I feel body pain after received a phone call , the pain is like wireless concentration attack or satellite attack .
The woman talk about survey 0 + 0 

Why I am so confirmed? 
This phone call to mobile phone I received is the only phone call I received in my mobile phone today.
And the pain is after a few minutes the call end

This is like the hacker can rebind the attack to mobile phone number or specified mobile phone.

 

2022年11月20日星期日

monthly repayment ability in coming next 20 years before retirement

Even if own a house for 1000 years, the payment of management fee can also exhaust all saving.



Safe repayment ability is HKD7,000 per month

2022年9月4日星期日

network can not zero trust

When there is no internet
There are 4G and 5G
There are neighbors

Network can not zero trust

2022年8月8日星期一

currency and bank choice

All money I only saved into HSBC only.
Only one bank.
Salary account start from first job had been only one bank HSBC.

Currency I hold:
US currency
UK currency
Euro currency

Currency I never exchanged in whole life including HSBC records
Japanese currency
Korean currency
Thailand currency
Malaysian currency
China currency
Taiwanese currency
And the rest of countries currency etc.


Now you know that you are not matched to compete with me.


2022年8月7日星期日

brand of notebook I never buy or would not buy any more

Notebook would be replaced by Intel NUC(hard disk disk space more) or Intel compute stick - 2018-now directly. Only one manufacturer Intel.

Brand of notebook I still in use:
Dell - disconnected and firewall skills all used 2020-2022 now

Brand of notebook I would not buy any more:
NEC - 2003 - 2004 broadway shop
Samsung - 2005-2006 1st notebook buy from university of hong kong promotion, 2 nd notebook broadway shop forget the year uses until 2019
Dell - start from 2019 late to 2020 I start to use Dell 1st and 2nd notebook buy from official web and phone call and email, respectively

Brand of notebook I never buy in whole life:
Sony
IBM
Lenovo
HP
Toshiba
Panasonic

brand of mobile phone I would not buy any more

Brand of mobile phone I may buy in future:
Tesla Pi model - only know in 2023. I may change mobile phone number after used satellite phone call. That means email phone number will change. Whatsapp not known how to deal by tesla pi model. Tesla mobile phone totally out of my mind. 

Brand of mobile phone I still in use:
Nokia - It is better because i choose to seldom using browser and very strict security include airplane mode.
Iphone - power off

Brand of mobile phone I would not buy any more after 2020:
Samsung - regret to use in 2012 to 2013
Apple - regret to use iphone 7 in 2017 to 2019
Nokia - because Tesla pi use satellite to call, no 4G and no 5G

Brand of mobile phone I never buy in whole life:
Sony
HCL
LG
And the rest of brand etc

2022年8月5日星期五

hand gesture and voice control in prediction

I had thought to use intel realsense to recognise hand gesture or dragon anywhere to start maplesoft to automate prediction and show in 60 inch TV and multiple transparent display mounting from ceiling and also transparent glass wall at home. 

Have I already been in future?

2022年7月28日星期四

iphone and apple tv password management

Perhaps you discover every time use password purchase music and movie, you feel hackers attack.

This time need to change password three times.

Furst time change iphone password with Norton password manager with password generator to generate a password with length 63 and click sign out all devies.

Second time change iphone password with simple password for you to login apple tv 

Third time change iphone password with a length 63 complex password generated by password generator, this time do not click sign out all devices

Store latest password and last password in two records to prevent password change still the same of last password.

If you are crazy or mad, you should change password in this way every Sunday or Saturday.




2022年7月27日星期三

search firefox in docker

I had used firefox app in docker in amazon
EC2 , it is really the best experience.

App should be in docker in the cloud.

Future has no app store and app is created by voice , which app can be located in mobile or in docker in cloud 

No SIM card, No bluetooth, no GPS, no emergency alert , no NFC , no microphone hole , no any holes in mobile phone , No 4G ,no 5G ,no 6G
No Lithium battery , no battery in future
All harvest the energy from wireless signal and TV signal and radio signal

Only change to satellite phone

Random number always brainwash memory in mobile phone to obsfucated memory when running program

Run each step of code followed by a random number to move AX or whatever pointer to another place in memory

Random number of encryption and hash with salt. I do not think collision can guess. 

May be one day buy a monitor like mission impossible movie only special glases can see the screen.

I am waiting vmware workstation support SGX.

From the view of cpu hackers, random number of hash of hash will be everywhere in comparison if statement in code shuffling the cpu registers pointers. Random numbers are everywhere following each line of code.

If speed is faster , even a counter and a flag are also encrypted random number of times.

2022年7月25日星期一

understood why people buy first model of new product

Many people are like got the message or plan from furure .

Many people compete to buy the first model of iphone and then stop buy advanced model or new product.

They seems know something but only they know earlier.

I think tesla pi model will be the same sitiation 

It is like after 1000 years movie.


searching A3 sized transparent display that can connect intel NUC

Searching A3 sized transparent display paper which has touch function like thin for paste on glass which mounted an intel NUC 
Then run my html web which adjust background and opacity to little transparent.

Then it will have movie like futuristic feeling 

Build a number of transparent glass wall mounted NUC 
And paste and mount these transparent display on glass, home can be a spaceship

However not found these size transparent display.

Using dragon anywhere to control all glass  walls computer with voice. It must feel like in spaceship.

And install Philips hand palm fingerprint and face recognition at door. Perfect home decoration. Together my firewall devices to protect the network. 

However, Chrome and firefox and edge can not configure transparent background. I guess no one use camera to make transparent background.

If I use philip face recognition handle , it may not have high availability to choose second wifi SSID if first SSID down. Not know whether door can open when network or or and power down.

If remote a drone to see the camera in my web , glass can see another camera background. Batman successful because the city and environment suitable for the batman computer show the futuristic feeling.

What else?




2022年7月23日星期六

latest mark six number 21 is exceptional number

Someone challenge me to use number 21.

Someone notice my skill

I have to be more careful.

There are guys know another numbers to win first prize. The first prize is got by others. 

NordVPN or antivirus software must exist in window

Last few years , i discover that if firewall not set well, or no antivirus software protected , when open file explorer, the window must be blue screen and restart need.

After install antivirus , nordvpn and set firewall well , window can use internet normally. Window is smarter than I think since 2020.


I had a flash of mind of using Assembly language to use SGX

But after watching the function of assembly language , not easy to use.

Then i searched that SGX deprecated 

SGX only exist in cloud.

I think that I am late or I am not updated enough in the trend of intel.

Then i think to buy ESX , the price is expensive. Using SGX is not normal thing.

If I had not been figured out how to win under cheaters know, that means I am not late to use SGX. However, this mind blowing techniques , is it really exist to become the god of gambling?


2022年7月7日星期四

searched python run in SGX enclave

Searched SCONE python run in SGX enclave. 

Why not window 11 run in enclave?

SGX seems not popular in python users yet.

Yesterday night tried web socket to send camera stream to EC2 web socket but connection closed itself. 
I imagined just change ip address then native html5 can do web conference p2p without using any software. Only need phone with peer and tell IP address.


2022年7月6日星期三

camera monitoring home can be very easy

Use html add video tag. A small javascript.

Turn on home computer and open html web

You can only need to remote home computer securely or through amazon EC2 to remote home computer.

You can watch html web in browser in remote desktop.

It had already been finished.


2022年7月5日星期二

firewall manufacturer, why not add a group by view?

Firewall automation is waiting for firewall manufacturer making a group by destination IP address view to be modified by firewall automation software.

It can keep old tradition works.
In another way, it can group by multiple fields itself to provide a way for automation software to work.

Bonus is adding virtual folders in group by view and naming good folder names itself.


Missing option to change jockey club betting phone password

 I tried to change jockey club betting account phone password , but no this option yesterday.

There were quite many thunder and rain yesterday.

This was my second time witnessed no one won first and second place.

2022年7月4日星期一

thinking about whether worth to buy a house

When spend million to buy a house, Imagine myself look at concrete walls and space. What can I do next?

Thinking then, then, then and then...

Where is the funny of that millions price walls and space?

voice control

Dragon anywhere is one of the successful voice control I have ever seen.

It is worth spending one extra small computer to play this software. 

I think an tool that input excel template with formula and input values and then output one csv data input template and one automation execution file. Once click the execution file it will read csv file as input and then output excel file result and csv result
All clerks use this then what to do next?
When all software input csv and ouput csv?
Is this called cascade when output become input of another program?
Will this become universal standard that all become automation?

When not set difficult to computer, computer is pretty easy to automate itself.



salute to alexa

https://youtu.be/7aKK9vo2amo

2022年7月3日星期日

Maximum length of password

It is quite seldom that people use maximum length of password because not convenient and can not memory

Some app can help but not all password suitable to use maximum length of password

Use a password generator and app to generate a long password and saved password and test the maximum length then try to use maximum length of password

Remember to turn on location history in google because mobile carrier had records, turn off google location history is useless.
Turn on location history in google is a clever step to help to catch hackers.




past thinking about Symmetric NAT

Symmetric NAT my past thinking is that it used to force hackers to use real IP address. 

When hackers use forward server outside Symmetric NAT that means hackers leave footprint because forward server belong to hackers.


2022年7月1日星期五

gmail and outlook etc have encryped email functions

Why not setting law to force advertisement email to use encrypted email that need password to open email?

Some email function have expiry time too.

Seldom people use these functions



Firewall operation has advanced skill that means priority hands on operation in next generation of firewall.

2022年6月30日星期四

use a safe search engine

Do not click the link even if using safe search engine

Do a screenshot of web site with a screenshot web site instead of click the link, especially news web site

Disable Asian countries CA certificate in mobile phone if possible 

Suggestion: use search engine to browse youtube.





2022年6月26日星期日

router design suggestion

Matrix movie told me to block cookie amd java applet in wifi router. At least block cookie. 

But I can not block when other users use bank web

I notice many physicial ports actually can only be used by administrator of wifi router at home.

For security, all can only use guest wifi.

Blocking cookie and java applet option are so simple. New design need to depend on specific user or web site. 

I notice real secured product usually have big bare metal characteristics.
Because small product are usually the spies trap product. Famous product is important. FIPS level 3 is also good. But nowadays need FIPS level 4, there is no more can do when surveillance override security.


2022年6月25日星期六

monitor firewall log and connection

Serenade

Today search voice assistant for coding 
And find serenade

Very good software 

I am thinking marvel movie like environment

"Show me the function you are running"

"Enable debug mode"

"Show the code on main screen"

"This part of code or print result show on screen"

"Just run this few lines console"

"Show the path of coding" 

"Just run to this part of code"

When searching with looping , there may be need to search with another loop for just specified row of data with another combination search.

I am thinking a table ,each row has detail to show another combination search result.
And use voice to show result.

There may need to 
Show 

Run A. Show result
Run A and B. Show another line of result.
Run A and B and C. Show next line of result.
And show data come from which line of code. Security reason I can not use and write this kind of voice coding. It is only imagination.





2022年6月24日星期五

first time using system credential in android

Fortunately no android phone use bank site

I can choose any CA certificate to untrust.

Today is first time that i use this.

correct firewall configuration

A.default block all outbound
B. When use old version of window, priority button may not be available. So add character a in name to make it as first rule to block multicast IP address and broadcast IP address then start to allow port 53,443,80 optional to allow amazon EC2 desktop remote port 3389, if you are using NordVPN, then you have to email support to ask which port to allow. , Another optional allow port is time port, 123
C. You may find some allow rules controlled by default apps. This time you need to configure connection security rules
When you find log about IPsec these things , that means your time port is not allowed yet or there are unknown apps go to internet itself.

2022年6月23日星期四

suggestion in textarea JavaScript

Besides parse batch in text

I think when I change the word , it can show menu or voice ask whether replace all with the word in text area 

Searching online tool about book text to cypher convertor but not exist

I have multiple books waiting to be a doctor robot

I think book publisher can provide neo4j database directly 

Multiple database can combine together to form one dstabase for doctor robot to use

Query creation is also need to do with GPT3

But what are interesting to query?

Recently I saw poker card sequence numbers and also pairs. 

But photo has noisy and can not identify the numbers words in the future photo generated.

It looks like past have people reach my level or it is just my work stolen been transmitted to past ? 

So how these people solve photo problem?



2022年6月20日星期一

watch matrix movie again

Yesterday I watch matrix movie again

I am thinking whether home decoration been matrix like personal computer environment station

I think ceiling can be added a office like ceiling with transparent plastic to see the cables, and then mounting trails bar like excel cells like at ceiling , so that I can mount laptop to any place from ceiling 
without damage the rock of ceiling.

Matrix movie like computer chairs and multiple monitor connected.

Search Philips secured power bar and smart home devices. It seems not ready been secured enough to release to market.

I search some people said wireless lose make smart lock that can not open door.
Fortunately, I did not use smart home devices yet.

As tablet and laptop both are spied and have battery and cpu attack
It seems whether there is wireless portable monitor with touch screen to remote control laptop and tablet with no cpu and no GPS and no computing and using battery cells from supermarket. Then I can mount at the side of my bed.

Even no this kind of ceiling 

I think whether have a big C stand station 
Stand on the ground and C shaped top of it has mount from top to hold monitor

today tried to use tablet to remote amazon EC2 to feel matrix like station

I think it lack of voice control to transfer screen and files among intranet computer , I think i can write this C# application to transfer screen but may not well enough 
Say , Hey transfer this screenshot to monitor X or main monitor


Today tried example of three.js 
It works by used quite much memory









GPT-3 first step I would search

Ask GPT-3 to write code to convert text of book to Neo4j Cypher to create graph database

Next is to ask it to write some queries 

Next to make it as chat bot

Finished.



2022年6月16日星期四

outlook need automation for networking

Outlook email automation can be done
1. Specific keywords to control python script or powershell script to query network devices into csv files or even configure 

2. Auto reply the result.

web need extra JavaScript library

1. Replay to watch user operations
2. Auto guildance like game
3. Group of templates and then type keyword in description to auto complete fill in fields
And help sort the top priorities in drop down list items.


2022年6月15日星期三

google home

https://youtu.be/7aKK9vo2amo

alexa

https://youtu.be/7aKK9vo2amo

doctor.ai , where is it?

I find doctor.ai in web but alexa app has no this skill after searched

Today i searched Neo4j database for medicine because I am lazy to create myself and not want to install extra software in laptop. Being of god of gambling has so much consideration before using computer.

Choose between Laptop and NUC


Want to buy NUC together with keypad external hardware encryption hard disk 
Because seems better than laptop 
And intel compute stick

But after checking CPU model, it has no SGX, It seems time has not come.

Is it possible to have all features?

The next thing to buy a secured monitor




Symmetric Firewall is a joke

Symmetric Firewall require service provider use forward server or client use uPnP

In another way, this is to tell you the hacker traffic is starting from inside to outside

This is why phishing email exist.

This is user clicked or program already installed and run automatically.

This is to tell you that user or computer self willing go to internet result in hacking possibilities.






Palo Alto ultimate plan


My router use VPN to protect traffic outside firewall, so only need to one country. 

My design first rule is to block private and multicast address.

Then block hackers countries

Then block MITRE web mentioned malicious ports in two directions

Ultimate war of firewall

A new concept corrected when past is wrong

This correct concept is that when going to internet, home should DMZ, and use guest wifi.


2022年6月12日星期日

Each Real Grade A should have independent unique method, why not show some proof?

Many "claimed" grade A said they are grade A 

Why not show some mark six historical data testing result to proof Grade A ability ?

Not counting terminator or cheating in future

I have shown historical mark six data proof 

It is your turn to show quality.


https://www.qwant.com/?t=videos&q=%E5%8D%83%E7%8E%8B%E4%B9%8B%E7%8E%8B&o=0%3Ai8jxnHfo9l8