2022年6月30日星期四

use a safe search engine

Do not click the link even if using safe search engine

Do a screenshot of web site with a screenshot web site instead of click the link, especially news web site

Disable Asian countries CA certificate in mobile phone if possible 

Suggestion: use search engine to browse youtube.





2022年6月26日星期日

router design suggestion

Matrix movie told me to block cookie amd java applet in wifi router. At least block cookie. 

But I can not block when other users use bank web

I notice many physicial ports actually can only be used by administrator of wifi router at home.

For security, all can only use guest wifi.

Blocking cookie and java applet option are so simple. New design need to depend on specific user or web site. 

I notice real secured product usually have big bare metal characteristics.
Because small product are usually the spies trap product. Famous product is important. FIPS level 3 is also good. But nowadays need FIPS level 4, there is no more can do when surveillance override security.


2022年6月25日星期六

monitor firewall log and connection

Serenade

Today search voice assistant for coding 
And find serenade

Very good software 

I am thinking marvel movie like environment

"Show me the function you are running"

"Enable debug mode"

"Show the code on main screen"

"This part of code or print result show on screen"

"Just run this few lines console"

"Show the path of coding" 

"Just run to this part of code"

When searching with looping , there may be need to search with another loop for just specified row of data with another combination search.

I am thinking a table ,each row has detail to show another combination search result.
And use voice to show result.

There may need to 
Show 

Run A. Show result
Run A and B. Show another line of result.
Run A and B and C. Show next line of result.
And show data come from which line of code. Security reason I can not use and write this kind of voice coding. It is only imagination.





2022年6月24日星期五

first time using system credential in android

Fortunately no android phone use bank site

I can choose any CA certificate to untrust.

Today is first time that i use this.

correct firewall configuration

A.default block all outbound
B. When use old version of window, priority button may not be available. So add character a in name to make it as first rule to block multicast IP address and broadcast IP address then start to allow port 53,443,80 optional to allow amazon EC2 desktop remote port 3389, if you are using NordVPN, then you have to email support to ask which port to allow. , Another optional allow port is time port, 123
C. You may find some allow rules controlled by default apps. This time you need to configure connection security rules
When you find log about IPsec these things , that means your time port is not allowed yet or there are unknown apps go to internet itself.

2022年6月23日星期四

suggestion in textarea JavaScript

Besides parse batch in text

I think when I change the word , it can show menu or voice ask whether replace all with the word in text area 

Searching online tool about book text to cypher convertor but not exist

I have multiple books waiting to be a doctor robot

I think book publisher can provide neo4j database directly 

Multiple database can combine together to form one dstabase for doctor robot to use

Query creation is also need to do with GPT3

But what are interesting to query?

Recently I saw poker card sequence numbers and also pairs. 

But photo has noisy and can not identify the numbers words in the future photo generated.

It looks like past have people reach my level or it is just my work stolen been transmitted to past ? 

So how these people solve photo problem?



2022年6月20日星期一

watch matrix movie again

Yesterday I watch matrix movie again

I am thinking whether home decoration been matrix like personal computer environment station

I think ceiling can be added a office like ceiling with transparent plastic to see the cables, and then mounting trails bar like excel cells like at ceiling , so that I can mount laptop to any place from ceiling 
without damage the rock of ceiling.

Matrix movie like computer chairs and multiple monitor connected.

Search Philips secured power bar and smart home devices. It seems not ready been secured enough to release to market.

I search some people said wireless lose make smart lock that can not open door.
Fortunately, I did not use smart home devices yet.

As tablet and laptop both are spied and have battery and cpu attack
It seems whether there is wireless portable monitor with touch screen to remote control laptop and tablet with no cpu and no GPS and no computing and using battery cells from supermarket. Then I can mount at the side of my bed.

Even no this kind of ceiling 

I think whether have a big C stand station 
Stand on the ground and C shaped top of it has mount from top to hold monitor

today tried to use tablet to remote amazon EC2 to feel matrix like station

I think it lack of voice control to transfer screen and files among intranet computer , I think i can write this C# application to transfer screen but may not well enough 
Say , Hey transfer this screenshot to monitor X or main monitor


Today tried example of three.js 
It works by used quite much memory









GPT-3 first step I would search

Ask GPT-3 to write code to convert text of book to Neo4j Cypher to create graph database

Next is to ask it to write some queries 

Next to make it as chat bot

Finished.



2022年6月16日星期四

outlook need automation for networking

Outlook email automation can be done
1. Specific keywords to control python script or powershell script to query network devices into csv files or even configure 

2. Auto reply the result.

web need extra JavaScript library

1. Replay to watch user operations
2. Auto guildance like game
3. Group of templates and then type keyword in description to auto complete fill in fields
And help sort the top priorities in drop down list items.


2022年6月15日星期三

google home

https://youtu.be/7aKK9vo2amo

alexa

https://youtu.be/7aKK9vo2amo

doctor.ai , where is it?

I find doctor.ai in web but alexa app has no this skill after searched

Today i searched Neo4j database for medicine because I am lazy to create myself and not want to install extra software in laptop. Being of god of gambling has so much consideration before using computer.

Choose between Laptop and NUC


Want to buy NUC together with keypad external hardware encryption hard disk 
Because seems better than laptop 
And intel compute stick

But after checking CPU model, it has no SGX, It seems time has not come.

Is it possible to have all features?

The next thing to buy a secured monitor




Symmetric Firewall is a joke

Symmetric Firewall require service provider use forward server or client use uPnP

In another way, this is to tell you the hacker traffic is starting from inside to outside

This is why phishing email exist.

This is user clicked or program already installed and run automatically.

This is to tell you that user or computer self willing go to internet result in hacking possibilities.






Palo Alto ultimate plan


My router use VPN to protect traffic outside firewall, so only need to one country. 

My design first rule is to block private and multicast address.

Then block hackers countries

Then block MITRE web mentioned malicious ports in two directions

Ultimate war of firewall

A new concept corrected when past is wrong

This correct concept is that when going to internet, home should DMZ, and use guest wifi.


2022年6月12日星期日

Each Real Grade A should have independent unique method, why not show some proof?

Many "claimed" grade A said they are grade A 

Why not show some mark six historical data testing result to proof Grade A ability ?

Not counting terminator or cheating in future

I have shown historical mark six data proof 

It is your turn to show quality.


https://www.qwant.com/?t=videos&q=%E5%8D%83%E7%8E%8B%E4%B9%8B%E7%8E%8B&o=0%3Ai8jxnHfo9l8

2022年6月11日星期六

I know you that will make US stocks drop


I know you that will make US stock drop with cash balance in half doubt.

So, my MPF is still in conservative fund
Now I confirmed that the cash balance really depend on my account.

Radio media said initial month ... Middle of month drop. 


2022年6月10日星期五

cash balance

There are clowns in bank set the rule to use cash balance to determine the direction of stock.

In order to trick the computer , there are need many rich people have many cash and used little cash to buy 1 quantity of stock to make the computer think you have much cash. 

Otherwise, the stock drop



Guest Wifi

Today I figure all at home should use Guest Wifi

But after configured guest wifi but can not connect internet , bad product

Then search new product , i can not find guest wifi , bad product

Today discover a bug , i need to allow outbound in public profile in order to access private IP address of checkpoint wifi firewall . Not know which product has this bug. I think i can get bounty for this bug. 

I find these software are made in Taiwan.
It look like Asia software customised in Taiwan. 

If you can inspect my short sighted glasses video , you will know that my saying is true. This had happened if you notice my operation.

This may not be true in other country and version. But my notebook really show this case. As i said software are customised. And computer had risk of hacking in disconnected state.

As i said you have to inspect whole story and watch the video first before making conclusion. 

If you have interest, you can email me and I bring my notebook to your company and let you research it.



I find back the bug 
Other brand wifi management portal has no problem because i can access under public profile outbound blocked.

But when accessing checkpoint wifi firewall management portal require public profile allow outbound. I take the video tp youtube.

Below config are correct. 

2022年6月7日星期二

today find skylake support SGX for runtime encryption

Today find skylake support SGX for runtime encryption 

But how to verify this?

I find hong kong online shop has no skylake cpu

And SGX need to install intel software 

But any extra software need to enable runtime encryption?

I find fortanix , but it look like enemy Japan company support NEC

It seems not my cup of tea.

change google account birth date to a children age?

Children are always protected by network

Theoretically change google account to a children age. It can hide from network attack.

2022年6月3日星期五

Stingray and HailStorm had been used by Asian since 2017

Japanese, Taiwanese, Malaysian who have a cloth on head,  Chinese face or Hong Kong face spies have been using StingRay and Hailstorm attacks
It has been widely used in Whatsapp and Some web sites and Asian App.
And popular in university graduates spies and some career industry have some people using.

Mobile carrier named 3 this 3G and 4G LTE exist massive real time attacks in all or nearby substation. Once enable mobile carrier even not include ethernet, it has already attacked. The LTE phone can immediately turn off battery saver automatically. There are extremely evil in LTE this network nearby in real time or always broadcasting and started HailStorm attack. 

https://en.wikipedia.org/wiki/Stingray_phone_tracker

https://www.cloudwards.net/how-to-block-stingray-surveillance/

This also why dispose phone is the only way. 
But, the spies exist as neighbors pedestrians or neighbors in flats by predict or know from camera or know habits in future and waiting or tracking in real time. 

This is why buying a flat is vain and wasted opportunity of evade.

High house price because people need money to migrate or there are future mission need them to set up a scene in another place or act as milestone waiting me to follow. But, they get future messge that their trap not work and I will not go. So they come back.

Nokia 8.3 android 12 without SIM card has been disabled or On word disappeared battery saver by Wifi network in 2022.

a good habit to encrypt file


By the way, habit to set up password to encrypt office file

You have noticed that window property has encryption attribute and this is the second encryption of the file by office. 

Now you have to think you have to ensure no keylogger and clean computer. Previous post i had already taught to use gpedit to allow specific application. And disconnect network. Theoretically this should be safe.

But you will start to notice your computer monitor and the TV and mobile device near computer. This is only the beginning.

Children security knowledge when first time use computer



Home user security: 
Disable NetBIOS 

Uncheck File and Printer sharing and client

Turn off network discovery and turn off files sharing 

choose block by default at inbound connections at window firewall at home

Allow TCP source port 49152-65535 to destination port 53 and 443 at outbound window firewall and hardware IPS at home 

Allow UDP source port 49152-65535 to destionation port 53 at outbound window firewall and hardware IPS at home

https://docs.microsoft.com/en-us/troubleshoot/windows-server/networking/service-overview-and-network-port-requirements


Files property : check Encrypt contents to secure data, if you like you can check read only attribute

Disable speaker and disable camera, disable Wifi, disable blue tooth

Disable remote help and remote connection after right click My Computer

Use normal user account instead of administrator account and then create another name of administrator account for update or upgrade or change setting and then use cmd command to hide administrator name this account

Setting - security - enable integrity

Make a D drive by partition tool, prevent using C drive


Reminder : do not think these security is enough. For detail, read previous posts.

Year 2001 I had already disabled NetBIOS. May be even earlier. 

Baseline of security may even dispose all  electronic devices. 

The real security has already begun in wireless wave since 2013.

Now is 2022.

If your computer only have rubbish, then these security measure are not for you and your home computer. You can just let the configuration in initial setting.


What if you do not have internet or you do not use Internet

domain and public profiles default inbound and outbound block, only private profile outbound allow

Then what to block at home wifi router

https://attack.mitre.org/techniques/T1571/

These C2 ports are needed to block at home wifi router. You notice that some ports greater 49152 to be blocked in home IPS and window firewall too

If your home wifi router advanced enough, you can block keywords too, but home wifi router blocking can not do when using mobile phone VPN.

Hackers usually use advertisement ID to hack, you may notice that I blocked GA_ and appflyers and googletag... etc


Mobile VPN can prevent ISP sniffing in the past. This is basic nowadays. 

What to do is using www.browserling.com, www.peekier.com or buying whole web arhive for private network use.

Hackers have already seen all that make difficult to hack. So, some of them do not play ethernet network. They play wireless wave. My next post is about LTE hackers use.