Monday, December 8, 2014
Placing Excess Data on a CD
Computers were collinear in nature. An older computer could store massive data bytes. The computer read the data width; but, not the depth. Here is a technique of adding data to a disc.
A CD ROM may carry "700MB" of data. If the file is read left to right, the computer perceives the data to be of a width based nature. If files contain subfiles many levels deep, the computer still reads the data as accordingly to width.
I have files that contain many subfolders that reach to 10 levels of subfolders deep. I have recorded these files onto CD ROM. These files range from 7.06 GB to 24 GB in range. With my sub subfolders, I was capable of tricking the computer into thinking the files were collinear. Instead, I recorded up to 24 GB per 700MB capacity disc.
Monday, July 21, 2014
"Enter" Passcode for Computers
"Enter" passcode for Computers: This technique is similar to a revolving set of numbers on a gambling machine. After a specific period of time, the lever is pulled to stop the numbers. Inm this case, "Enter" is selected to stop the digits in the specific place at a specific time.
Monday, June 9, 2014
"Enter" Diversion Passcodes
The "Enter" button is an integral part of a perpetually encoded passcode type of code.
Here is an example: The passcode P832"Enter"#524 is effectual. If; after the "enter" is selectee and actuated and the next digit is incorrect, the computer selects the code P832"Enter" code that will send the hacker to a security "O.S." that is contained within a quarantined O.S. within the security system. For the hacker to go to the original O.S., the hacker must close the security O.S.; then, start over once again.
Tuesday, February 25, 2014
Business Systems
For businesses, communication s very necessary; as well as synchronicity. The best basic business accessories are:
[1] Computers
[2] Intranet for worldwide communications
[3] Encoding phones for security calling
[4] LAN systems for interoffice computer communications
[5] Conference calling to interoffice computes for remote conferencing
Learning to use the Internet
If desiring to learn how to use search engines, start your own website, or other data regarding the internet, go to:
http://www.learnthenet.com/index.php
This site will guide you through basics to advanced internet methods.
The Ultimate Free E-Mail
For he ultimate E-mail, use Yahoo. Yahoo has a special folder system that may be used to store individual names or labels. Hundreds of folders may be created o store e-mails in.
Anti Hacker Data
For information regarding hackers, purchase the "Hacking Exposed" book. It will tell you everything you need to be update in computer security. The home website is located at:
www.hackingexposed.com
Watch the video first to see what a hacker can do to your computer.
I have created many passcodes that unbreakable. Some are only single digit codes. Passcode usage is very important for privacy on the Internet or Intranet.
Computers
For the absolutely best computer, it is best to have a custom computer manufactured. The best company is a well known company that designed and manufactured military computers for nuclear submarines and other uses. The company is located at:
http://mymiltope.com/
These computers are ultimately expensive.
Other companies that manufacture ruggedized handheld computers are:
http://www.trimble.com/Outdoor-Rugged-Computers/
Subscribe to:
Comments (Atom)