Monday, December 8, 2014

Placing Excess Data on a CD

Computers were collinear in nature. An older computer could store massive data bytes. The computer read the data width; but, not the depth. Here is a technique of adding data to a disc. A CD ROM may carry "700MB" of data. If the file is read left to right, the computer perceives the data to be of a width based nature. If files contain subfiles many levels deep, the computer still reads the data as accordingly to width. I have files that contain many subfolders that reach to 10 levels of subfolders deep. I have recorded these files onto CD ROM. These files range from 7.06 GB to 24 GB in range. With my sub subfolders, I was capable of tricking the computer into thinking the files were collinear. Instead, I recorded up to 24 GB per 700MB capacity disc.

Monday, July 21, 2014

"Enter" Passcode for Computers

"Enter" passcode for Computers: This technique is similar to a revolving set of numbers on a gambling machine. After a specific period of time, the lever is pulled to stop the numbers. Inm this case, "Enter" is selected to stop the digits in the specific place at a specific time.

Monday, June 9, 2014

"Enter" Diversion Passcodes

The "Enter" button is an integral part of a perpetually encoded passcode type of code. Here is an example: The passcode P832"Enter"#524 is effectual. If; after the "enter" is selectee and actuated and the next digit is incorrect, the computer selects the code P832"Enter" code that will send the hacker to a security "O.S." that is contained within a quarantined O.S. within the security system. For the hacker to go to the original O.S., the hacker must close the security O.S.; then, start over once again.

Tuesday, February 25, 2014

Business Systems

For businesses, communication s very necessary; as well as synchronicity. The best basic business accessories are: [1] Computers [2] Intranet for worldwide communications [3] Encoding phones for security calling [4] LAN systems for interoffice computer communications [5] Conference calling to interoffice computes for remote conferencing

Learning to use the Internet

If desiring to learn how to use search engines, start your own website, or other data regarding the internet, go to: http://www.learnthenet.com/index.php This site will guide you through basics to advanced internet methods.

The Ultimate Free E-Mail

For he ultimate E-mail, use Yahoo. Yahoo has a special folder system that may be used to store individual names or labels. Hundreds of folders may be created o store e-mails in.

Anti Hacker Data

For information regarding hackers, purchase the "Hacking Exposed" book. It will tell you everything you need to be update in computer security. The home website is located at: www.hackingexposed.com Watch the video first to see what a hacker can do to your computer. I have created many passcodes that unbreakable. Some are only single digit codes. Passcode usage is very important for privacy on the Internet or Intranet.

Computers

For the absolutely best computer, it is best to have a custom computer manufactured. The best company is a well known company that designed and manufactured military computers for nuclear submarines and other uses. The company is located at: http://mymiltope.com/ These computers are ultimately expensive. Other companies that manufacture ruggedized handheld computers are: http://www.trimble.com/Outdoor-Rugged-Computers/