The Potocols are a work of Genius, we should claim it for ourselves and Rebuild Humanity.

How to Create Better Passwords

A recently published survey named the twenty most common passwords used to “secure” personal computing devices, like laptops and phones. Guess what is the most favourite password? Do not look at your keyboard, close your eyes when you try remember the exact layout of your keyboard. What is the first thing comes to mind? 123456. Maybe you type a lot, so maybe you got stuck at qwerty. Ever used those for a password? Not even right at the beginning, when the password thing was such a bother?

Maybe you were clever, like about 20% of us, and you opted for password? I know I have used all three of those, then I was made clever by some other clever dude, and I learned the most bestest of ways for to make better security in the making of passwords. That grammar was awful, I know, but that is lesson number one! Be unpredictable!

The simplest way to make a memorable password, is to spell something you will not forget, in a way that no-one will suspect. Is your name John Smith? Spell it Jawn Smiff. Even better: JawnSpaceSmiff. Most firewalls will give you a good rating on that one, but some demand a mixture of letters and numbers, even symbols or punctuation. How on earth must I remember that?

Let us randomise John’s name better. Look at the letters: John Smith. I look at my Keyboard, and I see no alternative for J, but next, I see a zero, an h and n, space, 5, m, 1, t and h. That spells J0hn 5m1th. The little bar on your virus protector just turned green! Go further: J0h^_5m17h. But this is not good enough yet. Every security expert and hacker will tell you; do not use the same password for everything! So let us up the ante a bit.

For every device and service, make up your own name. Wh4t54p9 for WhatsApp. P1nt3r35t for Pinterest. You like to bake cookies? 1L1k32BakeC00k135 for your recipe app. My(0mp00t3r for my computer. This way, you can even leave yourself reminders, because who will know what to do with a list lying on your table that says:

john smith
whatsup
pinterest
mycomputer
I like to bake cookies
^0tty91(5D07c0^^

Use lots of symbols that require the Shift key, in case someone is trying to look what you type. The more effort it is to type in, the longer it will take to “crack” your password. No password is 100% secure, but with enough effort, and sheer length, you can get close. The only reason Bitcoins are “unhackable”, is because a computer could possibly spend decades trying every combination of symbols available. With emerging “quantum” computer technology, it is expected that hacking a Bitcoin will take hours, maybe minutes. The good news is, it will take years before your neighbourhood hacker gets hold of that technology.

How do you keep a secret? By not sharing it.  Do not use “The Cloud” for anything you do not want to lose or get prosecuted for, like maybe opinions on impossibly suspect vaccines and those who promote them. Researchers have lost years of work on their doctoral thesis, because Google read their work and put it behind a politically correct firewall, where it “got lost” from the “most secure servers on earth”. Recently, doctors and nurses were fired and even lost licences to practise, for innocently tweeting about not worshipping Baal’s Holy Water, I mean Bill Gates’ vaccines.

One last thing: You hear a lot about “hacking” these days. The latest is the “hacking” of voting machines in Yankeeland.  Hacking actually is exactly what it sounds like; a guy standing by the object and hacking at it, blow by blow, until it breaks off or open. A hacker will sit (well, program his computer to sit) and try every address it can guess at, and when it gets a reply, it will start sending passwords, one by one, until one works. Of course, they first go through that list of 1234qwerty lazies we talked about at the beginning. That, however, is not what’s happening at the DNC, or voting machines, or Microsoft operating systems.

What the CIA does is not “hacking” but “exploitation”. They “exploit vulnerabilities” in systems such as Windows™. Baal gates has a spy listening under your Windows™, and now he is infiltrating the only decent alternative, Linux. There is a lot of extraneous information in every single file that you create with Billy’s software.

On a printed page, there are microscopic variations in letter spacing, period placing, line justification and such things we cannot really pick up by eye. Those little discrepancies can be deciphered by properly equipped people. Those indiscernible mistakes on every single printed page identifies your computer, username, creation and print dates and goodness knows what else. That’s how they catch public workers who steal embarrassing proof of corruption that “…threaten National Security, but in the interests of transparent governance, said public servant can be held accountable for those unproven allegations.”

Losing your secrets via the CIA’s spying tools you innocently paid for and installed yourself, is not hacking, it is programmed intelligence gathering. When private hackers find these loopholes, Billy da Patch quickly issues a “safety issue warning”. The closing of said loophole may be near immediate, or sometimes we wait until the client that paid Bill for that functionality, “upgrades” his package and Bill opens him another little hole when he “updates” your software.

The other way you can lose your privacy, is when the machine was designed for surveillance, like your cell phone or “smart watch”. Or, recently, the routers and servers that sit in your telecoms company’s rooms. These are so-called “back doors” built right into the physical machine you are holding in your hand, or the ones connecting you “securely” to the rest of the world.

Remember the spat between America and Huawei? “They are spying on ‘Murica!” Actually, the Yanks are really angry that Huawei does not want to give them access to their routers and servers via this back door, and no amount of reverse engineering could find it. The Chinese told (and showed) them there is no such functionality on their equipment, so America banned their equipment!

The lesson here is; If you want to keep your data secure, do not expose it to the network. Keep your stuff on a removable drive, which you ONLY plug in while not connected to the internet. There are no secrets on the network, not even the one you built yourself using machines They made.

The good news? There are people using these same back doors and vulnerabilities to find us the evidence of our ruling kakastocracy’s underhanded dealings and genocide. One day, soon, when the four unicorns of happiness rides in on the rainbow, we will be able to inspect every single government financial record, in real time, as they are being created. THAT would be democracy!

Let us see how much taxes we really need, when millions of auditors are working for free, searching for financial misconduct, so they can claim that 1% prize money. Another nine percent if you can get us the money back. Around here, we call that Translucency in Government, the basis of Democratic Anarchy. As opposed to Transparent Governance, which actually means making invisible the kleptomania of the kakastocracy.

Putin’s Miracle Vaccine for Mopping Up Anti-Vaxxer Dissidents

There are those who threaten us with second and third waves of “The Pandemic”. Baal Gates goes so far as to promise us pandemics with “higher fatality until we take notice” of him and his insistent desire to vaccinate us all with a vaccine that only he has the authority to approve. Of course, the first wave of Covid was already the “second wave”, but somehow every “news” pundit and “libertarian” webmaster has forgotten the first wave of infections Baal demanded we line up to have vaccinated en masse for. Do you, dear reader, still remember the terrible pandemic in 2018/19, when hundreds, okay, maybe not hundreds, but over a hundred children died of measles? Or did they? Remember how Baal gates and his friends demanded we all stand in line for his special injections? No? Maybe you missed our article on that one.

Read more ...

The Pentagon's Data on Microsoft's Cloud

So, the Pentagon issues an RFQ (request for quotation) to anyone willing and able to host their data “on the cloud”. For months, the news media was abuzz with speculation on the main contenders in the race; Microsoft, Google, Amazon. Anybody who has ever had a thought on things military, immediately asked “Pentagon data on an open, or at least privately-owned computer network? The ones regularly “hacked” and the personal data of millions of people stolen and sold into the criminal underground known as on-line marketers? Really? Can that be considered a safe way to handle the military data of the army supposed to protect the population?” We conspiracy theorists are so naïve, we actually thought the Military-Industrial Complex are going to put their secrets where we can find them. The truth turns out to be simpler, easier, so much more frightening!

Read more ...

The Coca Cola Effect and Big Pharma Drug Merchants

There is hardly any corporation on earth with the distribution capacity of Coca Cola’s. In fact, this distribution system has become so pervasive, Bill Gates wants us to believe he will save the world by spreading his poisonous vaccines The Coke Way. We shall not argue the merits of his poisonous cocktails here, but let us look at the so-called Coca Cola Effect, and pretend we have some evil drugs to disseminate. Just for fun, a laugh, a little chortle, if you will.

Read more ...

Number Portability is a Scam

So you dial your buddy. As you get connected, your phone says: “Bleep-bleep-bleep. Purr-purr, purr-purr…” and so on until someone picks up. Now we all know what the purr-purr means, it is the guy’s phone ringing on the other side, but what about those three short beeps at the beginning? It is the sound of you being scammed by your cheap friend who thought he saves money by changing contracts, and can you believe it, he took his WoodenCom number over to MightyNet! Isn’t those guys just too kind and accommodating! If you believe that, you probably believe the polar bears are dying of hunger because the penguins fell off the melting icebergs and drowned.

Read more ...

The Science behind the Holy Communion

There are those, usually the atheist-science type, that likes to make fun of sacred stuff. A favourite object of their ridicule, is the so-called barbaric cannibalism of the holy communion. Of course, as is the wont of scientists in possession of eternal Truth, mocking other peoples’ truths is a blatant display of ignorance. On the other hand, they also supply us with entertaining nonsense like dark matter, dark energy and Artificial Intelligence, capital letters, please. But they are just stupid little atheist devils with no scientific understanding. Let's educate them a bit in the wonders of creation, why don't we?

Read more ...

  • NATURAL LIVING

    The Greenpets Triad of Hope:

    NATURAL REARING

    NATURAL LIVING

    NATURALLY RAW!

    If all seeds are patented, what will you grow without permission? Education has been declared to be Unsustainable. GMO food products are not suitable for any terrestrial diet. If you can sill afford it, it will give you cancer. We try to find solutions.

    Article Count:
    26
    • APOTECHARY

      A licensed health practitioner would sell advice and nostrums on a page like this. We can't, but here are the things we use. If you find some reason to grow your own, or learn to make something, you may find a few useful bits of information here. Not well populated yet, we do more on our knees in the mud than we talk about it sitting down.

      Article Count:
      7
    • PHOTOGRAPHY

      Dani and her Nikon looking at the world.

      Article Count:
      2
    • ENGINEERING

      Purpose-built and innovative helpful structures

      Article Count:
      5
      • MOTORFIX

        Emergency fault finding and repair for small motors, such as generators, lawnmowers and pumps.

        Article Count:
        3
      • 3D Print

        Design and manufacture of plastic objects up to 250x250x270 volume.

        Article Count:
        1
    • FICTION

      Sometimes, the truth is just too absurd for words. Stories have many words one can borrow, new eyes, new ways of listening.

      Article Count:
      3
    • THE BIOME

      Every living thing is in an environment it shares with other organisms. Every living thing is an environment shared by other organisms. Every environment is a living organism.

      Article Count:
      5
  • NATURAL REARING

    The principles of conforming the diet to the digestive characteristics of man, animal and plant alike.

    Article Count:
    30
    • CRITTERS

      Our animals, your animals and all the things that makes life better for animals.

      Article Count:
      22
      • DRAGONS

        Everything we know about Dragons that might be useful to someone else.

        Article Count:
        6
      • CHICKENS

        Not those weird feathered flu-taxis that grow to slaughter weight in four weeks. Real chickens, free chickens that came dear.

        Article Count:
        2
      • HORSES

        The ultimate bug-out vehicle. Off-road, in water, and it can love you back. Also, they fart less than any SUV.

        Article Count:
        1
      • TORTOISES

        What life tortoise about snailosauruses

        Article Count:
        1
      • BUDGIES

        Keeping, Feeding and Breeding Budgies in Gauteng

        Article Count:
        6
      • CATS

        Keeping, training, Feeding, Breeding cats in Gauteng

        Article Count:
        6
    • PLANTS

      Gardening without modern poisons is a challenge, and understanding the lifecycle of your enemies takes some observation. This blog will eventually catalogue our attempts at poison-free farming for Naturally RAW! food.

      Article Count:
      0
  • NATURALLY RAW!

    the GREENPETS attempt at avoiding, voiding and overcoming the poisoned food chain.

    Article Count:
    70
    • THE HERBAL

      The list of herbs at Greenpets. Identification and Propagation or at least how to keep it alive in Gauteng.

      Article Count:
      57
    • FOOD

      Right or wrong, good or bad, we have to eat. Everyone has to eat, and we are what we eat. Commentary and suggestions on important nutritional news.

      Article Count:
      3
    • BREWING

      The art of brewing, distilling and hydration of the body with the products thereof.

      Article Count:
      8