Knowledge is Power
I don’t believe what I see, but I believe in what I investigated.

Knowledge is Power

If someone gives you a million dollars, first : drink a glass of water, then say that… §ù%è ?sù &se*rfù%èsr !!!??!!.

We cannot say who we are if we are not who we say, if you can read and write it means that you can distinguish a dog from a cow. The problem is that the dog has started to act like a cow and we can no longer distinguish them from each other. And if you know how to use a computer you really have the certainty that the cow is the door to your house and the dog called New play cards wits the pig.

The question is who you are in this story?

The moral of this story is that you are a good reader and a good analyst already, you started asking questions whoever you are.

Good luck in the world of the internet, but be careful what you read today no longer exists tomorrow, here in the world of the internet the words are numbers and the numbers do not compose coherent sentences because THEY want to be like that, and you don’t know THEM, but THEY know you.

Example :

A mouse click on the computer screen is done in a few seconds, this is the visible part of what you see. Here is the instruction to perform this operation, which you do not see :

Mouse Clicks :

>>> pyautogui.click(clicks=2)

>>> pyautogui.click(clicks=2, interval=0.25)

>>> pyautogui.click(button=’right’, clicks=3, interval=0.25)

99.99 of the world’s population does not understand anything here, it is normal you need to have in-depth knowledge of computer science.

It should be noted that almost all computers in the world 99.99% are hacked with the help of a mouse (own mouse).

You will ask how ?, it’s simple, in reality very few hackers can enter in your computer from 10,000 km, rather at a precise target, having a precise abject after months of detailed pursuit and research, to hide their traces, etc. most hackers are based on your ignorance, meaning that you will open the gate yourself.

The explanation is that no real hacker (a professional, I’ll call it the ALPHA hacker) will enter your computer to steal some videos or pdfs or pictures that are worthless.

Only if you are a businessman or a senator, etc. and may risk obtaining important information that can then be sold later.

These types of hackers are very few because they will not risk between 20-40 years of sacrifices to learn C ++, Python, Java, HTML, etc., lost nights, humiliation that he can’t find a job because he won’t find a job that suits him, no one will pay as much as he asks, his health is poor and then he risks being caught hacking a few computers with no value.

So who will hack your computer?

Yourself

I know you won’t believe it.

The explanation is that the rest of the hackers (non-professionals, I’ll call it a BETA hacker) who use programs made by real hackers (programmers) do not really know how it works. So what do I do? They will search the internet for small programs called Trojans, etc. which will be sent to several email addresses, etc. at the same time, when a person opens an attachment or a picture from such an email, the program will be automatically installed on his computer, he will do everything himself, I do not enter here in details.

Then the BETA hacker will be able to access your computer so he does something when he can’t find anything, he will modify some files or worse he will damage your computer.

 So the BETA hacker will not risk anything, he is just looking for glory to be recognized as an ALPHA hacker, he will leave behind only fire and smoke just to make a name for himself.

 Now imagine the same scenario at Fake News.

To defend yourself from these hacker programmers, etc. have developed over time several defense solutions. I will not go into details here.

No defense system has been found for Fake News yet.

So what do we do?, how do we distinguish true information from false information?

What you need to know is that it is more dangerous to break your mind than your own computer. You can repair or change your computer but your mind is unchangeable, it is unique, don’t let it ruin your mind … be vigilant.

In the early days of the internet, hackers were few, now or turned into organizations, misinformation has become a weapon, creating fake news doesn’t have to be a hacker, before the internet: bad kings, dictators, bad people, they deceived people that they were good to be elected, they had an army behind them to promote them, today with a handful of money you can become president without moving a finger. The Internet gives you this possibility, or rather, those behind the Internet (people in the shadows who are just simple IDs, or nicknames). They know what toilet paper you use, what color, how many times you go to the toilet, where you buy it, what day you go shopping, etc., many of the people are so gullible that if you tell them that a chest with money is hidden near their house they will dig around their house until they die of hunger and exhaustion. Why this because there is no other possibility to verify the information.

How do we distinguish true from false information on the internet, here is a question I will try to answer on this blog.

https://nknow616255148.wordpress.com




Julien TONG

??Je rends la pratique du CrossFit accessible à tous, notamment pour les personnes ayant des problèmes de dos ou souhaitant perdre du poids.

2 年

Christian, joli partage! On se voit à la salle quand vous voulez, 1ere séance offerte :-)

回复

要查看或添加评论,请登录

Rojan Christian的更多文章

  • The restaurant the fast-food and the box(part 1)

    The restaurant the fast-food and the box(part 1)

    Almost a 1000 years were needed for the restaurant concept to pass through an intricate transformation, to become what…

    1 条评论

社区洞察

其他会员也浏览了