Secure Administrator Technology
2020 Cyber Crime
Revise Cyber Security
Protocols and Procedures
Recent cyber-attacks in the news are putting businesses under fire. Looking at the Mondelez incident was very avoidable. Had “Secure Administrator Technology” been in place the laptops and servers could have been saved. 1,700 servers and 24,000 laptops was a huge mishap that could have been avoided also avoided lengthy court trials. The 2017 Not Petya attack on Mondelez Beverage was avoidable. Let us explain.
Like most software you can purchase it online then download it or go to a retailor and obtain a hard copy. What you have is the same software sitting on the same computer everywhere in the world. “Production line Application” purchased by every cyber-crime organization on the globe. This is a never ending opportunity to reverse engineer and find vulnerabilities and exploit them. They have all of the time and all of the updates to learn downloaded and purchased software applications. There is nothing that can be done about this. For example windows update and antivirus. You get an update the cyber criminals get that same update. The windows operating system is the same everywhere. The only thing that changes is the language, English, French, Italian, etc.
Microsoft and all of its subsidiaries all work one constant way and nothing is ever changed. A well designed Microsoft Windows Operating system gets worse and worse every year as users loose more and more control over the system. Just read the Microsoft user agreement and see this. The way Microsoft is operating is like this:
1. Collecting user data is Priority one.
2. Dividing and implementing data to its subsidiaries is second place.
3. Purchaser owner operator user is third place.
4. Operating system security last place.
Overall outcome is Microsoft remains in control of your business data. There is a constant medium for this control of data. It is called a Microsoft Certification. Created by Microsoft taught by Microsoft and upheld by Certified Microsoft technicians. Microsoft technicians will do say and carryout anything to keep the data flowing to the Microsoft server farms. If you think we don’t know what the problem is just ask a Microsoft Certified tech this:
1. Can windows operate without windows update?
2. Can windows operate without antivirus?
3. Can large networks operate without a patch server system?
4. Can the windows operating system operate as a stand-alone self-contained image?
5. Can the constant background data collected be stopped permanently?
6. Can the windows operating system be hand customized to each individual business?
7. Can the windows operating system function normally under brute force attacks?
Now this is why this kind of technology cannot be turned over to Microsoft Certified technicians who work for your company. Microsoft Certified Technicians will never let your business cut off server farm data. Why would your company call Microsoft for “Secure Administrator Technology” information when we do not support any of their policies? We are a separate non associated entity from Microsoft. We stand for privacy and purchaser ownership. We do not support windows update or antivirus and subsidiary background deals. You must hire independent testers to evaluate this technology not sworn to Microsoft certifications. Microsoft certified technicians will declare the breakthrough as rubbish and fight their certifications off to dismiss the trials. Voices will be raised and reason challenged by Microsoft Certified computer technicians. Fight to the end for your company not to try “Secure Administrator Technology”. This will ensure nothing changes for Microsoft to lose the constant resource eating data flow from your company. Microsoft will remain in full control over your companies’ Operating Systems architecture ownership. With no intention of ever giving a company control over its operating systems. Constant failure after failure and not changes made. This is achieved with windows update and antivirus companies. Microsoft cannot guarantee no successful cyber-attacks. City after city government getting hit for large sums of bitcoins. No one will change and Microsoft has an army of certifications to keep their protocol in place.
Try one of our “Secure Administrator Computers”, Operating Systems. Pay for the PC of your choice and shipping. Try our systems for free for your business. Tell us where you would like us to purchase your computer. Pay for computer and taxes plus shipping at (paypal.me/computers24) and we will get it to you to try. Keep and enjoy the demo. If you don’t like the performance. In the event we don’t stop encryption or destruction of files and ransomware lockouts. If your file information is stolen. Delete the “Secure Administrator Operating System” and install a fresh copy Microsoft configuration windows. This trial is designed for companies to explore and apply use of S.A.T. technology. Only 2 trial pcs per company. All shipping done from Sacramento California.
Any questions contact us at :
Surplus Stuff 8508 Folsom Blvd
Sacramento Ca 95826. (916)-541-9226
e-mail [email protected]
Website: www.computers24repairs.com
See us on twitter, search bar = @raashi1963
See us on YouTube, search bar = Secure Administrator Technology
See us on Facebook Marketplace, search bar = Secure Administrator Computers
See us on linked, search bar = www.dhirubhai.net/in/mark-a-w-27086913a
Mark A. West
Secure Administrator Technology
January 2020
Mark A. West Business Owner
Mark A. West Developer
EXECUTIVE SUMMARY
On the subject of cybercrime. Cybercrime has affected business all over the world and it will only worsen. This is forcing business to use network practices that slow down pc speed and production. Purchase new PC’s when the old ones are fine to use longer. Constantly updating and patching. Keeping antivirus up to date. Corporate fear of opening e-mail. Group reboots, chasing down KB files on missed updates. Patch crashes or patch bugs. Employees informing customers the system is down. Ransomware attack just got past the antivirus. Time for IT team’s assessment and solutions. More wasted resources.
These scenarios are all too common. There is a way to end all of these issues.
INTRODUCTION
Secure Administrator Technology:
To combat and end this rise in cyber-crime, I introduce to everyone the “Secure Administrator Technologies”. Freedom from cybercrime and other disturbances on your end user pc:
· End cyber-attacks and cyber theft, end windows update and end use of antivirus. This leaves added urgency. Get this addressed and save company resources.
· Look at current security practices. Look at equipment stress and maintenance. Employee time, wear and tear on machines. Customers told call back.
· There are powerful benefits your business gains from the Secure Administrator Technology. A list of aggravation done away with. Far less company time wasted on data collection, experimentation, updates and patch servers.
Sub-point 1
End cyber-attacks and cyber theft, end windows update and end use of antivirus:
All of the issues businesses face listed are done away with. The Secure Administrator Technologies do not require system updates. Secure Administrator Technologies do not require antivirus. (Do not ever install anti-virus on a Secure Administrator PC). This is accomplished with the creation of each individual operating system. Once the operating system is created cyber attackers and hackers tools cannot command to the O.S. Currently as you read this report all cybercrime is based on windows Silicon Valley configuration. When you purchase a new computer you get Microsoft configuration. When you do a clean install you get Microsoft configuration. Secure Administrator Configures an operating system to customized configuration for the business it is used in. Configured for the particular customer that wants installation. Each installation is different all performance results the same.
· Cyber criminals do not have your configuration.
· Cyber tools cyber thugs use only work on windows configuration.
· Cyber thugs can write code in any language they want, none of them can command the Secure Administrator Configuration.
· Secure Administrator Technology protects your motherboard from Specter and Meltdown plus their families. Permanently (Processor and Ram are protected completely).
Sub-point 2
Look at current security practices. Look at equipment stress and maintenance:
Currently as you read this report all cyberattacks are created for windows out of the retailor production line platform. Okay let’s cover operating system updates. Currently windows update sends updates on a regular basis. Doesn’t matter how much space they take up or the stress on the PC. It doesn’t care rather or not it slows or crashes the computer the updates keep coming. Now let’s add anti-virus updates also. Anti-virus has to have patches. Keep in mind that cyber criminals download the same antivirus you do. They have all the time in the world to reverse engineer and hack at it. Now you have gig after gig after gig of bloated files and errors plus plenty of bloatware you do not need. Let’s look at the operating system image. It’s been stretched, blown up, deflated, sliced, diced and flattened with a rolling pin by the constant flow of updates and patches. This is better known as an unstable environment. All this leads to less productivity and customers calling back.
· The Secure Administrator does not support background agreement traffic.
· The image is never disturbed for any reason from outside commands.
· Performance and security remains at a constant not all over the place.
· Place more PC’s directly on the www.
· Reduce traffic on private networks.
Sub-point 3
There are powerful benefits your business gains from the Secure Administrator Configuration:
The “Secure Administrator Configuration Technology” is for use in everyday business applications. Protect every Windows based computer the client owns and future computers client may purchase. Provides an operating system image stable and un-disturbed in a clean cyber environment. Differentiate between Anti-virus and Secure Administrator Technology Configuration. Anti-virus does not take Operating System make it stand alone then hand it to the owner/purchaser. Secure Administrator Technology is a stand-alone Operating System to the owner/purchaser. Secure Administrator Technology is an independent product. You can see this on YouTube. Real time attacks and data execution from opening emails. They all fail.
· End successful Cyber-attacks on company PC, s.
· End data collection and transmission of computer activity to various entities for any purpose(Data Mining)
· End windows update dependencies.
· End use of anti-virus software.
· End the constant loading of unnecessary files and commands to Operating System image.
· End tampering with VPN’s that causes them to disconnect and fail.
· End DDOS interferences.
· End experimentation with your businesses data.
YouTube
Here are some videos that show the secure administrator defense against random e-mail opening. Please understand that the computers are never damaged or encrypted. The ransomware is played with and opened time after time for demonstration purposes. At no time does the ransomware ware take over the PC.
1. https://youtu.be/AIb7B9IT6vE
2. https://youtu.be/r2KasPCC2xo
3. https://youtu.be/OpafcwNk7vk
4. https://youtu.be/SCJV-6qb1Wo
5. https://youtu.be/ejRmvZy2hpA
6. https://youtu.be/AtsV4DQ3t64
7. https://youtu.be/dXdrLofL2WQ
8. https://youtu.be/urGSujV-cHI (permanently ends data execution attacks)
9. https://youtu.be/C1zaYFb_9-c
10. https://youtu.be/ZKLaOYdbNNs
11. https://youtu.be/l5OLkm3mdOw
12. https://youtu.be/IE4lZSV_zzw
13. www.dhirubhai.net/in/mark-a-w-27086913a
14. https://twitter.com/raashi1963
15. Linked and YouTube and Twitter
These demonstration videos are backed by, Network Vulnerability scanners over and over. The charts are included in this report. Please feel free to use the network scanner of your choice to run test of your Secure Administrator Image. Keep in mind these scanners are programed to find every windows based vulnerability on any windows operating system. Let’s look at the charts and graphs results. These are the results over and over with different manufacturers of the PC’s
Penteston
First set of results are Penteston. This network vulnerability scanner is the most respected. They give 42 individual tool test for vulnerability all in different modes. All of these test are the mode (White Box).There are 7 test done with 5 printouts each. To keep this white paper short only the attestation compliance copy, executive summary and the first 9 test tools are included (Report for Developers). This network scanner outright shows zero vulnerability and is completely reliable. Proven over and over by the YouTube videos. Please note all results are no anti-virus installed.
9 More tools #1
73.185.94.1
PENTESTON REPORT
Report for developers
9 More tools #1
Type: External
Conduct: White box
Test created: 04/03/2018
Report generated: 04/03/2018
TABLE OF CONTENTS
Scope of Work
Need to get through. This is the secure Administrator Configuration. It has not been penetrated since its creation. This is Windows 10 Pro 64 bit 2015.Install Name HF4J3R5. Product ID:00330-80000-00000-AA857
E8400 Intel Core Duo CPU 3.00GHZ
2GB DDR2
Team detail
Mark A. West known as Computers 24.Developer Mark A. West
Scanners:
- Nmap
Informative alerts: 2
Alerts: 0
Alert results: 0
- Low Alerts: 0
- Medium Alerts: 0
- High Alerts: 0
Informative alerts
state
IP: 73.185.94.1
state: up
Reason: echo-reply
Source: Nmap
microsoft-ds
IP: 73.185.94.1
name: microsoft-ds
method: table
conf: 3
Protocol: tcp 445
Source: Nmap
GFI Langaurd
This is the next set of results is by a different testing standards. The first test on 73.185.94.1 Target PC is only showing an open modem from a different public IP address. This is not the complete vulnerability test. The test for Target is the next scan after the cross public IP 73.185.94.1.
The test for 73.185.94.1 is 3 devices. This needed to be detected across the private network. Due to some of the limitations of the GFI Langaurd software.
Multi Role Secure Deployment
For Merchant, Military, Government use:
The "Secure Administrator" will allow you to operate your networks free of survey chatter
and interruption’s and experimenting with your data in workflow. Forced data collection is voided. Everything that has interfered with computer work is voided.
Law Enforcement: The secure administrator can be tailored to your organization. Not only will you be immune to viruses and attack ware, No one on the planet will have your O.S. configuration.The way this is run leaves you with zero computer down time. Currently everyone on the planet has your computer configuration for your organization. Currently everyone on the planet has your antivirus configuration. It doesn’t matter what antivirus you have. If you down loaded antivirus everyone else has down loaded it along with you. If they don’t get hacked then there should not be updates required. It is strongly recommended police organizations use their image only. The police secure administrator purchased by the police is for that department only. The remaining municipality’s department should have their own separate install leases. Law enforcement and fire should be on their own Image. These secure images not accessible by any other departments. For complete R&D data please send a request to us: [email protected]
There is no "Operating System” update maintenance requirement with the Secure Administrator.
There is no network security or maintenance needed.
That is only required for a Microsoft configuration PC.
External control of operational parameters is an invitation for intrusion.
There is no remote operation with Secure Administrator Configuration.
.
This particular test is done on a private network. It shows the target computers vulnerability level as non-existent. This is indicated by the needle being flat in the N/A vulnerability gauge. This is the solid sheet of defenses your company will have when installing the Secure Administrator Configuration for their end user PC’s. Due to the reconfigured operating system it cannot accept outside commands.
Development
The Windows operating system was developed and distributed by Microsoft.
The custom configuration was developed by an IT Professional.
This high performance and security configuration does not come from Microsoft.
Microsoft or its staff has no idea on how to operate this high-performance system.
There is no remote access with Microsoft. You are the single operator.
There is no warranty with Microsoft.
Performance and security exceed anything you can purchase at a retail outlet with windows pre-installed.
While in Vulnerability testing there were some informational entries. Accuracy does vary from company to company. If there were any critical entries they would be investigated and determined if valid. The security stays the same and never waivers.
The only thing that can change will be the number of applications you run. The more applications you run the more processing and ram you use. You only loose a little speed. Unlike Microsoft configuration with 4 or 5 major applications you lose noticeable speed. The background information collection is brought to a standstill. You can see this if you install a Spybot Anti Spyware beacon. When you first install it look at the percent already stopped. Usually around 92%. When you hit immunize it will go up to 100%.
Maintenance is simple. The Secure Administrator Configuration needs no maintenance. It doesn’t update or antivirus update. Standalone from Microsoft. The only thing you need to maintain is the applications you install. We recommend an operating system cleaner. A cleaner that does not have anti-virus rolled into it. Cleaners like: CC Cleaner, AVG Tune-up 2016, Ashampoo, Winoptemiser, Zooka, System Cleaner 7 and Windows Manager.
The next test after GFI LanGaurd is Tenable on page 20 of 21.This test was done with 61 applications installed on the end user PC. These are kept safe by “Secure Administrator Configuration”. This is shown in the YouTube Videos. The Secure Administrator has been put online and attacked by the www internet. The best in every country was invited to gain entry or destroy the end user PC. They were invited by HACKNYC, and the Critical Infrastructure of America. From North Korea, to Russia, to Iran all invited and everyone has failed.
Tenable/Nessus
This is the third Vulnerability trial of the “Secure Administrator” .Over an average you will not be able to invade The Secure Administrator Configuration. With these reports and the actual videos you can determine that Secure Administrator Configuration is effective. Network vulnerability tools read and detect differently with no record of this type of O.S.
About Computers 24
We are a micro business. Family owned serving the Sacramento and surrounding area. We specialize in custom computers for specific task. Pick up and return operations and in home installations. Home and small business networking. The thing customers constantly asked for was how you can make my computer faster? Well after installing capacity ram per board there was nothing left to do. Overclocking was just too risky. Customers always wanted over clocking but never learned how to manage it. This was soon abandon by Computers 24. Having all the tools necessary. I began work on customizing the windows operating system. This was years of work. While in the middle of testing there were some incidents. What happened was while online checking internet speed. I was hit with a virus and I knew what it was but I quickly closed the internet. This happened a few times before I thought to see would the virus even have any effects on my custom operating system configurations. When I saw what my work was doing, I had work cut out. By 2015 I had configured and operated windows 7,8,10 with trials over and over I decided to post work on YouTube
Reference
Testing was performed with Penteston ProactiveRISK, first phase testing averaging 0 vulnerabilities.
Continues testing was performed with GFI LanGaurd, second phase testing averaging 0 vulnerabilities.
Final testing was performed with Tenable/Nessus averaging 0 vulnerabilities.
Personal Computer towers used Hewlett Packard DC 5800, Dell OptiPlex 780, Dell Latitude E6400, E-Machines EL1352G-41W, Dell Inspiron, Custom Asus tower, Custom Gigabyte tower, Dell Vostro. It was a total of 15 computers used for the research.
YouTube was used to publish real-time attacks on video.
Twitter was used to post the target@ (73.185.94.1) PC. HACKNYC posted the challenge (Mr. Tom Brennan). Critical Infrastructure Association of America retweeted the challenge test. Every attack failed like the videos. When we put a regular non Secure Administrator on that public ip @ (73.185.94.1) it was destroyed within 15 minutes.
Microsoft Windows Operating Systems 7,8,10, Professional, Enterprise were used in all the research.64Bit architecture only.