Showing posts with label hackgate. Show all posts
Showing posts with label hackgate. Show all posts

Sunday, 21 April 2013

HACKED! Another site down "someone is trying to impersonate the site"

This Connection is Untrusted
     
     
     
     
       
          You have asked Firefox to connect
securely to information4sale.blogspot.com, but we can't confirm that your connection is secure.
          Normally, when you try to connect securely,
sites will present trusted identification to prove that you are
going to the right place. However, this site's identity can't be verified.
       
       
       
          What Should I Do?
         
            If you usually connect to
this site without problems, this error could mean that someone is
trying to impersonate the site, and you shouldn't continue.
           
         
       
       
       
       
          Technical Details
          information4sale.blogspot.com uses an invalid security certificate.

The certificate is only valid for the following names:
  *.googleusercontent.com , googleusercontent.com , *.commondatastorage.googleapis.com , commondatastorage.googleapis.com , atgglstorage.com , *.atgglstorage.com , *.s.atgglstorage.com , *.ggpht.com , ggpht.com 

(Error code: ssl_error_bad_cert_domai

Elyssa Durant, Ed.M.
Nashville, Tennessee

"You may not care how much I know, but you don't know how much I care."

Upload Failed

P1695

Saturday, 20 April 2013

Project World Awareness: This psychopaths kettle is boiling... she did warn us....

Photo

Foresight Through Hindsight | Project World Awareness
http://www.projectworldawareness.com/forums/


Comments

  • osmankadrikoca on April 28th, 2009

    ‘When an artist looks at the world,he sees color..

    When a musician looks at the world,she hears music..

    When an economist looks at the world,she sees a symphony of costs and benefits..

    The economist’s world might not be as colorful or as melodic as the others’ worlds,but it’s more practical..

    If you want to understand what’s going on in the world that’s really out there,you need to know economics..„

  • Lisa on September 8th, 2010

    Hey Jude, this Rocks!! Thank you so much for taking the time to provide a place where we can gather and start the conversation. Luv ya!

  • admin on September 9th, 2010

    I’m in lala land so going to take a rest…Thanks for the comment Lisa…can always count on you xoxoxo

    ~hugs

  • Elyssa Durant on September 9th, 2010

    “The paradox of education is precisely this– that as one begins to
    become educated, one begins to examine the society in which he [or
    she] is being educated.” – Baldwin

  • vaxen_var on September 9th, 2010

    Hope all your lala’s are us… ;) Happy 9 of 7 jude san.

  • admin on September 9th, 2010

    I think this article, published in 1993, gives an excellent perspective on why 9/11 and the war on terrorism were ‘needed’ for US For. Pol. Leon Hadar: The Green Peril, Creating the Islamic Fundamentalist Threat (Cato Institute) http://bit.ly/c3w2m1

    Here are some more articles posted on this in 2006 (ignore the Dutch comments) http://bit.ly/bV11Sk

    Nye/Woolsey – Defend Against the Shadow Enemy (US Senate, 5 Sep. 2001) http://bit.ly/bxYrX5

    Donald Rumsfeld: From Bureaucracy to Battlefield (Sep. 10, 2001) http://bit.ly/9IjyNu Ever read this speech ?

  • admin on September 9th, 2010

    OHHH and BTW…my lala’s were fine lolll
    ~hugs

  • Elyssa Durant on September 10th, 2010

    Hey Jude~ I just came across this comment iin the Examiner http://tinyurl.com/2fbvprv

    “WE NEED NULLIFICATION NOW TO REGAIN OUR COUNTRY FROM THESE TYRANNICAL FREAKS WHO HAVE TAKEN OVER AMERICA AND WANT TO USHER IN THEIR ILLUMINATI NWO INSANITY. I NEED HELP IF ANYBODY GIVES A DAMN IN THIS WORLD.”

    http://disc.yourwebapps.com/discussion.cgi?disc=149495;article=131896;ti

    KEVIN CANADA
    631 778-5024

    The eror is real and although I can’t call perssonallly, I’m wondering if there is some way we can le that there ARE people who give a damn. Aritcle link

    http://www.examiner.com/human-rights-in-national/extremist-stalking-cells-america

    http://tinyurl.com/2fbvprv

  • Lessat on September 10th, 2010

    Your gift of Words & Wisdom is a blessing to us all ….thank you for always reaching out to help your fellow man. Hugs

  • opphoto on September 10th, 2010

    Just popped by to check on you and your your lala’s ;-) Thanks for the meeting spot, it’s a great start!

  • admin on September 11th, 2010

    Exclusive: Google, CIA Invest in ‘Future’ of Web Monitoring | Danger Room | Wired… http://bit.ly/cribNL <> hold 4 HiStory…

    Thanks for all checking in hope to hear *more* from you ;)
    ~love, me

  • admin on September 12th, 2010

    per your post Ellysa… http://www.nwbotanicals.org/oak/newphysics/synthtele/synthtele.html

  • Krystin Piel on September 21st, 2010

    nice blog!! Learning something new everyday and benefiting from the posts of other people is one reason why I love to read blogs. Thanks for sharing this.

  • admin on September 22nd, 2010

    You’re very welcome…enjoy!!!
    ~hugs,~jude

  • Just1Marine on April 5th, 2011

    Great site my friend. Stay Free, Semper Fi

  • rockingjude on April 5th, 2011

    Semper Fi~

    XOXO

  • Al Holtje on March 24th, 2012

    Hey Jude, I’ve been around for a long time. Worked as a cryptographer at NATO Headquarters in Paris for 3 years during the Cold War and came away at the early age of 22 with the ability to look at any problem figure it out and then put the pieces back together. I did exactly that on Wall Street for 35 years. Designing and implementing systems. In 1987 I was asked to look at the new computerized trading system and said: “NO” it had too many loop holes and needed to be strengthened. System was making big money so nothing got done. Later that year i realized that the system could experience a sell off and invested in puts on the S&P500. The market crashed and well let’s just say, I have the confirmations to prove it.

    That being said. Here we go again except this time, it’s out of control. Thank you very much for publishing my article “Bursting the Bubble” and, if there’s anyway I can help let me know. Again, great site and … Thank You
    Al Holtje

  • rockingjude on March 24th, 2012

    Would love to talk with you…I wasn’t on the inside but a group of us that were trading released what was happening with the housing market etc way before anyone even realized it was a problem…ergo I decided our private boards weren’t enough and built this site…got on twitter and started talking… ;)

    ~jude

Leave a Reply

© 2009-2013 Project World Awareness 


 

image.png

image.jpeg

RockingJude in all her glory... 

I let it rest. When she disappeared from the blogosphere and her precious twitter, I secretly hoped that she had either followed through with her frequent threats of suicide or was finally receiving the long term psychiatric hospitalization that she so desperately needs. 

No such luck. Jude reappeared to solicit sympathy and assistance from some of my biggest fans (DefCon 4 types) begging them to protect her from me and my hacking skills. 

Jude Vosika, "allegedly from Wyoming" accused me once again of hacking her site and begged for assistance from AntiSec and LulzSec. 

Little Miss V claims she had to hire security professionals (again) to secure her pathetic, unoriginal site, ProjectWorldAwareness.com (which, incidentally is not registered in her name or place of residence) as a result of being hacked since 2010 by me and my "cronies."

I have two things to say:

1. What is so damn special about her pathetic website worthy of hacking? She BEGGED me to post these generic comments just so my name would be on her page. She also took my original writings (protected by copyright) and posted them as her own on her stupid little site. 

Since she can't spell, write and has no education or real "creds" you can find other comments and people complaining that she merely steals materials from others (like myself) and when she wants to troll or harass people she uses fake names since hers carries no weight. 

This is clearly evident in the screen cap above where she pretends to be a well respected and independent thinker using his name to threaten me on my blog. 

"You don't need to be a rocket scientist" to realize that Jude Vosika was posing as someone she claims also hacked her when I met her a few years ago under VERY bizarre circumstances.. 

2. If you're so damn sure I am hacking you, call the fucking Feds. God knows you have enough an interest in them judging by how you stalked and fixated on my father; posting his bio and credentials on YOUR pathetic little website. 

Glad that shit got suspended. Couldn't have happened to a nicer person. 

To be continued if need be. 

Quit while your ahead, stupid cunt. 

PS  Also noticed Jude posts under multiple admin accounts, Gravatars and multiple aliases and personalities; but she sure loves using her self-proclaimed "celebrity" and the name ROCKINGJUDE ( @rockingjude on Twitter and FaceBook) and her less than interesting timeline to create, drama, terror, fear and to enlist help from 200,000 or so [probably] paid followers to stalk, bully, threaten, harrass and terrorize her victims.

I wonder how many of these people have ever met this deranged woman.  I sure wish I never did.

Word of advice, if you ever see "Hello, it's me" in her tineline-- she has slipped into an altar ego where she "hunts" her victims with the help of few friends for days, weeks, months, or in my case, years on end. 

I have an advanced degree in Psychology and worked as a therapist for the state, the CDC, SAMHSA, and several other agencies and organizations.

I could you her diagnosis, but that would be sinking to her level and she would claim I am victimizing her.

Do yourselves a favor. STAY AWAY!

[originally posted June 19, 2011 updated in light of recent events April 20, 2013]

 

Just me,

e 📧
@ELyssaD™

Forgive typos! iBLAME iPhone

Thursday, 21 March 2013

Recover a Hacked Microsoft Account | Microsoft Security

How to recover your hacked Microsoft account

How to recover your hacked Microsoft account

If you think your Microsoft account has been hacked, we recommend that you reset your password right away. To change your Outlook.com or Hotmail password, sign in to your Microsoft account, and then go to the Password and Security section for Outlook.com or the Account overview page in the Account security section for Hotmail.

Add security information to your account

You can also recover your account by associating it with information that cybercriminals can’t easily access, like your mobile phone number or an alternate email address. For example, if you lose your password or your account is compromised, Microsoft sends you an account-recapture code in a text message to help you regain access to your account. Add security information to your account.

You can also set up a "trusted PC" to recapture a hijacked account. You can associate your account with one or more of your personal computers. That way, if you ever need to regain control of your account by resetting your password, use one of your trusted computers and Outlook.com or Hotmail will know you are the legitimate owner.

Watch out for scams

If you receive an email message about the security of your account, it could be a phishing scam. Don’t click links in any messages unless you trust or check with the sender. Instead, reset your password.

Use antivirus software

Scammers can get into your email account by installing malicious software onto your computer without your knowledge. Make sure you use antivirus software that updates automatically like Microsoft Security Essentials if your computer runs Windows 7, Windows Vista, or Windows XP. If you’re using Windows 8, you already have antivirus and antispyware protection called Windows Defender—which means you don’t need to download Microsoft Security Essentials or other antivirus programs. Windows Defender 8 runs in the background and notifies you when you need to take specific action.

GOOD LUCK WITH THAT!

Wednesday, 20 March 2013

What's Really Behind China's Attacks On Apple And Android? – ReadWrite

What's Really Behind China's Attacks On Apple And Android?

American technology is winning the smartphone wars. Apple's iPhone captures the lion's share of the industry's profits and Google's Android operating system easily dominates smartphone market share. Is this a cause for concern in China - which has grown accustomed to dominating tech manufacturing?

Clearly, something is bothering the Chinese establishment. 

Two weeks ago, China's Ministry of Industry and Information Technology (MIIT) sounded an alarm about Android's dominance:

While the Android system is open source, the core technology and technology roadmap is strictly controlled by Google.

According to the Ministry's statement, China's “mobile operating system research and development is too dependent on Android.” While Android is the world's dominant smartphone platform, with an estimated 70% market share, Android commands an estimated 90% of the Chinese smartphone market.

This is a big deal. There are more than one billion smartphones in use around the world - and billions more are expected to be activated over the next several years. China is the world's largest smartphone market, but nearly every new smartphone made is based on technology developed and controlled by North American companies. 

The top smartphone operating systems in the world are American, with Google's Android and Apple's iPhone leading by a wide margin. Android commands 48% of the market and iPhone has 19%. Blackberry owns 8% of the market and Microsoft's Windows Phone has 2%. (Legacy devices running on the outmoded Symbian OS still control 15% of the current market.) Just as important, services, applications, businesses and innovation gravitate to the winning platforms. 

(See also America's Mobile Comeback.)

Android And iPhone Rising

Earlier this month, I suggested that a de facto threat to Android could certainly benefit China's 'homegrown' platforms, such as Alibaba's Aliyun operating system, for example. I also said that such a move might benefit Apple's iPhone and other competing platforms. But that may no longer be a valid assumption.

Late last week, China's official media, China Central Television  (CCTV), went after Apple. According to The Wall Street Journal:

China Central Television accused Apple of skirting warranty periods and adopting customer-service policies for Chinese customers that differ from its practices in other countries.

During the two-hour broadcast, watched by millions, the network accused Apple of not fully meeting product warranty requirements and of engaging in customer-service practices that differ from Apple's standard practices in other countries. For example, Chinese customers, the broadcast said, are more likely to receive a refurbished product instead of a new device when their original fails.  

"This is too unfair to Chinese consumers," one customer said in the report.

While the iPhone has only a small share of the Chinese smartphone market, Apple has been moving aggressively into the country. In the last fiscal quarter alone, Apple generated $6.83 billion in revenues from the Chinese market (including Hong Kong and Taiwan). China is currently Apple's second largest market by revenue, though CEO Tim Cook has predicted that China will become Apple’s number one market soon.  

Cook was in China earlier this year, where he met with several government officials and the chairman of China Mobile, the country's largest mobile carrier.

Any actions undertaken by the Chinese government that limit or otherwise diminish the prospects of Apple's iPhone and Google's Android platform would likely be felt immediately. As The Wall Street Journal stated in its CCTV report:

China's consumers flooded social-media sites after the CCTV report. Zheng Yuanjie, a famous Beijing-based children's author, wrote on the Sina Weibo microblogging service, "By paying the same or even a higher price for Apple products, Chinese consumers have received even lower standards of after-sales service than those in developed countries. I hope the part Apple is missing [in its products] is not its conscience." The comment received nearly 8,000 comments and was forwarded nearly 10,000 times by late Friday night. 

Smoke But No Fire

Not everyone is convinced. Steven Millward, who covers the mobile market in Asia out of Shanghai, said the moves by China's state-run broadcaster and Ministry may not be coordinated:

Coming just two weeks after China's MIIT warned of the country being too dependent on Google-controlled Android, the CCTV attack on Apple might seem to be a co-ordinated attack on the two leading smartphone platforms in the country, iOS and Android, but i'm not convinced. 

There could be other factors for CCTV's attack on Apple: it was, after all, World Consumer Rights Day, and major foreign companies are often (though not exclusively) the ones at whom the brickbats are thrown.

Apple, Millward notes, is also a "prestigious target" for a television broadcaster to go after. Indeed, as The Wall Street Journal reported, the CCTV report was "hyperbolic" if not necessarily effective. 

Similarly, while there may be some legitimate cause for concern over Android's near-monopoly in the China smartphone market, Millward notes that "Chinese authorities must realize that their leading Web companies - from Baidu to Tencent, Sina to startups - badly need iOS and Android as the basis of their entire mobile strategy." 

China's Sputnik Moment?

Even if the broadsides launched against Apple and Google are indeed coincidental, they could still be signs of China's own 'Sputnik moment' over American domination of smartphone technology, 

For non-history-buffs, back in 1957 the Soviet Union launched Sputnik, the world's first successful artificial satellite. Reaction in the United States was dramatic, with warnings that American technological leadership was being squandered and hysterical fears of a deadly "missile gap." The Sputnik issue became a central to the 1960 U.S. presidential election. Soon after his election, John F. Kennedy Jr. committed the United States to sending a man to the moon.

It's probably hyperbole to claim that the rise of Android and iPhone will inspire new efforts by the Chinese in the smartphone sphere. But it's equally clear that China has noticed that there's a key technology category where it doesn't lead the way. And no one should be surprised if they decide to do something about it in a big way. 

Nobody's Talking

Apple did not respond to requests for comment, nor did the U.S. Chamber of Commerce. Google responded with the following statement:

Android is an open source mobile platform freely available to everyone. It is available in its entirety at http://source.android.com, allowing device manufacturers to customize and offer new user experiences, driving innovation and consumer choice.

 

Image of Chinese flag courtesy of Wikipedia. Graphic image by Nick Statt.

Tags:

I call Bullshit. They build our iPhones and hold the root certificate for NASA apps.

If they wanted to fuck with our toys, they had of plenty of opportunity... BEFORE they shipped them to the US of A's.