Showing posts with label stealing. Show all posts
Showing posts with label stealing. Show all posts

Monday, July 23, 2018

About the age limits in the use of the Internet



https://metsantarinoita.blogspot.com/

Kimmo Huosionmaa

Google has prohibited the use of its services from persons, who are under 16, here in Finland. 16 is the limit when people are responsible for their crimes in the eyes of the law, and they can put jail. The reason for choosing the age of 16 in Finland is probably, that other persons would make Google accounts in the name of people, who is under the age of criminal responsibility.


And maybe some hackers or other persons, who have used the Internet for the illegal purposes, like spamming the parliamentarians, are opened their accounts in the name of underage persons, whose names and pictures got from schools or neighbors. If some hacker can get the names of the pupils, this criminal can steal their identity by using their names and birthdays and then start the actions as the official supporter of the Russian Federation.


The telephone number can also be faked, or it can be prepaid, but this kind of things makes that suspicious. Use of underage person identity on the Internet is the very bad thing because the usage of those accounts is sometimes very different, what child's world should be, and the international politics and terrorism are the things, what should not be written by some 12 years, if that person is not some extreme intelligent youngster.


The thing, what makes the account suspected for use in illegal actions, is that some 12 years old probably would not support Vladimir Putin or show the pictures of assault rifles. This means that the actions of that account are different than the other that age person's accounts have. Another way to see the texts is that if the text would not fit the writer. The real prisoner would not probably like police, or homeless would not like to live on the streets. But if some prisoner starts to like the things, what is working against their benefits, the account would be stolen. Those accounts can be put under the surveillance, and if they are used by mobile devices, the person can be located quite easily.


And if in the table of the restaurant, where that device is located finds any children, but telephone sends messages, there is a reason to suspect that some other person than the marked user of the account is using that account. One thing, what makes the account suspicious is that is used only from the public hotspots. That means that the user would want to hide the existence of that account.

Monday, May 14, 2018

When you steal something, you make a crime


http://marxjatalous.blogspot.fi/p/when-you-steal-something-you-make-crime.html

https://youtu.be/3cmqtm_Rfcs

Kimmo Huosionmaa

Above and below this text is very interesting "teaching video" of stealing property from some shops, and here I must say, that stealing from shops is the result of the process, where a young person has been getting in the wrong gang. Stealing is the port for making contact with criminals, and that is the mark, that somewhere in this thief's personal life is a thing, what makes believe that stealing is the right thing. That means there in the social network of the thief is somebody, what accepts that kind of things like stealing from the markets.


And this is the reason, why those crimes must be reported to the police immediately. Stealing is the gate, what sometimes cause that person would slip even in some mafia-gang. This happened to Sam Giancana, who started his career as the small thief but then raised to the leader of United States mafia. And that man made many very violent crimes in his bloody career. I don't want to support criminal activities, but if somebody has gone to make business with wrong fellows, could the results be like this. When somebody really wants to get in some social environment, this can make this person the good target for exploitation. The new fellows might say that they would be the friends for the new guy, if this would get some stuff from local shop. This stuff is something like alcohol or other things, what has the high age limit.


And this situation might turn that those friends just slip away, and the thief would stay outside the shop with stolen property. This would cause the criminal prosecution process. It's not only one time when some gang members have been instigated new face for crimes, and then inform that person to police or security guards. This has probably felt good, but that makes the person, who was busted very angrily. The kings of those gangs have an attractive way to swagger their clean criminal registers. And of course, they always are persons, who conflict every crime in the world.

Those persons who have lead criminal gangs are sometimes persons, who think that there is nothing wrong if they are giving orders to make crimes. Sometimes those gang leaders have grown very big gangsters, but the death of those people have been violent. And one reason for killing persons like Sam Giancana must be revenge. Those high-class mafia-men are sometimes sold their fellows to police, and somebody just got to an electric chair, because they are trusted Giancana, who of course sold them to police. And that caused hate in the other gangster's mind because they had not small nice house in good neighborhood and congressmen ever visited in their flats. Those kings of the gangs ever make their hands dirty in the stealing or making any other crimes.

They order other people make them. When they are elder persons, they would tell to their families stories, what kind of criminals they have known in their young ages. Of course, those persons newer drive over-speed because they just sit on the right side of the cars and someone else always drives the vehicle. And the house of those persons is always in the very expensive neighborhood, what gives those ex-kings very good social status in the eyes of other people. In the same time the person, who was sold to police sits in the home lonely, and remember the wild heydays.

Sources:

https://youtu.be/3cmqtm_Rfcs

http://marxjatalous.blogspot.fi/p/when-you-steal-something-you-make-crime.html

Monday, April 16, 2018

What information should not deliver to Facebook


Kimmo Huosionmaa

Below this text links to information, what should not share on Facebook. That text is in Finnish, but if you don't understand use some translator program. Here I must say that there are a million things, what might cause embarrassing situation if that information is shared on social media. First one would be that some sportsman might portray cigarette in mouth and bottle of whiskey in hand.


That would cause very embarrassing situation at home, and another thing, that might cause very much humor, is if some director of the enterprise-class company would say the family to go to London for the business meeting. And then there would be pictures and position information from "Red light district of Amsterdam". There might be little things to explain at home when our hero would get back to home.


Also, pictures that are taken at home might be dangerous, if there is a picture of guns. Firearms are the most wanted thing, what thieves want, and that might be the risk for the personal security of this person. But many times the reason for blocking the Facebook is a fear of making mistakes in social media. The things that some person has many great opinions and writings would cause strange feelings if that person ever writes anything in social media. Or by the way, those people publish many things in social media, but they only share those texts with their friends.


When we are talking about blackmailing people by stealing their diary, we must face the thing, that what kind of person steals their friend's diary? And if somebody ever writes a world, how this person keeps some diaries? Stealing the texts of some person, must the thief pay copyright payments to that person. And when we are thinking very clearly about the situation, that somebody orders text from some writer for dating, will that be the very embarrassing thing, if that would someday uncover. I understand very good, that somebody lends Shakespeare in those texts, but ordering the date letter from somebody else is something, what I don't understand.


And the top thing in this fictional case is that this orderer of the texts introduces that text in own production. This is what means plagiarism, and stealing the some other person's production is very embarrassing if that thing where dating letter what seemed very attractive was made by somebody else. This kind of things must be thought in public media.

https://www.mtv.fi/lifestyle/digi/artikkeli/ethan-ole-jakanut-naita-tietoja-facebookissa-kahdeksan-asiaa-jotka-jokaisen-pitaisi-poistaa-sivuiltaan/6867702#gs.bRDl0zg

https://vapaaverkkojulkaiseminen.blogspot.fi/p/what-information-should-not-deliver-to.html

Tuesday, October 17, 2017

Every encryption have vulnerabilities and now WPA2 (WiFi Protecting Access 2) algorithm has vulnerabilities




Kimmo Huosionmaa

Again hackers have made a good job and broke secrecy of the WPA2 (WiFi Protecting Access 2) algorithm. What made this good work, is that they published that data so all Internet community can begin to create new kind of secrecy, or prepare themselves that their private data can be stolen from their secured WEB-drives.  That action shows that we must keep going with creating new methods of encrypting data and keep our privacy so strong, that nobody sees our private data what is sent over the net. But as you might know, real-life hacking is more difficult than something that happens in media. Almost every kind of encryption has weakened, and one thing what creates much more vulnerabilities is human. If a person uses too difficult passwords he or she might need to write it down or in worst case use a text file, where that person copy-pastes those marks to password line.


And what makes that thing vulnerable for the system, is that somebody might take the only photograph from the screen, when that person opens his or her text file. And the question is did he or she remember to shut down the big screen if that person is giving training lessons to some audience. In that case, could the hacker get password very easily, only thing what that person need is taken photograph in the right moment, and after that hacker could slip in the system. Worst hacker-style is social hacking. The simplest way is just to find a boss of that target company and pump that person full of sodium-Amytal when those attackers are only asked for the password from that man or woman.


In that method hackers just get one director's phone in their hands, and simply ask people passwords from the telephone, and if people won't warned about that kind of hacking, could hackers steal very much information from their target system. Sometimes users of the system ask micro support to install some programs on their workstations, and that could cause terrible situation if a hacker is a member of the micro support team. That could cause information leak where hacker simply copies hard disks information to their USB-memories, and that could be very harmful to business secrets.


In those scenarios, hackers slip a man inside the system. There they can steal information for years if somebody wouldn't see what that person does. But when we are talking about cracking algorithms with the mathematical method, we must remember that modern computers speed and power have been grown from days when that WPA2 algorithm have been created. That makes that security vulnerable for modern computers when they use "brute force" attack against the system.

https://crisisofdemocracticstates.blogspot.fi/

New self-assembly nanotubes turn the impossible possible.

 New self-assembly nanotubes turn the impossible possible.  "The crystal structure of a carbon bilayer. The purple outer layer and blue...