Feels like the good old – OSI model & Virtualization, yadda yadda

What’s real, what’s not….. To Be or NOT 2 B, that my dear Mr. Watson is the question !

I AM THAT I AM…. rings a bell ? Sorry for the pun. πŸ™‚

How technology is lifting the covers on infidelity

Root Source – http://www.cbc.ca/news/technology/story/2012/11/13/affair-social-media-cheating-email-petraeus.html

As the saying goes, better late than never ! Starting to feel at home, I can’t wait what I can come up with !

I’ve got so many ideas – nothing conventional WAY TOO BORING ! My head’s spinning & twisting…. must be the Spiral thing I talked about earlier.

Let’s see if we can change the ending radically, not a fan of machines as you’ve already noted.

Red pill and blue pill

http://en.wikipedia.org/wiki/Red_pill#Other_uses

KeyLogging

https://www.google.ca/search?q=key+tracer+spyware&oq=key+tracer+spyware&aqs=chrome.0.57&sugexp=chrome,mod=11&sourceid=chrome&ie=UTF-8

Network monitoring

http://en.wikipedia.org/wiki/Network_monitoring

VMWare

http://en.wikipedia.org/wiki/VMware

OSI model – my Fav, just fascinating stuff

http://en.wikipedia.org/wiki/OSI_model

Wireless Bridge

http://en.wikipedia.org/wiki/Wireless_bridge

Obviously this is more than just a 1 + 1 equals 2 answer

These concepts are Ki(key) elements to keep track of what’s what with PC’s on Intel & AMD computers, laptops and related devices.

Android, iPhones, Samsung, LG, Blackberry, Motorola, Nokia, iPads, Unix, Linux computers, devices, smartphones, Digital TVs, tablets, etc…… all the same using their own appropriate software.

That’s the client/consumer level. Server levels with Virtual Software is even more hidden. Think it’s real, think again – you could be in for a nasty surprise.

Leave a comment