Penetration Testing & Auditing



Since the Trump started exposing Fake News. Certain trend I've noticed in the live telecasts around the world. Such as after the initial info. the transmission gets owned, by whom? is a long story. But since this article is about Penetration Testing and Auditing, we gonna' go ahead with the solutions.

It's something such as the Man in the middle attack but doesn't concerns the original networked concept. The scenario is something like, a server lying around in the room but that's not the only server we're dealing with. Because according to my calculations on my neighbors house, there are/were atleast 28 different dimensions containing the same person. Now if ever the real person shows up in the camera if installed is highly unlikely. It could be possible that one person does something but the other clones wouldn't and in the morning the culprit could register the case and it'll become like that in all the dimensions.

Similarly we have the TV and Telcom networks lying around everywhere. We can trust the networked owner for being legitimate but it's all going the other way round, seems it doesn't matter, legit or not.

So, one simple solution would be to takeout those dimensions containing the culprits, and the set-up would obviously leave. Or we can install our own personnel dealing with them but that would be time staking and they wouldn't know how to handle except for the mouth service.

Let Trump build the Wall and we gonna' see how the Americans deal with that. Eventually cleaning up the mess and owning the telecasts would had to stop one way or the other.

Foedus Operandi

Keeping in mind the more than 28 pages with the golden book & it's pages or dimensions in mind. The second thing is:

It needs to be hit at 4 points. IN, PK here IN, PK there. IN, PK original site IN, PK original site. Otherwise impossible to get them. Even if one bullet is fired it needs to be fired at 4 locations at one time. Tried & Tested.




Comments

Disclaimer

Although, images and paragraphs already mentioned are taken care of, but others we have to monitor and investigate and double check on everything, including the gangs and culprits and their movements & networks, facilities if any and the source of their funding and the traces of which all around the globe.
It takes small relative time to come in to effect, because of the nature of things involved, based on findings, but besides all the given details it can be done ASAP, as well.