Decision Making Process

Network Discovery Process.com

ubuntu + wordpress

What links here = lunix running windows << Network Discovery Process
It's not just about  ''Why should I want Linux?''. It's also about ''Why should Linux want me?'' [archived]

Linus Law

 

Microsoft Buys Canonical And Shuts Down Ubuntu Linux OS

 

 

Ubuntu Linux Is Coming To Windows 10 — Microsoft Partners With Canonical

 

 

To be continued - 


ubuntu + windows xp professional [source

+ windows NT Double Commander
[source]

ubuntu + windows 7 vista [source

win 8 + linux mint Pavilion g7 [source]YouTube

linux mint + windows xp [source]




MS DOS 3.11 [source]YouTube

+ BBS [source]YouTube

Telephone line [source]YouTube

FTP [source]YouTube

buffer overflow [source]YouTube




AMD Processor [source]YouTube

Youtube-dl [source]YouTube

Programming language [source]YouTube

Dumpster Diving [source]YouTube

homepc [source]
computerhacker.nl




Skype + VOIP [source]

Container [source]YouTube

Usenet [source]YouTube

BIOS [source]YouTube

Newsgroups [KPN][ZIGGO][VODAFONE][SABnzbd][Usenet]


wordt vervolgd


Download Verkenning cybercrime in Nederland 2009

Stap 1: de aanbieder vinden


Step 1: find the provider

De eerste stap om kinderporno te verkrijgen, is het vinden van de aanbieder. Dit blijkt echter lastiger te zijn dan dat het in eerste instantie lijkt.

The first step in obtaining child pornography is to find the provider. However, this appears to be more difficult than it initially seems.

 

  1. Ubuntu Linux is the Most Popular Operating System in the Cloud [archived]
    Windows user installs ubuntu on his mothers laptop WATCH YOUTUBE VIDEO
  2. Why is Ubuntu the Most Popular Operating System for Cloud? [archived]
    An introduction to a linux windows xp professional user [2017 WATCH YOUTUBE VIDEO]*
  3. Richard Stallman talks about Ubuntu
  4. What is AWS? [archived]
  5. What are the Different Components Used in AWS? [archived]
  6. Richard Stallman: Dangers of IoT and Amazon Alexa
  7. The Netherlands Continues to be the Worst Country for Hosting Child Sexual Abuse Material [archived]

    - ''Furthermore, Linux servers are often used to harbor Windows malware. When you click on a malicious link, the likelihood is that it directs you to a Linux server''. [archived]

Full Screen internet pedo hunting ground

 

 

  1. What is the differences between windows 7, windows home and windows xp professional? and vista
    https://en.wikipedia.org/wiki/Windows_7_editions
  2. Is Open Source More of Less Secure? [archived]
  3. Linux is Not Windows [archived]
    Linux is Geen Windows [archived]
  4. Is Your Son a Computer Hacker? [archived]
    Your Son is a Computer Hacker WATCH YOUTUBE VIDEO
  5. Dumpster Diving - What Can Be Found? [archived]
    Your Son Dumpster Diving WATCH YOUTUBE VIDEO
  6. IMPORTANT! Ubuntu Forums Hacked [archived]
    Your Son Hacked
  7. The Risk of Running Windows XP Professional After Supports Ends in April 2014 [archived]

To be continued - 


ubuntu + windows xp professional [source

+ windows NT Double Commander
[source]

ubuntu + windows 7 vista [source

win 8 + linux mint Pavilion g7 [source]YouTube

linux mint + windows xp [source]




MS DOS 3.11 [source]YouTube

+ BBS [source]YouTube

Telephone line [source]YouTube

FTP [source]YouTube

buffer overflow [source]YouTube




AMD Processor [source]YouTube

Youtube-dl [source]YouTube

Programming language [source]YouTube

Dumpster Diving [source]YouTube

homepc [source]
computerhacker.nl




Skype + VOIP [source]

Container [source]YouTube

Usenet [source]YouTube

BIOS [source]YouTube

Newsgroups [KPN][ZIGGO][VODAFONE][SABnzbd][Usenet]



Your Son Dumpster Diving

Operating system
Ubuntu + windows xp professional [source] + windows NT [source]
Ubuntu + windows 7 vista [source
Ubuntu + windows xp professional [source]
Ubuntu + windows 8 [source]
Ubuntu + linux mint
linux mint + windows xp [source]

Stap 2: anoniem en ontraceerbaar surfen

Step 2: surf anonymously and untraceable

Eenmaal doorverwezen naar een website met kinderporno moet er een aantal veiligheidsmaatregelen worden genomen om ervoor te zorgen dat de aanbieder en de andere gebruikers van de website niet het risico lopen om gepakt te worden doordat de nieuwe klant door de politie getraceerd kan worden.

Indien de nieuwe klant de politie naar het netwerk leidt, zijn immers ook de andere gebruikers in gevaar.

Once referred to a website with child pornography, a number of security measures must be taken to
ensure that the provider and the other users of the website do not run the risk of being
caught by the police after
tracing the new
client. 

If the new customer leads the police to the network, the other users are also in danger.

  • Ubuntu gaining ground in website deployments - More popular on servers now than Red Hat, Suse [archived]
  • Why Linux is good for Network and Security [archived]
  • Canonical waarschuwt voor einde ondersteuning Ubuntu 14.04 - Security.NL [archived]

  • Populariteit Ubuntu op webservers stijgt explosief - Webwereld [archived]

 

Home / Algemeen / Veiliger dankzij Linux? Vergeet het maar!


Pop-up laag: klik op deze afbeelding
Pop-up laag: klik op deze afbeelding



 Hackles Cartoon Archive


  • Linux is geen beveiligingsoplossing [archived]
- ''Maar 'het veiligste besturingssysteem' is nog altijd het systeem waarmee de gebruiker het meest vertrouwd is zodat hij weet welke security gereedschappen beschikbaar zijn en hoe hij deze moet gebruiken''.


http://www.microsoft.com/windowsserver/compare/compare_linux.mspx


https://web.archive.org/web/20190125032831/https://idefix.net/~koos/kooszndoos.html#

https://web.archive.org/web/20190328221321/https://www.fsf.org/blogs/rms/ubuntu-spyware-what-to-do#
https://web.archive.org/web/20190328221639/https://www.eff.org/deeplinks/2012/11/privacy-ubuntu-1210-full-disk-encryption
https://web.archive.org/web/20160327195650/http://www.omgubuntu.co.uk/2012/09/online-shopping-features-arrive-in-ubuntu-12-10#
https://web.archive.org/web/20190421053549/https://www.markshuttleworth.com/archives/1318#
https://www.wired.com/2013/09/why-free-software-is-more-important-now-than-ever-before/

https://www.omgubuntu.co.uk/2012/09/mark-shuttleworth-explains-ubuntus-new-amazon-adware-feature
https://arstechnica.com/information-technology/2012/12/richard-stallman-calls-ubuntu-spyware-because-it-tracks-searches/

 

Marktaandeel Windows november 2008






The Users Control the Program OR The Program Controls the Users



https://en.wikipedia.org/wiki/Secure_by_design#

In 2016, most child sexual abuse imagery was hosted in Europe (60%), 37% was hosted in the Netherlands


  • 87% of all child sexual abuse URLS we identified globally in 2017 were hosted in these five countries

 


 

Other links:

http://all.net/Library.html

https://www.wisdomjobs.com/e-university/all-skillsets-interview-questions.html

http://en.wikipedia.org/wiki/Security_by_obscurity

https://web.archive.org/web/20051015020635/http://en.wikipedia.org/wiki/Linus%27s_law#

http://www.microsoft.com/windowsserver/compare/compare_linux.mspx

Many eyes, shallow bugs -- the untold story

http://www.cve.mitre.org/cgi-bin/cvekey.cgi?keyword=format+string

wordt vervolgd

- ''whether if the knowledge is harmful or not''


/



network discovery process @ http://free.vs.closed.software/

<<-- --wordt----vervolgd---->>


Windows 7 Professional This edition is targeted towards enthusiasts, small-business users, and schools. [1] It includes all the features of Windows 7 Home Premium, and adds the ability to participate in a Windows Server domain. [1] Additional features include support for up to 192 GB of random-access memory (increased from 16 GB), [13] operating as a Remote Desktop server, location aware printing, backup to a network location, Encrypting File System, Presentation Mode, Software Restriction Policies (but not the extra management features of AppLocker) and Windows XP Mode. [1] It, too, was available in both 32-bit and 64-bit versions. [12]Figure shows setting up linux image extra..... Microsoft windows xp Professional gevonden op /dev/sda1


full screen




I back up data on my home PCs...

Linux box running duplicity, encrypted, and into the S3 cloud

-   Linux. Common practice is to not run anti-malware software on Linux systems. 


Pop-up laag: klik op deze afbeelding


However, many software developers do not create their software for Linux, and choose to focus on creating packages for operating systems with the highest market shares, such as Windows, which has traditionally held the highest market share of desktop PCs and laptops. This results in Linux users needing compatibility layer software if they wish to run Windows software on their Linux operating system. 

Wine is the de facto compatibility layer for running Windows applications on POSIX-compliant operating systems, such as Linux, Mac OS X, and BSD. Wine works by translating functions that are Windows specific into a format that can be understood by Linux (or other POSIX systems). The use of compatibility layer software may present a security threat to Linux users. The fact that it enables Windows software to run in Linux environment introduces the possibility of running Windows malware on an otherwise secure Linux machine. The level of security risk that Wine poses to Linux users is largely undocumented.

  • Security implications of running windows software on a Linux system using Wine: a malware analysis study [PDF]

 

  • the majority of detections of malware on Linux systems are for Windows malware
  • URL geo redirection is another term for redirecting a website to another URL based on the location of the visitor to the website
  • subscribe for updates
  • To be continued

watch my youtube channel
http://youtubechannel.nl/
http://www.youtubechannel.nl








trace my internet presence