Introducing Boutiquechng

Many Thanks for your visit

Please pay me a visit soon and do go to "ABOUT ME" click "View my complete profile" for more of my other blogs at the right side of this blog. Please click (1) The Future World (2) Malaysian Stories of Daily Life (3) The Way How I Feel and See It (4) The Photo Stories (5) The Worldfuturia (6) Home Cook Recipe.

Please do key in "boutiquechng" using Google Search Then click "The Future World" Or my other blogs as mentioned above to visit me next time OR go to the top left of this blog click "Follow" to follow this blog whenever there is new pages added or edits of old page

Thank you, good day or good night.

Sunday, July 17, 2011

Security Systems III

Our human body, the functioning is exactly the same as the functioning of a simple configuration of table top computer or any other computer configuration.  Our brain is tantamount to the CPU and our eyes are the same of the monitor and scanner. Our hands are the keyboard or the mouse.  There are not much of any differences.

The sound frequencies, it is too high or too low, our ears are not able to pick up.  The frequencies must fall within the hearing range.  Likewise, our eyes are not able to accept any basic frequencies of any object.  It must be within the acceptable frequencies range so that our eyes are able to pick up whatever the images it may be. (The basic frequencies are referring to those frequencies of atoms of different materials.  Please refer to my earlier posts).  The light is able to increase the basic frequencies up to the range which is acceptable by our eyes. It is to say, the light is able to alter the images to reach our eyes and not getting the true images.

Instant download A device could be produced and attached to human body or other materials/object and it became invisible.  The device is able to allow the images frequencies, guiding them from the back to the front and of any blocking of the images to reach our eyes.  These devices are good for the data storage hardware of the supercomputer and put them in place at the earth orbiting path. In simple words, invisible of any object is possible by such a device. These devices are needed to protect the supercomputer and its components/peripherals for sabotages.


There is another way that any object could be made into invisible.  The basic frequencies that could be accepted by eyes of living things, the eyesight frequencies, there are able to penetrate through any object except there will in the form of weak signally and may be slightly differ from the original images due to resistance of object that there were passing through.


There is no way hacker could get into supercomputer system; all users are online with the supercomputer.  The only way for hackers to get in, it is by disguise themselves as new born, visitors and tourists and they needed to have a device be able to break the code from the air, they can do anywhere from the earth and the universe. The supercomputer is 100% wireless and their hardware is everywhere, on the ground, in the air and at any one point of the space.

Every transmitting and receiving codes carried out by the supercomputer, it has a group of soldiers to guide and protect them along the way.  One of these soldiers is simply the human/object frequencies and they change just a nano second further more it is more ten (may be hundreds) frequencies. The hacker has to break these codes less than nano second with the exact set of more than ten combinations of different codes. They failed to get in within the time limit.  Another soldier activates and starts to collect the hacker esense place them into the supercomputer hackers file for future use.  No action is taken towards any hacker unless there is danger of crippling the supercomputer systems. Other soldier will get into the hacker’s computer system and became a sleeper and data collectors and it is only restricted to the techniques and codes of hackings. The data will relay to the supercomputer’s teams of systems experts.

Disguising as newborn, it is not possible, the supercomputer is constantly online with the newborn’s parents. Disguising as migrates, visitors and tourists, it is possible but there are many ways could be imposed manually and many methods could be installed inside the supercomputer for the implementation and monitoring.

Embedding into emails, the supercomputer is well verse with all know emails, unknown emails will be subjected to stringent scanning. It is most important; the supercomputer will trace its owner, pick up the esense and create a temp file if it is new entry, there after the supercomputer will online constantly and monitoring.


Next Topic: Zero Crimes Tolerance



Please do double click the sites, in The Banners for more details and prices of their products and services.

==============================================
Please click the "Blog Archive “at the right side of this blog for more readings. Click the Online Hypermarket,  Discounted Hypermarket and  RingAcall Hypermarket for more products and services.
==============================================

Sunday, July 3, 2011

Security Systems II

Human body is another useful re-generating source of power; it is also a transmitter and receiver.  The transmitting of human body frequencies and the reception of information in the form of various frequencies from the atoms, molecules, elements and higher form of combination of elements, living cells, such function of the human body, it is named as esense

The supercomputer is connected to the econnect, the devices which are installed in the satellite and orbiting.  There may be more than one satellite to be able to connect the esense of their folks of the nation all over the world. The movement of each and every folk of the nation is collected by the econnect from the esense and the supercomputer is keeping the information into their respective files. The collection of data started day one when the mother, one or more days before the child is conceived. The collection of data is continuing until a person is passed away but the files of the deceased may not be deleting and they are kept forever.

It is seen by this way of data collecting, the supercomputer will get busted for over loading.  A technique of data save keeping is needed to introduce. The invention of one binary code be kept by one atom is needed. By this way, the device is able to keep trillions of code by just only one fine shape pencil dot. Secondly, management of data keeping, the data compressing method, it is able to contain data more than the source data. The compressing method, it is keeping only one record for a number of same and identical records. They may have hundreds of same and identical data and the system provide for only one data to be kept.  Whenever it needs the repeating data, it retrieves the one data and put it back the copied hundreds of data to their rightful place.

It may be at our understanding that there are repeating recording same data of any person especially while we are sleeping. It is not the case, we may have standing still of no physical movement but our bodies frequencies keep on changing. We are constantly reacting to our surroundings, the contents of the air, the moisture, the dirt, the chemicals, the noise and you may wonder, there could be phenomenon change, the disposition of elements into atoms and formation of molecules and elements. The reception of frequencies, from other human, animal and even plants, may be rocks and other non life materials as well, it is these frequencies create a change in the brain activities and affect physically. These data are useful for health purposes.

Purchasers are able to buy anything from any establishment, the hypermarket or the roadside store without carrying anything in hand for the buying.  The transactions may be shown on any device with capability of online.  There may not be needed any showing of the transactions, the seller allowed the purchaser to take possession of the commodity and walked away.   The decisions of the seller and buyers are picked up by econnect from their esense and the supercomputer updates all respective transactions.  Such a system once it is in place, hacking is becoming more difficult if not impossible.

There is another device, the eowner, it is installed together with econnect in the satellite.  The function of the eowner is to keep track of commodity ownership.  Anything, a small piece of sand, a product produced from the same mould and a living thing, each of them has its own characteristic.  Each of them has its owner and they are kept track, as for sand and rock, the moment the system started, the products/produce, the moment they are produced and all living things, the moment they are born, the ownership are recorded respectively by the supercomputer. There is not necessary to provide continuing capturing of data except whenever they are changing ownership.

Someone who tries to gain access the supercomputer to get useful information of others, preliminary it is one of two situations, he is a user of the supercomputer, and he is not a user.  The supercomputer is continuing in contact and online with all users.  It leaves no room for the hacker to activate other user files other than his own files unless it is legitimate.  Outsider to gain access the supercomputer, again since all users are online with supercomputer, any access will be denied.  The supercomputer will not accept any new user unless it is a new approved migrate and visitors or tourists and their activities being monitor continuing.

There are more than two backup hardware of the supercomputer system. All the backups and the main supercomputer, they are running concurrently. Any one hardware breakdown, it must be replaced within minutes.  There are procedures to follow by the supercomputer, should replacement is not done in due course.  One of the procedures of the supercomputer may trigger some kind of national curfew on certain aspects.  It is the upmost critical that the supercomputer must be functioning continuingly without any technical glitches.

Next Topic:   Security Systems III


Please do double click the sites, in The Banners for more details and prices of their products and services.


==============================================
Please click the "Blog Archive “at the right side of this blog for more readings. Click the Online Hypermarket,  Discounted Hypermarket and  RingAcall Hypermarket for more products and services.
==============================================