Introducing Boutiquechng

Many Thanks for your visit

Please pay me a visit soon and do go to "ABOUT ME" click "View my complete profile" for more of my other blogs at the right side of this blog. Please click (1) The Future World (2) Malaysian Stories of Daily Life (3) The Way How I Feel and See It (4) The Photo Stories (5) The Worldfuturia (6) Home Cook Recipe.

Please do key in "boutiquechng" using Google Search Then click "The Future World" Or my other blogs as mentioned above to visit me next time OR go to the top left of this blog click "Follow" to follow this blog whenever there is new pages added or edits of old page

Thank you, good day or good night.

Sunday, July 17, 2011

Security Systems III

Our human body, the functioning is exactly the same as the functioning of a simple configuration of table top computer or any other computer configuration.  Our brain is tantamount to the CPU and our eyes are the same of the monitor and scanner. Our hands are the keyboard or the mouse.  There are not much of any differences.

The sound frequencies, it is too high or too low, our ears are not able to pick up.  The frequencies must fall within the hearing range.  Likewise, our eyes are not able to accept any basic frequencies of any object.  It must be within the acceptable frequencies range so that our eyes are able to pick up whatever the images it may be. (The basic frequencies are referring to those frequencies of atoms of different materials.  Please refer to my earlier posts).  The light is able to increase the basic frequencies up to the range which is acceptable by our eyes. It is to say, the light is able to alter the images to reach our eyes and not getting the true images.

Instant download A device could be produced and attached to human body or other materials/object and it became invisible.  The device is able to allow the images frequencies, guiding them from the back to the front and of any blocking of the images to reach our eyes.  These devices are good for the data storage hardware of the supercomputer and put them in place at the earth orbiting path. In simple words, invisible of any object is possible by such a device. These devices are needed to protect the supercomputer and its components/peripherals for sabotages.


There is another way that any object could be made into invisible.  The basic frequencies that could be accepted by eyes of living things, the eyesight frequencies, there are able to penetrate through any object except there will in the form of weak signally and may be slightly differ from the original images due to resistance of object that there were passing through.


There is no way hacker could get into supercomputer system; all users are online with the supercomputer.  The only way for hackers to get in, it is by disguise themselves as new born, visitors and tourists and they needed to have a device be able to break the code from the air, they can do anywhere from the earth and the universe. The supercomputer is 100% wireless and their hardware is everywhere, on the ground, in the air and at any one point of the space.

Every transmitting and receiving codes carried out by the supercomputer, it has a group of soldiers to guide and protect them along the way.  One of these soldiers is simply the human/object frequencies and they change just a nano second further more it is more ten (may be hundreds) frequencies. The hacker has to break these codes less than nano second with the exact set of more than ten combinations of different codes. They failed to get in within the time limit.  Another soldier activates and starts to collect the hacker esense place them into the supercomputer hackers file for future use.  No action is taken towards any hacker unless there is danger of crippling the supercomputer systems. Other soldier will get into the hacker’s computer system and became a sleeper and data collectors and it is only restricted to the techniques and codes of hackings. The data will relay to the supercomputer’s teams of systems experts.

Disguising as newborn, it is not possible, the supercomputer is constantly online with the newborn’s parents. Disguising as migrates, visitors and tourists, it is possible but there are many ways could be imposed manually and many methods could be installed inside the supercomputer for the implementation and monitoring.

Embedding into emails, the supercomputer is well verse with all know emails, unknown emails will be subjected to stringent scanning. It is most important; the supercomputer will trace its owner, pick up the esense and create a temp file if it is new entry, there after the supercomputer will online constantly and monitoring.


Next Topic: Zero Crimes Tolerance



Please do double click the sites, in The Banners for more details and prices of their products and services.

==============================================
Please click the "Blog Archive “at the right side of this blog for more readings. Click the Online Hypermarket,  Discounted Hypermarket and  RingAcall Hypermarket for more products and services.
==============================================

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.