>The largest European hacker club, “Chaos Computer Club” (CCC), has reverse engineered and analyzed a “lawful interception” malware program used by German police forces. It has been found in the wild and submitted to the CCC anonymously. The malware can not only siphon away intimate data but also offers a remote control or backdoor functionality for uploading and executing arbitrary other programs. Significant design and implementation flaws make all of the functionality available to anyone on the internet.
If you have ever watched the news, you probably saw a report involving a president of the United States. Maybe he was on a trip visiting world leaders, holding a press conference, or making a speech about some national or world event. Have you ever wondered what it would be like to be the president? Being America’s president is more than just public appearances; it involves a lot of pressure and stress, and is often considered the most difficult job in the modern world.
IBM’s first cognitive computing chips mimic functions of the brain
Today, IBM announced the very first cognitive computing chips, designed to emulate the brain’s abilities for perception, action and cognition. The technology could yield many orders of magnitude less power consumption and space than used in today’s computers, and give computers a sort of “right brain” capability to match their superior calculating abilities. Following Watson, it is yet another example of IBM’s quest to build learning systems.
>ipfilterX collects secret ranges, concerning military, covert companies, hidden bank lines, offshore companies, unknown customers and societies, etc. may be used from same secret agents, mercenaries, black money dealers, to cover and protect their operations through the net . All personalities that are in doubt by authorities are spied , their computers, laptops, are subjected to intruder software just as trojans , keyloggers, malware, etc. and their data secretly sent to Government Agencies and Federals, same thread for military matter.
In this view it can be used also by Anti Industrial espionage , Corporations, Military and Government to protect their secrets and data transfer .
Potential and possibilities regarding ipfilterX are limitless from any side you want to see them .
ipfilterX blocks the 99.9% of your enemies ranges ,and if you are an enemy you can remove your range and those of your allies and continue to block your enemies , making difficult to be traced , intercepted , spied .
From this same point of view and using PeerBlock and similars with ipfilterX may very well prevent
sending unauthorized personal data under covert operations or if your
computer has been infected and is under control by some trojan horses .
It’s not a fully warranty but still , why not ?
One of the most efficient cyber weapon can be in your hands for a very cheapest price compared to those of useless companies ,