Thursday, November 23, 2023

Parliamentary VISA Application

This is a simple request from Speaker of the House.

It is very funny in a democracy speaker cannot speak.

Since he can write and my request is simple.

Better still he could publish this data on a web page.

He has to fill only 225 (including himself) VISA Forms giving the following details.

For example he can use Wira Wansa as a model case.

This should be published on or before the 1st of January, 2024 which is our election year.


1. Name of each parliamentarian.

2. His aliases like Loka Hora, Podi Malli, Harak Kata, Boru Wansa, Putta Pul Boru Yaka, Nalla Thambi, Sinna Thambi

3. His birth date and birth certificates.

4. Forged birth certificates.

5. Sex

6. Sexual orientation including Woke Culture.

7. Spouse and spouses of spouses, old and new.

8. Illegal dealing like prostitutes and massage parlours they frequent so ordinary citizens could avoid them.

9. Number of ID cards and Passports old and new.

10. Dual or Triple Citizenship.

11. How mamy criminal offences from birth  listed, decade by decade.

12. How many bank accounts.

13. Business addresses

14. Business partners both legal and illegal.

15. How many cell phones they own and the number of SIM cards.

16. Foreign travels and future itineraries.

17. Smuggled items including gems, gold and living souls, including prostitutes travelling with them.

18. Their favorite sports and games.

19. Number of casinos they own.

20. Number of promises

21. Registered party

22. Forged Membership in other parties

23. How many bars they own.

24. How many bars the spouse owns.

25. Income Tax portfolio and declarations.

26. Number loans they have absconded from paying.

27. Name of their Thug Groups and Buvallas



This is like a revolving door and list is expanding.

I will stop at this level, for the time beings.


Level of Snooping and Government Surveillance

Every time one hits the web browser, you are exposed to the algorithm of Government Surveillance.

I think best surveillance is in Russia.

The worse is in America.

Ukraine is in between.

Everything Ukraine does in monitored both  at physical and digital level.

There are Linux playbook answers to penetration testing but Kali is the worst Linux distribution.

Python is the longest but most exposed system.

This is not about hacking but a summary of a Linux Guys activity.

Hackers, privacy experts and freebies are trying to address this issue.

Number one caution is do not buy a second hand laptop. It is already hacked that is why somebody has dumped it in E-Bay.

Just think of son of President Biden's plight. His laptop was hacked, I believe by a Chinese guy.

We will not hear about this ultimate saga for another 20 years.

Outcome

Biden is the first in US history who could not run for a second term.

I think former President Trump had to pay his legal team a lot for his defense for his simple negligence, not necessarily the foul mouth.

Freedom of Speech is ingrained in American politics but F.B.I infiltration is known from J.F.K. regime.

Even Mafia is not immune but their ploy is termination (their legal term for brutal killing).

Please note I am not a hacker.

If my government (Ceylon) tries to snooze on my computer, I would lead them astray!

What is the perfect laptop for hacking?

1. Hacking is 80% human.

2. Hacking is 20% machine.

3. A Linux Gamer needs a greatest and latest but a Linux hacker can do that with a USB stick.

4. So do not let a guy or girl use your laptop when you are having a conversation with a friend or having a lunch break.

5. The computer should go to security mode within few minutes.

6. Build your skill set on a cheap laptop to begin with.

7. By the way, Maru Sira's web site was hacked by an amateur!

8. CPU is not critical except password hacking.
Investment in CPU is not a good investment for hacking.

9. GPU is necessary for complicated password hacking.

So invest the money on the GPU.

10. Linux tools are light weight.

11. Penetration Testing and Hacking are not simple processes.

12.   RAM is important.

13. Multiple Virtual Machines needs lot of RAM.

14. 4G is the minimum and more is better.

15. Good WiFi adaptor for wireless hacking.

16. Rubber duckies and WiFi Pineapple are not all that important.

17. VM Ware VM Ware Work Station.

18. Virtual Box is free but VM Ware are expensive.

19. The paradox of hacking is illegal but your government does it on daily basis on nano second intervals.

20. Does not matter the host system

Windows
Linux
MacOs

Every Unit can be hacked.

21. Some Hacker applications are incompatible with Apple and Windows but Bare Metal Linux can accommodate them.

22. For a Training session Kali Linux is OK.

23. Parrot Linux is another but I have never use it.

24. Dragon OS is not listed in www.distrowatch.com.
I do not recommend it.
By the way, it is Debian derived.

One should notice Linux developers are colossal guys and girls and we do not encourage illegal mechanisms.

25. Cloud can be used for Penetrating Systems.

26. There are other B.S.D. derivatives for penetration testing.

I started my work with an old B.S.D. to erase my laptop of Windows.

27. TrueNAS

TrueNAS is a Network Attached Storage system which stores files, blocks and docker containers.

It is a WEB File Server platform that supports Linux, Windows and Apple files.

It has Free version and Enterprise version which include hardware.

It has both Linux and B.S.D. components.