• About the Author

  • Enter your email address to follow this blog and receive notifications of new posts by email.

    Join 77 other followers

  • Archive

  • Categories

  • June 2015
    M T W T F S S
    « May   Jul »
    1234567
    891011121314
    15161718192021
    22232425262728
    2930  
  • Disclaimer

    The following are INFORMATION, ARTICLES and OTHER that I found interesting for the day, week , month. My PROFESSIONAL OPINIONS are added to the information based on my EXPERIENCES in the SECURITY and INTELLIGENCE professions. If YOU have ARTICLES or OTHER you would like placed on the site, please do not hesitate to send them to me with YOUR OPINIONS at efpipps@gmail.com. I look forward to ALL of your comments and information.

RDP SECURITY BLOG / JUNE 15, 2015 / MONDAY

ON COMPUTER INSECURITY,…

06/15/15 – SEX, LIES AND DEBT POTENTIALLY EXPOSED BY U.S. DATA HACK
https://ca.news.yahoo.com/sex-lies-debt-potentially-exposed-u-data-hack-054657057.html

COMMENTS: Once again, computer security is a joke and not worth one dime of government money, but we put trillions into it. It is sad and wasteful. As some people say, it could be going to educate our youth. But no, we are throwing money at a problem that has no cure. Trying to outback the hackers is a losers dream.

ON ISIS PLAYING SPECIAL FORCES IN THEIR BACKYARD,…

06/15/15 – ISIS SPECIAL FORCES NOT THAT SPECIAL

COMMENTS: This speaks for itself.  It just shows how truly pathetic ISIS is and how more pathetic the Iraqi military is for letting isis take over the country.  The Iraqi ‘army’ is good at handing the equipment we give them to ISIS to use.  True continuing fraud.

FACE-TO-FACE WITH ISLAMIC STATE

COMMENTS: These three ISIS maggots show just how pathetic the whole organization is and how easy they would be to defeat if REAL soldiers were fighting them. The leader being to gutless to even watch the destruction he wrought on women, children, and old people.

ON THE 2ND CURSE WORD OF MODERN BUSINESS, OUTSOURCING,…

06/15/15 – TOP 6 OUTSOURCING DISADVANTAGES
http://operationstech.about.com/od/outsourcing/tp/OutSrcDisadv.htm

COMMENTS: I am going to make this one easy for you because I have other things to do. A large percentage of business outsourcing, and computer outsourcing companies are owned, run, managed, funded by individuals, organizations, and or countries that do not have our best interests at heart. When you ship Americans personal information around the world to save a couple of dollars and fund a foreign country you are risking greatly. I will not go into the ‘weeds’ here, but everything timing and you have no idea whether the information has been compromised or not. I can tell you that MOST information shipped out of this country in bulk HAS been compromised, the bad guys just haven’t figured out what they want to do with it. But hear this, it is on an assembly line and the time and your number is coming up. From a logical standpoint if your information is being stolen here CONUS, what do you think is happening once it crosses the U.S. border in the most fragile of protections, a cable. Even if encrypted, the U.S. Government and at least four other countries have the backdoor ‘keys’ to the encryption. If they do then China does, on and on into oblivion. Computers are not the answer to anything to do with security. Computers ARE a fools game that has been pushed, sold, and thrown at the American public as the answer to all things. This, we can all see, is one of the greatest lies ever told, and OUTSOURCING is the guy standing over you after he knocks you out calling you a “bitch” and then takes your woman, your money, and you ride.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: