Ivacy VPN: Lifetime Subscription


Enjoy P2P file-sharing with complete anonymity and blazing fast speeds with Ivacy VPN. With a lifetime subscription to this highly-reviewed service, you can unblock and enjoy buffer-less HD streaming of your favorite movies, TV shows, and sports events. Defeat geo-restrictions and embrace Internet freedom by connecting to more than 450+ servers in 100+ locations worldwide! Official partners with National Cyber Security Alliance, Ivacy VPN promotes cybersecurity and privacy education and awareness. 

TrustPilot: “Great VPN app with great features at the most competitive price out there!” 

  • Lock down your browsing w/ powerful 256-bit encryption

  • Enjoy fast uninterrupted P2P file-sharing with complete anonymity

  • Quick-connect to 450+ servers in 100+ locations across 50+ countries

  • Get a dedicated VPN add-on for Kodi

  • Protect yourself against hackers, spyware, & government surveillance

  • Anonymize your online activity against spammers & identity thieves

  • Overcome ISP speed throttling & port blocking

  • Access region-blocked content anywhere in the world

  • Enjoy amazing Ivacy features on a range of compatible devices

  • Log in on 5 devices simultaneously

Strict No Logging Policy


  • VPNMentor: ★★★★★

  • BestVPNProvider: ★★★★★

What every Security Expert must know to tweak your device security

The browser is the weakest link to the internet and can be easily exploited. Common folders like Download and Temp are standard folders all hackers will look for. Although you cannot change your Temp folder where all materials of a web page is downloaded, cookies and your history files are located, there are ways to protect your Download for by renaming it in your browser. Make it harder for would be hackers to know what they are against.  Your cache can be manipulated to activate java, not many know how to do it. I will not give hackers a field day. Clear all your temp files including cache by

<Start><Run><Temp>delete all files.

<Start><Run><%Temp%>delete all files.

File Folder <Windows><SoftwareDistribution>delete all files(This is where your Windows Update files contain.  

Use Windows Cleanup.

Use a VPN service. Windows has a default service but you need to manually set it up, connection by connection, on every site you visit.

For Andriod you can also use a VPN service by downloading from Google Play. Most of them do not give you full protection from a free service and the connection is extremely slow. Better go for a paid service.

Never use your credit/debit card on the internet. Especially those sites that does not hide your credit card details. You do not want to suddenly find your money missing by fraud. My recommendations is to use Paypal as a service, add your credit/debit card details and have peace of mind. Do not expect high compensation from insurance companies, if part of the reason is you did not take basic steps to protect yourself.

How your mobile phone can be attacked. 1) The attack your VTAP touch on your mobile. 2) Your keystroke, tap and brush can be monitored. 3) They can activate the Airplane mode. 4) They can dim your Display 5) Your messages and voice can be monitored. 6) They can activate and launch apps on your mobile. 

Your USB and USB-C has no protection against hacking to retrieve your data.

Your network you chose to connect to the internet is the weakest link especially in Public Wifi and the ISP you chose. Remember your ISP has access to all your information online including history, software or apps you use and all your payment details.

Only Whatsapp communications are encrypted, everything else is open.

Fake deals offered by websites that are too incredible to be true. What they want is you details and credit /debit card info.

Do not download any software from sites you do not trust as you are opening up your PC and mobile for attacks.

There are logs in your activity details on the different platform you use. If you detect any unauthorised activity, immediately change your password. Especially for your payment/banking account, turn on two-step verification.

Use Last Pass to remember your master password and let the software manage all the different passwords to different websites. Do not use a common password for different websites as who knows the admin who has access to your info can use it to access your other accounts. I do not follow my own rules as I am able to setup a trojan horse and trace and identify who has hacked into my account and get back at them.

If you are concerned about your privacy you must know that Windows 10 track all your activities and Facebook and Youtube track all your likes, comments and subscriptions so as to give you a better experience with relevant advertisements. You can decide not to accept cookies, browse incognito and turn off the privacy setting in windows.

I know so much because I have been attacked by so many different methods online and offline for more than 10 years and once I know the methods used, I will develop ways to counter it. 

PS : Today FB is down because more than a hundred million people accessed my webpage when I uploaded all the videos of future technologies that will come true. You can create fake statistics on every website but I know exactly what is happening in the world and nobody can tell me lies. 

Lies, Lies, and more Lies I am getting from my family members and the entire world trying to learn all my secrets but for more than 10 years they cannot find it anywhere, even trying to develop technologies to read my brain but everyone failed miserably because the time is not yet ripe. Make me angry and I will become a hermit and leave this entire world. The mastermind of all these nonsense is my mom who wants me to prove to the world and see if I can create tons of money but I am not so stupid to conform. I will never forgive her and I have prepared a place in hell for all her sins of greed, selfishness and the love of money.

Donald Trump, the issue is not about Huawei, everything on the internet is not secure and can be intercepted, unless you encrypt everything with an unhackable key or use a private VPN.

Contributed by Oogle.


With USB-C, even plugging in can set you up to be hacked

By Assistant Professor of Computer Science, North Dakota State University

lugging in the power – or at least what you think is power – to a USB-C powered laptop can connect your computer, and the valuable personal data on it, directly to hackers. Your personal financial information, passwords and documents stored on the laptop could help a cybercriminal steal your identity. The laptop may even be used to attack your employer’s computers and network.

The European Union is already moving to require all smartphones be compatible with USB-C power adapters – itself a move that endangers users’ privacy. If the EU made a similar standard for laptop computers, it would threaten to make the problem worse, by increasing the number of people vulnerable to what is basically the digital equivalent of pick-pocketing.

From mobile phones to laptops

Mobile phones have been hackers’ targets for years. Phones that are left behind or stolen can contain sensitive personal data that can let a criminal open a new bank account or take out a loan.

However, a far more insidious way to get the data is to simply connect to the phone and steal everything it holds. As the phone is not lost, the user may be unaware that anything is wrong. Attackers try to get access to mobile phones via their internet connections and local wireless connection technologies like Bluetooth and Wi-Fi.

But some attackers are finding a weakness in phone charging. Many newer phones use the same port – one of several types of USB – for both connecting to a computer and charging. A charger could be modified to attack your phone via that trusted connection. This has led some researchers to recommend never using public USB chargers for your smartphone.

Older mobile phones, including some smartphones, that used power-only connections didn’t have to worry about this issue. Users of these devices can plug in to public multi-device charging stations without worry, as there is no connection to the device’s data. For those with combined data and power ports, however, the same port that many people only use to power their phone is commonly used by hackers and even law enforcement to access the data on it.

Laptops can now be attacked by USB power ports

Until recently, laptop computers had enjoyed some protection, with most having a dedicated power port to connect their chargers to. Other purpose-specific ports allowed connections to desktop monitors, conference room projectors and other devices, without need for concern. USB-C changed this, with one high-speed port now able to provide and receive power, send video signals to projectors and monitors, and connect to USB thumb drives and numerous other peripheral devices.

Most of the time, this is extremely convenient, reducing the number of different ports needed on today’s lightweight and compact laptops. However, it also allows criminals to attack the computer of an unsuspecting user who is just trying to charge the device’s battery.

With the European Union potentially requiring phone makers to standardize on USB-C chargers to reduce waste and provide consumer flexibility, similar rules for laptops may not be far behind. In any case, people with laptops powered by USB-C and those who connect to USB-C screens and projectors in public areas need to be vigilant.

Compared to a mobile phone, laptops may contain far more data. Some laptop users may not have these files backed up to other locations, which makes them vulnerable to deletion or even encryption for a ransom payment. Hacked laptops can also serve as a method to get viruses and other malware into sensitive business or government facilities, bypassing firewalls, intrusion detection systems and other network security mechanisms. In short, they may be much more attractive targets to hackers.

Prevent problems by not plugging in

As someone who researches and teaches courses related to cybersecurity, I follow numerous reports of scam websitesall manner of fraudulent callers and electronically distributed viruses – all trying to steal personal information.

Criminals run these scams from the other side of the world, making them hard to track down and bring to justice. While there is little you can do to prevent your data from being released by large-scale hacks of personal data like the Equifax breach, you can reduce your risk of power-connection hacking.

USB-C laptop users should not plug in to airport, hotel or other public USB ports without protection. Charge-only adapters, portable USB batteries and cables that can shield the data connection are possible solutions. At present, in most cases, it is best to just plug the laptop’s power supply into a normal wall power outlet; many public USB ports, which follow the older USB-A standard, don’t yet provide enough power to run and charge a laptop anyway.

When connecting to other devices, check for signs of tampering, such as missing screws, scuffing and other wear – particularly around screw holes and edges. When projecting for others, use your own USB-C to VGA or HDMI converter and connecting to these ports.

Over time, the computer industry may be able to create tamper-evident USB devices and other ways of protecting USB users, like ATM manufacturers have tried to do. Until then, USB-C users need to protect themselves by not connecting to public, insecure and other potentially compromised or suspicious USB ports. Information technology managers face a tougher battle and may try to avoid USB-C powered devices or train users to use them safely.

This article was first published on The Conversation

Breaking News ; Sound can travel beyond c with optical, microwave, and electrical pulses, setting the stage for next gen Internet beyond 6G/WiFi6 transfer of data



Concepts and Theories

What is Dark Matter, Dark Energy and Anti-Matter?

What then is Reverse Matter? What is Dark Energy?
It is the decay of Dark Matter and Antimatter.

If we travel faster than the speed of light, it is possible to crack the time/space concept and into another dimension in Space/Time. Where black holes are gateway to another dimension where dark matter, antimatter and reverse matter exists. The dimensions of Heaven/Hell are thru the eye of a needle and they exist since the beginning of Time. 

 time dilation, which describes how time runs more slowly for objects moving very rapidly. If you flew on a rocket traveling 90 percent of light-speed, the passage of time for you would be halved. Your watch would advance only 10 minutes, while more than 20 minutes would pass for an Earthbound observer.

You would also experience some strange visual consequences. One such consequence is called aberration, and it refers to how your whole field of view would shrink down to a tiny, tunnel-shaped “window” out in front of your spacecraft. This happens because photons (those exceedingly tiny packets of light) — even photons behind you — appear to come in from the forward direction. In addition, you would notice an extreme Doppler effect, which would cause light waves from stars in front of you to crowd together, making the objects appear blue. Light waves from stars behind you would spread apart and appear red. The faster you go, the more extreme this phenomenon becomes until all visible light from stars in front of the spacecraft and stars to the rear become completely shifted out of the known visible spectrum (the colors humans can see). When these stars move out of your perceptible wavelength, they simply appear to fade to black or vanish against the background.

First of all,it is essential to know the basis differences between light and sound. While sound is a longitudinal waves(the disturbances parallel to the direction of sound travel,essentially in the form of compression and rarefaction of air/any medium it propagates in), light is transverse in nature meaning the disturbances in the form of electromagnetism are perpendicular to direction light travels in. Again, while light does not need a medium to travel(can travel in vacuum, as in case of from sun to earth), sound does require a medium to travel in because sound waves travel by virtue of actual physical disturbances in the medium.
When we talk about speeds of two different kinds of waves, we must also tell the medium in which speed is to be measured. Light travels fastest in vacuum(an astounding 299792458 meters per sec), slower in air. Sound waves can not travel in vacuum,but in air it’s speed is around 330 meters per sec. For speeds of waves, there are actually formulae to give us speeds.

Robertson and his colleagues transmitted sound pulses from the sound card through a loop made from PVC plumbing pipe and connectors from a hardware store. This loop split up and then recombined the tiny waves making up each pulse.

This led to a curious result. When looking at a pulse that entered and then exited the pipe, before the peak of the entering pulse even got into the pipe, the peak of the exiting pulse had already left the pipe.

If the velocities of each of the waves making up a sound pulse in this setup are taken together, the “group velocity” of the pulse exceeded c.

“I believe that this is the first experimental demonstration of sound going faster than light,” Robertson said. Past research has proven it possible to transmit electrical and even light pulses with group velocities exceeding c.

Common thing?

Robertson explained this faster-than-light acoustic effect is likely commonplace but imperceptible.

“The loop filter that we used splits and then recombines sound along two unequal length paths,” he said. “Such ‘split-path’ interference occurs frequently in the everyday world.”

For example: “When a sound source is located near a hard wall, some sound reaches the listener directly from the source whereas some sound travels the longer path that bounces the sound off the wall. The sounds recombine at the listener,” Robertson said. However, the weakness of the signals and the fact that any resultant differences in timing are very slight “mean that we would never be able to hear this effect.”

None of the individual waves making up the sound pulses traveled faster than c. In other words, Einstein’s theory of relativity was preserved. This means one could not, for instance, shout a message faster than light.

Still, this research might have engineering applications. Robertson explained that although it is not possible to send information faster than light, it seems these techniques could make it possible to route slower-than-light signals in electronic circuits faster than before.


I have studied the technical specs and I need the ability to travel at speeds beyond the speed of light for data transfer in order to link all the exchanges of the world together and present technologies is too expensive. Sound using next gen WiFi, Powerlines with GRID, fibre optics is the medium for data transmission beyond the speed of light.

Contributed by Oogle.

PS Beyond Einstein’s Unified Theory, all the clues are found here, you need to travel beyond the speed of light to find the answers, I will never release it until I get my way.

Cyber Security Hacks for the Next Generation Internet

If you want Total Security, Do not then connect to the Internet, everything can be compromised even with the latest Technologies, it is how you minimise the risks.

!) Do not use websites that display your credit card details in plain text, all websites need to encrpyt or hide the credit card details as a basic requirement to ecommerce, or use Paypal as a payment service to store your credit card information.

2) All browsers can be compromised especially running java, where a smart programmer who knows what you use can compromise passwords and login IDs to websites.

3) For Next Generation Internet, it is possible to run programs to embed codes into pictures and videos, upon loading by the browser to steal information but I know nobody in the world knows how to do it except me but I am not a programmer, I just test software for vulnerabilities and warn others about it.

4) Those who have the computing power can hack using brute force into WPA3 for WiFi 6, and also do likewise for plain text IDs and password of websites. Encryption technology is a deterent with 2048 bits but not forever.

5) With Intelligent Matrix Routing, you can control how a person accesses the Next Gen Internet with NAT, it is also possible to track and block and deny access using IDs or facial recognition.

6) Firewalls are no longer a deterent against intrusion, it is now possible to scan all the ports it uses and find all the vulnerabilities by studying the protocol it uses.

7) Softwares using AI now automates all processes, data can be collected to analyse all the vulnerabilities of a network, even if it is the dark web, sites can appear and disappear, unless you know the exact IP to enter.

8) A Central database of all qualified personnel who learns about and is certified in all technologies related to secret banking access has to be monitored in case of breech, and so are programmers who works for ecommerce or payment projects of high profile banks.

9) Identity Theft is possible using IRIS or Fingerprint technology, but Facial recognition CCTV cameras make it almost impossible to get away without leaving your footprint.

10) Temporary folders, cookies and containers for IDs and password are risks where a compromised website collects data using java and php/html5 coding, an expert programmer will study all your details of your browser and trick you on the sites you visits as you can be easily tracked on the Internet, and compromise you.

11) App developers hide keystroke and spy applications like Spyzie to monitor and analyse customer’s behavior without the customer knowing. Even your location and demographics can be compromised and tracked. 

– Contributed by Oogle.

The Future of Wifi mesh as a utility network like electricity grid

Monday, Aug 20, 2012

PARIS – Wireless routers for homes and offices could be knitted together to provide a communications system for emergency responders if the mobile phone network fails, German scientists reported on Monday.
In many countries, routers are so commonplace even in medium-sized towns that they could be used by fire services, ambulance and police if cellphone towers and networks are down or overwhelmed by people caught up in an emergency, they say.
Kamill Panitzek and colleagues at the Technical University in Darmstadt, western Germany, walked around their city centre to pinpoint the location – but without invading privacy – of wireless routers.
In an area of just 0.5 square kilometres (0.19 square miles), using an Android application to locate wireless networks, they found 1,971 routers of which 212 were public routers, meaning they were non-encrypted.
This rich density means that an emergency network could piggyback on nearby routers, giving first responders access to the Internet and contact with their headquarters.
“With a communication range of 30 metres (yards), a mesh network could be easily constructed in urban areas like our hometown,” say the team, whose mathematical model is published in the International Journal of Mobile Network Design and Innovation.
The team suggest that routers incorporate an emergency “switch” that responders can activate to set up a backup network, thus giving them a voice and data link through the Internet.
This could be done quite easily without impeding users or intruding on their privacy, the study argues. Many routers already have a “guest” mode, meaning a supplementary channel that allows visitors to use a home’s wifi.
“The emergency switch would enable an open guest mode that on the one hand protects people’s privacy, and on the other hand makes the existing communications resources available to first responders,” says the paper.
The population of Darmstadt is 142,000. The location scanned in the study comprised a rectangle of streets in the city centre, covering 467,500 square metres (558,500 square yards).
When the mobile networks are down, all cellular devices have an emergency call feature that can be turned on to access the Wifi network instead, giving vital communications of voice and data while during an emergency, it is even possible in future to treat these Wifi mesh networks as an utility network where owners can derive benefits for those who use their networks.
– Contributed by Oogle.