Welcome to Gaia! :: View User's Journal | Gaia Journals

 
 

View User's Journal

GAIA ONLINE DATABASE REASEARCH - SAMUEL F. WOLFE
Computer Ethics
wahmbulance Okay... Red flag for the server speed and hacker situation garbage that people spread around. I am unable to think or enjoy the web in my own seclusion space.

And please stop using youtube. - Note for the people who actually want to get caught or noticed for stupidity. And if you were a true person or pirate who is stupid enough... join someone or work together instead of being such an impossible interfearance with others.

If you know how to build an online server good for you and bad for the world. - At least in my theory. Cause I have no clue what a hacker's purpose is except trying to screw people over.

Note the fact I am being sarcastic about the grouping with hackers, that is to say if you are a pirate and have joined one or more sites pretending to have laws and such that make them legal but are strictly not - and even if you reported them, they still come back to get you.

That is to say if it were not for all the hackers and situations out there. Yet it is people like me who complain due to the scams out their by businesses, companies, and the average consumer, rather the coder because we all are caught at least once using those materials in spare times or when push comes to shove and people are desperate.

Anyway... as suggested not by me of course - there have been people reported with searching terms Gaia hack script and other generators.

Even if one gets a generator, they still have to take a survey so don't even try. Such is a security measure done with Nexon or has been tested not for my use but rather just to be stupid and cheap.

That is also to state even if I did try or was successful, they now use computer trackers which violate policy terms and could instantly terminate the program, this goes for online web interface and applications that use such with piece files. - Obviously done through DOS and web connection which is so not beneficial to a computer unless you have a protect me from DOS system - also known as root protection.

Therefore I, meaning many have lost faith in the situations and it is better to have more than one filter, both online and offline. This may prevent a person from being attacked. The worst thing anyone can do major damage.

Basically the system will tell you if you do or not have compatible stuff on your machine. As far as them pesky virus, malware, etc... do not execute anything unless you have checked each file through with notepad. This prevents you from directly executing all pieces at once.

Even if a program is permitted through download there is no instance that all the source will go through. Though I know a lot about it I have witnessed it and therefore restrict myself with the lack of resources, rather the scripts people put out there just to screw people over. So it happens. This does not apply to hackers alone but also pirates who take software that needs to be paid for.

It is certain though being guilty I have a right to defend both sides and not only the victim.

Because of this situation the online speed and searching web space is slow. Such happens when one witnesses incoming connections such as port traffic and data rate. I downloaded a game called Maple story that takes forever to download due to the fact that the game is global and no base is within my reach - that is to say if it came from China, Korea, or any one of the instant stream locations. It could be Nexon's system or installer for all people may know who have at least installed the game.

I am aware that files downloaded through streams can be changed or switched by those of the admin. Therefore I take extra percautions when I validate safety methods and detection of websites.

I have seen fake application attacks. I have dealt with trojans, found 13 in the C drive. Heck there could be more. But each one has a different function and purpose that is not to be executed. Some attach themselves: The worms which are an annoyance hopping from file to file.

If you type in the path of a trojan... the virus thing updated will protect you from it, it could be executed, or worse crash the machine, also send information everywhere.

People who use SQL injection have inserted a file they are not supposed to and that has happened more than once on online gaming, social and networking sites, so I am quite aware of these.

I may not know my types but I have witnessed some of them and yes... a computer can survive the blue screen of death if you are lucky that a signal brings it back to operating.

Those Virus companys: AVG, Norton, MacAfee, etc... any company heard of on the web that does computer protection be careful and see if any of your virus programs contradict one another or if one detects another as a trojan. Basically here is a choice or choose risk it all on the system. The best one fits the machine perfectly without bothering other virus prevention programs.

Recommendations for free virus protection...
1. Protect yourself with filters that block ads or popups.
2. System is compatible with X...
3. If not compatible or delivers false information or worse. Get rid of X.
4. Serial sites are a must for you lazy people who do not want to pay and that aggrivates the heck out of people when you use a serial key that is legit and download. (It is called piracy. - so do not.)
5. Take the complaints to your company or just do what you do.
6. Any company that is mentioned on the internet, please do not deliver your serial keys to sites, because people steal those. XD.
Honestly to tell you the truth... This is useful to everybody for free and valid software.
7. Only get the serial from a site... check the key or validation for a real or fake. That way it will not mess up the regeistry.
8. Download from official site... - and for non pirates if anyone, put your real name in just for the sake so that you can get it sent to you by email and it is legit. Otherwise you stole money from a company.
9. Please note that companies cannot track people down for software that was free and legit and already put out there unless it is for an update to a final product. That is why we get updates that are renewable within the software for free.
10. Any company that sells a product in the store at retail price is ripping someone off unless they can validate where the software came from. - So goes the laws of a company in computer consumer ethics.

Please do not... unless you are an honest person and nobody repeats your true attitude...

Give your account name and pass.
Give your email with a name in it.
Give your email with a pass in it.


Below is how a person gets ripped off. In the long run if you buy from a non-legit... you are risking information.

If you buy from legit... you just lose money anyway due to the fact that they are hiding the fact of when the software and information actually gets updated. - so I learned it takes at least 1-3 months before the next one comes out. And enough with this beta garbage.

Please test the bugs on your machine people.

Buy from a non-legit or legit company.
Buying from a non-legit company = pains, and better software, no cost.
Legit company = non-better software, no pain, update may cost.

Why are hackers beneficial...: If you are a coder... better programs.
Why are hackers not beneficial: worse in society matters.
Why are pirates beneficail: They test out the software freely and help.
Why are pirates not beneficial: They break the law taking stuff.
Why are companies beneficial: They made it. Why don't you ask them.
Why are companies not beneficial: They will try to rip you off.

My Law Of Ethics:
1. The computer is a man's oyster if on his own machine.
2. Companies that hide their final product are in a good clear until people have bought any version of their product not aware by public.
3. The standards of piracy and hacker, hence the difference... one downloads, another goes into the roots core of another. They are both bad but beneficial to a chainlink. Therefore if this keeps up... I will quit the programming buisness with people stealing my work.
4. The time one tries to validate a company whether the hacker has a site or not, it is not legit in any form of manner to allow hack sites on the web stream. People fight this by saying we must have your software and you are ripping us off.
5. Any man who tracks a man by stealing his an account and acting like him is a theif and worse than both a hacker and a pirate.
6. A pirate + hacker + theif equals a bad combo unless you are those grayscales trying to stop all of this junk. Hence that does not mean restricting privacy or usage rights. It means keeping a valid log of what site and what distribution method.
7. If you are more of a reporter or a writer like me, you also contribute to the ideas of all sides. Please be aware of consequences that may occur later. ^-^ - I need the adventure and all this stuff is coming from my head.
8. Always activate the main program unless stated otherwise from a file or with. Please use notepad to read and change the file back to its main name without executing. - good for reading information.
9. Never restrict a man unless he is out of bounds of the oyster meaning not in his limit...
10. Do not embed viruses in websites, keylog, or method down other people's information. If you notice this... then you are out of your mind and juristiction unless you are a keeper of passwords.
11. It is up to a keeper of passwords to monitor both the server and account information, that is to say, there must be another way or method to validate who one is if one's account is stolen.
12. Do not work with a hacker who will try to hurt you in any way.
13. I sent my mail to them but they never responded... I would report if not delivered within a limit of 1-3 days based on the situation and one's priorities.
14. What is the expire date of software or copyright and is it still legit without a lisense? The answer is yes if it is permittable.
15. I will not steal the liscense or use another's to activate my own program.
16. I cannot activate this program and need to purchase a lisense. What do I do unless someone else lets me have one.
17. Basically if the rule above happens and it is found in a legit zip file, that does mean it is still not yours and therefore cannot be used if it expires. If there is not an expire date and the program is permenant then it may be used if under juristiction it is not sold or used for commercial gain.
18. Only commercial programs that are not stolen, or used for personal use, can be used for commercial buisness unless that program is also a nesscessity.
19. Am I a hacker or pirate people may ask... Let me answer that in a clear statement - mentioned below.

I have had my share. I am tired of the economy. I do not live by software but it entertains us from boredom and lets us see the world for what it is. Because of its speech and our actions we contridict ourselves - the way we truely act, and the way we see others. Most people want to live in the economy others in technological warfare or a virtual stream. It is much better not one or the other, but of both, even though I am stranded on my seat working for what others have already achieved and we have built upon to claim as our own. If I had possession of all computers and my parents were dead. I would smash them with a hammer unless otherwise needed. My code is that no man can repeat or I have tried and failed... and that is kindness and respect for humanity and the world though one feels trapped by beliefs. Both sides, consider me a grayscale who goes not for it but rather against it all though the skills are needed to fight for what one believes in. My skill is not hacking anothers machine though I know how. Basically unless one attacks me I will not bother them though I notice them on the web wondering or interacting. It is consideration of a man whether pirate or hacker or user. I am each. But rather, I would like to be one who maintains balance by listing my research sources on the matter.
Such is known by a writer, often people misunderstand them and argue against them, the adminstrator sees this and one could think is this guy nots and I must remove this. Some would leave this message alone and have the respect to take its advice. It depends more now a days on society how one must treat. Whether one delivers or not to the public is up to the individual and one's circumstance. Unlike others you are witnessing an honest view. I notice not all people who are hackers are bad, yet most are not good. Yet we take pride in what we do knowing that all sides help each other in some way shape or form. And that is what keeps a virtual economy alive if all sides benefit instead of one.

Here is my statistics of web downloading...

Society has gotten worse...
They try to take it all over, management.
Scam me through a survey if you must...
Stolen in many ways... all data - People steal.
Better than this to is delete the file if not shared freely or payed for...
A man will build something better or find a way around...
That will be if it is shared or known, perhaps not.
In it they advance... one age after a number...
I remain watching as each one opens up weakness and strength...
The data is there and I cannot grasp it...
For I am a piece and a core... of interpretation.
And though I decipher...
It is just a piece for one must know to encrypt his or her mind.
Sometimes that being deadly...
An age that goes too fast for understanding we advance onward...
And all in shamble like a past decade of rememberance and fortune.

In relation to Gaia... I notice a resemblence to Meebo yet they are both different. I believe the ideas and concepts remain different but the same. I could be wrong. But that is just my opinion and statement in relation towards a chat system.

I hope someone comes up with something out of a regular person's league. That will be the day we all struggle for it. But... In the long run... some of us, our greed will it take upon self. We shall endure.

Whether trial or sorrow reach, so does peace. ^_^

I want to write an autobiography on here. One can read my stories and thoughts and learn from them. Yet they are not my own even if I came up with them. I have no clue where my thoughts will take me. Others are driven insane. Some in relaxation find victory.





 
 
Manage Your Items
Other Stuff
Get GCash
Offers
Get Items
More Items
Where Everyone Hangs Out
Other Community Areas
Virtual Spaces
Fun Stuff
Gaia's Games
Mini-Games
Play with GCash
Play with Platinum