User:Juanpgmartinez
Alert! The AC power adapter wattage and type cannot be determined. The battery may not charge. The system will adjust the performance to match the power available.
---
W32time Service received notification to rediscover its time sources and/or resynchronize time. Reason Code:2 System Tick Count: 108274750
Reason code description:
0 : An explicit time resynchronization request from an administrator
1 : Power state changes on this machine
2 : Changes to the network interface or to the network topology
3 : State changes within W32time that require time synchronization
The actions that follow this notification may impact fine-grained time synchronization accuracy.
---
Processor 0 was throttled by an entity other than the kernel power manager.
---
So I was reading and wonder what was throttled by an entity...
Also called: throttle valve any device that controls the quantity of fuel or fuel and air mixture entering an engine.
Machinery.
To obstruct or check the flow of (a fluid), as to control the speed of an engine.
To reduce the pressure of (a fluid) by passing it from a smaller area to a larger one.
---
Entity
being or existence, especially when considered as distinct, independent, or self-contained: He conceived of society as composed of particular entities requiring special treatment.
essential nature: The entity of justice is universality.
--
Traffic Test Sent
Packets were successfully sent to your computer. The server was unable to obtain a connection or any traffic from your computer. This generally indicates that your computer blocked the traffic successfully.
If you did not see an event warning it may indicate that the traffic did not reach your computer at all.
This could be due to any of the following reasons:
- You are connecting to the Internet through a proxy server. When we attempted to connect back to the IP address your web traffic came from we actually were connecting to the proxy server, not your computer.
- You are behind a corporate computer which is redirecting traffic in an unexpected manner.
- You are connecting to the Internet through a NAT (network address translator). When we attempted to connect back to the IP address your web traffic came from we actually were connecting to the proxy server, not your computer.
In any of these cases you will not see an event notification on your computer because our connection attempt did not reach your computer. In any case, your computer is secure.
Cannot Connect |
The Proxy received an invalid response. |
URL:http ect...
---
But YOUR computer has DELIBERATELY CHOSEN NOT TO RESPOND (that's very cool!) which represents advanced computer and port stealthing capabilities.
A machine configured in this fashion is well hardened to Internet NetBIOS attack and intrusion.
(This is very uncommon for a Windows networking-based PC.) Relative to vulnerabilities from Windows networking,
this computer appears to be VERY SECURE since it is NOT exposing ANY of its internal NetBIOS networking protocol over the Internet.
There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!
Just such hacking packets are now being detected across the Internet. Scanning is underway and the threat is real.
---
Light Facts We see light from the sun every day. Light is measured in ‘waves’ and the light that we can see is only a small portion of the types of light. Light is an energy beam that moves in wavelengths. It is made up of tiny photons, each contains a lot of energy. Each type of light has a varying length of ‘wave’
---
A person said one time
Thats a machine. Personal guides wouldn't count...honor, duty, loyalty ...everything a soldier lives by will be wiped out.
All you have left is statistics. How many men with the machine murdered today...a hundred, thousand, ten thousand if this the future, i don't want any part of it.
Cortan
Add The Sun Is Also a Star to reading list
Add Astrophysics for People in a Hurry to reading list
Add All the light we cannot see to reading list
E=mc2.... time = c times E ?
A God writer said
But mass is an illusion... a perception of virtual particles that are only given a value based on the perceived energy needed to move those thoughts of “I AM” or should I say I “was” but now “I AM” ... the minus one law of the conservation of information... demands we keep a record of those values as energy cannot be created or destroyed. But thoughts are not physical, that is just a perception of what is already known or experienced, THE PAST, we call dark matter as opposed to the thoughts of that which has not yet occurred that we call dark energy or matter... those are the biblical FAITH in memories of the past and HOPE for future expectations and experiences... which do not exist anymore or yet relatively speaking even though They make up all we are experiencing as the Now singularity that we LOVE to create so much.. using that FAITH and HOPE.... and therein sir lies the time value of ZERO ONE ZERO ONE 1010101010 that we create thus virtual reality universe which can exist only as a SINGULARITY.... because .... the past 1 Is forever over and gone... the future
1 is never here yet, so only the CURRENT 1, ever exists as an eternally CHANGING 1 in the
“101010 NOW 0101010” existence we are experiencing ... not 1’s that are being created and destroyed in and out of existence in violation of the laws of perceived physics, but that is just changing form in obedience to those laws.... HOWEVER... there are TWO DIMENSIONS... those laws of physics apply only to the sentient existence of humanity.... a CLOSED SYSTEM ... our other dimension of sapience is GOD over our sentient dimension as it choose our actions UNTIL the action becomes part of the physical perception of our reality... then as the dark energy of sapience is converted into the dark matter during the NOW singularity we (if you will pardon the pun) “SEE THE LIGHT” of this VISIBLE UNIVERSE..as it changes from FUTURE thoughts of dark ENERGY, into the NOW SINGULARITY and then into the PAST thoughts of dark MATTER, we create as remember by FAITH and CHANGE - energy into matter using the CLOSED UNIVERSE OF THE NOW SINGULARITY
By the way my last comment takes all the mystery out of quantum entanglement and the observer effect and why light the photon of this visible universe has the properties of both WAVE dark energy antimatter AND PARTICLE, dark matter ... that the photon creates as thoughts or virtual particles of antimatter and E=mc2 changes that antimatter into perception of a physical reality we call matter .... it’s the SINGULARITY OR FURNACE we call LIFE which is metaphorically speaking our HELL in which this story takes place in DANIEL THREE memorialized by Johnny Cash in this song.... “The Fourth Man"
They wouldn't bend
They held on to the will of God so we are told
They wouldn't bow
They would not bow their knees to Idols made of gold
They wouldn't burn
They were protected by the Fourth Man in the fire
They wouldn't bend
They wouldn't bow, they wouldn't burn.
Now the prophet Daniel tells about
Three men who walked with God
Shadrach, Meshach and Abednego
Before the wicked king they stood
And the king commanded them bound and thrown
Into the fiery furnace that day
But the fire was so hot that the men were slain
That forced them on their way.
Now when the three were cast in and the king rose up
To witness this awful fate
He began to tremble at what he saw
In astonished tones he spake
Did we not cast three men bound
Into the midst of the fire
Well, Lo, I see four men unhurt
Unbound and walkin' down there;
There's Shadrach, Meshach and Abednego
And the fiery coals they trod
But the form of the Fourth Man that I see
Is like the Son of God;
They wouldn't bend
They held on to the will of God so we are told
They wouldn't bow
They would not bow their knees to Idols made of gold
They wouldn't burn
They were protected by the Fourth Man in the fire
They wouldn't bend
They wouldn't bow, they wouldn't burn.
Positive results seen
This page has reported 54861 positive “exposed” results.
The count is incremented only once per router IP address, regardless of the number of times the test is performed on an exposed router. Although we do not log the IP addresses of the results, we maintain an “MRU” (most recently used) list in RAM to prevent multiple counts per router.
What results are possible?
It's natural to wonder what other results might have been shown if your Internet equipment were different. So to satisfy that curiosity, here are three sample screens showing each of this test's three possible outcomes: |
|
Transaction Watchdog Timeout
The throttled engine has exceeded the configured threshold to process a transaction. This could indicate a suboptimal configuration that may cause temporary network outages.
Owning Process ID: 4324
Transaction Time (msec): 578
Transaction Commit Time (msec): 0
Configured Threshold (msec): 500
A Power event was fired: Monitor Setting Change (Power Event Type) true [Enabled].
A Power change was processed.
Reason: A resume was triggered by user
---
Action fired for V2 with behavior Window Size Changed
Capability change on : V4 Capability: Internet Change Reason:ProbeSucceeded
---
Network location has been suppressed
---
Network State Change Fired
New Internet Connection Profile: false
Connection Cost Changed: false
Domain Connectivity Level Changed: false
Network Connectivity Level Changed: true
Host Name Changed: true
Wwan Registration State Changed: false
Tethering Operational State Changed: false
Tethering Client Count Changed: false
---
Their Final Invention: Artificial Intelligence and the End of the Human Era, Read more about powered (QSA)
Elon Musk named Our Final Invention one of 5 books everyone should read about the futureA Huffington Post Definitive Tech Book of 2013Artificial Intelligence helps choose what books you buy, what movies you see, and even who you date. It puts the "smart" in your smartphone and soon it will drive your car. It makes most of the trades on Wall Street, and controls vital energy, water, and transportation infrastructure. But Artificial Intelligence can also threaten our existence.In as little as a decade, AI could match and then surpass human intelligence. Corporations and government agencies are pouring billions into achieving AI's Holy Grail—human-level intelligence. Once AI has attained it, scientists argue, it will have survival drives much like our own. We may be forced to compete with a rival more cunning, more powerful, and more alien than we can imagine. Through profiles of tech visionaries, industry watchdogs, and groundbreaking AI systems, Our Final Invention explores the perils of the heedless pursuit of advanced AI. Until now, human intelligence has had no rival. Can we coexist with beings whose intelligence dwarfs our own? And will they allow us to?
Operation found for 8, Service powered (QSA)
What does a QSA do?
Qualified Security Assessor (QSA) companies are independent security organizations that have been qualified by the PCI Security Standards Council to validate an entity's adherence to PCI DSS
The Connection Provider status changed to Connected.
Network got disqualified for automatic setup of network connected devices because 0x10 bits are used for its mask.
BINDFLT filter registration succeeded.
User-mode process attempted to change the system state by calling Suspend State or System Power State APIs.
Solicited TCP Packets: PASSED — No TCP packets were received from your system as a direct result of our attempts to elicit some response from any of the ports listed below — they are all either fully stealthed or blocked by your ISP. However . . .
Unsolicited Packets: PASSED — No Internet packets of any sort were received from your system as a side-effect of our attempts to elicit some response from any of the ports listed above. Some questionable personal security systems expose their users by attempting to "counter-probe the prober", thus revealing themselves. But your system remained wisely silent. (Except for the fact that not all of its ports are completely stealthed as shown below.)
Ping Reply: RECEIVED (FAILED) — Your system REPLIED to our Ping (ICMP Echo) requests, making it invisible on the Internet. Most personal firewalls can be configured to block, drop, and ignore such ping requests in order to better hide systems from hackers. This is highly recommended since "Ping" is among the oldest and most common methods used to locate systems prior to further use of natural resources of the exploitation of those resources.