Friday, May 8, 2020

WHAT ARTIFICIAL INTELLIGENCE CANNOT DO , a grim note to the top 100 intellectuals of this planet , Part 19 - Capt Ajit Vadakayil



THIS POST IS CONTINUED FROM PART 18, BELOW--







  1. https://timesofindia.indiatimes.com/india/9600-cases-in-a-day-indias-daily-count-worlds-3rd-highest/articleshow/76205085.cms

    MIDGET VINEET JAIN DOING FALSE PROPAGANDA, AS USUAL..

    DEATH STATISTICS PER MILLION IS AS FOLLOWS.. INDIA IS LOWEST AT 4 BECAUSE WE HAVE 1380 MILLION PEOPLE…

    WHICH EVER NATIONS ARE DECLARING LESS THAN FOUR DO NOT HAVE A CENTRAL SYSTEM…

    BELGIUM / 824
    SPAIN / 580
    UK / 588
    ITALY / 554
    SWEDEN/ 452
    FRANCE / 445
    NETHERLANDS / 350
    IRELAND / 337 .
    USA / 333
    INDIA / 5

    I HAVE BAAAD NEWS FOR TRAITORS IS DEEP STATE PAYROLL LIKE ASHOK FUCKIN’ SWAIN..

    INDIA HAS THE LOWEST ( BY PERCENTAGE OF POPULATION ) RAPES / MOLESTATION/ MURDERS / CRIMES/ LOSS OF VIRGINITY BEFORE MARRIAGE/ DIVORCES/ HOMOSEXUALS / PEDOPHILES / PROSTITUTES/ CARBON EMISSIONS/ CONSUMPTION OF ELECTRICITY / FUEL CONSUMPTION / UNHAPPINESS/ DRUG-ALCOHOL ADDICTIONS / DYSFUNCTIONAL FAMILY/ PARENTS DISCARDED IN OLD AGE HOMES / MENTAL PROBLEMS/ CRIPPLES/ SERIOUS DISEASES / INFERTILITY / LACK OF RESPECT FOR WOMEN – PARENTS / HUNGER / DEBT PER CAPITA / WIFE BEATING / IMPOTENCY ETC ETC..

    AFTER THE PANDEMIC SMOKE BLOWS OVER , INDIA WILL BE THE LAST MAN STANDING..

    IN 13 YEARS INDIA WILL BE THIS PLANETs NO 1 SUPERPOWER..

    http://ajitvadakayil.blogspot.com/2016/06/gpi-dog-shall-wag-gdp-tail-not-vice.html

    capt ajit vadakayil
    ..
    ReplyDelete
  2. https://ajitvadakayil.blogspot.com/2020/03/what-artificial-intelligence-cannot-do_15.html

    WHEN YOU ARE IN THE OFFICE, WHETHER IT'S AN ACTUAL THING HAPPENING OR NOT, YOU FEEL LIKE PEOPLE ARE WATCHING. WHEN YOU ARE AT HOME, YOU DON'T FEEL THAT, SO PEOPLE DO FEEL A LITTLE BIT MORE ENTITLED TO PULL INFORMATION ( STEAL INTELLECTUAL RIGHTS ) OFF THEIR WORK MACHINE, OR SHARE THINGS IN A CERTAIN WAY.

    71% OF BREACHES OVER THE PAST YEAR HAVE BEEN TIED TO INSIDE JOBS.

    THE ABILITY TO WORK FROM HOME IS A PRIZED EMPLOYEE PERK THAT OFFERS WORKERS THE CHANCE TO FREE THEMSELVES FROM THE DAILY COMMUTE AND COMPLETE THEIR TASKS.

    BEFORE THE PANDEMIC A LOT OF COMPANIES WERE AT MAYBE 25% OF THE SEATS AVAILABLE FOR WORK-FROM-HOME, AND NOW IN THIS NEW ENVIRONMENT YOU ARE CLOSE TO 98-100% WORK-FROM-HOME—OR COMPANIES LOSE BIG MONEY AND CANNOT SURVIVE.

    EVEN IF YOUR COMPANY PROVIDES VIRTUAL PRIVATE NETWORK (VPN) ACCESS, YOUR COMPUTER (AND THE DATA IT STORES) – COULD BE COMPROMISED IF SOMEONE HACKS INTO YOUR HOME WI-FI NETWORK.

    HENCE FORTH EMPLOYEE CONTRACTS, AND EMPLOYMENT AGREEMENTS… NEED TO MAKE IT VERY CLEAR THAT “THOU SHALT NOT STEAL OUR IP ”.

    YOU HAVE TO LAY OUT CLEAR ACCESS PRIVILEGES, ACCESS RIGHTS

    YOU NEED TO BE ABLE TO SHOW THAT SOMEONE EXCEEDED THEIR AUTHORIZED ACCESS TO A PROTECTED COMPUTER SYSTEM… WHICH BOILS DOWN TO, 'DID THEY DO SOMETHING THEY KNEW THEY SHOULDN’T HAVE?'"

    SOME COMPANIES ARE ALLOWING LOCAL PRINTING; THAT IS SOMETHING WHICH MUST BE DISABLED. USB PORTS THAT ARE OPEN SHOULD BE LOCKED DOWN . CAREFULLY MONITOR THOSE GIVING NOTICE OR BEING LET GO OR EVEN WHO GOT A BAD REVIEW / YEARLY RAISE ; THAT'S A POINT WHERE PEOPLE MAY TAKE DATA THEY SHOULD NOT BE TAKING..

    MOST COMPANIES HAVE EVERYTHING LOGGED, BUT ACTIVE MONITORING NEEDS TO BE IN PLACE. AT LEAST YOU HAVE THE DETECTIVE CONTROL IF YOU CAN'T PREVENT IT

    BRAINSTORMING NEEDS TO BE DONE-- HOW WE CAN ADAPT OUR IT SECURITY PORTFOLIO TO AN ENVIRONMENT WHERE EVERYONE IS WORKING FROM HOME, BUT STILL NEEDS ACCESS TO ALL THE TOOLS AND RESOURCES THEY HAD BEFORE?

    HOW HAVE OUR POLICIES, AND SYSTEMS HELD UP TO THE UPSWING IN VPN USE, DISTRIBUTED WORKERS, SHIFTING MEETINGS ON-LINE, AND EVERYTHING ELSE THAT WE’VE HAD TO CHANGE TO ADAPT TO THIS “NEW NORMAL?”

    THERE ARE SOME COMMON THREADS – FOR EXAMPLE, THE ADAGE ABOUT “UNKNOWN UNKNOWNS.”.. MAKING SURE THAT SENSITIVE DOCUMENTS AND FILES REMAIN CONFIDENTIAL IS DEFINITELY AN ISSUE REMOTE EMPLOYEES NEED TO TACKLE

    IN COMPLICATED TIMES – LIKE THE NOVEL CORONAVIRUS PANDEMIC – PHISHERS ARE HOPING TO TAKE ADVANTAGE OF TRUSTING VICTIMS. THEY'LL OFTEN PRETEND THEY'RE SOMEONE WITHIN THE COMPANY, LIKE THE CEO OR A MANAGER, TO ESTABLISH FALSE TRUST. REMOTE WORKERS ARE EASY TARGETS BECAUSE THEY'RE NOT IN THE OFFICE AND, THEREFORE, HACKERS ARE HOPING THEY WON'T CHECK TO SEE IF THE EMAIL IS LEGITIMATE.

    MANY REMOTE EMPLOYEES ARE USING THEIR PRIVATE HOME NETWORK, WHICH CAN INCREASE THE RISK OF LEAKED DATA. THIRD PARTIES MIGHT BE ABLE TO INTERCEPT AND ACCESS SENSITIVE EMAILS, PASSWORDS AND MESSAGES. THERE IS ALSO THE RISK THAT OTHERS WHO LIVE THE EMPLOYEE'S HOME (WHO USE THE SAME INTERNET CONNECTION) MAY SEE VALUABLE COMPANY DATA.

    MORE THAN 50% OF EMPLOYEES REPORT TRANSFERRING FILES BETWEEN THEIR WORK AND PERSONAL COMPUTERS. IF EMPLOYEES OBTAIN SENSITIVE DATA AND STORE IT ON THEIR PERSONAL DEVICES, THAT PUTS MANY COMPANIES AT RISK – ESPECIALLY IF SAID DISGRUNTLED EMPLOYEE ENDS LEAVES THE COMPANY.

    ANOTHER SOURCE OF VULNERABILITY IS THAT IF YOU, AS A REMOTE EMPLOYEE, ARE USING YOUR PERSONAL COMPUTER AND ARE NOT DOWNLOADING THE LATEST UPDATES, YOU COULD BE MORE VULNERABLE TO CYBERATTACKS.

    MULTIFACTOR AUTHENTICATION GRANTS ACCESS TO THE DEVICE AND ALL SOFTWARE AFTER THE EMPLOYEE PROVIDES MORE THAN ONE FORM OF IDENTIFICATION.

    ANYONE CAN MEMORIZE A PASSWORD OR STEAL A PHYSICAL DEVICE AND UNLOCK A COMPUTER. MULTIFACTOR AUTHENTICATION CAN PREVENT HACKERS FROM PHYSICALLY ACCESSING YOUR COMPANY DEVICE.

    CONTINUED TO 2--
    1. CONTINUED FROM 1--

      DATA ENCRYPTION HELPS PROTECT SENSITIVE INFORMATION BY TRANSLATING IT INTO A CODE THAT ONLY PEOPLE WITHIN YOUR COMPANY CAN ACCESS THROUGH A SECRET KEY OR PASSWORD. EVEN IF SCAMMERS INTERCEPT YOUR DATA, THEY WON'T BE ABLE TO INTERPRET IT PROPERLY. THIS GOES FOR ANY MESSAGES OR INFORMATION YOU SEND, RECEIVE OR STORE ON YOUR DEVICES.

      TAKING THE FOLLOWING PRECAUTIONS TO LIMIT SECURITY RISKS WHILE EMPLOYEES WORK FROM HOME.

      REQUIRE THAT EMPLOYEES USE A NON-STORED PASSWORD TO CONNECT TO THE NETWORK, ESPECIALLY FOR VPN ACCESS.

      ENFORCE REASONABLE SESSION TIMEOUTS FOR SENSITIVE PROGRAMS OR APPS. A USER SHOULD NOT HAVE TO RECONNECT AFTER WALKING TO THE KITCHEN TO POUR A CUP OF COFFEE, BUT AT THE SAME TIME, YOU CANNOT TRUST THAT EVERY EMPLOYEE WILL ALWAYS LOG OUT WHEN THEY ARE DONE FOR THE DAY.

      LIMIT PROGRAM/FILE ACCESS TO ONLY THOSE AREAS THAT ARE ABSOLUTELY NEEDED BY THAT EMPLOYEE.

      RESERVE THE RIGHT TO TERMINATE EMPLOYEE ACCESS AT ANY MOMENT.

      PROVIDE SERVICES FOR REMOTE FILE STORAGE AND OTHER TASKS; DON'T RELY ON INDIVIDUALS TO USE THEIR PERSONAL PROGRAMS AND ACCOUNTS TO STORE YOUR COMPANY'S DATA.

      ADVANCED ANALYTICS CAN BRING IT ALL TOGETHER. TAKE THE OVERWHELMING FLOOD OF INFORMATION AND CONSOLIDATE IT INTO ONE PLACE, THEN RUN IT THROUGH A MACHINE LEARNING ENGINE TO IDENTIFY THE ANOMALIES AND OUTLIERS.

      THIS ENABLES AN ORGANIZATION’S SECURITY OPERATIONS TEAM TO IDENTIFY ISSUES THEY COULD NOT HAVE SEEN BEFORE, AND A SINGLE CONSOLIDATED AND CORRELATED RISK SCORE MAKES IT MUCH EASIER TO RESPOND TO THREATS. WITH THIS NEW PERSPECTIVE, ANALYSTS CAN UNCOVER SOME OF THOSE PREVIOUSLY UNKNOWN THREATS.

      Capt ajit vadakayil
      ..

  1. https://ajitvadakayil.blogspot.com/2020/05/what-artificial-intelligence-cannot-do.html

    IN ADDITION TO M SEVERAL WARNINGS TO PMO ABOUT ZOOM THAT IT LACKS THE FULL TYPE OF END-TO-END ENCRYPTION ..

    ZOOM COMPANY GOT SHIT ON FACE OVER SECURITY AND PRIVACY-RELATED ISSUES EVER SINCE THE REPORTS OF ZOOMBOMBING CAME TO LIGHT.

    ZOOMBOMBING OR ZOOM RAIDING IS THE UNWANTED INTRUSION INTO A VIDEO CONFERENCE CALL BY AN INDIVIDUAL, CAUSING DISRUPTION. THE TERM BECAME POPULARIZED IN 2020, AFTER THE COVID-19 PANDEMIC FORCED MANY PEOPLE TO STAY AT HOME AND VIDEOCONFERENCING IS USED ON A LARGE SCALE BY BUSINESSES, SCHOOLS, AND SOCIAL GROUPS.

    FBI SAID THAT THEY HAVE RECEIVED OVER 240 REPORTS OF “ZOOM-BOMBING” IN WHICH HIJACKERS BROADCASTED MATERIAL DEPICTING CHILD SEXUAL ABUSE TO UNSUSPECTING USERS.

    ENCRYPTION IS USED TO PROTECT THE IDENTITY OF USERS, CALL DATA BETWEEN ZOOM CLIENTS AND ZOOM'S INFRASTRUCTURE, AND MEETING CONTENTS.

    WHEN A ZOOM CLIENT IS AUTHORIZED TO JOIN A MEETING, THAT CLIENT IS GIVEN A 256-BIT SECURITY KEY FROM ZOOM'S SERVER.

    BUT THE ZOOM SERVER RETAINS THE SECURITY KEY PROVIDED TO MEETING PARTICIPANTS, THEREBY LACKING TRUE END-TO-END KEY MANAGEMENT AND ENCRYPTION.

    THE LACK OF FULL END-TO-END ENCRYPTION MEANS THAT AN ATTACKER WHO CAN MONITOR ZOOM'S SERVER INFRASTRUCTURE AND GAIN ACCESS TO THE MEMORY OF THE RELEVANT ZOOM SERVERS COULD DEFEAT THE ENCRYPTION FOR A SPECIFIC MEETING.

    AS SUCH, THAT PERSON COULD THEN VIEW THE SHARED MEETING KEY, DERIVE SESSION KEYS, AND DECRYPT ALL MEETING DATA.

    https://support.zoom.us/hc/en-us/articles/201361943-New-updates-for-iOS

    NEW DOCUMENT FROM ZOOM ILLUSTRATES HOW THE COMPANY HOPES TO CHICKEN UP—NAY-- BEEF UP THE SECURITY AND PRIVACY OF ITS VIRTUAL MEETING PLATFORM.

    ALL ZOOM ROOMS WILL HAVE ENHANCED ENCRYPTION BETWEEN ZOOM ROOMS CONTROLLER AND ZOOM ROOMS ENABLED STARTING JUNE 30, 2020..

    TO FIX SOME OF ITS SECURITY HOLES, ZOOM OUTLINED THE GOALS OF ITS PROPOSAL AS FOLLOWS: 1) ONLY AUTHORIZED MEETING PARTICIPANTS SHOULD HAVE ACCESS TO THEIR MEETING'S DATA; 2) ANYONE EXCLUDED FROM A MEETING SHOULD NOT HAVE THE ABILITY TO CORRUPT THE CONTENT OF THAT MEETING; 3) IF A MEETING PARTICIPANT ENGAGES IN ABUSIVE BEHAVIOR, THERE SHOULD BE AN EFFECTIVE WAY TO REPORT THAT PERSON TO PREVENT FURTHER ABUSE.

    https://www.youtube.com/watch?v=-dgW6_n8XsQ

    WITH ZOOM 5.0 UPDATE, SUPPORT FOR AES 256 BIT GCM ENCRYPTION WAS ADDED 256-BIT ENCRYPTION IS MUCH STRONGER THAN 128 BIT AS A BIGGER KEY SIZE HAS A HIGHER CHANCE OF REMAINING SECURE. THIS MEANS THAT IF SOMEONE WERE TO ATTEMPT TO HACK ENCRYPTED DATA, 256-BIT ENCRYPTED DATA WOULD TAKE SIGNIFICANTLY LONGER TO CRACK.

    AES 256-BIT GCM ENCRYPTION WILL BE ENABLED SYSTEM-WIDE FROM MAY 30 IN ZOOM AND USERS WILL NEED TO HAVE UPDATED CLIENTS AND APP TO JOIN MEETINGS. THE SECURITY ICON IN THE MEETING WILL LET THE HOST EASILY LOCK/UNLOCK MEETINGS, ENABLE/DISABLE WAITING ROOMS, ENABLE/DISABLE IN-MEETING CHAT, ENABLE/DISABLE PARTICIPANT RENAMING, ENABLE/DISABLE SCREEN SHARING, REMOVE A PARTICIPANT, AND REPORT A PARTICIPANT..

    ON JUNE 30, ENHANCED ENCRYPTION BETWEEN ZOOM ROOMS CONTROLLER AND ZOOM ROOMS WILL BE ENABLED. ZOOM ROOMS CONTROLLERS THAT DO NOT HAVE THE RECOMMENDED VERSION 5.0 OR HIGHER WILL STOP FUNCTIONING.
    ZOOM 5.0 INCLUDES SECURITY ENHANCEMENTS AND A STRONGER ENCRYPTION STANDARD, TO FURTHER ENSURE THAT ZOOM CONFERENCES CANNOT BE INTERCEPTED BY UNINVITED PEOPLE.

    AFTER THE MEETING STARTS, ALL PARTICIPANTS WILL SEE A MEETING SECURITY CODE THEY CAN USE TO VERIFY THAT NO ONE'S CONNECTION TO THE MEETING WAS INTERCEPTED. THE HOST CAN READ THIS CODE OUT LOUD, AND ALL PARTICIPANTS CAN CHECK THAT THEIR CLIENTS DISPLAY THE SAME CODE.

    IF THE HOST LEAVES, THEY CAN NOW EASILY SELECT A NEW HOST AND HAVE THE CONFIDENCE THAT THE RIGHT PERSON IS LEFT WITH HOST PRIVILEGES..

    CM OR GALOIS / COUNTER MODE ENCRYPTION IS AN ALGORITHM FOR AUTHENTICATED ENCRYPTION OF DATA THAT PROVIDES ASSURANCE OF AUTHENTICITY OF THE CONFIDENTIAL DATA.

    CONTINUED TO 2--
    1. CONTINUED FROM 1--

      IT IS A MODE OF OPERATION OF THE ADVANCED ENCRYPTION STANDARD (AES) ALGORITHM CONSTRUCTED FROM A BLOCK SIZE OF 128-BITS. ESSENTIALLY, GCM ENCRYPTION PROVIDES A LAYER OF PROTECTION FOR YOUR DATA AND RESISTANCE TO TAMPERING.

      AFTER MAY 30, THE SHIELD WILL BE GREEN FOR ALL USERS, DENOTING ENHANCED GCM ENCRYPTION.

      ZOOM ROOMS CONTROLLERS (INCLUDING ZOOM ROOMS SCHEDULING DISPLAYS) WILL NOT FUNCTION IF THEY ARE NOT RUNNING THE MINIMUM VERSIONS.

      CLICKING THE ICON TAKES THE USER TO THE STATISTICS PAGE FOR ADDITIONAL ENCRYPTION DETAILS. ADDITIONALLY, MEETING HOSTS CAN NOW SELECT DATA CENTER REGIONS AT THE SCHEDULING LEVEL FOR MEETINGS AND WEBINARS.

      ZOOM 5.0 MAKES PASSWORDS FOR MEETINGS ACTIVE BY DEFAULT, IN ORDER TO REDUCE S ZOOM-BOMBINGS - THE INTRUSION OF UNINVITED INDIVIDUALS IN OTHERS' VIDEO CONFERENCES.

      INITIALLY BY DEFAULT, A ZOOM MEETING DELIBERATELY DID NOT REQUIRE A PASSWORD. THAT MEANS IT IS ALL TOO EASY FOR NEW WORK-AT-HOME MEETING ORGANIZERS TO LEAVE THEIR FRIENDS' GET-TOGETHERS, PROGRESS MEETINGS, OR VIRTUAL CLASSROOMS OPEN TO SNOOPS OR ABUSERS.

      BOTTOM LINE WARNING;; THIS LOLLIPOP STILL ISN’T THE FULL-PROOF END-TO-END ENCRYPTION ONE WOULD IDEALLY WANT FROM THE SERVICE

      capt ajit vadakayil
      ..
  1. HULLO US FBI..

    YOU SEEM TO BE VERY CONCERNED ABOUT PEDOPHILA PORN VIA ZOOM BOMBING..

    DO YOU KNOW QUORA CEO ADAM D ANGELA HAS BEEN PEDDLING CHILD PORN , BESTIALITY AND INCEST FOR A LONG TIME..

    I HAVE PROTESTED MORE THAN 50 TIMES TO PM MODI-- IT I NO USE.. THIS IS ON RECORD.. LOOKS LIKE HE ENJOYS IT..

    GOOGLE FOR--

    AAA- QUORA INCEST SEX

    BBB- QUORA BESTIALITY SEX

    CCC- QUORA SHIVA SEX

    DDD- QUORA CHILD SEX

    EEE- QUORA BRAHMA INCEST SEX

    FFF- SHIVA CANNIBAL AGHORI

    ALL HINDU GODS ARE COMIC ALLEGORIES EXCEPT MORTAL VISHNU AVATARS RAMA/ KRISHNA/ AYYAPPA.

    WHAT IS ALL THIS?

    capt ajit vadakayil
    ..
    1. PUT ABOVE COMMENT IN WEBSITES OF--
      CIA
      MOSSAD
      KGB
      M16
      AMBUJ SHARMA
      ALL MEMBERS OF PMO
      EVERY MINISTRY IN INDIA
      EVERY MP OF INDIA
      EVERY MLA OF INDIA
      ALL COLLECTORS OF KERALA
      PIYUSH GOYAL
      GITA GOPINATH
      RAGHURAM RAJAN
      ABHIJEET BANNERJEE
      AMARTYA SEN
      MANMOHAN SINGH
      MONTEK SINGH AHLUWALIA
      CHID BABY
      PRANAB MUKHERJEE
      YESHWANT SINHA
      RUCHIR SHARMA
      PMO
      PM MODI
      EXTERNAL AFFAIRS MINISTER/ MINISTRY
      AMIT SHAH
      HOME MINISTRY CENTRE/ STATES
      CJI BOBDE
      ATTORNEY GENERAL
      LAW MINISTER PRASAD / MINISTRY CENTRE AND STATES
      ALL CHIEF JUSTICES HIGH COURTS
      I&B MINISTER / MINISTRY
      NSA
      AJIT DOVAL
      RAW
      IB
      CBI
      NIA
      ED
      ALL DGPs OF INDIA
      ALL IGs OF INDIA
      ALL 3 ARMED FORCE CHIEF
      CDS
      DEFENCE MINISTER/ MINISTRY
      ALL CMs OF INDIA
      ALL MLAs OF INDIA
      ALL MPs OF INDIA
      ALL COLLECTORS OF MAJOR CITIES
      ALL STATE GOVERNORS
      PRESIDENT OF INDIA
      VP OF INDIA
      SPEAKER LOK SABHA
      SPEAKER RAJYA SABHA
      ALL INDIAN THINK TANKS
      NITI AYOG
      AMITABH KANT
      MOHANDAS PAI
      RAJEEV CHANDRASHEKHAR
      E SREEDHARAN
      WILLIAM DALRYMPLE
      KONRAED ELST
      FRANCOIS GAUTIER
      STEPHEN KNAPP
      DAVID FRAWLEY
      GVL NARASIMHA RAO
      SAMBIT PATRA
      ASHOK PANDIT
      ANUPAM KHER
      KANGANA RANAUT
      VIVEK AGNIHOTRI
      MEENAKSHI LEKHI
      SMRITI IRANI
      PRASOON JOSHI
      SWAPAN DASGUPTA
      MADHU KISHWAR
      SUDHIR CHAUDHARY
      GEN GD BAKSHI
      RSN SINGH
      ARNAB GOSWAMI
      NAVIKA KUMAR
      ANAND NARASIMHAN
      RAHUL SHIVSHANKAR
      RAJDEEP SARDESAI
      SRINIVASAN JAIN
      SONAL MEHROTRA KAPOOR
      VIKRAM CHANDRA
      NIDHI RAZDAN
      ZAKKA JACOB
      RAHUL ANWAL
      RAVISH KUMAR
      PRANNOY JAMES ROY
      AROON PURIE
      VINEET JAIN
      RAGHAV BAHL
      SEEMA CHISTI
      DILEEP PADGOANKAR
      VIR SANGHVI
      KARAN THAPAR
      PRITISH NANDI
      ASHISH NANDI
      SHEKHAR GUPTA
      SIDHARTH VARADARAJAN
      PAVAN VARMA
      RAMACHANDRA GUHA
      THAMBI SUNDAR PICHAI
      SATYA NADELLA
      CEO OF WIKIPEDIA
      QUORA CEO ANGELO D ADAMS
      QUORA MODERATION TEAM
      KURT OF QUORA
      GAUTAM SHEWAKRAMANI
      MUKESH AMBANI
      RATAN TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      SWAMY
      RAJIV MALHOTRA
      P GURUS
      RSS
      AVBP
      VHP
      MOHAN BHAGWAT
      RAM MADHAV
      MOHANLAL
      SURESH GOPI
      NALIN KOHLI.
      RAJ THACKREY
      CHANDAN MITRA
      SADGURU JAGGI VASUDEV
      BABA RAMDEV
      SRI SRI RAVISHANKAR
      CHETAN BHAGAT
      AMISH TRIPATHI
      DEVDUTT PATTANAIK
      THE QUINT
      THE SCROLL
      THE WIRE
      THE PRINT
      MK VENU
      MADHU TREHAN
      SANJAY HEDGE
      SHOBHAA DE
      ARUNDHATI ROY
      MADHU TREHAN
      JAIRAM RAMESH
      SHASHI THAROOR
      KAPIL SIBAL
      ABHI SEX MAANGTHA SINGVI
      TEHSEEN POONAWAALA
      SHEHZAD POONAWALA
      SANJAY JHA
      SURJEWALA
      AK ANTONY
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA VADRA
      AK ANTONY
      PC CHACKO
      JEAN DREZE
      DIG VIJAY SINGH
      JULIO RIBEIRO
      ASADDUDIN OWAISI
      SHEHLA RASHID
      RANA AYYUB
      SUHEL SETH
      SHAZIA ILMI
      MANI SHANGARAN AIYERAN
      SALMAN KHURSHEED
      GHULAM NABI AZAD
      SWARA BHASKAR
      ALL HINDU STALWARTS AND ORGS
      ROMILA THAPAR
      IRFAN HABIB
      NIVEDITA MENON
      AYESHA KIDWAI
      HISTORY CHANNEL
      DAVID HATCHER CHILDRESS
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA VADRA
      SOLI BABY
      FALI BABY
      KATJU BABY
      SALVE BABY
      JOHN BRITTAS
      PRAKASH KARAT
      BRINDA KARAT
      SITARAM YECHURY
      D RAJA
      ALEX JONES
      RENSE
      DAVID ICKE
      ANGELO JOHN GAGE
      DEEPAK CHOPRA
      ROBIN SHARMA
      TAREK FATEH
      ALL INDIAN MEDIA
      MUKESH AMBANI
      RATAN TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      NCERT
      EDUCATION MINISTER
      NHRC
      NCW MAIN
      NCW STATES
      REKHA SHARMA
      SWATI MALLIWAL
      TEESTA SETALVAD
      KAVITA KRISHNAN
      NISHANT VERMA
      KUNHALIKUTTY
      FAZAL GHAFOOR
      PRINCESS HEND AL QASSIMI

      SPREAD ON SOCIAL MEDIA--
      SPREAD BY WHATS APP

  1. https://www.youtube.com/watch?v=qatcinfrz_e

    LARGE ORGANIZATIONS FACE THE CHALLENGE OF HOW TO DISTINGUISH 'AUTHORIZED' ACCESS FROM ONE THAT IS NOT FOR A LEGITIMATE WORK-RELATED PURPOSE, DURING THIS COVID-19 PANDEMIC WHERE WORK AT HOME REMOTE ACCESS CANOT BE AVOIDED

    ORGANIZATIONS MUST BUILD A FOOL-PROOF AND EFFECTIVE FOUNDATION FOR A REMOTE WORKPLACE.

    THIS INCLUDES TAKING STOCK OF COMPANY ASSETS, METHODICALLY ENCRYPTING ON-PREMISES, MOBILE DEVICES AND APPLICATIONS, PLUS PROVIDING ACCESS TO CORPORATE DATA AND COLLABORATION CHANNELS, SUCH AS THROUGH A SECURE VIRTUAL PRIVATE NETWORK (VPN).

    WITH THE INCREASING NUMBER OF PEOPLE BRINGING THEIR DEVICES TO WORK AND THE CONSTANT APPEARANCE OF NEW SOFTWARE SOLUTIONS AND CLOUD SERVICES, EMPLOYEES ARE USING MORE AND MORE TECHNOLOGIES WITHOUT NOTIFYING THE CORPORATE IT TEAM ABOUT THEM

    MULTI-FACTOR AUTHENTICATION / MFA REQUIRES AN EXTRA LAYER OF AUTHENTICATION, SUCH AS ENTERING A ONE-TIME PIN NUMBER OR FACIAL RECOGNITION IN ADDITION TO CREDENTIALS. THIS PROCESS ENSURES THE PERSON ACCESSING YOUR NETWORK IS WHO THEY SAY THEY ARE.

    PRIVILEGED USERS, SUCH AS DATA ADMINISTRATORS, TYPICALLY HAVE COMPLETE ACCESS TO THEIR ORGANIZATION'S DATA, AND WHEN A WORK FROM HOME SITUATION IS MANDATED, THESE PERSONNEL WILL HAVE TO FACE THE ADDITIONAL CHALLENGE OF PROVIDING GRANULAR ACCESS TO CORPORATE RESOURCES.

    THERE IS OFTEN A LACK OF CONTEXTUAL INFORMATION ABOUT USERS AND REQUESTERS OF DATA, WHICH IS A SIGNIFICANT FACTOR TO CONSIDER BEFORE GRANTING DATA PRIVILEGES.

    THIS IS WHERE A PRIVILEGED ACCESS MANAGEMENT (PAM) STRATEGY PLAYS AN ESSENTIAL ROLE IN MAINTAINING DATA INTEGRITY. IMPLEMENTING AUTHENTICATION PROTOCOLS, AUTOMATED PASSWORD ENCRYPTION, AND REGULAR AUDITING AND REPORTING CAN ALL HELP ENTERPRISES MAINTAIN DATA SECURITY.

    PRIVILEGE PROVIDES THE AUTHORIZATION TO OVERRIDE, OR BYPASS, CERTAIN SECURITY RESTRAINTS, AND MAY INCLUDE PERMISSIONS TO PERFORM SUCH ACTIONS AS SHUTTING DOWN SYSTEMS, LOADING DEVICE DRIVERS, CONFIGURING NETWORKS OR SYSTEMS, PROVISIONING AND CONFIGURING ACCOUNTS AND CLOUD INSTANCES, ETC.

    BY DIALING IN THE APPROPRIATE LEVEL OF PRIVILEGED ACCESS CONTROLS, PAM HELPS ORGANIZATIONS CONDENSE THEIR ORGANIZATION’S ATTACK SURFACE, AND PREVENT, OR AT LEAST MITIGATE, THE DAMAGE ARISING FROM EXTERNAL ATTACKS AS WELL AS FROM INSIDER MALFEASANCE OR NEGLIGENCE.

    A CENTRAL GOAL IS THE ENFORCEMENT OF LEAST PRIVILEGE, DEFINED AS THE RESTRICTION OF ACCESS RIGHTS AND PERMISSIONS FOR USERS, ACCOUNTS, APPLICATIONS, SYSTEMS, DEVICES (SUCH AS IOT) AND COMPUTING PROCESSES TO THE ABSOLUTE MINIMUM NECESSARY TO PERFORM ROUTINE, AUTHORIZED ACTIVITIES.

    SHADOW IT DESCRIBES THOSE APPLICATIONS AND DEVICES EMPLOYEES USE FOR WORK BUT ARE NOT MANAGED BY THE IT ORGANIZATION

    LACK OF SECURITY – LACK OF VISIBILITY AND CONTROL OVER NETWORK ELEMENTS ARE THE MAIN CYBERSECURITY RISKS OF USING SHADOW IT. THEY CREATE NUMEROUS WEAK SPOTS THAT HACKERS MAY USE FOR COMPROMISING A SYSTEM AND COLLECTING OR STEALING SENSITIVE BUSINESS INFORMATION

    https://www.youtube.com/watch?v=vnz3txfrhtc

    EXAMPLES OF SOME FREE OR FREEMIUM SHADOW IT SERVICES ARE GOOGLE DOCS, DROPBOX AND ZOOM. SHADOW IT HAS BECOME MORE PERVASIVE AS A RESULT OF THE WORK-FROM-HOME SHIFT. THE RISK LIES IN SHARING OR STORING BUSINESS FILES WITHIN THESE SHADOW IT APPS AND DEVICES. WHEN THIS HAPPENS, THE ORGANIZATION LOSES CONTROL OF DATA AND EXPOSES ITSELF TO A BREACH.

    MOST EMPLOYEES USE SHADOW IT WITH THE GOOD INTENTION OF GETTING THEIR WORK DONE. HOWEVER, ORGANIZATIONS NEED POLICIES THAT SET CLEAR EXPECTATIONS AROUND USING OFFICE TECHNOLOGIES AND DATA. SUCH POLICIES CAN SIGNIFICANTLY REDUCE THE RISKS BROUGHT ON BY SHADOW IT.

    CONTINUED TO 2--
    1. CONTINUED FROM 1--

      EMPLOYEES’ BEHAVIORAL CHANGES CAN INDICATE THAT THE COMPANY IS ABOUT TO BE COMPROMISED. IF AN EMPLOYEE IS ACCESSING SYSTEMS OR FILES AT UNUSUAL HOURS (GIVEN THEIR WORK HISTORY), IF THEY SUDDENLY START WORKING REMOTELY/START WORKING REMOTELY FREQUENTLY WITHOUT EXPLANATION, IF LOGON ATTEMPTS APPEAR TO BE ORIGINATING FROM UNEXPECTED LOCATIONS, IF AN EMPLOYEE IS ACCESSING UNUSUALLY LARGE AMOUNTS OF DATA OR IS ABUSING PERMISSIONS TO ACCESS NEVER-BEFORE-ACCESSED DATA, OR IF TECH TEAMS SEE UNAUTHORIZED ATTEMPTS TO ACCESS SERVERS AND DATA, THERE MIGHT BE AN INSIDER THREAT TO INVESTIGATE.

      BEHAVIOR CHANGES ARE EASY TO DETECT WITH SECURITY TOOLS LIKE DATA LOSS PREVENTION (DLP), INTRUSION DETECTION SYSTEMS (IDS), AND ENDPOINT AND MOBILE SECURITY, BUT TRADITIONAL TOOLING IS REACTIVE, WHICH MEANS THAT SOMETHING BAD HAS TO HAPPEN BEFORE IT CAN BE STOPPED AND (HOPEFULLY) MITIGATED BEFORE TOO MUCH DAMAGE IS DONE.

      SETTING UP THE RIGHT LEVELS OF ACCESS FOR EVERY EMPLOYEE AND SYSTEM, MAINTAINING APPROPRIATE PERMISSIONS OVER TIME, AND UNDERSTANDING THE SENSITIVITY OF DATA TO WHICH BOTH EMPLOYEES AND SYSTEMS HAVE ACCESS (FOR STARTERS) IS A MASSIVE RESPONSIBILITY. THIS IS WHY EXCESSIVE ACCESS PRIVILEGES, GROWING AMOUNTS OF DATA AND NETWORKED PARTNER ECOSYSTEMS, SHADOW IT, IOT, AND EXPLODING MOBILE AND CLOUD USAGE PLAGUE NEARLY EVERY ORGANIZATION.

      OVERLY PERMISSIVE ACCESS CONTROLS ARE A KEY FACILITATOR OF INSIDER THREAT. THE PRINCIPLE OF LEAST PRIVILEGE LIMITS THE ACCESS THAT USERS, SYSTEMS, AND PROCESSES HAVE TO NETWORKED RESOURCES BASED ON ROLES AND RESPONSIBILITIES. ELIMINATING UNNECESSARY OR OVERLY PERMISSIVE ACCESS REDUCES THE NETWORK ATTACK SURFACE AND HELPS MITIGATE THE PROBABILITY OF ATTACKERS ESCALATING PRIVILEGES AND ACCOMPLISHING A BREACH.

      HISTORICALLY, NETWORK ACCESS WORKED MUCH LIKE A LOCK ON A FRONT DOOR; ANYONE WITH THE RIGHT KEY WAS ABLE TO GET INSIDE. ONCE INSIDE THE BUILDING, THAT PERSON WAS FREE TO GO WHEREVER THEY PLEASED. OVER TIME, NETWORK AND SECURITY ADMINS REALIZED THAT A ONE-TIME SECURITY AUTHENTICATION AT THE “FRONT DOOR” (I.E., PERIMETER) WASN’T ENOUGH AND SET UP ADDITIONAL PERIMETERS THROUGH WHICH USERS AND PROCESSES HAD TO AUTHENTICATE BEFORE BEING ALLOWED TO ACCESS CRITICAL DATA, APPLICATIONS, OR SERVICES.

      HOWEVER, THE IDEA OF TRUST REMAINED. CREDENTIALS CHECKED ONE TIME AT EACH JUNCTURE PERMITTED THE USER/PROCESS EASY ACCESS TO ANYTHING INSIDE.

      ZERO TRUST ABANDONS THE IDEA OF A TRUSTED USER OR PROCESS AND REQUIRES A CHECK ON AUTHORIZATION AND AUTHENTICATION EVERY TIME ACCESS IS REQUESTED; PREVIOUS ACCESS DOESN’T DETERMINE FUTURE ACCESS (BECAUSE ATTACKERS CAN INTERCEPT COMMUNICATIONS). TO PREVENT AN ATTACKER FROM PIGGYBACKING ON AUTHORIZED USERS OR PROCESSES, A ZERO TRUST NETWORK CREATES ACCESS PERMISSIONS THAT ARE DYNAMIC AND BASED ON A WIDE COLLECTION OF ATTRIBUTES — AS OPPOSED TO A USERNAME+PASSWORD COMBINATION, LOCATION-BASED PROTOCOLS, OR OTHER STATIC INFORMATION.

      THIS COMBINATION OF ATTRIBUTES FORMS AN IDENTITY FOR EVERY USER AND PROCESS, AND IF THE IDENTITY IS ALTERED, ACCESS IS DENIED. IF THE USER/PROCESS IS ACTING IN AN UNEXPECTED WAY (E.G., SENDING EXCESSIVE AMOUNTS OF DATA), THE ACTION IS BLOCKED. CONTINUOUS AUTHENTICATION AND AUTHORIZATION PREVENTS “BAD” FROM HAPPENING BECAUSE EVERY ACTION IS CHECKED.

      IN A ZERO TRUST NETWORK, ASSETS/RESOURCES ARE ASSIGNED AN IDENTITY (JUST LIKE USERS), BUT EACH IDENTITY IS BASED ON A COLLECTION OF ATTRIBUTES TAKEN FROM SOURCE DATA (RATHER THAN NETWORK-BASED INFORMATION OR A PASSWORD+USERNAME COMBO).

      THIS PROCESS PROVIDES THE CONTEXTUAL INFORMATION WHICH ALLOWS THE SYSTEM TO DETERMINE THE TRUE AUTHENTICITY OF NETWORK COMMUNICATION REQUESTS, ONLY WITHOUT REQUIRING A USER OR ADMINISTRATOR TO TAKE FURTHER ACTION. MULTI-FACTOR AUTHENTICATION IN USERLAND IS OFTEN RESISTED BECAUSE IT MEANS THE USER MUST SUPPLY ADDITIONAL INFORMATION BEFORE RECEIVING PERMISSION TO ACCESS THE REQUESTED RESOURCE.

      CONTINUED TO 3--

    2. CONTINUED FROM 2--

      BUT MULTI-FACTOR AUTHENTICATION IN A ZERO TRUST NETWORK CAN HAPPEN AUTOMATICALLY AND SEAMLESSLY BECAUSE IDENTITIES ARE COLLECTIONS OF MULTIPLE FACTORS WHICH, IN AGGREGATE, CANNOT BE CHANGED BY AN ATTACKER — BE THAT PERSON AN EMPLOYEE OR AN EXTERNAL THREAT ACTOR.

      COMPANIES, HAVE IMPLEMENTED VARYING SEGMENTATION METHODS OVER THE YEARS TO KEEP SENSITIVE DATA SEGREGATED FROM OTHER PARTS OF THE NETWORK. FIREWALLS ARE THE MOST COMMON TOOL IN THE SECURITY PRACTITIONER’S TOOLBOX, BUT FIREWALLS ONLY WORK INSOMUCH AS NETWORK CONSTRUCTS AND LOCATION DATA ARE ACCURATE.

      A MODERN, ZERO TRUST SEGMENTATION STRATEGY SHIFTS FOCUS AWAY FROM THE NETWORK TO WHAT IS COMMUNICATING ON THE NETWORK — HOSTS, SERVERS, APPLICATIONS, ETC. RATHER THAN CREATING PERIMETERS AROUND THE WHOLE NETWORK OR MICRO-PERIMETERS AROUND SECTIONS OF THE NETWORK, ZERO TRUST SEGMENTATION A) USES IDENTITY AS THE BASIS FOR PERIMETERIZATION, B) CONTINUOUSLY AUTHORIZES AND AUTHENTICATES COMMUNICATING ASSETS, AND C) ENFORCES CONTROL BASED ON COMMUNICATING ASSETS.

      THIS LAST POINT IS ESPECIALLY CRITICAL WHEN TRYING TO PREVENT ATTACKS. IF THE SECURITY/NETWORKING TEAM CAN SEGMENT THE NETWORK BASED ON ASSETS RATHER THAN NETWORK CONSTRUCTS, THE HASSLE OF TRADITIONAL SEGMENTATION IS ELIMINATED AND SECURITY POLICIES REMAIN IN PLACE EVEN IF THE NETWORK CHANGES.

      THE VAST MAJORITY OF INSIDER ATTACKS HAPPEN BECAUSE AN EMPLOYEE WANTS TO STEAL OR DESTROY COMPANY-PROPRIETARY DATA. THEREFORE, WHEN LOOKING AT SECURITY STRATEGIES TO PREVENT INSIDER THREAT, IT MAKES SENSE TO PUT SECURITY CONTROL AS CLOSE AS POSSIBLE TO THE THING ATTACKERS WANT: THE DATA. TRADITIONAL SECURITY TOOLING FOCUSES ON PROTECTING THE NETWORK IN WHICH THE DATA LIVES, OR DETECTING ABNORMAL OR UNAUTHORIZED ACTIVITY BY A USER. BUT A ZERO TRUST NETWORK PLACES THE STRONGEST PROTECTION AROUND THE MOST SOUGHT-AFTER ASSET INSTEAD OF THE ENVIRONMENT IN WHICH THE ASSET IS COMMUNICATING.
      SECURE MOBILITY AND CLIENT-BASED VPN WITH ENFORCED, RISK-AWARE, AND ADAPTIVE ACCESS POLICIES
      SECURE ALL LOCAL NETWORK ACCESS THROUGH CLOUD-BASED DNS SECURE INTERNET GATEWAY FOR WEB AND APP-BASED PROXY CONTROL
      DEPLOY CLOUD-BASED ADAPTIVE MULTIFACTOR AUTHENTICATION (MFA) TO ENSURE THE TRUSTWORTHINESS OF USERS AND DEVICES
      PROTECT END-POINTS WITH EDR (END-POINT DETECTION AND RESPONSE) AND DATA LEAK PREVENTION
      TIGHTEN SECURITY OPERATIONS (SECOPS) MANAGEMENT FOR ENHANCED THREAT DETECTION AND PREVENTION

      ESTABLISH A CLEAR POLICY AS TO WHICH DEVICES, SYSTEMS AND SOFTWARE EMPLOYEES CAN USE. THEN COMMUNICATE THAT POLICY TO ALL EMPLOYEES — NOT JUST ONCE, BUT OFTEN. ESTABLISH A CLEAR POLICY AS TO WHICH DEVICES, SYSTEMS AND SOFTWARE EMPLOYEES CAN USE. THEN COMMUNICATE THAT POLICY TO ALL EMPLOYEES — NOT JUST ONCE, BUT OFTEN. A CLOUD ACCESS SECURITY BROKER (CASB), ENSURES REAL-TIME DATA PROTECTION. RUN STRATEGIC ANALYSIS OF USAGE PATTERNS. RECOGNIZE THAT THE ORGANIZATION NEEDS A FULL RANGE OF TOOLS AND SERVICES IN ORDER TO FUNCTION PROPERLY..

      EMPLOYEES ARE CONSTANTLY TRYING TO DO THEIR JOBS AS EFFICIENTLY AS POSSIBLE, PARTICULARLY WHEN THEY ARE WORKING OUT OF THE OFFICE. IT’S UP TO IT TO PROVIDE EMPLOYEES WITH SYSTEMS THAT MAKE THEIR JOBS EASIER, WHILE ENSURING SECURITY.

      Capt ajit vadakayil
      ..

  1. https://www.forbes.com/sites/thomasbrewster/2020/05/19/easyjet-hacked-9-million-customers-and-2000-credit-cards-hit/#408adcf81ae1

    CARD SKIMMERS ARE DEVICES THAT WILL ALLOW THIEVES TO CAPTURE THE DIGITAL INFORMATION EMBEDDED IN CREDIT CARDS. THEY MAY BE USED BY THE WAITER THAT YOU'VE GIVEN YOUR CARD TO PAY THE BILL, OR SNEAKILY SLIPPED INTO THE CREDIT CARD READER OR SOME OTHER AUTOMATED DEVICE

    https://www.youtube.com/watch?v=gp1iv4314f8

    ATM SKIMMING IS A THEFT OF CARD INFORMATION, WHERE A SMALL DEVICE, KNOWN AS A SKIMMER, IS USED TO STEAL THE INFORMATION DURING A LEGITIMATE ATM TRANSACTION. AS THE CARD IS SWIPED AT THE MACHINE, THE SKIMMER DEVICE CAPTURES THE INFORMATION STORED ON THE CARD'S MAGNETIC STRIP

    https://www.youtube.com/watch?v=vehyjq0nwf4
    https://www.youtube.com/watch?v=pumezxnuz9u

    AT ATMS, SKIMMERS ARE SOMETIMES USED IN CONJUNCTION WITH HIDDEN CAMERAS THAT RECORD YOU AS YOU ENTER YOUR PIN..
    WHEN A SKIMMING DEVICE IS PLANTED ON AN ATM, IT GATHERS ACCOUNT DATA FROM ANY CARDS THAT ARE SWIPED. THOSE WHO PLANTED IT CAN THEN RETRIEVE THAT DATA AND PUT IT ON BLANK BANK CARDS. OFTEN, CRIMINALS WILL ALSO HIDE A SMALL PINHOLE CAMERA IN A BROCHURE HOLDER NEAR THE ATM IN ORDER TO EXTRACT THE VICTIMS' PIN NUMBERS. ALL OF THIS ALLOWS THEM TO ACCESS THE FUNDS IN THEIR VICTIMS' ACCOUNTS..


    A CREDIT CARD SKIMMING DEVICE READS THE MAGNETIC STRIPE ON YOUR CREDIT OR DEBIT CARD WHEN YOU SLIDE IT INTO A CARD READER AT AN ATM, GAS PUMP OR OTHER POINT OF SALE. THE SKIMMER THEN STORES THE CARD NUMBER, EXPIRATION DATE AND CARDHOLDER'S NAME. THESE STRIPES EVEN APPEAR ON CHIP-ENABLED CARDS

    CHIP CARDS CAN BE SKIMMED BECAUSE OF THE MAGNETIC STRIP THAT STILL EXISTS ON THESE CARDS.

    USE CREDIT, NOT DEBIT, WHENEVER POSSIBLE.

    $31 BILLION IN ANNUAL GLOBAL LOSSES FROM DEBIT AND CREDIT CARD FRAUD AND ELECTRONIC CRIME ASSOCIATED WITH ATMS , THESE LOSSES CONTINUE TO GROW.

    WHEN CRIMINALS HACK DATABASES FULL OF CREDIT AND DEBIT CARD NUMBERS THEY THEN USE THAT INFORMATION TO PULL CASH FROM THE VICTIM'S BANK ACCOUNT AT AN ATM.

    ONE OF MY FRIENDS ( RICH MARWARI ) WENT TO GREECE FOR A PRIVATE HOLIDAY WITH HIS FAMILY .. HIS LOCKED BAG GOT SWIPED FROM THE HOTEL ROOM.. HE LOST MASSIVE MONEY FROM HIS BANK ACCOUNTS.. MOBILES PHONE ARE STOLEN NOT FOR THE VALUE OF THE PHONE, BUT FOR THE SIM CARD INSIDE.

    IT’S SIMPLE ENOUGH TO HACK INTO A DATABASE AND COMPROMISE CARDS AND PINS. IT’S EVEN EASIER TO AFFIX HARDWARE TO THE FACE OF AN ATM MACHINE AND DO THE SAME. ONCE THE DATA IS COMPROMISED, THE IDENTITY THIEVES CLONE CARDS AND TURN THE DATA INTO CASH AS QUICKLY AS POSSIBLE.

    THERE ARE A FEW TYPES OF DEVICES THAT CRIMINALS USE FOR ATM SKIMMING:

    CARD READER OVERLAYS: THESE PLASTIC DEVICES FIT OVER THE SLOT WHERE YOU INSERT YOUR CARD. THEY STEAL AND STORE YOUR CARD DATA WHEN YOU PUT YOUR CARD IN THEM.

    HIDDEN CAMERAS: THESE ARE USUALLY VERY TINY AND CAN BE PLACED ON OR AROUND AN ATM TO HEP THIEVES KEEP AN EYE ON THE AREA AND CAPTURE PINS.

    PIN-CAPTURE OVERLAYS: THESE FAKE KEYPADS FIT OVER AN ATM'S ACTUAL KEYPAD TO CAPTURE PINS.

    ATM FACEPLATES: THESE OVERLAYS FIT OVER THE ENTIRE ATM FACEPLATE AND CAN CONTAIN EVERYTHING FROM CARD READERS TO KEYPAD OVERLAYS TO HIDDEN CAMERAS.

    IN ORDER TO ACCESS YOUR BANK ACCOUNTS, THIEVES NEED TO HAVE YOUR CARD NUMBER AND YOUR PIN. BY COVERING THE KEYPAD, YOU PREVENT CAMERAS AND ONLOOKERS FROM SEEING YOUR PIN.

    IF SOMEONE DOES GET YOUR INFORMATION, YOU SHOULD NOTIFY YOUR BANK AS SOON AS POSSIBLE.

    Capt ajit vadakayil
    ..
  1. BEFORE THE COVID-19 CRISIS, A LOT OF PEOPLE HAVEN’T EVEN HEARD OF VIDEO CONFERENCING APPLICATION ZOOM.

    AS CORONAVIRUS HAS MOVED MANY IN-PERSON ACTIVITIES ONLINE, THE USE OF VIDEO CONFERENCING APPLICATIONS HAS ALSO SEEN A SURGE IN DEMAND IN THE PAST TWO MONTHS.

    ZOOM IS A PRIME TARGET FOR FOREIGN SPIES, ESPECIALLY CHINESE INTELLIGENCE OPERATIVES, THE DEPARTMENT OF HOMELAND SECURITY HAS WARNED U.S. GOVERNMENT AGENCIES AND LAW-ENFORCEMENT AGENCIES,

    CHINA'S ACCESS TO ZOOM SERVERS MAKES BEIJING UNIQUELY POSITIONED TO TARGET U.S. PUBLIC AND PRIVATE SECTOR USERS

    INDIA MUST CREATE OUR OWN VIDEO CONFERENCING SYSTEM LIKE ZOOM

    ZOOM IS EASY TO SET UP, EASY TO USE AND LETS UP TO 100 PEOPLE JOIN A MEETING FOR FREE. IT JUST WORKS.

    https://www.youtube.com/watch?v=fnfsbjfvk2o
    ZOOM'S EASE OF USE MAKES IT EASY FOR TROUBLEMAKERS TO "BOMB" OPEN ZOOM MEETINGS..

    IF YOU ARE HOSTING A ZOOM MEETING, ASK THAT MEETING PARTICIPANTS SIGN IN WITH A PASSWORD. THAT WILL MAKE ZOOM-BOMBING MUCH LESS LIKELY.

    UNTIL RECENTLY ZOOM HAD THE RIGHT TO DO WHATEVER IT WANTED WITH USERS' PERSONAL DATA, AND ITS ENCRYPTION POLICIES, WHICH HAVE BEEN MORE THAN A TAD MISLEADING.

    ZOOM CREATES A HUGE "ATTACK SURFACE" AND HACKERS ARE GOING TO COME AT IT EVERY WAY THEY CAN

    CYBERCRIMINALS MAY HAVE REGISTERED HUNDREDS OF NEW ZOOM-RELATED WEBSITE ADDRESSES IN THE PAST FEW WEEKS

    MANY OF THESE SITES ARE BEING USED IN PHISHING ATTACKS TO GRAB VICTIMS' ZOOM USERNAMES AND PASSWORDS, AND SIMILAR SCAMS ARE LEVERAGING RIVAL VIDEO-CONFERENCING PLATFORMS SUCH AS GOOGLE MEET AND MICROSOFT TEAMS.

    RESEARCHERS AT TREND MICRO SPOTTED ANOTHER ZOOM INSTALLER FILE THAT HAD BEEN CORRUPTED WITH MALWARE.

    IN THIS CASE, IT'S SPYWARE THAT CAN TURN ON THE WEBCAM, TAKE SCREENSHOTS AND LOG KEYSTRKES, AS WELL AS COLLECTING DIAGNOSTIC DATA ABOUT THE SYSTEM IT'S RUNNING ON. IT ALSO INSTALLS A FULLY WORKING VERSION OF THE ZOOM DESKTOP CLIENT.

    NO END-TO-END ENCRYPTION: ZOOM HAS FALSELY ADVERTISED THAT IT IS USING END-TO-END ENCRYPTION POLICY ON IT’S PLATFORM. END-TO-END ENCRYPTION MEANS A SYSTEM THAT SECURES COMMUNICATION SO THAT THE DATA CAN ONLY BE READ BY THE INTENDED AUDIENCE.

    LATER, IT WAS ADMITTED BY ZOOM, THAT CURRENT SURGE IN DEMAND LEADS TO MISSTEPS IN THE SECURITY AND PRIVACY IMPLEMENTATION IN THE NEW MODULES AND END-TO-END ENCRYPTION IS CURRENTLY NOT POSSIBLE.

    SECURITY FLAWS: A NUMBER OF SECURITY FLAWS HAVE BEEN DETECTED IN THE RECENT WEEK:

    A HIDDEN WEB SERVER WAS INSTALLED ON THE USER MACHINE SO THAT THE USER CAN BE ADDED TO A CALL WITHOUT THEIR PERMISSION.
    A BUG WAS DISCOVERED, THAT CAN TAKE OVER THE CONTROL OF ZOOM USER’S MAC, INCLUDING TAPPING INTO THE WEBCAM AND HACKING THE MICROPHONE.

    IN-APP SURVEILLANCE MEASURES: ZOOM HAS INTRODUCED A “ATTENTION TRACKING” FEATURE. THIS FEATURE ALLOWS THE HOST TO SEE IF THE USER CLICKS AWAY FROM THE ZOOM WINDOW FOR 30 SECONDS OR MORE. THIS FEATURE HELPED THE EMPLOYERS TO SEE IF THE EMPLOYEE IS REALLY TURNED INTO THE MEETING OR IF THE STUDENTS ARE REALLY WATCHING CLASSROOM PRESENTATIONS REMOTELY.

    CONTINUED TO 2-
    .
    1. CONTINUED FROM 1--

      SELLING OF USER DATA: ZOOM HAS SAID THAT THE COMPANY HAS NEVER SOLD USER DATA IN THE PAST AND HAS NO INTENTION OF SELLING USERS DATA. CUBER SECURITY RESEARCHERS HAVE FOUND MULTIPLE DATABASES CONTAINING ZOOM CREDENTIALS AND STARTED ANALYZING HOW HACKERS GOT HOLD OF THEM IN THE FIRST PLACE.

      CREATE A ‘WORKING COMMUNICATION PLAN REMOTELY’ TO GIVE REASSURANCE TO YOUR REMOTE WORKERS THAT ALL COMMUNICATIONS WILL STAY SAFE AND SECURE.

      PROVIDE CYBERSECURITY TRAINING FOR YOUR REMOTE WORKERS ON HOW TO STAY SAFE AND SECURE WHILE WORKING FROM HOME.

      MOVE YOUR DATA FILES TO THE CLOUD IF YOU HAVEN’T ALREADY DONE SO. THE CLOUD PROVIDES BETTER SECURITY AND PROTECTION, KEEPING VITAL DATA SAFE. DATA STORED IN THE CLOUD IS EASILY ACCESSIBLE BY APPROVED USERS.

      ESTABLISH A VIRTUAL PRIVATE NETWORK (VPN) TO PROTECT REMOTE WORKERS. PUT A BUSINESS VPN IN PLACE TO ENCRYPT THOSE CONNECTIONS FOR ADDED SECURITY. CYBERCRIMINALS CAN’T GET INTO CLOUD-BASED APPLICATIONS AT THE SAME REMOTE WORKERS ARE ACCESSING IT.

      CHECK YOUR REMOTE IT SUPPORT OPTIONS. IF REMOTE WORKERS ARE HAVING AN IT ISSUE, APPOINT A TRUSTED IT PRO AND ALLOW THEM TO LOG IN REMOTELY.

      https://ajitvadakayil.blogspot.com/2020/05/what-artificial-intelligence-cannot-do.html

      THUMBRULE: NEVER LOCK THE STABLE DOORS AFTER THE HORSES HAVE BOLTED..

      Capt ajit vadakayil
      ..

  1. ALL LEADERS/ RULERS OF THIS PLANET, LISTEN UP..

    INDIA HAS BEEN WRONGLY PORTRAYED AS AN IMMORAL NATION IN DECAY BY WORLD MEDIA, WORLD HISTORIANS ETC WITH CONVERT SUPPORT FROM OUR OWN PM MODI, A DEEP STATE DARLING WHO SHOWS INDIA IN POOR LIGHT…
    .
    HERE IS THE NAKED TRUTH..

    INDIA HAS THE LOWEST ( BY PERCENTAGE OF POPULATION ) RAPES / MOLESTATION/ MURDERS / CRIMES/ LOSS OF VIRGINITY BEFORE MARRIAGE/ DIVORCES/ HOMOSEXUALS / PEDOPHILES / PROSTITUTES/ CARBON EMISSIONS/ CONSUMPTION OF ELECTRICITY / FUEL CONSUMPTION / UNHAPPINESS/ DRUG-ALCOHOL ADDICTIONS / DYSFUNCTIONAL FAMILY/ PARENTS DISCARDED IN OLD AGE HOMES / MENTAL PROBLEMS/ CRIPPLES/ SERIOUS DISEASES / INFERTILITY / LACK OF RESPECT FOR WOMEN – PARENTS / HUNGER / DEBT PER CAPITA / WIFE BEATING / IMPOTENCY ETC ETC..

    TO UNDERSTAND THE MATH, CONSIDER THE CURRENT COVID-19 PANDEMIC..

    OPEN THE LINK BELOW— AND CHECK OUT THE FOURTH COLUMN FROM THE RIGHT ( DEATHS PER MILLION POPULATION)..

    https://www.worldometers.info/coronavirus/

    AAA- BELGIUM HAS 11.6 MILLION POPULATION.. WHILE INDIA HAS 1379 MILLION…

    BBB- BELGIUM HAS 8955 COVID-19 DEATHS .. WHILE INDIA HAS 2753 DEATHS..

    CCC- THE DEATHS PER MILLION POPULATION FOR BELGIUM IS A HIGH 773 WHILE INDIA HAS A LOW 2.0 ..

    IF YOU UNDERSTAND THE MATH, NOW YOU KOW WHY INDIA HAS BEEN UNFAIRLY BRANDED AS A NATION OF RAPISTS/ HOMOSEXUALS / CARBON POLLUTERS AND EVERYTHING NEGATIVE..

    THE WHOLE IDEA IS TO SHOWCASE INDIA AS A NATION UNFIT TO BE IN THE UNSC.. WHEN IN REALITY INDIA IS THE ONLY MORAL NATION ON THIS PLANET , FIT TO BE THE LEADER OF UNSC..

    CAPT AJIT VADAKAYIL HAS BEEN TRYING TO GET MODI TO CORRECT THE BAD MIRROR REFLECTION OF HIS MOTHERLAND ( BHARATMATA )., TO NO AVAIL.. MODI HAS HIS SET OF JEWISH DEEP STATE SYCOPHANTS/ LACKEYS AROUND HIM WITH JUDICIAL / MEDIA SUPPORT. .

    THESE ARE CHILDREN OF BHARATMATA WHO REVEL IN PROVING THAT THEIR OWN MOTHER IS A SLUT FOR A PIECE OF FOREIGN SILVER..

    EXAMPLE--?

    INDIA HAS THE LOWEST LOSS OF VIRGINITY BEFORE MARRIAGE..

    YET FOR SAKE OF POLITICAL DONATIONS FROM KOSHER EVIL PHARMA, OUR SCHOOL CHILDREN PRIOR TO FIRST MENSES GIRLS WERE BEING INJECTED WITH HPV VACCINES IN SCHOOL WITHOUT PARENTAL PERMISSION..

    DESPITE BEING THREATENED WITH LONG TERM JAIL, CAPT AJIT VADAKAYIL PERSISTED AND SHOT THIS HPV THINGY DOWN…

    http://ajitvadakayil.blogspot.com/2016/03/say-no-to-hpv-vaccination-for-indian.html

    NOW LISTEN TO THIS SHOCKER…

    THE WHITE INVADER RULED INDIA.. THE WHITE BRITISH SOLDIER WAS PROVIDED FREE SEX WITHOUT CONDOMS, AND PRODUCED A MILLION STRONG HALF BREEDS , WITH WHITE FATHER AND INDIAN MOTHER..

    THE SHOCKING THING IS ALL THESE PREGNANT MOTHERS WERE FROM THE AGE OF FIRST MENSES 12 TILL 16, BY WHICH TIME THEY EITHER GOT PREGNANT OR DIED OF VAGINAL / ANAL DISEASES..

    DURING BRITISH RULE, AS SOON AS AN ATTRACTIVE INDIAN GIRL GOT HER FIRST MENSES, SHE WAS KIDNAPPED AND MARRIED OFF TO THE IDOL OF A MONKEY NAMED HANUMAN..

    HANUMAN IS A MONKEY IN OUR EPIC RAMAYANA, WHO WAS MADE GOD BY GERMAN JEW ROTHSCHILD ( WHO RULED INDIA)..

    WHEN THE WHITE INVADER CAME TO INDIA THERE WAS NOT A SINGLE TEMPLE FOR MONKEY HANUMAN..

    BY THE TIME THE WHITE INVADER LEFT IN 1947, INDIA HAD THOUSANDS OF HANUMAN TEMPLES, 20 TIMES MORE THAT THAT OF LORD RAMA, THE GOD AND HERO OF EPIC RAMAYANA..

    http://ajitvadakayil.blogspot.com/2014/02/devadasi-system-immoral-lie-of-temple.html

    OUR SCHOOL CHILDREN ARE TAUGHT IN SCHOOL THAT INDIA IS AN IMMORAL NATION.. AND PM MODI IS IN CAHOOTS.. DO YOU STILL WANT TO HUG THIS FELLOW?..

    https://www.youtube.com/watch?v=4ZFCMTSbsRo

    capt ajit vadakayil
    ..
    1. PUT ABOVE COMMENT IN WEBSITES OF—
      BILL GATES
      MELINDA GATES
      NITA AMBANI
      MUKESH AMBANI
      ANIL AMBANI
      BILL GATES FOUNDATION
      QUEEN OF ENGLAND
      PRINCE CHARLES
      ALL MEMBERS OF BRITISH HOUSE OF COMMONS AND LORDS
      TRUMP
      EVERY US SENATOR/ CONGRESS MAN
      EXTERNAL AFFAIRS MINISTER/ MINISTRY
      PUTIN
      BORIS JOHNSON
      MACRON
      ANGELA MERKEL
      XI
      AMBASSADORS TO FROM USA/ RUSSIA/ UK/ FRANCE / GERMANY
      EDITOR GLOBAL TIMES HU XIJIN
      PMO
      PM MODI
      HEALTH MINISTER/ MINISTRY CENTE- STATES
      AMIT SHAH
      HOME MINISTRY CENTRE/ STATES
      CJI BOBDE
      ATTORNEY GENERAL
      LAW MINISTER PRASAD / MINISTRY CENTRE AND STATES
      ALL CHIEF JUSTICES HIGH COURTS
      I&B MINISTER / MINISTRY
      NSA
      AJIT DOVAL
      RAW
      IB
      CBI
      NIA
      ED
      ALL DGPs OF INDIA
      ALL IGs OF INDIA
      ALL CMs OF INDIA
      ALL MLAs OF INDIA
      ALL MPs OF INDIA
      ALL COLLECTORS OF MAJOR CITIES
      ALL STATE GOVERNORS
      PRESIDENT OF INDIA
      VP OF INDIA
      SPEAKER LOK SABHA
      SPEAKER RAJYA SABHA
      ALL INDIAN THINK TANKS
      NITI AYOG
      AMITABH KANT
      MOHANDAS PAI
      RAJEEV CHANDRASHEKHAR
      E SREEDHARAN
      WILLIAM DALRYMPLE
      KONRAED ELST
      FRANCOIS GAUTIER
      STEPHEN KNAPP
      DAVID FRAWLEY
      GVL NARASIMHA RAO
      SAMBIT PATRA
      ASHOK PANDIT
      ANUPAM KHER
      KANGANA RANAUT
      VIVEK AGNIHOTRI
      MEENAKSHI LEKHI
      SMRITI IRANI
      PRASOON JOSHI
      SWAPAN DASGUPTA
      MADHU KISHWAR
      SUDHIR CHAUDHARY
      GEN GD BAKSHI
      RSN SINGH
      ARNAB GOSWAMI
      NAVIKA KUMAR
      ANAND NARASIMHAN
      RAHUL SHIVSHANKAR
      RAJDEEP SARDESAI
      SRINIVASAN JAIN
      SONAL MEHROTRA KAPOOR
      VIKRAM CHANDRA
      NIDHI RAZDAN
      ZAKKA JACOB
      RAHUL ANWAL
      RAVISH KUMAR
      PRANNOY JAMES ROY
      AROON PURIE
      VINEET JAIN
      RAGHAV BAHL
      SEEMA CHISTI
      DILEEP PADGOANKAR
      VIR SANGHVI
      KARAN THAPAR
      PRITISH NANDI
      ASHISH NANDI
      SHEKHAR GUPTA
      SIDHARTH VARADARAJAN
      PAVAN VARMA
      RAMACHANDRA GUHA
      THAMBI SUNDAR PICHAI
      SATYA NADELLA
      CEO OF WIKIPEDIA
      QUORA CEO ANGELO D ADAMS
      QUORA MODERATION TEAM
      KURT OF QUORA
      GAUTAM SHEWAKRAMANI
      MUKESH AMBANI
      RATAN TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      SWAMY
      RAJIV MALHOTRA
      P GURUS
      RSS
      AVBP
      VHP
      MOHAN BHAGWAT
      RAM MADHAV
      MOHANLAL
      SURESH GOPI
      NALIN KOHLI.
      RAJ THACKREY
      CHANDAN MITRA
      SADGURU JAGGI VASUDEV
      BABA RAMDEV
      SRI SRI RAVISHANKAR
      CHETAN BHAGAT
      AMISH TRIPATHI
      DEVDUTT PATTANAIK
      THE QUINT
      THE SCROLL
      THE WIRE
      THE PRINT
      MK VENU
      MADHU TREHAN
      SANJAY HEDGE
      SHOBHAA DE
      ARUNDHATI ROY
      MADHU TREHAN
      JAIRAM RAMESH
      SHASHI THAROOR
      KAPIL SIBAL
      ABHI SEX MAANGTHA SINGVI
      TEHSEEN POONAWAALA
      SHEHZAD POONAWALA
      SANJAY JHA
      SURJEWALA
      AK ANTONY
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA VADRA
      AK ANTONY
      PC CHACKO
      JEAN DREZE
      DIG VIJAY SINGH
      JULIO RIBEIRO
      ASADDUDIN OWAISI
      SHEHLA RASHID
      RANA AYYUB
      SUHEL SETH
      SHAZIA ILMI
      MANI SHANGARAN AIYERAN
      SALMAN KHURSHEED
      GHULAM NABI AZAD
      ENTIRE BBC GANG
      SWARA BHASKAR
      ALL HINDU STALWARTS AND ORGS
      ROMILA THAPAR
      IRFAN HABIB
      NIVEDITA MENON
      AYESHA KIDWAI
      MAJOR WORLD MEDIA
      HISTORY CHANNEL
      DAVID HATCHER CHILDRESS
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA VADRA
      SOLI BABY
      FALI BABY
      KATJU BABY
      SALVE BABY
      JOHN BRITTAS
      PRAKASH KARAT
      BRINDA KARAT
      SITARAM YECHURY
      D RAJA
      ALEX JONES
      RENSE
      DAVID ICKE
      ANGELO JOHN GAGE
      DEEPAK CHOPRA
      ROBIN SHARMA
      TAREK FATEH
      ALL INDIAN MEDIA
      GITA GOPINATH
      AMARTYA SEN
      RAGHURAM RAJAN
      PRINCESS HEND AL QASSIMI
      SPREAD ON SOCIAL MEDIA--

      SPREAD BY WHATS APP


  1. I WAS THE FIRST TO INTRODUCE VIRTUAL TEAMING CONCEPT AT SEA

    ALL LOOKED AT ME AS IF I WAS CRAZY..

    THE TOP GUN TOLD ME  ” AJIT YOU ARE TOO FAR AHEAD OF OUR TIMES.. SLOW DOWN”

    http://ajitvadakayil.blogspot.com/2010/11/virtual-teaming-capt-ajit-vadakayil.html

    THIS PANDEMIC HAS KICK STARTED VIRTUAL TEAMING. . SEE EVERY CLOUD HAS A SILVER LINING..

    SAME WAY WHEN I INTRODUCED RISK ASSESSMENT AND PREDICTIVE MAINTENANCE AT SEA, ALL LOOKED AT ME AS IF I WAS CRAZY.

    http://ajitvadakayil.blogspot.com/2010/04/dynamic-risk-assessment-on-chemical.html

    MY SHORE BOSSES TOLD ME , "YOUR PREDICTIVE MAINTENANCE THINGY IS REJECTED"

    I TOLD THEM TO FUCK OFF.. THIS IS MY SHIP AND I WILL RUN IT THE WAY I WANT..

    http://ajitvadakayil.blogspot.com/2010/12/predictive-maintenance-on-chemical.html

    Capt ajit vadakayil
    ..





CAPT AJIT VADAKAYIL SAYS  A MUST MEAN  “INTELLIGENCE AUGUMENTATION “  IN FUTURE ..

Let this be IA


OBJECTIVE AI CANNOT HAVE A VISION,  
IT CANNOT PRIORITIZE,   
IT CANT GLEAN CONTEXT,   
IT CANT TELL THE MORAL OF A STORY ,  
IT CANT RECOGNIZE A JOKE, OR BE A JUDGE IN A JOKE CONTEST  
IT CANT DRIVE CHANGE,    
IT CANNOT INNOVATE, 
IT CANNOT DO ROOT CAUSE ANALYSIS ,  
IT CANNOT MULTI-TASK,   
IT CANNOT DETECT SARCASM,  
IT CANNOT DECIPHER TONE ( I KILLED THE CLERK !? --OF MY COUSIN VINNY )
IT CANNOT DO DYNAMIC RISK ASSESSMENT ,  
IT IS UNABLE TO REFINE OWN KNOWLEDGE TO WISDOM, 
IT IS BLIND TO SUBJECTIVITY,  
IT CANNOT EVALUATE POTENTIAL,   
IT CANNOT SELF IMPROVE WITH EXPERIENCE,
IT CANNOT UNLEARN
IT IS PRONE TO CATASTROPHIC FORGETTING    
IT DOES NOT UNDERSTAND BASICS OF CAUSE AND EFFECT,   
IT CANNOT JUDGE SUBJECTIVELY TO VETO/ ABORT,    
IT CANNOT FOSTER TEAMWORK DUE TO RESTRICTED SCOPE,  
IT CANNOT MENTOR,   
IT CANNOT BE CREATIVE,  
IT CANNOT THINK FOR ITSELF, 
IT CANNOT TEACH OR ANSWER STUDENTs QUESTIONS,  
IT CANNOT PATENT AN INVENTION, 
IT CANNOT SEE THE BIG PICTURE , 
IT CANNOT FIGURE OUT WHAT IS MORALLY WRONG, 
IT CANNOT PROVIDE NATURAL JUSTICE, 
IT CANNOT FORMULATE LAWS
IT CANNOT FIGURE OUT WHAT GOES AGAINST HUMAN DIGNITY
IT CAN BE FOOLED EASILY USING DECOYS WHICH CANT FOOL A CHILD, 
IT CANNOT BE A SELF STARTER, 
IT CANNOT UNDERSTAND APT TIMING, 
IT CANNOT FEEL
IT CANNOT GET INSPIRED
IT CANNOT USE PAIN AS FEEDBACK,
IT CANNOT GET EXCITED BY ANYTHING
IT HAS NO SPONTANEITY TO MAKE THE BEST OUT OF  SITUATION 
IT CAN BE CONFOUNDED BY NEW SITUATIONS
IT CANNOT FIGURE OUT GREY AREAS,
IT CANNOT GLEAN WORTH OR VALUE
IT CANNOT UNDERSTAND TEAMWORK DYNAMICS 
IT HAS NO INTENTION
IT HAS NO INTUITION,
IT HAS NO FREE WILL
IT HAS NO DESIRE
IT CANNOT SET A GOAL

IT CANNOT BE SUBJECTED TO THE LAWS OF KARMA

ON THE CONTRARY IT CAN SPAWN FOUL AND RUTHLESS GLOBAL FRAUD ( CLIMATE CHANGE DUE TO CO2 ) WITH DELIBERATE BLACK BOX ALGORITHMS,  JUST FEW AMONG MORE THAN 60 CRITICAL INHERENT DEFICIENCIES.



HUMANS HAVE THINGS A COMPUTER CAN NEVER HAVE.. A SUBCONSCIOUS BRAIN LOBE,  REM SLEEP WHICH BACKS UP BETWEEN RIGHT/ LEFT BRAIN LOBES AND FROM AAKASHA BANK,  A GUT WHICH INTUITS,   30 TRILLION BODY CELLS WHICH HOLD MEMORY,   A VAGUS NERVE , AN AMYGDALA ,  73% WATER IN BRAIN FOR MEMORY,  10 BILLION MILES ORGANIC DNA MOBIUS WIRING ETC.



SINGULARITY ,  MY ASS !








INDIA MUST NOW LEAD THE PLANET IN WORK AT HOME LOGISTICS -- 


WE ARE IN FOR A LONG PANDEMIC HAUL .


PROTECT THE CLOUD DATA !





  1. CAPT AJIT VADAKAYIL URGES PM MODI..

    STOP WHAT EVER YOU ARE DOING
    ORDER YOUR IT EXPERTS AND THINK TANKS, TO DO BRAIN STORMING AND THEN A DYNAMIC RISK ASSESSMENT.. BASED ON INPUT BELOW IN THIS BLOGPOST..
    https://ajitvadakayil.blogspot.com/2020/05/what-artificial-intelligence-cannot-do.html
    DO NOT LOCK THE STABLE DOORS AFTER THE HORSES HAVE BOLTED , AS IS ALWAYS THE CASE IN INDIA..

    THIS IS THE SAD STORY OF BHARATMATA..

    WE WATCH..

    NARENDRA DAMODARDAS MODI, YOU CAN GIVE US HAJAAR JAANKARI ABOUT ROTHSCHILDs HEROES GANDHI/ BR AMBEDKAR/ BUDDHA/ BASAVA/ SHIRDI SAI BABA/ GHANSHTAM PANDE / PLANETs OLDEST LANGUAGE TAMIL ETC LATER..

    DO YOUR JOB..

    capt ajit vadakayil
    ..


    1. PMO
      PM MODI
      IT MINISTER/ MINISTRY CENTRA AND STATES
      DEFENSE MINISTER / MINISTRY
      ALL THREE ARMED FORCE CHIEFS
      CDS
      AMIT SHAH
      HOME MINISTRY CENTRE/ STATES
      CJI BOBDE
      ATTORNEY GENERAL
      LAW MINISTER PRASAD / MINISTRY CENTRE AND STATES
      ALL CHIEF JUSTICES HIGH COURTS
      I&B MINISTER / MINISTRY
      LAW MINISTER / MINISTRY CENTRE AND STATES
      CYBER CELL CENTRE AND STATES
      NSA
      AJIT DOVAL
      RAW
      IB
      CBI
      NIA
      ED
      ALL DGPs OF INDIA
      ALL IGs OF INDIA
      ALL CMs OF INDIA
      ALL MLAs OF INDIA
      ALL MPs OF INDIA
      ALL COLLECTORS OF MAJOR CITIES
      ALL STATE GOVERNORS
      PRESIDENT OF INDIA
      VP OF INDIA
      SPEAKER LOK SABHA
      SPEAKER RAJYA SABHA
      ALL INDIAN THINK TANKS
      NITI AYOG
      AMITABH KANT





COMPANIES AND AGENCIES ARE STRUGGLING… AS THEY SEND WORKERS HOME AND FIND THAT THEY DON’T HAVE A HANDLE ON DEALING WITH UNKNOWN PERSONAL DEVICES THAT WILL NOW BE USED TO DO BUSINESS AND RETAIN SENSITIVE CORPORATE DATA

AS YOUR ORGANIZATION ADAPTS TO REMOTE WORK, AVOID HASTY PLANS TO MAKE ALL DATA ACCESSIBLE, INCLUDING MIGRATING ALL DATA TO THE CLOUD.

TO MITIGATE SECURITY RISKS, CONSIDER USING A SECURE CLOUD-BASED DATA SYSTEM.  MANY ORGANIZATIONS HAVE RECENTLY MOVED TO THE CLOUD AND CHANGED THEIR CONTROLS TO ALLOW REMOTE ACCESS TO DATA SYSTEMS, AND CYBERCRIMINALS ARE TAKING ADVANTAGE OF THIS DURING THIS HOUR OF PANDEMIC



WHEN MOVING YOUR EMPLOYEES TO REMOTE WORK ENVIRONMENTS DURING THIS COVID-19 PANDEMIC , IT’S IMPORTANT TO CONSIDER THE TECHNOLOGY REQUIRED FOR A SECURE WORKFORCE AS DETAILED IN YOUR BUSINESS CONTINUITY PLAN, INCLUDING SECURE INTERNET AND VIRTUAL PRIVATE NETWORKS (VPN).  

YOUR INSTITUTION SHOULD TEST YOUR SYSTEM REQUIREMENTS AND BANDWIDTH BEFORE FULL IMPLEMENTATION TO PREVENT THE RISK OF OVERLOADING THE SYSTEM. IN THE PAST, YOUR NETWORK WAS WITHIN YOUR COMPANY AND PROTECTED BY YOUR FIREWALL AND DATA CONNECTIONS, BUT THAT MAY NO LONGER BE THE CASE. 

BEFORE MOVING TO REMOTE WORK, YOUR INSTITUTION SHOULD UNDERSTAND NETWORK SECURITY VULNERABILITIES AND WHICH TYPES OF CONTROLS ARE NEEDED TO SECURE THOSE CONNECTIONS.


ENABLING REMOTE ACCESS IS ACCOMPANIED WITH CERTAIN RISKS. SOME ORGANIZATIONS RUSHED AND DRAGGED BY THEIR NOSTRILS INTO THE UNEXPECTED HAVE MADE THE MISTAKE OF ENABLING DATA ACCESS IN A NON-SECURE WAY, THUS EXPOSING VULNERABILITIES THAT WOULD NOT HAVE EXISTED OTHERWISE.



IT IS IMPERATIVE THAT YOU UNDERSTAND YOUR INSTITUTION’S CONTROLS AND ENABLE PROTECTIONS LIKE MULTIFACTOR AUTHENTICATION, ESPECIALLY FOR CLOUD-BASED APPLICATIONS.  

FOR APPLICATIONS THAT DO NOT WORK WELL IN A CLOUD-HOSTED SCENARIO, YOU CAN EMPLOY A HYBRID APPROACH WITH A COMBINATION OF CLOUD-BASED HOSTED CONNECTIONS AND VPN ACCESS.

AVOID BROWSER-BASED, REMOTE-CONTROLLED SOFTWARE UNLESS YOUR INSTITUTION FULLY UNDERSTANDS THE CONTROLS AND AUDIT CAPABILITIES AND HAS DONE VENDOR DUE DILIGENCE. WITH THIS TYPE OF SOFTWARE, USERS IN THE OFFICE CAN DOWNLOAD AN APPLICATION ON THEIR SYSTEM THAT ALLOWS THEM TO ACCESS THE APPLICATION AND CONTROL THEIR DESKTOP REMOTELY.

GENERALLY, EMPLOYEES SHOULD NOT ACCESS A CORPORATE NETWORK WITH A PERSONAL DEVICE. USING HOSTED EMAIL OR OTHER ONLINE HOSTED SYSTEMS ON PERSONAL DEVICES POSES LESS RISK; HOWEVER, RISK IS ALWAYS PRESENT. 

IF AN EMPLOYEE UNKNOWINGLY HAS MALWARE ON THEIR PERSONAL DEVICE AND OPENS THEIR BROWSER TO DOWNLOAD A DOCUMENT, THAT MALWARE CAN BE TRANSFERRED TO THE NETWORK WHEN THE DOCUMENT IS SENT BACK VIA EMAIL ATTACHMENT. 

IF YOU’RE USING HOSTED EMAIL OR SIMILAR SYSTEMS, YOUR INSTITUTION CAN USE SYSTEMS THAT WILL SCAN EMAIL ATTACHMENTS OR OPEN AND MONITOR ATTACHMENTS IN A CONTROLLED, AUTOMATED ENVIRONMENT TO DETERMINE THE RISK.

 INSTITUTIONS COPE WITH OPERATIONAL CHANGES, IT IS CRITICAL TO COMMUNICATE WITH YOUR EMPLOYEES ABOUT YOUR WORK-FROM-HOME POLICIES AND BEST PRACTICES.

DEPLOY TECHNOLOGY SOLUTIONS TO PREVENT SECURITY BREACHES.


CLOUD ADOPTION WILL  SKYROCKET, AS WILL MARKED INCREASES IN ADDITIONAL SECURITY TECHNOLOGIES RELATED TO BORDERLESS NETWORKS AND ZERO TRUST MODELS, AND YOUR INSTITUTION SHOULD BE PREPARED.. 

AS ORGANIZATIONS IN ALL SECTORS HAVE RAPIDLY EMPTIED THEIR OFFICES AND SENT THEIR EMPLOYEES HOME TO COMPLY WITH EVER MORE EXPANSIVE SHELTER-IN-PLACE AND QUARANTINE MANDATES, REPLICATING THE FULL BREADTH OF SERVICES REMOTELY HAS BEEN IT’S SINGULAR PRIORITY.

MISSION CRITICAL FACILITIES LIKE DATA CENTERS CAN’T BE RELOCATED INTO EMPLOYEES’ HOME OFFICES. WHILE TRANSFERRING END-USER PRODUCTIVITY OUT OF A TRADITIONAL OFFICE CONTEXT IS A FAIRLY STRAIGHTFORWARD PROCESS, THE SAME CAN’T BE SAID FOR THE HIGHLY SPECIALIZED WORKLOADS THAT CAN ONLY BE MANAGED WITHIN THE CONTEXT OF A DATA CENTER.

REGULATORY CONSTRAINTS AROUND HOW INCALCULABLY VITAL DATA MUST BE MANAGED AND PROTECTED THROUGHOUT ALL PHASES OF ITS LIFECYCLE ADD EVEN MORE COMPLEXITY TO DATA CENTER PROTOCOLS DURING A PANDEMIC.


 THE OLD TRUTH TO AVOID PUTTING ALL YOUR EGGS IN ONE BASKET HAS NEVER BEEN MORE VALID THAN IT IS NOW. THIS ISSUE RELATES DIRECTLY TO CAPACITY MANAGEMENT, AND, AS THE CRISIS DEEPENS, THE STRAIN ON ALL ASPECTS OF INFRASTRUCTURE WILL ONLY INCREASE. 

DIVERSIFY YOUR UPSTREAM PROVIDERS AS MUCH AS POSSIBLE TO MITIGATE THE RISKS ASSOCIATED WITH ANY ONE OF THEM BEING COMPROMISED BY PANDEMIC-RELATED RESOURCING CONSTRAINTS. THIS MINIMIZES THE POTENTIAL FOR BACK-END INTERRUPTIONS TO REACH YOUR CUSTOMERS.




TRADITIONALLY VIRTUAL PRIVATE NETWORK SOLUTIONS HAVE BEEN THE MOST COMMONLY USED TECHNOLOGY FOR REMOTE WORKERS.

A VIRTUAL PRIVATE NETWORK (VPN) EXTENDS A PRIVATE NETWORK ACROSS A PUBLIC NETWORK AND ENABLES USERS TO SEND AND RECEIVE DATA ACROSS SHARED OR PUBLIC NETWORKS AS IF THEIR COMPUTING DEVICES WERE DIRECTLY CONNECTED TO THE PRIVATE NETWORK. 

APPLICATIONS RUNNING ON AN END SYSTEM (PC, SMARTPHONE ETC.) ACROSS A VPN MAY THEREFORE BENEFIT FROM THE FUNCTIONALITY, SECURITY, AND MANAGEMENT OF THE PRIVATE NETWORK. ENCRYPTION IS A COMMON, THOUGH NOT AN INHERENT, PART OF A VPN CONNECTION.

VPN TECHNOLOGY WAS DEVELOPED TO ALLOW REMOTE USERS AND BRANCH OFFICES TO ACCESS CORPORATE APPLICATIONS AND RESOURCES. TO ENSURE SECURITY, THE PRIVATE NETWORK CONNECTION IS ESTABLISHED USING AN ENCRYPTED LAYERED TUNNELING PROTOCOL, AND VPN USERS USE AUTHENTICATION METHODS, INCLUDING PASSWORDS OR CERTIFICATES, TO GAIN ACCESS TO THE VPN. 

IN OTHER APPLICATIONS, INTERNET USERS MAY SECURE THEIR CONNECTIONS WITH A VPN TO CIRCUMVENT GEO-RESTRICTIONS AND CENSORSHIP OR TO CONNECT TO PROXY SERVERS TO PROTECT PERSONAL IDENTITY AND LOCATION TO STAY ANONYMOUS ON THE INTERNET. 

SOME WEBSITES, HOWEVER, BLOCK ACCESS TO KNOWN VPN TECHNOLOGY TO PREVENT THE CIRCUMVENTION OF THEIR GEO-RESTRICTIONS, AND MANY VPN PROVIDERS HAVE BEEN DEVELOPING STRATEGIES TO GET AROUND THESE BLOCKADES

VPN HAS ITS INHERENT PITFALLS:

VPNS ARE A POPULAR VECTOR FOR CYBERATTACKS. VPNS ENCRYPT DATA (IN TRANSIT) FROM POINT A TO POINT B, BUT IT DOES NOT PROTECT EMPLOYEE DEVICES. IF SOMEONE HACKS THE DEVICE OR STEALS VPN CREDENTIALS, HACKERS CAN EASILY STEAL COMPANY DATA.

VPNS CAN EASILY GET OVERLOADED AS THEY ARE NOT TYPICALLY BUILT TO SCALE WELL. IN CASE OF A PANDEMIC OR IF SUDDENLY 500,000 EMPLOYEES USE A VPN, IT WILL LIKELY CRASH.

SINCE VPN REROUTES INTERNET TRAFFIC VIA VPN SERVERS, INTERNET SPEEDS ARE DRAMATICALLY REDUCED, AFFECTING BANDWIDTH-HUNGRY AUDIO AND VIDEO APPLICATIONS. THIS WILL MOST LIKELY BRING PRODUCTIVITY TO A SCREECHING HALT.


EMERGING TECHNOLOGIES LIKE CLOUD-BASED DESKTOP VIRTUALIZATION (VDI) HOLD PROMISE

DESKTOP VIRTUALIZATION ALLOWS THE USERS' OS TO BE REMOTELY STORED ON A SERVER IN THE DATA CENTER.IT ALLOWS THE USER TO ACCESS THEIR DESKTOP VIRTUALLY, FROM ANY LOCATION BY DIFFERENT MACHINE. USERS WHO WANTS SPECIFIC OPERATING SYSTEMS OTHER THAN WINDOWS SERVER WILL NEED TO HAVE A VIRTUAL DESKTOP.

DESKTOP VIRTUALIZATION CREATES A SOFTWARE-BASED (OR VIRTUAL) VERSION OF AN END USER’S DESKTOP ENVIRONMENT AND OPERATING SYSTEM (OS) THAT IS DECOUPLED FROM THE END USER’S COMPUTING DEVICE OR CLIENT. THIS ENABLES THE USER TO ACCESS HIS OR HER DESKTOP FROM ANY COMPUTING DEVICE.

DESKTOP VIRTUALIZATION IS CONSIDERED A TYPE OF CLIENT-SERVER COMPUTING MODEL BECAUSE THE "VIRTUALIZED" DESKTOP IS STORED ON A CENTRALIZED, OR REMOTE, SERVER AND NOT THE PHYSICAL MACHINE BEING VIRTUALIZED.

DESKTOP VIRTUALIZATION "VIRTUALIZES DESKTOP COMPUTERS" AND THESE VIRTUAL DESKTOP ENVIRONMENTS ARE "SERVED" TO USERS ON THE NETWORK. YOU INTERACT WITH A VIRTUAL DESKTOP IN THE SAME WAY YOU WOULD USE A PHYSICAL DESKTOP. ANOTHER BENEFIT OF DESKTOP VIRTUALIZATION IS THAT IS LETS YOU REMOTELY LOG IN TO ACCESS YOUR DESKTOP FROM ANY LOCATION.

VDI (VIRTUAL DESKTOP INFRASTRUCTURE -- OR INTERFACE) IS A POPULAR METHOD OF DESKTOP VIRTUALIZATION. THIS TYPE OF DESKTOP VIRTUALIZATION USES THE SERVER COMPUTING MODEL, AS THE DESKTOP VIRTUALIZATION IN THIS SCENARIO IS ENABLED THROUGH HARDWARE AND SOFTWARE. VDI HOSTS THE DESKTOP ENVIRONMENT IN A VIRTUAL MACHINE (VM) THAT RUNS ON A CENTRALIZED OR REMOTE SERVER.

IN VIRTUAL DESKTOP INFRASTRUCTURE (VDI), THE OPERATING SYSTEM RUNS ON A VIRTUAL MACHINE (VM) HOSTED ON A SERVER IN A DATA CENTER. THE DESKTOP IMAGE TRAVELS OVER THE NETWORK TO THE END USER’S DEVICE, WHERE THE END USER CAN INTERACT WITH THE DESKTOP (AND THE UNDERLYING APPLICATIONS AND OPERATING SYSTEM) AS IF THEY WERE LOCAL.

VDI GIVES EACH USER HIS OR HER OWN DEDICATED VM RUNNING ITS OWN OPERATING SYSTEM. THE OPERATING SYSTEM RESOURCES—DRIVERS, CPUS, MEMORY, ETC.—OPERATE FROM A SOFTWARE LAYER CALLED A HYPERVISOR THAT MIMICS THEIR OUTPUT, MANAGES THE RESOURCE ALLOCATION TO MULTIPLE VMS, AND ALLOWS THEM TO RUN SIDE BY SIDE ON THE SAME SERVER.

A KEY BENEFIT OF VDI IS THAT IT CAN DELIVER THE WINDOWS 10 DESKTOP AND OPERATING SYSTEM TO THE END USER’S DEVICES. HOWEVER, BECAUSE VDI SUPPORTS ONLY ONE USER PER WINDOWS 10 INSTANCE, IT REQUIRES A SEPARATE VM FOR EACH WINDOWS 10 USER.

DESKTOP VIRTUALIZATION IS A SOFTWARE TECHNOLOGY THAT SEPARATES THE DESKTOP ENVIRONMENT AND ASSOCIATED APPLICATION SOFTWARE FROM THE PHYSICAL CLIENT DEVICE THAT IS USED TO ACCESS IT.


DESKTOP VIRTUALIZATION CAN BE USED IN CONJUNCTION WITH APPLICATION VIRTUALIZATION AND USER PROFILE MANAGEMENT SYSTEMS, NOW TERMED "USER VIRTUALIZATION", TO PROVIDE A COMPREHENSIVE DESKTOP ENVIRONMENT MANAGEMENT SYSTEM. 

IN THIS MODE, ALL THE COMPONENTS OF THE DESKTOP ARE VIRTUALIZED, WHICH ALLOWS FOR A HIGHLY FLEXIBLE AND MUCH MORE SECURE DESKTOP DELIVERY MODEL. IN ADDITION, THIS APPROACH SUPPORTS A MORE COMPLETE DESKTOP DISASTER RECOVERY STRATEGY AS ALL COMPONENTS ARE ESSENTIALLY SAVED IN THE DATA CENTER AND BACKED UP THROUGH TRADITIONAL REDUNDANT MAINTENANCE SYSTEMS. 

IF A USER'S DEVICE OR HARDWARE IS LOST, THE RESTORE IS STRAIGHTFORWARD AND SIMPLE, BECAUSE THE COMPONENTS WILL BE PRESENT AT LOGIN FROM ANOTHER DEVICE. 

IN ADDITION, BECAUSE NO DATA ARE SAVED TO THE USER'S DEVICE, IF THAT DEVICE IS LOST, THERE IS MUCH LESS CHANCE THAT ANY CRITICAL DATA CAN BE RETRIEVED AND COMPROMISED.


IN REMOTE DESKTOP SERVICES (RDS)—ALSO KNOWN AS REMOTE DESKTOP SESSION HOST (RDSH)—USERS REMOTELY ACCESS DESKTOPS AND WINDOWS APPLICATIONS THROUGH THE MICROSOFT WINDOWS SERVER OPERATING SYSTEM. 

APPLICATIONS AND DESKTOP IMAGES ARE SERVED VIA MICROSOFT REMOTE DESKTOP PROTOCOL (RDP). FORMERLY KNOWN AS MICROSOFT TERMINAL SERVER, THIS PRODUCT HAS REMAINED LARGELY UNCHANGED SINCE ITS INITIAL RELEASE.

FROM THE END USER’S PERSPECTIVE, RDS AND VDI ARE IDENTICAL. BUT BECAUSE ONE INSTANCE OF WINDOWS SERVER CAN SUPPORT AS MANY SIMULTANEOUS USERS AS THE SERVER HARDWARE CAN HANDLE, RDS CAN BE A MORE COST-EFFECTIVE DESKTOP VIRTUALIZATION OPTION. IT’S ALSO WORTH NOTING APPLICATIONS TESTED OR CERTIFIED TO RUN ON WINDOWS 10 MAY NOT BE TESTED OR CERTIFIED TO RUN ON THE WINDOWS SERVER OS.

IN DESKTOP AS A SERVICE (DAAS), VMS ARE HOSTED ON A CLOUD-BASED BACKEND BY A THIRD-PARTY PROVIDER. DAAS IS READILY SCALABLE, CAN BE MORE FLEXIBLE THAN ON-PREMISE SOLUTIONS, AND GENERALLY DEPLOYS FASTER THAN MANY OTHER DESKTOP VIRTUALIZATION OPTIONS.

LIKE OTHER TYPES OF CLOUD DESKTOP VIRTUALIZATION, DAAS SHARES MANY OF THE GENERAL BENEFITS OF CLOUD COMPUTING, INCLUDING SUPPORT FOR FLUCTUATING WORKLOADS AND CHANGING STORAGE DEMANDS, USAGE-BASED PRICING, AND THE ABILITY TO MAKE APPLICATIONS AND DATA ACCESSIBLE FROM ALMOST ANY INTERNET-CONNECTED DEVICE. THE CHIEF DRAWBACK TO DAAS IS THAT FEATURES AND CONFIGURATIONS ARE NOT ALWAYS AS CUSTOMIZABLE AS REQUIRED.

VIRTUALIZING DESKTOPS PROVIDES MANY POTENTIAL BENEFITS THAT CAN VARY DEPENDING UPON THE DEPLOYMENT MODEL YOU CHOOSE. SOME OF POSSIBLE BENEFITS ARE AS FOLLOWS:

SIMPLER ADMINISTRATION: DESKTOP VIRTUALIZATION CAN MAKE IT EASIER FOR IT TEAMS TO MANAGE EMPLOYEE COMPUTING NEEDS. YOUR BUSINESS CAN MAINTAIN A SINGLE VM TEMPLATE FOR EMPLOYEES WITHIN SIMILAR ROLES OR FUNCTIONS INSTEAD OF MAINTAINING INDIVIDUAL COMPUTERS THAT MUST BE RECONFIGURED, UPDATED, OR PATCHED WHENEVER SOFTWARE CHANGES NEED TO BE MADE. THIS SAVES TIME AND IT RESOURCES.

COST SAVINGS: MANY VIRTUAL DESKTOP SOLUTIONS ALLOW YOU TO SHIFT MORE OF YOUR IT BUDGET FROM CAPITAL EXPENDITURES TO OPERATING EXPENDITURES. BECAUSE COMPUTE-INTENSIVE APPLICATIONS REQUIRE LESS PROCESSING POWER WHEN THEY’RE DELIVERED VIA VMS HOSTED ON A DATA CENTER SERVER, DESKTOP VIRTUALIZATION CAN EXTEND THE LIFE OF OLDER OR LESS POWERFUL END-USER DEVICES. 

ON-PREMISE VIRTUAL DESKTOP SOLUTIONS MAY REQUIRE A SIGNIFICANT INITIAL INVESTMENT IN SERVER HARDWARE, HYPERVISOR SOFTWARE, AND OTHER INFRASTRUCTURE, MAKING CLOUD-BASED DAAS—WHEREIN YOU SIMPLY PAY A REGULAR USAGE-BASED CHARGE—A MORE ATTRACTIVE OPTION.

IMPROVED PRODUCTIVITY: DESKTOP VIRTUALIZATION MAKES IT EASIER FOR EMPLOYEES TO ACCESS ENTERPRISE COMPUTING RESOURCES. THEY CAN WORK ANYTIME, ANYWHERE, FROM ANY SUPPORTED DEVICE WITH AN INTERNET CONNECTION.

SUPPORT FOR A BROAD VARIETY OF DEVICE TYPES: VIRTUAL DESKTOPS CAN SUPPORT REMOTE DESKTOP ACCESS FROM A WIDE VARIETY OF DEVICES, INCLUDING LAPTOP AND DESKTOP COMPUTERS, THIN CLIENTS, ZERO CLIENTS, TABLETS, AND EVEN SOME MOBILE PHONES. 

YOU CAN USE VIRTUAL DESKTOPS TO DELIVER WORKSTATION-LIKE EXPERIENCES AND ACCESS TO THE FULL DESKTOP ANYWHERE, ANYTIME, REGARDLESS OF THE OPERATING SYSTEM NATIVE TO THE END USER DEVICE.

STRONGER SECURITY: IN DESKTOP VIRTUALIZATION, THE DESKTOP IMAGE IS ABSTRACTED AND SEPARATED FROM THE PHYSICAL HARDWARE USED TO ACCESS IT, AND THE VM USED TO DELIVER THE DESKTOP IMAGE CAN BE A TIGHTLY CONTROLLED ENVIRONMENT MANAGED BY THE ENTERPRISE IT DEPARTMENT.

AGILITY AND SCALABILITY: IT’S QUICK AND EASY TO DEPLOY NEW VMS OR SERVE NEW APPLICATIONS WHENEVER NECESSARY, AND IT IS JUST AS EASY TO DELETE THEM WHEN THEY’RE NO LONGER NEEDED.


BETTER END-USER EXPERIENCES: WHEN YOU IMPLEMENT DESKTOP VIRTUALIZATION, YOUR END USERS WILL ENJOY A FEATURE-RICH EXPERIENCE WITHOUT SACRIFICING FUNCTIONALITY THEY’VE COME TO RELY ON, LIKE PRINTING OR ACCESS TO USB PORTS.




THE SOFTWARE REQUIRED FOR DELIVERING VIRTUAL DESKTOPS DEPENDS ON THE VIRTUALIZATION METHOD YOU CHOSE.

WITH VIRTUAL DESKTOP INFRASTRUCTURE (VDI), THE DESKTOP OPERATING SYSTEM (MOST COMMONLY MICROSOFT WINDOWS) RUNS AND IS MANAGED IN THE DATA CENTER. 

HYPERVISOR SOFTWARE RUNS ON THE HOST SERVER, DELIVERING ACCESS TO A VM TO EACH END USER OVER THE NETWORK. CONNECTION BROKER SOFTWARE IS REQUIRED TO AUTHENTICATE USERS, CONNECT EACH TO A VIRTUAL MACHINE, MONITOR ACTIVITY LEVELS, AND REASSIGN THE VM WHEN THE CONNECTION IS TERMINATED. CONNECTION BROKERS MAY BE BUNDLED WITH, OR PURCHASED SEPARATELY FROM, THE HYPERVISOR.

REMOTE DESKTOP SERVICES (RDS/RDSH) CAN BE IMPLEMENTED USING UTILITIES THAT ARE BUNDLED WITH THE MICROSOFT WINDOWS SERVER OPERATING SYSTEM.

IF YOU CHOOSE A DESKTOP-AS-A-SERVICE (DAAS) SOLUTION, ALL SOFTWARE INSTALLATION, CONFIGURATION, AND MAINTENANCE WILL BE HANDLED BY THE DAAS CLOUD-HOSTED SERVICE PROVIDER. THIS INCLUDES APPLICATIONS, OPERATING SYSTEMS, FILES, AND USER PREFERENCES.

HOW TO CHOOSE: VDI VS. RDS VS. DAAS

VDI IS A POPULAR CHOICE BECAUSE IT OFFERS A VIRTUALIZED VERSION OF A FAMILIAR COMPUTING MODEL—PHYSICAL DESKTOP COMPUTING. BUT IMPLEMENTING VDI REQUIRES YOU TO MANAGE ALL ASPECTS OF THE INFRASTRUCTURE YOURSELF, INCLUDING THE HARDWARE, OPERATING SYSTEMS AND APPLICATIONS, AND HYPERVISOR AND ASSOCIATED SOFTWARE. 

THIS CAN BE CHALLENGING IF YOUR VDI EXPERIENCE AND EXPERTISE IS LIMITED. PURCHASING ALL INFRASTRUCTURE COMPONENTS CAN REQUIRE A LARGER UPFRONT INVESTMENT.

RDS/RDSH CAN BE A SOLID CHOICE IF IT SUPPORTS THE SPECIFIC APPLICATIONS YOU NEED TO RUN AND YOUR END USERS ONLY NEED ACCESS TO THOSE APPLICATIONS, NOT FULL WINDOWS DESKTOPS. RDS OFFERS GREATER END-USER DENSITY PER SERVER THAN VDI, AND SYSTEMS ARE USUALLY CHEAPER AND MORE SCALABLE THAN FULL VDI ENVIRONMENTS. YOUR STAFF DOES NEED THE REQUISITE SKILL SET AND EXPERIENCE TO ADMINISTER AND MANAGE RDS/RDSH TECHNOLOGY, HOWEVER.

DAAS IS CURRENTLY GAINING IN POPULARITY AS IT TEAMS GROW MORE COMFORTABLE WITH SHARED DESKTOPS AND SHARED APPLICATIONS. OVERALL, IT TENDS TO BE THE MOST COST-EFFECTIVE OPTION. 

IT’S ALSO THE EASIEST TO ADMINISTER, REQUIRING LITTLE IN-HOUSE EXPERTISE IN MANAGING INFRASTRUCTURE OR VDI. IT’S READILY SCALABLE AND INVOLVES OPERATING EXPENDITURES RATHER THAN CAPITAL EXPENDITURES, A MORE AFFORDABLE COST STRUCTURE FOR MANY BUSINESSES.

DESKTOP VIRTUALIZATION AND IBM CLOUD

THE ROOTS OF VIRTUALIZATION LIE IN MAINFRAME COMPUTING, AND IBM INVENTED THE HYPERVISOR TO TEST SOFTWARE ON ITS MAINFRAMES IN THE 1960S. TODAY, IBM SUPPORTS A FULL RANGE OF VIRTUALIZATION SOLUTIONS, INCLUDING VIRTUAL DESKTOPS.

IF YOU’RE LOOKING TO BUILD YOUR OWN VDI ENVIRONMENT, YOU CAN DO SO WITH IBM CLOUD IAAS SOLUTIONS. IBM OFFERS A FULL-STACK CLOUD PLATFORM THAT INCLUDES ALL THE COMPONENTS YOU’D NEED TO BUILD YOUR OWN VDI ENVIRONMENT, INCLUDING VIRTUALIZED COMPUTE, NETWORK, AND STORAGE. YOU’D NEED TO INSTALL AND MANAGE THE HYPERVISOR YOURSELF IN THIS SCENARIO.

IN PARTNERSHIP WITH VMWARE, IBM OFFERS CUSTOMER-MANAGED AND PARTIALLY VMWARE-MANAGED VDI SOLUTIONS AND A FULLY-MANAGED VIRTUAL DESKTOP AS A SERVICE (DAAS) SOLUTION, DELIVERING DESKTOPS AND APPLICATIONS HOSTED ON THE IBM CLOUD PLATFORM..

WITH CLOUD-BASED VDI, END USERS LOG INTO A VIRTUAL PC THAT IS CONNECTED TO THE ORGANIZATION’S CENTRAL INFRASTRUCTURE (ON THE CLOUD). THIS APPROACH IMPROVES EMPLOYEE EXPERIENCE WHILST DELIVERING MANY BENEFITS:

FLEXIBILITY AND PORTABILITY: THE ONLY REQUIREMENT OF VDI IS A DEVICE THAT IS CAPABLE OF CONNECTING AND LOGGING INTO THE INFRASTRUCTURE. WHETHER YOU’RE USING A DESKTOP, LAPTOP OR A MOBILE DEVICE, USERS HAVE A CONSISTENT EXPERIENCE ACROSS THE BOARD. 

THE SERVICE IS DEVICE AND PLATFORM INDEPENDENT. IF YOU’RE WORKING ON A FILE OR EDITING AN IMAGE, YOU CAN PICK UP WHERE YOU LEFT OFF IMMEDIATELY AFTER YOU RECONNECT.

HIGH PERFORMANCE AND SCALABILITY: SINCE THE USER IS ACCESSING THE SERVER DIRECTLY AND ALL THE FILES AVAILABLE LOCALLY WITHIN THE LAN, EMPLOYEES CAN ENJOY GIGABIT SPEEDS AND NO LONGER HAVE TO TRANSMIT LARGE DOCUMENTS OVER VPNS WHICH OFTEN HAMPERS PRODUCTIVITY. THIS SERVICE IS ALSO SCALABLE TO THE ENTIRE ORGANIZATION IN CASE A CRISIS HAPPENS AND FOR BUSINESS CONTINUITY IF THE ENTIRE WORKFORCE GOES REMOTE.

BETTER SECURITY: NONE OF THE DATA IS ACTUALLY STORED ON THE EMPLOYEE’S DEVICE AND THE USER ONLY ACCESSES A VIRTUAL INSTANCE OF THEIR DESKTOP. IN CASE OF LOSS OF DEVICE OR THEFT, ALL YOUR DATA REMAINS SECURE SINCE NONE OF THE DATA ACTUALLY RESIDES ON THE DEVICE. 

IT TEAMS CAN ALSO FINE-TUNE SECURITY CONTROLS USING MICRO SEGMENTATION AND ALSO LEVERAGE TWO FACTOR AUTHENTICATION IN CASE THEY WANT TO LIMIT CERTAIN APPLICATIONS TO SPECIFIC USERS. 

VDI CAN ALSO BE INTEGRATED WITH MONITORING TOOLS SO THAT SECURITY TEAMS CAN IDENTIFY RISKY USERS AND RISKY APPLICATIONS AND VULNERABILITIES CAN BE QUICKLY CONTAINED.
IMPROVED PRODUCTIVITY: RESEARCH SHOWS THAT REMOTE WORKERS ARE HAPPIER, MORE PRODUCTIVE AND LOYAL THAN ON-SITE WORKERS. 

DEPLOYING A CLOUD-BASED VDI SOLUTION WILL ENABLE SEAMLESS ACCESS TO APPLICATIONS AND RESOURCES TO REMOTE WORKERS AND PROVIDE THEM THE FLEXIBILITY THEY NEED IN AN INCREASINGLY MOBILE ENVIRONMENT.


FINALLY, EVERY BUSINESS IS UNIQUE AND HAS DIFFERENT GOALS AND NEEDS. IF YOUR GOAL IS TO TRULY ENABLE YOUR WORKFORCE FOR REMOTE WORK AND BUSINESS CONTINUITY THEN YOU NEED TO RETHINK WORK ITSELF AND DESIGN INFRASTRUCTURE USING EMERGING TECHNOLOGIES THAT ARE SCALABLE, SECURE AND A REMOTE-WORK FRIENDLY.




HERE ARE SOME RECOMMENDED ACTIVITIES DURING EXTRAORDINARY TIMES:
MONITOR AND ADJUST FIREWALL AND VPN CAPACITIES TO MATCH EACH REGIONS DEMAND
ENSURE THAT YOU HAVE ADEQUATE TOOLS SUCH AS LAPTOPS TO ENABLE NEW HIRES AND REMOTE WORKERS TO BE FULLY PRODUCTIVE

WORK WITH VENDORS TO ESTABLISH SUPPORT ALTERNATIVES TO PROVIDE ONSITE SUPPORT BOTH IN THE DATACENTER AND HOME LOCATIONS

WORKING AT HOME INCREASES PRODUCTIVITY, SAVES LESS COMMUTE TIME, GIVES BETTER WORK-LIFE BALANCE AND ENHANCED PREPAREDNESS FOR BUSINESS CONTINUITY, SHOULD A LOCALISED DISASTER STRIKE, SUCH AS A FLOOD OR A PANDEMIC.


OVERNIGHT, THE COVID-19 GLOBAL PANDEMIC MADE THE FINAL ARGUMENT FOR WORK-FROM-HOME A REALITY FOR MILLIONS OF WORKERS – READY OR NOT.   

MANY GLOBAL ENTERPRISES MUST SUDDENLY SUPPORT MORE AND MORE PEOPLE WORKING REMOTELY, WHETHER THEY ARE EQUIPPED TO DELIVER AND SUPPORT WORKLOADS AT SCALE OR NOT.   

THIS HAS SENT BUSINESSES SCRAMBLING TO QUICKLY EMBELLISH DIGITAL CHANNELS AND PLATFORMS, INCREASE BANDWIDTH, ADD VIRTUAL PRIVATE NETWORKS (VPNS), PROVISION MORE LAPTOPS, AND OFFER THIN-CLIENT APPLICATIONS TO THEIR EMPLOYEES AND CUSTOMERS TO IMPROVE OPERATIONAL COLLABORATION

EVEN WITH WORKPLACE VIRTUALISATION TECHNOLOGIES LIKE REMOTE CONSOLES AND “OUT-OF-BAND NETWORKS”, WHICH REDUCE THE NEED FOR ON-SITE DATA CENTRE OPERATIONS STAFF, THE FACT IS, PHYSICAL BOXES IN ON-PREMISES DATA CENTRES STILL NEED TO BE MANAGED, GUARDED AND SECURED BY PEOPLE.

TAKE THE FEBRUARY 2019 DATA CENTRE MELTDOWN OF A MAJOR U.S. BANK, WHICH CRIPPLED THE ORGANISATION’S ONLINE AND MOBILE BANKING CAPABILITIES. THE COMPANY NEEDED TO SHUT DOWN ONE OF ITS DATA CENTRE FACILITIES DUE TO A SMOKE CONDITION. IT TOOK TWO DAYS TO BRING THE FACILITY BACK UP, AND ONLY WITH SIGNIFICANT EFFORT, WHICH REQUIRED THE PHYSICAL PRESENCE OF DATA CENTRE STAFF.


IMAGINE IF THIS HAPPENED DURING THE COVID-19 CRISIS. THE TIME TAKEN TO FIX THE ISSUE WOULD INCREASE EXPONENTIALLY DUE TO A LACK OF PEOPLE RESOURCES AND HESITATION TO COLLABORATE IN-PERSON. EVEN PHYSICAL SECURITY COULD BECOME COMPROMISED, WHICH RAISES GRAVE CONCERNS.


AS OUR DEPENDENCE ON IT INTENSIFIES, DATA CENTRES HAVE BECOME THE SUBSTRATUM OF HOW WE LIVE, WORK AND PLAY. FROM BANKING TO INSURANCE TO 24×7 NEWS, EVERYTHING IS SUPPORTED BY CLOUD INFRASTRUCTURE HOUSED IN VIRTUAL DATA CENTRES. 

IF THESE DATA CENTRES GO DOWN, CRITICAL BUSINESS FUNCTIONS, FINANCIAL NETWORKS AND IN SOME CASES OUR WHOLE WAY OF LIFE BECOME THREATENED. AS A RESULT, VIRTUAL DATA CENTRES NEED TO BE CONTINUOUSLY SUPERVISED AND CONSTANTLY CARED FOR.

:A VIRTUAL DATA CENTER IS A VIRTUALIZED POOL OF CLOUD INFRASTRUCTURE RESOURCES, INCLUDING COMPUTING, MEMORY, STORAGE, AND BANDWIDTH, THAT ARE DESIGNED SPECIFICALLY FOR ENTERPRISE BUSINESS NEEDS. THE MAIN DIFFERENCE BETWEEN THE CLOUD VS. DATA CENTER IS THAT A DATA CENTER REFERS TO ON-PREMISE HARDWARE WHILE THE CLOUD REFERS TO OFF-PREMISE COMPUTING

LARGE COMPANIES AND CORPORATIONS OFTEN USE THEIR OWN DATA CENTERS. IT GIVES THEM APPARENT SECURITY AND THE FEELING THAT THEY HAVE FULL CONTROL OVER IT ISSUES. HOWEVER, FOR THE PROPER OPERATION OF THE DATA CENTER, BOTH HARDWARE AND PEOPLE WHO WILL MANAGE IT ARE NEEDED.

 THEIR ABSENCE (ASSOCIATED WITH, FOR EXAMPLE, A COVID-19 PANDEMIC ) MAY AFFECT DELAYED RESPONSE TO INCIDENTS, AND IN EXTREME CASES EVEN THE UNAVAILABILITY OF SERVERS. FURTHERMORE, IN SITUATIONS WHERE LEAVING THE HOME IS INADVISABLE, IT’S WORTH CONSIDERING A SOLUTION THAT WILL ALLOW TO PERFORM OUR DUTIES REMOTELY.

SERVERS ARE THE FOUNDATIONS ON WHICH WE BUILD OUR DIGITAL BUSINESS. THEY PROVIDE THE ENVIRONMENT TO RUN OUR APPLICATIONS. IF THE SERVERS HAVE PROBLEMS, EVEN THE MOST PERFECT APP WILL STOP WORKING, AND YOUR COMPANY WILL SUFFER LOSSES. TO PREVENT THIS FROM HAPPENING, YOU CAN MOVE THEM TO THE CLOUD.


LET’S APPLY THE CONCEPT OF INFRASTRUCTURE AS A SERVICE (IAAS). LET’S REPLACE PHYSICAL DEVICES WITH VIRTUAL MACHINES (INSTANCES). CLOUD VENDOR SERVER ROOMS (PUBLIC CLOUD PROVIDERS) ARE POWERFUL COMPLEXES SPREAD OVER A LARGE AREA. THEY HAVE THOUSANDS OF SERVERS, THEIR OWN INTERNAL NETWORK AND MANY POWER SOURCES.


OBVIOUSLY, YOU MIGHT THINK THAT THE INSTANCE IS RUNNING ON A SPECIFIC PHYSICAL SERVER AND IT MAY ALSO CRASH. YES, IT MAY HAPPEN. HOWEVER, THE SOLUTIONS OF KEY CLOUD PROVIDERS SUCH AS AWS, MICROSOFT AZURE OR GOOGLE CLOUD PLATFORM ARE DESIGNED IN SUCH A WAY THAT IN CASE OF FAILURE OF ONE OF THE HYPERVISORS (TOOLS FOR MANAGING VIRTUALIZATION PROCESSES) YOUR INSTANCE COULD BE LAUNCHED ON ANOTHER AND CONTINUE TO WORK.

DUE TO HIGH AVAILABILITY SOLUTIONS AND CLOUD COMPUTING FLEXIBILITY, THE ENTIRE SERVER ROOM OF A GIVEN PROVIDER MAY HYPOTHETICALLY BREAK DOWN AND YOUR SERVICES WILL CONTINUE TO WORK. 

THIS IS DUE TO THE SPECIFICITY OF THESE COMPLEXES, WHICH CONSIST OF SEVERAL DISTRIBUTED DATA PROCESSING CENTERS. ASSUMING EVEN THE DARKEST SCENARIO AND A POWERFUL CATACLYSM THAT TURNS OFF ONE OF THESE COMPLEXES (REGIONS) IN WHICH YOU HAD YOUR RESOURCES LOCATED, YOU’LL STILL BE ABLE TO FUNCTION.

STICKING TO TRADITIONAL SOLUTIONS, IN THIS CASE YOU SHOULD RENT SERVERS IN A ANOTHER DATA CENTER, ORDER YOUR ADMINISTRATORS TO INSTALL SYSTEMS, PREPARE ENVIRONMENTS, AND THEN START THE TEDIOUS PROCESS OF RESTORING DATA FROM BACKUPS

WITH DAAS, DESKTOP OPERATING SYSTEMS RUN INSIDE VIRTUAL MACHINES ON SERVERS IN A CLOUD PROVIDER'S DATA CENTER.

DIFFERENCE BETWEEN SAAS, PAAS, IAAS AND DAAS IS THE SCOPE OF SERVICE THAT IS PROVIDED. SAAS PROVIDES SOFTWARE IN ADDITION TO PAAS. PAAS PROVIDES A PLATFORM IN ADDITION TO IAAS. IAAS PROVIDES INFRASTRUCTURE SUCH AS SERVERS. DAAS PROVIDES A VIRTUAL DESKTOP ENVIRONMENT

VDI IS A TECHNOLOGY THAT ALLOWS END USERS TO ACCESS A WINDOWS DESKTOP WITH ALL THEIR BUSINESS APPLICATIONS AT ANY TIME, FROM ANY TYPE OF DEVICE (WINDOWS, APPLE, ANDROID), FROM ANY LOCATION WITH AN INTERNET CONNECTION.

ESTABLISHING A VIRTUAL PRIVATE NETWORKS (VPN) IS TYPICALLY THE WAY REMOTE USERS ACCESS CORPORATE SYSTEMS AND DATA. THE VPN PROVIDES ENCRYPTED MANAGED ACCESS BY REMOTE USERS TO ORGANIZATIONAL RESOURCES (APPLICATIONS, DATA, ETC.). STAFF WORKING REMOTELY MUST BE ABLE TO ACCESS CRITICAL INTERNAL APPLICATIONS AND DATABASES. 

WITH APPLICATIONS HOSTED IN THE CLOUD ACCESS IS MADE MORE SEAMLESS. TELE/VIDEO CONFERENCING – THIS IS ONE OF THE CRITICAL TOOLS IN THE VIRTUAL OFFICE WORLD TO KEEP COMMUNICATION LINES OPEN BETWEEN STAFF MEMBERS. 

THE MOST POPULAR TELE/VIDEO CONFERENCING CLOUD-BASED APPLICATIONS ARE CISCO’S WEBEX, GO-TO-MEETING AND JITSI. ORGANIZATIONS WOULD NEED TO SUBSCRIBE TO SUCH A SERVICE AND TO ENSURE THAT IT HAS ENOUGH CONCURRENT LICENSES TO CONDUCT VIDEO/TELE CONFERENCES WITH THE REQUIRED NUMBER OF PEOPLE. 

WITH THE CURRENT COVID-19 CRISIS MANY COMPANIES ARE OFFERING FREE TRIALS AND ADDITIONAL LICENSES FOR FREE OR AT DISCOUNTED RATES. FOR EXAMPLE, CISCO IS EXTENDING FREE LICENSES FOR ITS WEBEX SYSTEM AND OFFERING EXTRA USE AT NO ADDITIONAL COST FOR THREE OF ITS MAIN SECURITY SOLUTIONS. 

CONSIDERATION SHOULD BE GIVEN AS TO HOW COMPUTER SECURITY PATCHES CAN BE UPDATED REMOTELY AND HOW OTHER SECURITY MEASURES WILL BE DEPLOYED WITH A VIRTUAL WORKFORCE. ORGANIZATIONS WILL NEED TO ADDRESS FIREWALL ISSUES TO PROTECT INTERNAL ASSETS FROM THE INCREASED RISK POSED BY THE IMPLEMENTATION OF A REMOTE VIRTUAL OFFICE ENVIRONMENT. MANY OF THE CORE TOOLS ABOVE CAN AND WILL BE PROVIDED AS A CLOUD COMPUTING SERVICE. 

THIS WILL REDUCE LEAD TIMES FOR ESTABLISHING THE VIRTUAL OFFICE ENVIRONMENT AND REMOVE MANY OF THE TECHNICAL BURDENS, PARTICULARLY FOR SMALL AND MEDIUM SIZE ENTERPRISES WHO MAY NOT HAVE THE IT RESOURCES.

HOWEVER, CARE IN CHOOSING A CLOUD SERVICES VENDOR(S) SHOULD BE TAKEN. ON A STRATEGIC CORPORATE LEVEL CONSIDERATION SHOULD BE GIVEN AS TO WHERE INFORMATION IS STORED, AND EVENTUALLY WHICH JURISDICTION MAY HAVE CONTROL OR ACCESS TO THE INFORMATION. THERE MAY BE NATIONAL LEGISLATIVE REQUIREMENTS TO LOCALISE CERTAIN PERSONAL INFORMATION FOR DATA PRIVACY REASONS.

CLOUD GIANTS LIKE AMAZON HAVE ALREADY CONFIRMED THEIR CONFIDENCE IN THE ABILITY OF THEIR CLOUD SERVICE TO SATISFY THE SURGE IN DEMAND.

HOWEVER, THE SUDDEN AND UNPLANNED MIGRATION TO THE CLOUD HAS RESULTED IN MINOR OBSTACLES FOR A FEW CLOUD-BASED PLATFORMS. MICROSOFT, FOR INSTANCE, WAS EXPERIENCING TECHNICAL PROBLEMS BECAUSE OF AUGMENTED USAGE AND BANDWIDTH. HOWEVER, THESE COMPLICATIONS ARE USUALLY TEMPORARY, WITH SYSTEMS UP AND RUNNING SOON AFTER.







IT’S IMPORTANT FOR ORGANISATIONS TO BE READY TO SCALE CLOUD VOLUME IN STEP WITH THE DEMAND. HAVING A SEASONED CLOUD MANAGEMENT SERVICE PROVIDER, WHO CAN HELP YOU DO SO, WILL GUARANTEE A TROUBLE-FREE MIGRATION OF YOUR PROCESSES IN CONJUNCTION WITH TOP-NOTCH INFRASTRUCTURE MAINTENANCE SO THAT YOUR BUSINESS OPERATIONS STAY UNAFFECTED.

SIMPLY PUT, THE CLOUD SYSTEM IS SEGREGATED INTO FRONT-END AND BACK-END. THE FRONT-END OF CLOUD COMPUTING IS MANAGED BY THE CONSUMER OR ANY USER. THE BACK-END INCLUDES COMPUTERS, SERVERS, KNOWLEDGE STORAGE DEVICES, VIRTUAL SYSTEMS, AND MORE. THIS IS WHERE THE CLOUD ENVIRONMENT, THE DATA, AND THE NUMEROUS FUNCTIONALITIES ARE STORED. THE FRONT-END AND BACK-END ARE CONNECTED THROUGH THE WEB.

OTHER ELEMENTS LIKE MIDDLEWARE AND CLOUD RESOURCES ALSO ARE A PART OF CLOUD COMPUTING. THE CLOUD USES A NETWORK LAYER TO CONNECT ALL THE DEVICES AND PROVIDE ACCESS TO DATA AND FUNCTIONALITIES. THE WHOLE SYSTEM IS MANAGED THROUGH A CENTRAL SERVER THAT ADDITIONALLY MANAGES TRAFFIC.

BEING ON THE CLOUD CAN FACILITATE YOUR BUSINESSES CIRCUMVENT THE CHAOS FROM THE CORONAVIRUS LOCKDOWN IRRESPECTIVE OF YOUR LOCATION. FACTORS LIKE AFFORDABILITY, MEASURABILITY, AND EASE OF MAINTENANCE MAKE CLOUD SOLUTIONS AN ALLURING OPTION FOR BUSINESSES OF ALL SIZES.

CLOUD SOLUTIONS ARE EQUIPPED WITH FEATURES LIKE DATA BACKUP, DISASTER RECOVERY, AND BUSINESS CONTINUITY MANAGEMENT. THIS HAS ENSURED CONTINUED & HASSLE-FREE BUSINESS OPERATIONS AMIDST THIS SUDDEN AND UNFORESEEN PANDEMIC, WHERE IN-HOUSE IT SYSTEMS MAY HAVE BEEN UNUSABLE.

REMOTE OPERATING CAPABILITIES SUPPORTED BY THE CLOUD HAVE ENSURED THAT USER DATA AND SERVICES ARE ACCESSIBLE AT ALL TIMES. EMPLOYEES SITTING AT HOME ARE ABLE TO LOG IN FROM THEIR COMPUTERS AND WORK WITHOUT ANY HINDRANCES. THE CLOUD IS ADDITIONALLY ENSURING SMOOTH INTEGRATION OF DATA WHILE LEVERAGING THE NEWEST TECHNOLOGY TO SUPPORT YOUR BUSINESS GOALS.

IN OTHER WORDS, CLOUD SYSTEMS CAN PROVIDE MAJOR BENEFITS LIKE RELIABILITY AND CONTINUITY TO BUSINESSES EVEN DURING A GLOBAL CRISIS LIKE CORONAVIRUS PANDEMIC.

THERE IS ALWAYS THE NECESSITY TO SHOP FOR FOOD ITEMS AND HOUSEHOLD ESSENTIALS, REGARDLESS OF A  LOCKDOWN. CLOUD ACTS AS A BACKBONE FOR ALL ONLINE RETAILERS TO MAKE SURE THEIR OPERATIONS ARE RUNNING SMOOTHLY, ESPECIALLY SINCE THERE IS AN OVERWHELMING RISE IN DEMAND.

STORES RUNNING ON TRADITIONAL WEB-HOSTED PLATFORMS CAN EXPERIENCE DOWNTIME BECAUSE OF THEIR INABILITY TO HANDLE THE ESCALATION IN TRAFFIC. ON THE OTHER HAND, CLOUD-HOSTED PLATFORMS ARE EXTREMELY SCALABLE AND VERSATILE, PROTECTING BUSINESSES FROM DISRUPTION DUE TO INFRASTRUCTURE ISSUES.

FURTHER, MODERN CLOUD SOLUTIONS ARE ARMED TO HANDLE ONLINE SECURITY PROBLEMS AND CYBERCRIMES LIKE DEBIT/CREDIT CARD FRAUD, DATA BREACHES, DDOS ATTACKS, HACKING, PHISHING, RANSOMWARE, DARK CLOUD ATTACKS, AND SO. EXPERT CLOUD OPERATORS WORK WITH SECURITY AGENCIES AND LAW ENFORCEMENT OFFICERS TO FIND, MITIGATE, AND KEEP CYBER THREATS CORNERED

WHILE REMOTE WORK EXISTED EVEN BEFORE THE RAPID RISE OF CLOUD COMPUTING AND THE CORONAVIRUS PANDEMIC, INEFFICIENCIES AND TECHNICAL DIFFICULTIES WERE PREVALENT AT THAT TIME. HOWEVER, REMOTE WORK IS CURRENTLY WIDESPREAD, AND CLOUD COMPUTING IS PROVIDING CONSIDERABLE PRODUCTIVITY ENHANCEMENTS FOR ALL TASKS.


THANKS TO CLOUD TECHNOLOGY, REMOTE WORK IS NOW BEING CARRIED OUT SEAMLESSLY. THERE ARE CLOUD-BASED SOLUTIONS FOR NEARLY EVERY JOB, WHETHER IT’S ACCOUNTING, BACK-OFFICE TASKS, WRITING AND EDITING, ENGINEERING, ONLINE MARKETING, WEB DESIGNING, CONSULTING OR ANY OTHER JOB.



COMMUNICATION TOOLS LIKE TEAMVIEWER, SKYPE, SLACK, WHATSAPP, AND ZOOM ARE POWERED BY CLOUD TECHNOLOGY TO PROVIDE CEASELESS AND STEADY SERVICES.
MOST HEALTHCARE ORGANISATIONS HAVE SHIFTED THEIR DATA TO THE CLOUD TO OPTIMISE PATIENT OUTCOMES. 

TIMELY CLOUD ADOPTION HAS HELPED ENHANCE THE ABILITY TO ANALYSE DATA AND IMPROVE RESPONSE IN THE FACE OF THIS OUTBREAK.

FURTHER, THE CLOUD IS ADDITIONALLY SERVING HEALTHCARE INSTITUTIONS TO LIMIT UNNECESSARY IT COSTS ASSOCIATED WITH GETTING INSTRUMENTS AND PROVIDING PHYSICAL SPACE FOR A SEPARATE IT DEPARTMENT. CLOUD SOLUTIONS HAVE ALSO EXPEDITED INTEROPERABILITY THROUGH DATA AND SYSTEM INTEGRATIONS.

THAT’S NOT ALL. THE CLOUD IS PLAYING A HUGE ROLE IN SUPPORTING TELEMEDICINE AND TELEHEALTH, ENABLING HEALTHCARE PROVIDERS TO OFFER THEIR SERVICES FROM REMOTE PLACES.

THANKS TO THE CLOUD, THE WORLD IS FIGHTING CORONAVIRUS WITH TECHNOLOGY. BUSINESSES HAVE MANAGED TO REMAIN OPERATIONAL AND OTHER PEOPLE ARE CONNECTED EVEN AMID STRICT LOCKDOWNS. 

GIVEN THIS SCENARIO SPURRED BY THE CORONAVIRUS CRISIS, ONE FACTOR IS CLEAR: BUSINESSES NEED TO HANDLE THIS PANDEMIC STRATEGICALLY. THE FIRST ADVANTAGEOUS STEP WOULD BE MIGRATING TO RELIABLE CLOUD PLATFORMS.

CLOUD INFRASTRUCTURE IS  HIGHLY AUTOMATED AND ALLOWS FOR THE CREATION OF SCALING POLICIES THAT SET TARGETS AND ADD OR REMOVE CAPACITY IN REAL-TIME AS DEMAND CHANGES.

MOST CSPS NOW PROVIDE A MULTI-TENANT ARCHITECTURE THAT ALLOWS DIFFERENT BUSINESS UNITS WITHIN AN ORGANISATION OR MULTIPLE ORGANISATIONS TO SHARE COMPUTING RESOURCES. THIS ALLOWS ORGANISATIONS TO OPTIMISE THEIR RESOURCES AND STAFF VS. HAVING THEIR OWN DATA CENTRES.

LASTLY, THE PHYSICAL SECURITY IN AND AROUND CSP DATA CENTRES TENDS TO BE MORE ROBUST AND PROVEN THAN WHAT ENTERPRISES CAN INDIVIDUALLY AFFORD. MOST CSPS HAVE RIGOROUS AND ONGOING PROCESSES FOR ASSESSMENT AND MITIGATION OF POTENTIAL VULNERABILITIES, OFTEN PERFORMED BY THIRD-PARTY AUDITORS.

IN THE CONTEXT OF CORONAVIRUS, DIGITAL PLATFORMS RUNNING ON THE CLOUD CAN UNLEASH COST AND OPERATIONAL ADVANTAGES VIA CENTRALISED CONTROL WHILE MEETING BANDWIDTH CHALLENGES THAT FLARE UP DURING PEAK USAGE PERIODS.

CLOUD-SCALE DATA CENTERS ARE MORE AUTOMATED THAN THOSE IN THE TYPICAL ENTERPRISE. MOST CLOUD PROVIDERS ALSO HAVE MULTIPLE REGIONS, WHICH ENABLES THEM TO SHIFT WORKLOADS ON THE FLY TO EQUALIZE CAPACITY.

 CLOUD IMPROVES  OVERALL SECURITY POSTURE BECAUSE IT PROVIDES A NUMBER OF HIGHLY SCALABLE MECHANISMS AGAINST DENIAL-OF-SERVICE ATTACKS AND GREATER VISIBILITY INTO CYBERTHREATS,

WHILE CLOUD IS COMING ON AS EXTREMELY USEFUL FOR ENABLING REMOTE WORK, ONE CANNOT FORGET THAT JUST BEFORE THE PANDEMIC SET IN, THE INDUSTRY WAS DEBATING THE ADVANTAGES OF MOVING BACK TO ON-PREMISE.


CLOUD MODELS HAVE AN EDGE AS IT REMOVES THE HASSLE OF FREQUENTLY UPDATING SYSTEMS AND IS BETTER IN TERMS OF FLEXIBILITY, RELIABILITY, AND SECURITY,




THE ONGOING COVID-19 PANDEMIC HAS SUDDENLY TURNED THE SPOTLIGHT ON TO THE CIOS, CTOS, CISOS AND THE LIKES, AS THEY NOW OCCUPY THE CENTRE STAGE FACING PERHAPS WHAT WILL BE THE GREATEST TESTS IN THEIR CORPORATE CAREER. 

THEY ARE NOW TASKED TO BECOMING ENABLERS OF BUSINESS OPERATIONS IN A TIME OF CRISIS AND THE CARETAKERS OF EMPLOYEE EXPERIENCE.

AS COMPANIES MOVE MORE APPLICATIONS OUT TO THE CLOUD, THEY ARE LESS TIED TO VPNS AND THEN CAN OPT TO DEPLOY PASSWORDLESS AUTHENTICATION.

PASSWORDLESS AUTHENTICATION IS A TYPE OF AUTHENTICATION WHERE USERS DO NOT NEED TO LOG IN WITH PASSWORDS. ... WITH THIS FORM OF AUTHENTICATION, USERS ARE PRESENTED WITH THE OPTIONS OF EITHER LOGGING IN SIMPLY VIA A MAGIC LINK, FINGERPRINT, OR USING A TOKEN THAT IS DELIVERED VIA EMAIL OR TEXT MESSAGE.

83% OF HACKING-RELATED BREACHES WERE AS A RESULT OF WEAK, STOLEN, OR REUSED PASSWORDS.

BECAUSE THERE ARE NO PASSWORDS TO TYPE, THE LIKELIHOOD OF BEING PHISHED IS REDUCED. THIS ALSO MEANS USERS ARE PROTECTED FROM MAN-IN-THE-MIDDLE, MAN-IN-THE-BROWSER, AND OTHER REPLAY ATTACKS THAT RELY ON PASSWORDS.

WITH PASSWORDLESS AUTHENTICATION, WORKERS ARE FREE TO USE THEIR OWN DEVICES BECAUSE THERE'S A SECURE CONNECTION BETWEEN THE APPLICATION AND THE DEVICE.

PASSWORDLESS AUTHENTICATION IS A MORE SECURE





INTERNET SERVICE PROVIDERS (ISPS) SNOOPING ON EVERYTHING YOU WERE DOING ONLINE, THEN A VPN IS ABSOLUTELY FOR YOU. DID YOU KNOW THAT IN MANY COUNTRIES, YOUR ISP CAN SELL YOUR BROWSING HISTORY TO MARKETING AND ADVERTISING AGENCIES? AND THAT IF REQUESTED BY MANY GOVERNMENTS, THEY ARE LEGALLY BOUND TO HAND OVER LOGS OF YOUR ONLINE ACTIVITY?

IN A NORMAL INTERNET CONNECTION, WHEN YOU TRY TO ACCESS A WEBSITE ON THE INTERNET, YOUR COMPUTER ROUTES THE REQUEST THROUGH YOUR ISP’S SERVER, WHICH THEN CONNECTS YOU TO THE WEBSITE. IN A VPN CONNECTION, YOU CONNECT DIRECTLY TO THE VPN’S SERVER, BYPASSING YOUR ISP’S SERVER.

IF YOU’VE HEARD OF A FIREWALL BEFORE, THE VPN ACTS IN A SIMILAR WAY, SHIELDING AND PROTECTING YOUR INTERNET CONNECTION BY MEANS OF PRIVATE SERVERS AND ENCRYPTED DATA STREAMS.

IN A VPN CONNECTION, ALL THE DATA YOU SEND AND RECEIVE IS ENCRYPTED. SO, IF ANYONE WERE TO TRY TO INTERCEPT THE DATA YOU’RE SENDING, THAT ENCRYPTION WOULD KEEP YOU SAFE (OR AT LEAST, SAFER THAN IF IT WERE TRANSMITTED WITHOUT ENCRYPTION).

YOUR IP ADDRESS ISN’T THE ONLY THING THAT IDENTIFIES YOU ONLINE. IN FACT, THERE HAVE ALSO BEEN INSTANCES WHERE VPNS HAVE BEEN KNOWN TO LEAK ACTUAL IP ADDRESSES. 

OTHER METHODS OF TRACING YOU INCLUDE DOXING, USE OF MALWARE, PLAIN OLD CARELESSNESS AND MORE.

WHEN YOU’RE CONNECTED TO A VPN SERVICE, ALL YOUR INTERNET TRAFFIC AND COMMUNICATION PASSES THROUGH A SECURE TUNNEL. THAT IS WHAT KEEPS YOUR INFORMATION PRIVATE AND SAFE.

EACH VPN USES VARIOUS PROTOCOLS FOR THIS THAT HAVE DIFFERENT LEVELS OF SECURITY. HERE ARE SOME EXAMPLES;

INTERNET PROTOCOL SECURITY (IPSEC)
IPSEC AUTHENTICATES THE INTERNET SESSION AND ENCRYPTS DATA DURING THE CONNECTION. IT HAS TWO MODES, TRANSPORT AND TUNNELING, SO DATA IS SAFE DURING TRANSFER BETWEEN DIFFERENT NETWORKS. IPSEC CAN BE COMBINED WITH OTHER SECURITY PROTOCOLS TO MAKE SESSIONS EVEN SAFER.

LAYER 2 TUNNELING PROTOCOL (L2TP)
L2TP IS ONE OF THE OTHER PROTOCOLS WHICH CAN BE USED WITH IPSEC. IT CREATES A TUNNEL BETWEEN TWO POINTS WHICH IPSEC HANDLES THE ENCRYPTION OF THE DATA THAT IS PASSED BETWEEN THEM.

POINT-TO-POINT TUNNELLING PROTOCOL (PPTP)
PPTP IS AN ALL-IN-ONE PROTOCOL THAT BOTH CREATES THE TUNNEL AND ENCRYPTS DATA. IT IS VERY COMMONLY USED AND SUPPORTED, EVEN ON MAC AND LINUX SYSTEMS.

SINCE NOT ALL VPNS HAVE A NO LOGGING POLICY. LOGS ARE HISTORY FILES RECORD YOUR INTERNET TRAFFIC HISTORY. IF LOGS ARE NOT KEPT, OBVIOUSLY THE VPN SERVICE PROVIDER CAN’T SELL IT OR HAND IT OVER TO ANY GOVERNMENT OR LAW ENFORCEMENT AGENCY, RIGHT?

IF A VPN HAS A NO LOGGING POLICY, THIS IS OFTEN STATED VERY CLEARLY ON THEIR WEBSITE.


THERE IS NOW A SUDDEN 52% SPIKE IN REMOTE DESKTOP PROTOCOL (RDP) USAGE. RDP IS A POPULAR WAY FOR USERS TO ACCESS WINDOWS MACHINES AND SERVERS REMOTELY OVER THEIR VPN CONNECTIONS.

THE RUSH TO ENABLE EMPLOYEES TO WORK FROM HOME IN RESPONSE TO THE COVID-19 PANDEMIC RESULTED IN MORE THAN 1.7 MILLION NEW REMOTE DESKTOP PROTOCOL (RDP) SERVERS BEING EXPOSED TO THE INTERNET. THE NUMBER OF ATTACKS TARGETING OPEN RDP PORTS IN THE US MORE THAN TRIPLED IN MARCH AND APRIL 2020

ORGANIZATIONS HAVE RAMPED UP RDP USE TO ENABLE THEIR REMOTE WORKFORCE AND MAINTAIN BUSINESS OPERATIONS DURING THIS TIME OF PANDEMIC UNCERTAINTY. YET, WHILE RDP IS MORE SECURE THAN REMOTE CONNECTION TOOLS THAT DO NOT ENCRYPT ENTIRE SESSIONS, TWO CRITICAL RDP VULNERABILITIES DISCLOSED IN THE PAST YEAR – BLUEKEEP AND DEJABLUE – HIGHLIGHT POTENTIAL SECURITY RISKS.

CYBER ATTACKERS HAVE TAKEN ADVANTAGE OF SYSADMINS WORKING REMOTELY AND ARE DEDICATING MORE RESOURCES TO SCANNING FOR THE STANDARD RDP PORT 3389 TO SEE WHAT HAS BEEN EXPOSED. THEY’VE ALSO LAUNCHED A WAVE OF BRUTE-FORCE ATTACKS USING AUTOMATION TOOLS TO SYSTEMATICALLY TEST USERNAME AND CREDENTIAL COMBINATIONS UNTIL THEY CRACK THE CODE.

IN A STORY TOLD TIME AND TIME AGAIN, ONCE ATTACKERS GAIN AN ADMINISTRATOR’S PRIVILEGED CREDENTIALS, THEY CAN MOVE LATERALLY THROUGH THE ENVIRONMENT, ESCALATING PRIVILEGES UNTIL THEY REACH VALUABLE TARGETS LIKE THE DOMAIN CONTROLLER OR CLOUD CONSOLE. 

THIS ACCESS ALLOWS THEM TO CONTROL ANY SERVER, CONTROLLER, ENDPOINT OR PIECE OF DATA ANYWHERE ON A NETWORK. THEY CAN RUN COMMANDS, DISABLE ANTIVIRUS SOFTWARE, INSTALL MALWARE, ENCRYPT DATA FOR RANSOM OR STEAL VALUABLE DATA, INCLUDING PII. 

FORTUNATELY, THERE ARE A FEW STEPS ORGANIZATIONS CAN TAKE TO IMPROVE RDP SECURITY AND REDUCE THE RISK OF A DATA BREACH:

LIMIT PRIVILEGED ACCESS. BY DEFAULT, ALL ADMINISTRATORS CAN LOG INTO RDP. IMPLEMENT THE PRINCIPLE OF LEAST PRIVILEGE BY LIMITING ADMINISTRATIVE PRIVILEGES TO ONLY THOSE WHO ABSOLUTELY NEED IT. EVEN BETTER, LAYER IN AND ENABLE JUST-IN-TIME PROVISIONING FOR REMOTE VENDORS WHO ARE NOT PART OF THE DIRECTORY SERVICE SO THAT THEIR ACCESS IS TIME-LIMITED. 

BE SURE TO MONITOR AND TRACK ALL USER ACCESS AND ACTIVITY DURING PRIVILEGED SESSIONS, ESPECIALLY FOR TIER0 ASSETS LIKE DOMAIN CONTROLLERS OR CLOUD CONSOLES.

KEEP SOFTWARE UP-TO-DATE ON ALL REMOTE WINDOWS MACHINES CONNECTING TO THE INTERNET – INCLUDING WINDOWS 7 WORKSTATIONS.

ENABLE NLA. NETWORK LEVEL AUTHENTICATION (NLA) PROVIDES AN EXTRA LEVEL OF AUTHENTICATION BEFORE A CONNECTION IS ESTABLISHED.

AVOID EXPOSURE. KEEP RDP SERVERS BEHIND YOUR FIREWALL. NEVER ALLOW DIRECT RDP CONNECTIONS THAT EXPOSE MACHINES AND SERVERS TO THE INTERNET, WHICH CAN PUT YOUR CRITICAL DATA AND INTERNAL SYSTEMS AT RISK.

USE STRONG PASSWORDS AND MULTIFACTOR AUTHENTICATION. BRUTE FORCE TOOLS ARE GETTING SOPHISTICATED. STRONG PASSWORD POLICIES MUST BE FOLLOWED – AND MULTI-FACTOR AUTHENTICATION IS A MUST. EVEN BETTER, CONSIDER TOOLS THAT ELIMINATE PASSWORDS AND OTHER NETWORK-BASED ACCESS CONTROLS ALTOGETHER.

PRIVILEGED ACCESS MANAGEMENT (PAM) TOOLS LIKE THE CYBERARK PRIVILEGED ACCESS SECURITY SOLUTION HELP ORGANIZATIONS ESTABLISH A SECURE RDP CONNECTION FROM THE START. PRIVILEGED CREDENTIALS ARE CENTRALLY STORED AND MANAGED IN A DIGITAL VAULT AND ACCESS IS GRANTED ACCORDING TO USER PERMISSIONS. 

THE WEB BROWSER SESSION IS ISOLATED AND ENCRYPTED. PRIVILEGED USER ACTIVITY IS TIGHTLY MONITORED AND CONTROLLED, AND SUSPICIOUS ACTIVITY IS FLAGGED SO SOC TEAMS CAN RESPOND IMMEDIATELY.

MEANWHILE, REMOTE WORKERS CAN USE NATIVE WORKFLOWS THAT DON’T EXPOSE THEIR ENDPOINTS TO THE CREDENTIALS NEEDED TO ACCESS CRITICAL IT SYSTEMS FOR WORK, MAINTENANCE OR OTHERWISE. BEST OF ALL, THESE STRONG PAM CONTROLS EXTEND BEYOND RDP TO HELP ORGANIZATIONS SECURE REMOTE CONNECTIONS TO ANY WEB-FACING SYSTEM, LIKE SSH AUTHENTICATION TO UNIX/LINUX.

SECURE SHELL (SSH) IS A CRYPTOGRAPHIC NETWORK PROTOCOL FOR OPERATING NETWORK SERVICES SECURELY OVER AN UNSECURED NETWORK..   TYPICAL APPLICATIONS INCLUDE REMOTE COMMAND-LINE, LOGIN, AND REMOTE COMMAND EXECUTION, BUT ANY NETWORK SERVICE CAN BE SECURED WITH SSH.


SSH KEYS ARE AUTHENTICATION CREDENTIALS. SSH (SECURE SHELL) IS USED FOR MANAGING NETWORKS, OPERATING SYSTEMS, AND CONFIGURATIONS. IT IS ALSO INSIDE MANY FILE TRANSFER TOOLS AND CONFIGURATION MANAGEMENT TOOLS. ... TECHNICALLY THE KEYS ARE CRYPTOGRAPHIC KEYS USING A PUBLIC KEY CRYPTOSYSTEM


WHILE RDP IS CRITICAL FOR FACILITATING REMOTE WORK DURING THE PANDEMIC, IT CAN ALSO EXPOSE AN ENTIRE BUSINESS NETWORK TO RISK, WITH MANY COMPANIES HASTILY SETTING UP THE SOFTWARE AT THE START OF THE PANDEMIC.

ONCE MALICIOUS ACTORS COMPROMISE AN RDP PORT, THEY CAN EASILY USE IT TO SEND SPAM USING A COMPANY’S MAIL SERVER. WORSE, THEY CAN USE REMOTE ACCESS TO SPREAD MALWARE THROUGHOUT THE INTERNAL NETWORK.

REMOTE DESKTOP PROTOCOL (RDP) IS A PROPRIETARY PROTOCOL DEVELOPED BY MICROSOFT WHICH PROVIDES A USER WITH A GRAPHICAL INTERFACE TO CONNECT TO ANOTHER COMPUTER OVER A NETWORK CONNECTION. THE USER EMPLOYS RDP CLIENT SOFTWARE FOR THIS PURPOSE, WHILE THE OTHER COMPUTER MUST RUN RDP SERVER SOFTWARE.

THE RDP PROTOCOL IS A FREQUENT TARGET FOR CREDENTIAL STUFFING AND OTHER BRUTE-FORCE PASSWORD GUESSING ATTACKS THAT RELY ON LISTS OF COMMON USERNAMES AND PASSWORD COMBINATIONS OR ON CREDENTIALS STOLEN FROM OTHER SOURCES. 

SOME CYBERCRIMINALS EVEN SPECIALIZE IN SELLING HACKED RDP CREDENTIALS AS A COMMODITY ON THE UNDERGROUND MARKET TO OTHER HACKERS WHO USE THEM TO DEPLOY RANSOMWARE AND CRYPTOMINERS OR TO ENGAGE IN MORE SOPHISTICATED ATTACKS THAT CAN LEAD TO THE THEFT OF SENSITIVE DATA AND MORE EXTENSIVE NETWORK COMPROMISES.

RDP IS A MICROSOFT PROTOCOL RUNNING ON PORT 3389 THAT CAN BE UTILIZED BY USERS REQUIRING REMOTE ACCESS TO INTERNAL SYSTEMS. MOST OF THE TIME, RDP RUNS ON WINDOWS SERVERS AND HOSTS SERVICES SUCH AS WEB SERVERS OR FILE SERVERS, FOR EXAMPLE. IN SOME CASES, IT IS ALSO CONNECTED TO INDUSTRIAL CONTROL SYSTEMS.


RDP PORTS ARE OFTEN EXPOSED TO THE INTERNET, WHICH MAKES THEM PARTICULARLY INTERESTING FOR ATTACKERS. IN FACT, ACCESSING AN RDP BOX CAN ALLOW AN ATTACKER ACCESS TO AN ENTIRE NETWORK, WHICH CAN GENERALLY BE USED AS AN ENTRY POINT FOR SPREADING MALWARE, OR OTHER CRIMINAL ACTIVITIES.




.
WORK AT HOME OPPORTUNITY DURING THIS PANDEMIC HAS SIGNIFICANTLY INCREASED INSIDER THREATS FROM EMPLOYEES TAKING RISKS WITH COMPANY ASSETS, SUCH AS STEALING SENSITIVE DATA FOR PERSONAL USE OR GAIN AS EMPLOYERS HAVE LESS VISIBILITY TO WHAT EMPLOYEES ARE DOING OR ACCESSING.

WITH REMOTE WORK COMES GREATER CLOUD USAGE. THAT COULD BE A PROBLEM FOR MANY COMPANIES THAT HAVE ISSUES WITH VISIBILITY INTO THE SECURITY OF THEIR CLOUD COMPONENTS, AND THAT OFTEN RELY ON PERIMETER AND ON-PREMISE SECURITY SOFTWARE AND APPLIANCES TO KEEP THEIR SYSTEMS AND DATA SAFE

IF YOUR ORGANIZATION HAS NOT CONDUCTED A THOROUGH RISK ASSESSMENT AND ADOPTED A FORMALIZED INFORMATION SECURITY PROGRAM CONTAINING REASONABLE SAFEGUARDS THAT HAS CONSIDERED THE THREATS TO ITS REMOTE WORKFORCE, DEPENDING ON YOUR INDUSTRY, YOU ARE NOT IN REGULATORY COMPLIANCE WITH THE APPLICABLE STANDARDS FOR SAFEGUARDING PROTECTED INFORMATION

AN EMPLOYEE MIGHT LOSE HIS/HER DEVICE, OR LET OTHER FAMILY MEMBERS USE IT, WHICH WILL RESULT IN UNAUTHORISED ACCESS. IN SOME CASES, EMPLOYEES COPY CONFIDENTIAL DATA TO THEIR PERSONAL DEVICES FROM CORPORATE CLOUD STORAGE WITH HARMFUL/ MALICIOUS  INTENT, WHICH IS A SERIOUS SECURITY RISK AS WELL.
AN INSIDER THREAT IS A SECURITY RISK THAT ORIGINATES FROM WITHIN AN ORGANIZATION.   I

NSIDER THREATS OFTEN RESULTS IN THEFT OR DESTRUCTION OF DATA OR THE COMPROMISE OF NETWORKS, COMMUNICATIONS OR OTHER INFORMATION TECHNOLOGY RESOURCE.

THIS PANDEMIC “WORK AT HOME” CULTURE HAS PROVIDED GREATER OPPORTUNITY FOR SECURITY INCIDENTS AND GREATER DATA SECURITY RESPONSIBILITY WITH LESS DIRECT OVERSIGHT.

A MALICIOUS INSIDER UTILIZES CREDENTIALS TO GAIN ACCESS TO A GIVEN ORGANIZATION’S CRITICAL CLOUD INFRASTRUCTURE ASSETS.

MANY ORGANIZATIONS ARE CHALLENGED TO DETECT INTERNAL, NEFARIOUS ACTS, REGULARLY DUE TO LIMITED ACCESS CONTROLS AND THE ABILITY TO DETECT UNUSUAL ACTIVITY ONCE SOMEONE IS ALREADY INSIDE THEIR NETWORK.

RISK MANAGEMENT AND SECURITY LEADERS NEED TO MANAGE THE DELICATE ISSUE OF THE INSIDER THREAT DURING A TIME WHEN MANY EMPLOYEES HAVE CONCERNS, NEED SUPPORT AND REQUIRE PROTECTION. EMPLOYEES SUBJECT TO NEW WORKING ARRANGEMENTS MAY WELL REACT MALICIOUSLY DUE TO LIMITED HOURS, LOWERED COMPENSATION, REDUCED PROMOTION OPPORTUNITIES, AND EVEN EXPECTATIONS OF REDUNDANCY.

THESE CONCERNS AT WORK CAN BE COMPOUNDED BY INCREASED LEVELS OF STRESS OUTSIDE OF THE WORK ENVIRONMENT DUE TO WORRIES ABOUT THE HEALTH OF THEIR FAMILIES, LIVELIHOOD AND UNCERTAINTY ABOUT THE FUTURE. SOME EMPLOYEE ARE UNHAPPY WITH THEIR LAST ANNUAL RAISE OR UNFAIR EVALUATIONS BY THEIR USELESS  BOSSES,

UNDER THESE CONDITIONS, EMPLOYEES MIGHT BECOME RESENTFUL OR DISGRUNTLED TOWARDS THE ORGANIZATION, RESULTING IS OCCURRENCES OF INFORMATION LEAKAGE AND THEFT OF INTELLECTUAL PROPERTY.

SECURITY CONTROLS DESIGNED TO MONITOR AND CAPTURE ACTIVITY MAY NOT BE AS CAPABLE AS THEY WERE IN THE TRADITIONAL ON-PREMISES WORLD. EMPLOYEES MAY BE CONNECTING FROM NEW DEVICES AND NEW NETWORKS WHERE THE SECURITY CONTROLS AREN'T ON PAR.

ALL INDIAN ORGANIZATIONS SHOULD CONDUCT AN INSIDER THREAT RISK ASSESSMENT ON THEIR CRITICAL BUSINESS FUNCTIONS THAT COULD BE LEVERAGED BY AN INSIDER TO CONDUCT FRAUD. THERE ARE RIVAL COMPANIES READY TO PAY BIG MONEY FOR AN INSIDER BREACH .

AS MORE EMPLOYEES WORK REMOTELY, THEY HAVE TAKEN COMPANY DEVICES THAT MAY HAVE BEEN VERY DEPENDENT ON NETWORK SECURITY SUCH AS EMAIL GATEWAYS, WEB GATEWAYS, INTRUSION DETECTION SYSTEMS OR FIREWALLS TO PROTECT THOSE DEVICES. 

NOW, MOST OF THOSE PROTECTIONS ARE PRETTY MUCH USELESS WHEN THE DEVICES HAVE BEEN MOVED TO THE PUBLIC INTERNET. SENSITIVE DATA, ALONG WITH PRIVILEGED ACCESS ON THOSE SYSTEMS, ARE MORE EXPOSED THAN EVER BEFORE MAKING NEW TARGETS FOR CYBERCRIMINALS TO TAKE ADVANTAGE OF UNSUSPECTING VICTIMS TRUST OR CURIOSITY.     

ORGANIZATIONS CAN REDUCE THE RISKS BY REMOVING OVERPRIVILEGED USERS, SUCH AS LOCAL ADMINISTRATORS OR POWER USERS ON SYSTEMS, BEFORE THEY GET MOVED TO UNSECURE HOME NETWORKS, THUS REDUCING THE RISK OF THOSE PRIVILEGED ACCOUNTS GETTING COMPROMISED.  

USING THE PRINCIPLE OF LEAST PRIVILEGED WILL ALLOW EMPLOYEES TO CONTINUE DOING THEIR JOB STAYING PRODUCTIVE WHILE REDUCING THE RISKS OF ABUSING PRIVILEGES. COMBINING BOTH THE PRINCIPLE OF LEAST PRIVILEGED WITH PRIVILEGED ACCESS MANAGEMENT (PAM) WILL ALLOW A COMPANY TO NOT ONLY REDUCE THE THREATS FROM INSIDER ABUSE, BUT ALSO HAVE BETTER AUDITING ON WHO IS USING WHICH PRIVILEGED AND FOR WHAT. MONITORING PRIVILEGES REDUCES THE RISKS OF EMPLOYEES ABUSING THEIR PERMISSIONS AND ACCESS.

AS EMPLOYEES HAVE MOVED OUTSIDE THE COMPANY PERIMETER AND FIREWALL, THE CRITICALITY OF IDENTITY AND ACCESS MANAGEMENT (IAM) COMBINED WITH PRIVILEGED ACCESS MANAGEMENT, WILL HELP ORGANIZATIONS MAINTAIN A FULL AUDIT TRAIL. 

ONCE AN AUDIT TRAIL IS DIFFICULT TO HIDE AN EMPLOYEE’S TRACKS, THEY WILL HAVE LESS MOTIVE FOR ABUSING PRIVILEGES AS THEY ARE UNABLE TO GET AWAY WITH THE CRIME.  SOMETIMES ACCOUNTABILITY AND AUDITABILITY IS ENOUGH TO FORCE AN EMPLOYEE INTO NOT COMMITTING ANY CRIMINAL ACTIVITY RATHER THAN DETECTING IT.

TO KEEP BUSINESS OPERATIONS RUNNING CONTINUOUSLY, ORGANIZATIONS MAY RELY ON TECHNOLOGY THAT IS THE EASIEST TO USE AND OFFERS THE LOWEST BARRIER TO ENTRY. THE NUMBER ONE REMOTE WORK TOOL FOR WINDOWS PLATFORMS IS, OF COURSE, REMOTE DESKTOP PROTOCOL (RDP).

WHILE RDP ALLOWS EMPLOYEES TO QUICKLY AND NATIVELY ACCESS THEIR ORGANIZATION’S RESOURCES, IT IS NOT WITHOUT RISK – NOT JUST FROM OUTSIDE THREAT ACTORS, BUT FROM INSIDER THREATS AS WELL. 

ONE OF THE FEATURES OF RDP IS THAT IT ENABLES A REMOTE USER TO COPY AND PASTE TO AND FROM THE REMOTE AND LOCAL MACHINE. A USER COULD REMOTELY CONNECT TO A COMPUTER IN THEIR ORGANIZATION AND SIMPLY COPY FILES FROM THE REMOTE MACHINE TO THEIR HOME MACHINE.

THE PROBLEM IS THAT THERE IS NO LOGGING FOR THESE TYPES OF ACTIVITIES, AND THERE ARE VERY FEW RESULTING FORENSIC ARTIFACTS. THIS IS A SERIOUS PROBLEM, SINCE THE ACT OF COPYING AND PASTING IS SO NATURAL; IT ALLOWS FOR DATA EXFILTRATION WITHOUT ANY ADDITIONAL TOOLS.

THE POTENTIAL FOR INSIDER THREAT ATTACKS HAS GROWN SIGNIFICANTLY DURING THE PANDEMIC. THIS IS LARGELY BECAUSE MANY ORGANIZATIONS DO NOT HAVE A MATURE REMOTE WORK POLICY. THERE IS NO SILVER BULLET TO PREVENT INSIDER THREATS, BUT ORGANIZATIONS CAN EMPLOY DEFENSE IN DEPTH TO PROVIDE THE BEST SECURITY POSTURE POSSIBLE. ORGANIZATIONS SHOULD IMPLEMENT CONTROLS AT EACH STEP IN THE REMOTE WORK PROCESS, STARTING FROM THE CONNECTION. 

VPN SOLUTIONS USING MULTI-FACTOR AUTHENTICATION (MFA) SHOULD BE USED TO PROTECT THE POINT OF ACCESS. IF A COMPANY OPENS RDP TO THE PUBLIC WITHOUT ANY CONTROLS IN FRONT OF IT, THEY ARE SETTING THEMSELVES UP FOR FAILURE. MFA USED IN COMBINATION WITH A VPN CAN HELP PROTECT THE ACCOUNT FROM A BRUTE-FORCE OR CREDENTIAL REUSE ATTACK.

MANY COMPANIES ENFORCE SECURITY POLICY CHECKS WHEN CONNECTING VIA VPN, AND THAT HELPS PROTECT THE NETWORK FROM THE REMOTE USER’S COMPUTER. THINK OF IT AS A MINI SECURITY AUDIT THAT TAKES PLACE EVERY TIME AN EMPLOYEE CONNECTS TO THE VPN. THE REMOTE USER’S COMPUTER IS SCANNED FOR SECURITY PATCHES, VULNERABILITIES, AND ANY RUNNING SOFTWARE THAT MIGHT BE MALICIOUS. IF THE COMPUTER DOES NOT MEET THE SECURITY REQUIREMENTS, THE CONNECTION IS REFUSED.

IN ADDITION TO IMPLEMENTING MFA, IT IS VERY IMPORTANT TO LIMIT REMOTE ACCESS TO ONLY USERS WHO NEED IT. MANY ORGANIZATIONS MAY BE IN A SITUATION WHERE ALL WORKERS ARE CURRENTLY REMOTE AND REQUIRE ACCESS, BUT IT SHOULD REGULARLY AUDIT THEIR USER ACCOUNTS TO LIMIT ACCESS WHERE POSSIBLE. 

ANOTHER SAFEGUARD IS IMPLEMENTING GEOBLOCKING TO REFUSE LOGON ATTEMPTS FROM COUNTRIES WHERE EMPLOYEES DO NOT NORMALLY CONNECT FROM. THIS SHOULD NOT ONLY APPLY TO THE REMOTE CONNECTION, BUT TO FILES, SERVERS, AND OTHER ASSETS IN THE ORGANIZATION. IF AN EMPLOYEE DOES NOT NEED ACCESS TO CRITICAL DATA, THEIR ACCOUNT SHOULD PERMISSIONS SHOULD REFLECT THAT.

ACTIVITY LOGGING SHOULD BE A PRIORITY FOR ORGANIZATIONS GOING REMOTE, BUT IT IS CRITICAL THAT THE LOGS ARE MONITORED AND REVIEWED; OTHERWISE, YOU’LL ONLY KNOW ABOUT AN INSIDER THREAT AFTER THE FACT. THE LOG DATA SHOULD NOT ONLY BE ANALYZED FROM AN IT PERSPECTIVE, BUT FROM A BEHAVIORAL PERSPECTIVE AS WELL. INSPECTING NETWORK TRAFFIC FOR SIGNS OF LARGE VOLUMES OF DATA BEING COPIED OR SUSPICIOUS APPLICATIONS AND PROTOCOLS IN USE IS A GOOD INDICATOR THAT SOMETHING ATYPICAL IS OCCURRING. 

THE NUMBER OF CONNECTIONS AN EMPLOYEE MAKES IN A DAY CAN ALSO BE TELLING. IS AN EMPLOYEE SUDDENLY CONNECTING TO THE NETWORK AT OFF-HOURS AND ACCESSING SENSITIVE DATA? THOSE ACTIVITIES CALL FOR A DEEPER REVIEW.

ORGANIZATIONS NEED TO BE PROACTIVE IN ASSESSING THE IMPACT OF REMOTE WORK ON THEIR IT INFRASTRUCTURE. EARLY IDENTIFICATION OF ACCOUNTS, PERMISSIONS, SENSITIVE DATA LOCATIONS, AND THE CONTROLS IN USE GOES A LONG WAY IN DETERMINING THE IMPACT GOING REMOTE WILL HAVE ON AN ORGANIZATION. CONTINUOUS MONITORING AND ADDING CONTROLS WHERE NECESSARY CAN PREVENT INSIDER THREATS BEFORE THEY BEGIN.

TODAY, THERE’S  A GROWING PROBLEM: DATA EXFILTRATION (ANY UNAUTHORIZED MOVEMENT OF DATA) THAT HAPPENS MORE QUICKLY THAN EVER. AND WITH THE RECENT RAPID AND URGENT SHIFT TO SUPPORT REMOTE WORKERS AT SCALE WE CAN EXPECT THIS WILL DRIVE AN EXPONENTIAL INCREASE IN DATA EXFILTRATION OPPORTUNITIES FOR BAD ACTORS.

DATA IS THE LIFEBLOOD OF YOUR BUSINESS. AS ARE YOUR EMPLOYEES. AND, TO STAY IN BUSINESS IN THE YEARS AHEAD IT HAS NEVER BEEN MORE IMPERATIVE TO EMPLOY SECURITY SOLUTIONS THAT PROTECT THE DIGITAL CROWN JEWELS AND THOSE THAT INTERACT WITH THIS CRITICAL IP. AND AS PART OF ANY GOOD DATA LOSS PREVENTION (DLP) PLAN THERE HAS TO BE A THOUGHTFUL SECURITY STRATEGY AS WELL AROUND GUARDING AGAINST INSIDER THREATS. 

THIS IS BOTH A BACK-OFFICE AND FRONT OF HOUSE STRATEGY THAT INVOLVES DEPLOYING SECURITY SOLUTIONS THAT KNOW WHERE YOUR CRITICAL DATA RESIDES WITH THE CAPABILITY TO AUTOMATE SECURITY RESPONSE AS THE RISK LEVEL RELEVANT TO THE DIGITAL IDENTITY ACCESSING THAT DATA GOES UP OR DOWN. 

AND, EMPLOYEES CAN BE YOUR STRONGEST FRONT LINE SECURITY DEFENSE WITH EDUCATION AND ACTIVE SECURITY HYGIENE REINFORCEMENT, WHICH IS EVEN MORE CRITICAL AS THE MAJORITY OF WORKFORCES MOVE REMOTE.

CLOUD USAGE, IN PARTICULAR, INCREASES THE RISK OF INSIDER THREATS, AS MOST COMPANIES BELIEVE THAT DETECTING INSIDER ATTACKS IS HARDER IN THE CLOUD THAN ON-LOCATION

EMPLOYEES WORKING REMOTELY USE A HOST OF CLOUD APPLICATIONS TO EXCHANGE DATA, INCLUDING SENSITIVE DATA, AND THEY COULD MISPLACE THE DATA IN INSECURE LOCATIONS, LEADING TO COMPLIANCE VIOLATIONS. FOR EXAMPLE, SHARING SENSITIVE DATA VIA ZOOM – AN INCREASINGLY POPULAR APPLICATION FOR TELECOMMUNICATION – WILL RESULT IN DATA SHARING ACROSS WITH A HIGH RISK OF UNAUTHORISED ACCESS.

EMPLOYEES WORKING REMOTELY OFTEN WORK FROM THEIR PERSONAL DEVICES WHICH ARE NOT MONITORED BY THE CORPORATE IT TEAM, AND ARE MORE PRONE TO DATA SECURITY BREACHES THAN THEIR SECURED CORPORATE DEVICES. 

PERSONAL DEVICES ARE OFTEN VULNERABLE TO CYBER THREATS BY ACTING AS ENTRY POINTS. ONCE AN ATTACKER HAS AN ENTRY IN THE EMPLOYEE’S DEVICE, THEY LITERALLY HAVE THE “REMOTE CONTROL” AND CAN MONITOR AND LEVERAGE ANY OUTBOUND CONNECTIONS FROM THIS. THEY CAN GAIN ACCESS TO ALL CLOUD SERVICES THE USER CONNECTS TO OR EVEN TO THE ON-PREMISE CORPORATE NETWORK, AS SOON AS THE EMPLOYEE ESTABLISHES A VPN CONNECTION OR A REMOTE SESSION TO ANY INTERNAL SERVERS.

AN ORGANISATION SHOULD IDEALLY DEVELOP A PROPER SECURITY POLICY WITH A FOCUS ON CLOUD SECURITY, BEFORE ASKING ITS EMPLOYEES TO WORK REMOTELY. THE POLICY SHOULD ENSURE THAT ALL PERMISSIONS TO STORAGES WITH SENSITIVE DATA ARE GRANTED ON A  ‘NEED-TO-ACCESS’ BASIS TO EMPLOYEES TO ACCESS THE INFORMATION THEY DO NOT NEED TO DO THEIR JOB.

IN ADDITION, IT IS IMPORTANT TO ESTABLISH EFFECTIVE AND EFFICIENT ACCESS CONTROLS AND IDENTITY VERIFICATION METHODS SUCH AS MULTI-LAYERED AUTHENTICATION, THIS WILL PROTECT THE SENSITIVE DATA IN THE CLOUD FROM UNAUTHORISED ACCESS.

FINALLY, TRAINING OF EMPLOYEES ON THE ‘DOS’ AND ‘DON’TS’ OF THE CLOUD IS IMPORTANT,  FROM THE PRINCIPLES OF DEALING WITH SENSITIVE CLOUD DATA TO INSTRUCTIONS FOR PATCHING AND SECURING THEIR PERSONAL DEVICES.

KNOWING WHERE THE SENSITIVE DATA RESIDES IN THE CLOUD IS CRITICAL FOR THE ORGANISATION. THIS IS EXTREMELY CHALLENGING AS MODERN ORGANISATIONS USE MULTIPLE CLOUD SERVICES.

ACCORDING TO A STUDY, MCAFEE HAS ESTIMATED THAT AN AVERAGE ENTERPRISE USES AROUND 1,427 DISTINCT CLOUD SERVICES AND AN AVERAGE EMPLOYEE USES 36 CLOUD SERVICES AT WORK ACTIVELY. THE HIGHER THE NUMBER OF CLOUD SERVICES EMPLOYEES USE, THE HIGHER THE CHALLENGE IT IS FOR AN ORGANISATION TO TRACK THE HANDLING OF DATA. 

THERE IS AN INCREASED RISK OF MISPLACING SENSITIVE DATA AND THE BAD PR AND COMPLIANCE ISSUES THAT COME WITH IT. TO REDUCE DATA EXPOSURE, IT IS CRITICAL TO DEPLOY TECHNOLOGIES THAT AUTOMATICALLY DISCOVER SENSITIVE DATA ACROSS MULTIPLE CLOUD SERVICES AND CLASSIFY BASED ON SENSITIVITY ON AN ONGOING BASIS.

CLOUD DATA IS PRONE TO A BROAD RANGE OF THREATS FOR DATA EXFILTRATION BY EMPLOYEES, IT IS EXTREMELY IMPORTANT FOR AN ORGANISATION TO DETECT SUCH CASES IN AN EFFICIENT MANNER. DETECTING WHETHER IT IS THE MALWARE TRYING TO GET INTO THE CORPORATE NETWORK, OR AN EMPLOYEE TRYING TO STEAL THE CUSTOMER DATABASE? 

ALL THESE CLOUD COMPUTING SECURITY RISKS ARE ACCOMPANIED BY VARIABILITY IN USER ACTIVITY. HENCE, IF AN ORGANISATION USES CLOUD COMPUTING AND CLOUD STORAGE, IT IS IMPORTANT TO HAVE TOOLS OR TECHNOLOGIES THAT CAN TRACK USER BEHAVIOUR (UBA) AND DETECT DEVIATIONS FROM NORMAL USER BEHAVIOUR AND ALERT THE IT SECURITY TEAM ABOUT POTENTIAL THREATS.

EXAMPLES OF ANOMALIES THAT INDICATE A THREAT INCLUDE ABNORMAL LOGIN ATTEMPTS – TO LOG ON FROM MULTIPLE DEVICES, MULTIPLE SUBSEQUENT LOGINS IN A SHORT DURATION, AND A VERY HIGH NUMBER OF LOGIN FAILURES; OR DIFFERENCE IN DATA ACCESS PATTERNS FROM ONE USER TO ITS PEERS.

IT IS IMPORTANT TO NOTE THE SHIFT FROM OFFICE TO REMOTE WORK WILL PROBABLY CAUSE CHANGES IN USERS’ ACCESS PATTERNS. BUSINESSES CAN EXPECT A HIGHER NUMBER OF FALSE POSITIVES FROM MACHINE LEARNING-BASED BEHAVIOUR AND ANOMALY DETECTION SOLUTIONS IN THE FIRST FEW WEEKS.

THIS IS IN NO WAY AN EXHAUSTIVE LIST OF MEASURES, BUT IT IS A GUIDE THAT CAN HELP ORGANISATIONS REDUCE INSIDER THREATS IN THE CLOUD DURING ‘THE WORLD’S LARGEST WORK-FROM-HOME EXPERIMENT WHICH IS OW HERE TO STAY

CLOUD AND SAAS ADOPTION IS NOW MORE IMPORTANT THAN EVER. THE SAAS PROVIDER IS RESPONSIBLE FOR SECURING THE PLATFORM, NETWORK, APPLICATIONS, OPERATING SYSTEM, AND PHYSICAL INFRASTRUCTURE. HOWEVER, PROVIDERS ARE NOT RESPONSIBLE FOR SECURING CUSTOMER DATA OR USER ACCESS TO IT. SOME PROVIDERS OFFER A BARE MINIMUM OF SECURITY, WHILE OTHERS OFFER A WIDE RANGE OF SAAS SECURITY OPTIONS.
DATA ENCRYPTION PROTECTS BOTH DATA AT REST (IN STORAGE) AND DATA IN TRANSIT BETWEEN THE END USER AND THE CLOUD OR BETWEEN CLOUD APPLICATIONS. 

GOVERNMENT REGULATIONS USUALLY REQUIRE ENCRYPTION OF SENSITIVE DATA. SENSITIVE DATA INCLUDES FINANCIAL INFORMATION, HEALTHCARE DATA, AND PERSONALLY IDENTIFIABLE INFORMATION (PII). WHILE A SAAS VENDOR MAY PROVIDE SOME TYPE OF ENCRYPTION, AN ORGANIZATION CAN ENHANCE DATA SECURITY BY APPLYING ITS OWN ENCRYPTION, SUCH AS BY IMPLEMENTING A CLOUD ACCESS SECURITY BROKER (CASB).

TO BE MORE SECURE, EMPLOYERS SHOULD THINK IN TERMS OF HOW INFORMATION FLOWS OVER THE INTERNET FROM EMPLOYEE TO EMPLOYEE, EMPLOYEE TO CUSTOMER, MACHINE TO MACHINE, SYSTEM TO SYSTEM THROUGHOUT THE COMMUNICATIONS PROCESS.  THE INFORMATION NEEDS TO BE SECURED FROM THE TIME OF THE EMPLOYEE’S KEYBOARD STROKES, UP THE INFORMATION STACK, TO THE APPLICATIONS AND BROWSER.  

AN EMPLOYER MUST HAVE CONFIDENCE THAT THE INFORMATION WILL BE SECURELY EXCHANGED BETWEEN THE REMOTE WORKSTATIONS/MOBILE DEVICES AND SERVERS AND OTHER COMPUTERS, USING DIFFERENT PROTOCOLS AND SYSTEMS, OVER THE INTERNET.  

UNLESS YOU HAVE COMPREHENSIVELY CONSIDERED THE PARTICULAR JOB RESPONSIBILITIES OF EACH REMOTE JOB TITLE, THE TYPES AND SENSITIVITY OF INFORMATION HANDLED, THE METHODS OF REMOTELY ACCOMPLISHING TASKS AND THE CONNECTED HARDWARE AND SYSTEMS, AND HOW THEY ALL INTERACT AND WILL BE PROTECTED ON A DAILY BASIS, YOU ARE MISSING SOMETHING.  

AND IF YOU ARE MISSING SOMETHING, YOU ARE MISSING EVERYTHING BECAUSE ONE HOLE IN YOUR DEFENSES IS ALL THAT A HACKER NEEDS TO DEPLOY A DEVASTATING EXPLOIT.

MULTI-FACTOR AUTHENTICATION (MFA) SHOULD BE THE DEFAULT METHOD FOR AUTHENTICATION FOR REMOTE HOME-BASED ROLES WITH ACCESS TO SENSITIVE OR PROTECTED INFORMATION.  THE SAME HOLDS TRUE FOR REMOTE SYSTEM OR SERVER MAINTENANCE.  

IF YOUR SYSTEM ADMINISTRATORS WILL BE ROUTINELY PERFORMING REMOTE MAINTENANCE USING REMOTE DESKTOP PROTOCOL (RDP) OR HAVE REMOTE ACCESS TO OTHER PRIVILEGED ACCOUNTS, MULTI-FACTOR AUTHENTICATION SHOULD BE THE DEFAULT AUTHENTICATION METHOD.  

SIMILARLY, IF MORE DEVICES IN YOUR ORGANIZATION ARE NOW OPENING RDP TO THE INTERNET BECAUSE OF THE INCREASE IN REMOTE WORK, SECURE YOUR RDP.

ORGANIZATIONS SHOULD LIMIT ACCESS TO ITS SYSTEMS TO ONLY AUTHORIZED DEVICES.  FOR EXAMPLE, ARE REMOTE EMPLOYEES PERMITTED TO CONNECT TO ORGANIZATIONAL RESOURCES USING THEIR PERSONAL COMPUTERS OR BY COMPANY COMPUTERS OR BOTH?  

THERE ARE VASTLY DIFFERENT CYBER RISKS WITH EACH MODE OF DEVICE ACCESS.  HAVE YOU FULLY CONSIDERED THE RISKS OF AN EMPLOYEE WHO ROUTINELY HANDLES SENSITIVE INFORMATION CONNECTING TO YOUR NETWORK THOUGH A PERSONAL COMPUTER, IF YOU LACK THE ABILITY TO SCAN THE SECURITY POSTURE OF HIS OR HER COMPUTER?  

IF AN EMPLOYEE CAN USE AN UNKNOWN PERSONAL DEVICE TO CONNECT TO THE ORGANIZATION’S NETWORK, YOU MAY LACK VISIBILITY INTO THE DEVICE’S SECURITY UNLESS YOU INSTITUTE TECHNICAL MEASURES TO AUTHENTICATE THE DEVICE AND ADDRESS THOSE RISKS BEFORE NETWORK ACCESS IS PERMITTED.  

ORGANIZATIONS MAY WANT TO CONSIDER IMPLEMENTING A MOBILE DEVICE MANAGEMENT SOLUTION, NETWORK ACCESS CONTROL APPLIANCE OR OTHER TECHNICAL TOOLS TO MITIGATE THESE RISKS.

EMPLOYEES MAY ACCESS WEB-BASED RESOURCES THROUGH CREDENTIALS THAT DO NOT REQUIRE A CONNECTION THROUGH THE ORGANIZATION’S NETWORK, BUT RATHER BY DIRECTLY ACCESSING THE HOSTING WEBSITE.  

HAVE YOU ADDRESSED THE RISKS OF PERMITTING EMPLOYEES TO CONNECT DIRECTLY TO CLOUD BASED RESOURCES OUTSIDE OF YOUR NETWORK FROM THEIR HOMES?  IF SO, HAVE YOU CONSIDERED THE SENSITIVITY OF THE INFORMATION THEY HAVE ACCESS TO AND HOW TO EFFECTIVELY MONITOR THIS ACCESS?  

WHAT LOGGING CONFIGURATION DOES THE HOSTED SERVICES PERMIT, AND HAVE YOU IMPLEMENTED A LOGGING AND MONITORING PLAN THAT IS SUPPORTED BY RIGOROUS PERSONNEL POLICIES THAT PROVIDE NOTICE TO EMPLOYEES OF THE MONITORING?  

EFFECTIVE MONITORING IS CRITICALLY IMPORTANT TO BE ABLE TO DETECT AND RESPOND TO A BREACH OF SECURITY INVOLVING A REMOTE USER WITH DIRECT WEB BASED ACCESS.  GIVEN THE RISKS, EMPLOYERS MAY WANT TO CONSIDER REGULATING, SCREENING AND PROTECTING THIS TRAFFIC, USING A SECURE INTERNET GATEWAY OR OTHER TECHNICAL TOOLS.

MAKE SURE YOUR VPN IS AND REMAINS PATCHED, UPDATED, AND CONFIGURED USING SECURE BASELINES.

AS WITH ANY PATCHING AND SECURE CONFIGURATION PROCESS, THERE SHOULD BE A WRITTEN POLICY AND PROCEDURE THAT IS ENFORCED AND AUDITED.  ALSO, CONSIDER ELIMINATING “SPLIT TUNNELING” – WHERE EMPLOYEES CAN ACCESS THEIR HOME PRINTERS AND OTHER RESOURCES, WHICH MAY CREATE A GREATER RISK OF COMPROMISE.

TO ADDRESS THE INSIDER THREAT OF REMOTE WORKERS STEALING OR KEEPING SENSITIVE DATA AFTER THEY LEARN OF THEIR EMPLOYMENT TERMINATION, AN ORGANIZATION SHOULD HAVE WRITTEN PROCEDURES THAT ENSURE THAT SYSTEM ACCESS IS CUT OFF AT OR BEFORE THE TIME OF TERMINATION AS A DEFAULT.  

REMOTE WORKERS SHOULD BE SIGNING STRONG CONFIDENTIALITY AND ACCEPTABLE USE AGREEMENTS THAT PROVIDE FOR THE PRESERVATION, SAFEGUARDING AND RETURN OF COMPANY MATERIAL, AND SANCTIONS FOR FAILURE TO DO SO.  

A FORMALIZED INSIDER THREAT PROGRAM TO INCLUDE REMOTE WORKER SECURITY ISSUES SHOULD BE A PART OF ANY EFFECTIVE INFORMATION SECURITY MANAGEMENT PROGRAM.

BUSINESSES NEED TO ENSURE THAT SECURITY IS BUILT INTO CLOUD ENVIRONMENTS FROM THE START AND CONTINUALLY REEVALUATED TO MEET EVOLVING DEMANDS.

YOU NEED TOOLS TO DETECT AND ADDRESS IN-CLOUD THREATS QUICKLY. SOME SERVICES ALLOW YOU TO INTEGRATE YOUR EXISTING SECURITY TOOLS FOR DEEPER INSIGHTS INTO THREATS ACROSS HYBRID MULTICLOUD ENVIRONMENTS. 

THIS ALLOWS SECURITY TEAMS TO SEARCH FOR THREATS AND ORCHESTRATE RESPONSE WITH AUTOMATED ACTIONS QUICKLY — AND WITHOUT MOVING THE UNDERLYING DATA.


  1. THE LEVEL OF EMPLOYEES WORKING REMOTELY WILL ONLY INCREASE EXPONENTIALLY IN THE FUTURE. THAT MEANS MANY BUSINESSES WILL BE MOVING MORE OF THEIR INFRASTRUCTURE TO THE CLOUD AND HAVING TO DEAL WITH THE SECURITY CHALLENGES THAT COME FROM A HYBRID INFRASTRUCTURE

    A HYBRID CLOUD IS AN INFRASTRUCTURE THAT INCLUDES LINKS BETWEEN ONE CLOUD MANAGED BY THE USER (TYPICALLY CALLED “PRIVATE CLOUD”) AND AT LEAST ONE CLOUD MANAGED BY A THIRD PARTY (TYPICALLY CALLED “PUBLIC CLOUD”).

    HYBRID ENVIRONMENTS MAY NEED TO INCLUDE:--
    AT LEAST 1 PRIVATE CLOUD AND AT LEAST 1 PUBLIC CLOUD
    2 OR MORE PRIVATE CLOUDS
    2 OR MORE PUBLIC CLOUDS
    A BARE-METAL OR VIRTUAL ENVIRONMENT CONNECTED TO AT LEAST 1 CLOUD—PUBLIC OR PRIVATE

    WITH REMOTE WORK COMES GREATER CLOUD USAGE. THAT COULD BE A PROBLEM FOR MANY COMPANIES THAT HAVE ISSUES WITH VISIBILITY INTO THE SECURITY OF THEIR CLOUD COMPONENTS, AND THAT OFTEN RELY ON PERIMETER AND ON-PREMISE SECURITY SOFTWARE AND APPLIANCES TO KEEP THEIR SYSTEMS AND DATA SAFE

    SAAS ADOPTION IS NOW MORE IMPORTANT THAN EVER. THE CLOUD WILL ULTIMATELY SECURE WORKLOADS REGARDLESS OF WHERE EMPLOYEES ARE LOCATED

    THE COVID-19 PERIOD HAS ACCELERATED DIGITAL ADOPTION-- IT'S LIKE SOMEONE JAMMED THE ACCELERATOR AND JUMPED INTO THE HIGHEST GEAR..

    COVID-19 HAS FORCED COMPANIES TO RETHINK THE WAY THEY MANAGE NETWORK ACCESS. VPNS WERE FINE WHEN A SMALL PERCENTAGE OF WORKERS NEEDED TO ACCESS THE NETWORK REMOTELY. BUT WITH SOME COMPANIES GOING FROM A COUPLE OF HUNDRED REMOTE WORKERS TO MORE THAN 10,000 PRACTICALLY OVERNIGHT, IT MAKES NO SENSE TO SPEND FIVE TIMES OR MORE ON VPNS.

    EACH YEAR ON THE FIRST THURSDAY IN MAY, WORLD PASSWORD DAY PROMOTES BETTER PASSWORD HABITS. PASSWORDS ARE CRITICAL GATEKEEPERS TO OUR DIGITAL IDENTITIES

    FOR THE PAST FEW YEARS ON WORLD PASSWORD DAY WE'VE WONDERED WHY WE'RE CELEBRATING PASSWORDS GIVEN THE REALITY THAT MORE THAN 80% OF SECURITY BREACHES ARE CAUSED BY WEAK PASSWORDS AND CREDENTIALS

    TODAY, AS THOUSANDS OF COMPANIES HAVE BEEN FORCED TO WORK REMOTELY BECAUSE OF COVID-19 STAY-AT-HOME ORDERS, THE QUESTION THIS YEAR IS WHETHER THE PANDEMIC WILL RESULT IN THE MOVE TO PASSWORDLESS AUTHENTICATION SOLUTIONS EN MASSE.

    USING CSRF, AN ATTACKER COULD FORCE A VICTIM TO SEND THE ATTACKER SOME MONEY, OR BUY SOMETHING FROM THEM, OR UPVOTE THEIR VIDEOS.

    A CSRF VULNERABILITY CAN GIVE AN ATTACKER THE ABILITY TO FORCE AN AUTHENTICATED, LOGGED-IN USER TO PERFORM AN IMPORTANT ACTION WITHOUT THEIR CONSENT OR KNOWLEDGE. ... THIS MEANS THAT ANY APPLICATION THAT ALLOWS A USER TO SEND OR UPDATE DATA IS A POSSIBLE TARGET FOR AN ATTACKER.

    A CSRF ATTACK CAN OCCUR WHEN A MALICIOUS PROGRAM CAUSES A USER'S WEB BROWSER TO PERFORM AN UNWANTED ACTION ON A TRUSTED SITE ON WHICH THE USER IS CURRENTLY AUTHENTICATED.

    THIS TYPE OF ATTACK SPECIFICALLY TARGETS STATE-CHANGING REQUESTS TO INITIATE AN ACTION INSTEAD OF GETTING USER DATA BECAUSE THE ATTACKER HAS NO WAY TO SEE THE RESPONSE TO THE FORGED REQUEST.

    IN A SUCCESSFUL CSRF ATTACK, THE ATTACKER CAUSES THE VICTIM USER TO CARRY OUT AN ACTION UNINTENTIONALLY. FOR EXAMPLE, THIS MIGHT BE TO CHANGE THE EMAIL ADDRESS ON THEIR ACCOUNT, TO CHANGE THEIR PASSWORD, OR TO MAKE A FUNDS TRANSFER.

    AN INNOCENT END USER IS TRICKED BY AN ATTACKER INTO SUBMITTING A WEB REQUEST THAT THEY DID NOT INTEND. THIS MAY CAUSE ACTIONS TO BE PERFORMED ON THE WEBSITE THAT CAN INCLUDE INADVERTENT CLIENT OR SERVER DATA LEAKAGE, CHANGE OF SESSION STATE, OR MANIPULATION OF AN END USER'S ACCOUNT

    https://www.youtube.com/watch?v=SfhLtCKAWNQ

    https://www.youtube.com/watch?v=R2NHWqzR-MA

    https://www.youtube.com/watch?v=eWEgUcHPle0

    CONTINUED TO 2--
    1. CONTINUED FROM -1

      ATTACKERS HAVE FOCUSED ON TARGETING REMOTE WORKERS, VIRTUAL PRIVATE NETWORKING (VPN) TECHNOLOGIES, AND COLLABORATION SOFTWARE, SUCH AS ZOOM, IN THEIR ATTEMPTS TO TAKE ADVANTAGE OF COMPANIES' NOW MUCH-MORE-DISTRIBUTED ATTACK SURFACE AREA

      MOST COMPANIES DO NOT HAVE THE ABILITY TO LOCK DOWN EMPLOYEES' LAPTOPS NO MATTER WHERE THEY ARE..

      EFFECTIVELY OVERNIGHT, YOUR ATTACK SURFACE INCREASED DRAMATICALLY BECAUSE ANY WORKFORCE IS NOW OUTSIDE ANY PERIMETER SECURITY THAT YOU POSSIBLY HAD WITHIN AN OFFICE SPACE

      YOU ARE TOTALLY RELYING ON THE SECURITY THAT YOU HAVE BUILT INTO THE ENDPOINT, THE SECURITY AWARENESS THAT YOU HAVE INSTILLED IN THE USERS, AND ANY FORCED CONNECTIVITY THAT YOU HAVE USING A VPN BACK TO YOUR OWN INFRASTRUCTURE.

      COMPLICATING MATTERS WILL BE EMPLOYEES' DECISIONS TO USE UNAPPROVED CLOUD SERVICES FOR WORK, SO-CALLED SHADOW IT, AND THE UNIQUE RISKS THAT REMOTE PRIVILEGED USERS POSE TO NETWORK SECURITY. IN ADDITION, MANAGING THE SECURITY OPERATIONS CENTER REMOTELY ALSO POSES SIGNIFICANT CHALLENGES

      CLOUD IS HERE TO STAY. COLLABORATION TOOLS ARE HERE TO STAY. YOUR EMPLOYEES ARE GOING TO BE HOOKED ON THEM, AND THEY ARE GOING TO ALLOW YOU TO BE MORE PRODUCTIVE AND THINGS WILL BE DONE, BUT ATTACKERS WILL FOCUS ON THOSE WEAK POINTS AS WELL.

      THE TIME TO BRAINSTORM AND DO DYNAMIC RISK ASSESSEMENT IS NOW.. NOT AFTER SHIT HAS HIT THE FAN..

      MODI-- SUGGESTIONS ARE FOOD ON THE TABLE ( IN THE MOMENT)... GRIEVANCES ARE SHIT IN THE SEPTIC TANK ( PAST TENSE ) ..

      MODI, ARE YOU SURE THAT 95% OF OUR MINISTRY BABUS ARE NOT TRAITORS TO THE WATAN MOST IN DEEP STATE PAYROLL ?

      OUR FIRST PMO CHIEF MO MATHAI WAS A CIA SPY..

      http://ajitvadakayil.blogspot.com/2010/04/dynamic-risk-assessment-on-chemical.html

      WE WATCH..

      Capt ajit vadakayil
      ..


  1. https://economictimes.indiatimes.com/news/politics-and-nation/watch-pm-modi-interacts-with-bill-gates-via-video-conferencing-on-global-response-to-covid-19/videoshow/75749772.cms

    WE ASK MUKESH AMBANI AND PM MODI..

    WHY ARE YOU ALLLOWING BILL GATES ( AN AGENT OF THE JEWIS DEEP STATE ) TO PLAY DOCTOR OF THE PLANET..

    DON’T YOU KNOW THAT RIGHT NOW BILL GATES IS THE HIGHEST DONOR TO WHO, AND HIS POINT MAN IS THE ETHIOPIAN HEAD OF WHO – AND THIS FELLOW IS NOT EVEN A DOCTOR.

    TO CATCH BIG FISH YOU HAVE TO SACRIFICE SMALL FISH ON THE HOOK…
    5G IONISING RADIATION AFFECTS BABIES OF IVF PREGNANCIES, IN AS MUCH AS THE BABIES ARE AUTISTIC..

    http://ajitvadakayil.blogspot.com/2018/03/down-syndrome-trisomy-21-caused-by-ivf.html

    5G RADIATION WILL CAUSE THE PLANET TO STARVE AS STINGING BEES ARE POLLINATORS.. ALREADY THIS PLANET HAS LOST 60% OF OUR BEE POPULATION..

    https://ajitvadakayil.blogspot.com/2020/05/honey-most-dangerous-to-health-is-sold.html

    MODI IS THE DARLING OF JEWS ( HE WORE A MOSSAD SPONSORED SIKH TURBAN IN 1976 ) WHO USED THE WHITE REVOLUTION OF KERALA JEW VERGHESE KURAIN , A TRAITOR, TO SWITCH OUR PRICELESS HUMPED COWS WITH “WORSE THAN PIGS “ HUMPLESS WESTERN COWS WHICH GIVE TOXIC A1 MILK/ TOXIC URINE/ TOXIC DUNG AND TOXIC BEEF..

    FATHER OF GREEN REVOLUTION TRAITOR MS SWAMINATHANs DAUGHTER DR SAUMYA IS NOW CHIEF SCIENTIST OF WHO.. BY MERIT? OH YEAH?..

    SAUMYA BABY IS TRYING HARD TO CONVERT INDIANS TO GUINEA PIGS BY “KOSHER COMPASSION”….. CONSCIOUS BRAIN EXPERIMENTS CANNOT BE DONE ON LAB RATS WHO CANNOT PASS COLOUR/ MIRROR TEST..

    OUR FERTILE HUMUS LADEN TOP SOIL SIX FEET DEEP IS NOW A FEW INCHES ( LIKE BELGIUM, WHO HAS A FANTASTIC COVID-19 DEATH RATE ) . .. THE BELGIUM PEOPLE HAVE NO NATURAL IMMUNITY PROVIDES BY ORGANIC VEGGIES/ FRUITS/ GRAINS..

    95% OF OUR LAKES WHICH HELD PRISTINE WATER FOR MILLIONS OF YEARS HAS VANISHED IN 55 YEARS FLAT.. CHEMICAL FERTILISER GMO PUSHING GREEN REVOLUTION DECIMATED OUR GROUND WATER / AQUIFERS , TOP SOIL AND THE IMMUNITY OF INDIANS..

    Read all 7 parts of the post below--

    http://ajitvadakayil.blogspot.com/2019/03/india-must-revert-to-organic.html

    WE KNOW WHY BILL GATES TREATS PUNE SERUM INSTITUTE AS HIS TAJ MAHAL..

    THE BILLIONAIRE PARSI OWNER CYRUS POONAWALA WAS A SECRETIVE RACE HORSE STUD FARM OWNER, WHO MADE A MIGHTY JUMP FROM HORSE SERUM TO HUMAN VACCINES.. WE KNOW HOW AND WHY , AS WHISTLE BLOWERS HAVE SPOKEN..

    WE WATCH..

    SO IF ANYBODY HAS BAGS OF MONEY HE CAN PLAY DOCTOR TO THE PLANET?.. WHOSE IDEA IS ALL THIS?..

    WHO AND US CDC IS PACKED WITH BRIBED AGENTS OF KOSHER EVIL PHARMA.. BY CASH AND PEDOPHILE SEXUAL JAUNTS..

    Capt ajit vadakayil
    ..



    1. PUT ABOVE COMMENT IN WEBSITES OF—
      BILL GATES
      MELINDA GATES
      NITA AMBANI
      MUKESH AMBANI
      ANIL AMBANI
      BILL GATES FOUNDATION
      PUNE SERUM NSTITUTE
      CYRUS POONAWALA
      ADAR POONAWALA
      QUEEN OF ENGLAND
      PRINCE CHARLES
      TRUMP
      EVERY US SENATOR/ CONGRESS MAN
      EXTERNAL AFFAIRS MINISTER/ MINISTRY
      PUTIN
      BORIS JOHNSON
      MACRON
      ANGELA MERKEL
      XI
      AMBASSADORS TO FROM USA/ RUSSIA/ UK/ FRANCE / GERMANY
      EDITOR GLOBAL TIMES HU XIJIN
      PMO
      PM MODI
      HEALTH MINISTER/ MINISTRY CENTE- STATES
      AMIT SHAH
      HOME MINISTRY CENTRE/ STATES
      CJI BOBDE
      ATTORNEY GENERAL
      LAW MINISTER PRASAD / MINISTRY CENTRE AND STATES
      ALL CHIEF JUSTICES HIGH COURTS
      I&B MINISTER / MINISTRY
      NSA
      AJIT DOVAL
      RAW
      IB
      CBI
      NIA
      ED
      ALL DGPs OF INDIA
      ALL IGs OF INDIA
      ALL CMs OF INDIA
      ALL MLAs OF INDIA
      ALL MPs OF INDIA
      ALL COLLECTORS OF MAJOR CITIES
      ALL STATE GOVERNORS
      PRESIDENT OF INDIA
      VP OF INDIA
      SPEAKER LOK SABHA
      SPEAKER RAJYA SABHA
      ALL INDIAN THINK TANKS
      NITI AYOG
      AMITABH KANT
      MOHANDAS PAI
      RAJEEV CHANDRASHEKHAR
      E SREEDHARAN
      WILLIAM DALRYMPLE
      KONRAED ELST
      FRANCOIS GAUTIER
      STEPHEN KNAPP
      DAVID FRAWLEY
      GVL NARASIMHA RAO
      SAMBIT PATRA
      ASHOK PANDIT
      ANUPAM KHER
      KANGANA RANAUT
      VIVEK AGNIHOTRI
      MEENAKSHI LEKHI
      SMRITI IRANI
      PRASOON JOSHI
      SWAPAN DASGUPTA
      MADHU KISHWAR
      SUDHIR CHAUDHARY
      GEN GD BAKSHI
      RSN SINGH
      ARNAB GOSWAMI
      NAVIKA KUMAR
      ANAND NARASIMHAN
      RAHUL SHIVSHANKAR
      RAJDEEP SARDESAI
      SRINIVASAN JAIN
      SONAL MEHROTRA KAPOOR
      VIKRAM CHANDRA
      NIDHI RAZDAN
      ZAKKA JACOB
      RAHUL ANWAL
      RAVISH KUMAR
      PRANNOY JAMES ROY
      AROON PURIE
      VINEET JAIN
      RAGHAV BAHL
      SEEMA CHISTI
      DILEEP PADGOANKAR
      VIR SANGHVI
      KARAN THAPAR
      PRITISH NANDI
      ASHISH NANDI
      SHEKHAR GUPTA
      SIDHARTH VARADARAJAN
      PAVAN VARMA
      RAMACHANDRA GUHA
      THAMBI SUNDAR PICHAI
      SATYA NADELLA
      CEO OF WIKIPEDIA
      QUORA CEO ANGELO D ADAMS
      QUORA MODERATION TEAM
      KURT OF QUORA
      GAUTAM SHEWAKRAMANI
      MUKESH AMBANI
      RATAN TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      SWAMY
      RAJIV MALHOTRA
      P GURUS
      RSS
      AVBP
      VHP
      MOHAN BHAGWAT
      RAM MADHAV
      MOHANLAL
      SURESH GOPI
      NALIN KOHLI.
      RAJ THACKREY
      CHANDAN MITRA
      SADGURU JAGGI VASUDEV
      BABA RAMDEV
      SRI SRI RAVISHANKAR
      CHETAN BHAGAT
      AMISH TRIPATHI
      DEVDUTT PATTANAIK
      THE QUINT
      THE SCROLL
      THE WIRE
      THE PRINT
      MK VENU
      MADHU TREHAN
      SANJAY HEDGE
      SHOBHAA DE
      ARUNDHATI ROY
      MADHU TREHAN
      JAIRAM RAMESH
      SHASHI THAROOR
      KAPIL SIBAL
      ABHI SEX MAANGTHA SINGVI
      TEHSEEN POONAWAALA
      SHEHZAD POONAWALA
      SANJAY JHA
      SURJEWALA
      AK ANTONY
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA VADRA
      AK ANTONY
      PC CHACKO
      JEAN DREZE
      DIG VIJAY SINGH
      JULIO RIBEIRO
      ASADDUDIN OWAISI
      SHEHLA RASHID
      RANA AYYUB
      SUHEL SETH
      SHAZIA ILMI
      MANI SHANGARAN AIYERAN
      SALMAN KHURSHEED
      GHULAM NABI AZAD
      ENTIRE BBC GANG
      SWARA BHASKAR
      ALL HINDU STALWARTS AND ORGS
      ROMILA THAPAR
      IRFAN HABIB
      NIVEDITA MENON
      AYESHA KIDWAI
      MAJOR WORLD MEDIA
      HISTORY CHANNEL
      DAVID HATCHER CHILDRESS
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA VADRA
      SOLI BABY
      FALI BABY
      KATJU BABY
      SALVE BABY
      JOHN BRITTAS
      PRAKASH KARAT
      BRINDA KARAT
      SITARAM YECHURY
      D RAJA
      ALEX JONES
      RENSE
      DAVID ICKE
      ANGELO JOHN GAGE
      DEEPAK CHOPRA
      ROBIN SHARMA
      TAREK FATEH
      ALL INDIAN MEDIA
      GITA GOPINATH
      AMARTYA SEN
      RAGHURAM RAJAN
      PRINCESS HEND AL QASSIMI
      SPREAD ON SOCIAL MEDIA--

      SPREAD BY WHATS APP


  1. THUMB RULE: NEVER LOCK THE STABLE DOORS AFTER THE HORSES HAVE BOLTED
    ########################

    https://ajitvadakayil.blogspot.com/2020/05/what-artificial-intelligence-cannot-do.html

    INSIDER THREATS ENCOMPASS EMPLOYEES UNINTENTIONALLY SHARING PRIVATE DATA OUTSIDE OF WORKPLACE NETWORKS, BUT ALSO THE DELIBERATE STEALING OF DATA, TYPICALLY MOTIVATED BY FINANCIAL OPPORTUNITY OR A GRUDGE AGAINST AN EMPLOYER. A GROWING ISSUE, IS INTELLECTUAL PROPERTY THEFT AND ESPIONAGE ON BEHALF OF FOREIGN GOVERNMENTS.

    THERE ARE NEWER GROUPS THAT SEEK TO PROACTIVELY ALERT EMPLOYERS TO ANOMALOUS ACTIVITY THROUGH BEHAVIOURAL ANALYSIS OF DATA — WHICH CAN INVOLVE SCREENSHOTS AND KEYSTROKE LOGGING — AND THEN PLACE THE ONUS ON THOSE EMPLOYERS TO ACT IN A WAY THEY SEE FIT.

    TRADITIONAL CYBERSECURITY RELIES ON PERIMETER SOLUTIONS THAT ATTEMPT TO PREVENT INTRUSIONS AND LEAKAGE OF CONFIDENTIAL INFORMATION. THE SUDDEN MOVE TOWARD WORKING FROM HOME HAS EXPANDED THAT PERIMETER EXPONENTIALLY. IT’S NOW POTENTIALLY THOUSANDS OF DISAGGREGATED ENDPOINTS -- FAR TOO MANY TO SUCCESSFULLY SECURE THE TRADITIONAL WAY.

    THE USE OF VIRTUAL MEETINGS DURING THE PANDEMIC HAVE TAKEN AN ASTRONOMICAL JUMP. ONE ONLINE MEETING PLATFORM REPORTED MONTHLY USERS OF ITS VIDEO CONFERENCING APP SURGED FROM 10 MILLION IN DECEMBER TO 200 MILLION IN MARCH

    ADDITIONALLY, THE “NOT IN THE WORKPLACE” PROHIBITION AGAINST SOME APPS, DEVICES AND BEHAVIORS HAS BEEN VACATED AS PEOPLE WORK FROM HOME. THE VISIBILITY OF ACTIVITY AND PERSISTENCE OF GOVERNMENT WORKPLACE PROTOCOLS HAVE CHANGED WITH THE ADJUSTMENT, AND THE “USUAL” THREAT REPORTING AVENUES ARE NO LONGER AVAILABLE. AS A RESULT, CYBERSECURITY PROTOCOLS MUST QUICKLY EVOLVE TO SECURELY ADAPT TO THIS NEW REALITY.

    EFFECTIVE CYBERSECURITY PROTOCOLS NOW REQUIRE TOTAL VISIBILITY OF GOVERNMENT ASSETS -- THE ABILITY TO SEE AND MONITOR ACTIVITY IN REAL-TIME, QUICKLY RECOGNIZE PATTERNS AND BEHAVIORS AND MOVE TO ISOLATE AND ELIMINATE THREATS BEFORE THEY BECOME BREACHES. SECURITY TEAMS CAN ACCOMPLISH THIS THROUGH NON-INTRUSIVE MONITORING AND MACHINE LEARNING TECHNOLOGY THAT ANALYSES TELEMETRY FROM DATA, MACHINES, APPLICATIONS AND PEOPLE.

    IT’S CRITICALLY IMPORTANT TO IDENTIFY MALICIOUS INSIDERS IMMEDIATELY AND CAPTURE A FULL AUDIT-TRAIL TO STOP THEM BEFORE THEY STEAL DATA OR SABOTAGE SYSTEMS

    THE SAME APPLIES TO MALICIOUS OUTSIDERS WHO SOMEHOW MANAGE TO GET ACCESS TO GOVERNMENT SYSTEMS -- THEIR BEHAVIOR SHOULD BE DETECTED IMMEDIATELY SO THAT SENSITIVE SYSTEMS AND LEGITIMATE USER ACCOUNTS CAN BE QUARANTINED.

    WITH A LARGE SHARE OF WORKERS ACCESSING NETWORKS AND FILES FROM HOME AND CIRCUMVENTING VPNS, THE SECURITY RISKS HAVE GROWN EVEN GREATER.

    A VIRTUAL PRIVATE NETWORK (VPN) EXTENDS A PRIVATE NETWORK ACROSS A PUBLIC NETWORK AND ENABLES USERS TO SEND AND RECEIVE DATA ACROSS SHARED OR PUBLIC NETWORKS AS IF THEIR COMPUTING DEVICES WERE DIRECTLY CONNECTED TO THE PRIVATE NETWORK. VPN TECHNOLOGY WAS DEVELOPED TO ALLOW REMOTE USERS AND BRANCH OFFICES TO ACCESS CORPORATE APPLICATIONS AND RESOURCES.

    A CLOUD VPN ALLOWS BUSINESSES TO MAINTAIN AND PROTECT THEIR PRIVATE CLOUD RESOURCES.

    CLOUD VPN IS ALSO KNOWN AS HOSTED VPN OR VIRTUAL PRIVATE NETWORK AS A SERVICE (VPNAAS). CLOUD STORAGE SERVICES AND VPNS GO HAND IN HAND WHEN THERE’S A NEED FOR MORE SECURITY ONLINE. THE MOST POPULAR CLOUD STORAGE SERVICES ARE INDEED SAFE AND SECURE. BUT VPNS CAN PROVIDE AN EXTRA LAYER OF PROTECTION, ESPECIALLY WHEN DEALING WITH SENSITIVE DATA.

    A VPN IS A NETWORK OF SERVERS THAT ENABLES USERS TO CONNECT TO PUBLIC NETWORKS SECURELY AND ANONYMOUSLY. VPNS HIDE THE USER’S IDENTITY AND ENCRYPT SENSITIVE DATA BEFORE SENDING IT THROUGH THE PUBLIC NETWORK.

    VPNS ALLOW US TO ACCESS OUR CLOUD STORAGE FROM ANYWHERE WITHOUT LIMITATIONS. UNRESTRICTED ACCESS IS ESPECIALLY USEFUL FOR GOING AROUND FIREWALLS OR GEO-BLOCKING ON OUR CLOUD STORAGE SERVICES.

    FOR EXAMPLE, GOOGLE IS BANNED IN CHINA. SO, BY USING A VPN, WE COULD ACCESS OUR GOOGLE DRIVE FROM WITHIN CHINA BY CONNECTING TO A SERVER IN THE US, FOR INSTANCE.


    CONTINUED TO 2--
    ReplyDelete
    Replies
    1. CONTINUED FROM 1-

      EVEN THOUGH VPNS ARE SECURE AND SAFE TO USE, THEY HAVE ONE MAJOR FLAW. IF WE ARE, LET’S SAY, USING A FREE VPN SERVICE, THE OWNER OF THE VPN COULD TRACK OUR ACTIVITIES. SINCE ALL OF OUR TRAFFIC IS GOING THROUGH THE VPN, IT’S EASY FOR ADMINISTRATORS TO SEE WHAT SITES WE ARE VISITING.

      THEY MIGHT USE THAT DATA TO TARGET ADS BASED ON THE SITES WE ARE VISITING. ALSO, THEY MIGHT HAVE ACCESS TO OUR SENSITIVE INFORMATION.

      PEOPLE SHOULD USE VPNS WHEN ACCESSING CLOUD STORAGE SERVICES. BY CONNECTING TO THE CLOUD OVER AN UNSECURED INTERNET CONNECTION, WE RUN THE RISK OF EXPOSING OUR DATA TO HACKERS.

      ALSO, VPNS ARE USEFUL WHEN WE WANT TO ACCESS OUR CLOUD STORAGE ANONYMOUSLY. THE CLOUD STORAGE PROVIDER WON’T BE ABLE TO SEE OUR IP ADDRESS, BUT, INSTEAD, THEY WILL SEE THE IP ADDRESS OF THE VPN SERVER.

      VPNS ARE USEFUL FOR BYPASSING FIREWALLS OR OTHER GEO-LOCATION RESTRICTIONS. THAT ALLOWS US TO USE OUR CLOUD STORAGE FROM ANYWHERE IN THE WORLD FREELY AND WITHOUT LIMITATIONS.

      IF SET UP CORRECTLY, VPN TOOLS SHOULD PROVIDE A SECURE, ENCRYPTED TUNNEL FOR EMPLOYEES TO ACCESS TO A NETWORK. HOWEVER, RISKS CAN ARISE WHEN THEY ARE MISCONFIGURED AND NOT REGULARLY PATCHED, LEADING TO VULNERABILITIES THAT ALLOW ATTACKERS TO OBTAIN NETWORK ACCESS.

      PHISHING ATTACKS THAT TARGET REMOTE WORKERS HAVE INCREASED SUBSTANTIALLY SINCE THE CORONAVIRUS OUTBREAK AND USE PLATFORM NOTIFICATIONS SUCH AS FILE SHARING AS A HOOK TO BAIT RECIPIENTS INTO SHARING CREDENTIALS AND INSTALLING MALWARE

      REMOTE DESKTOP PROTOCOL, OR RDP FOR SHORT, ENABLES A USER OF A COMPUTER IN ONE LOCATION TO ACCESS A COMPUTER OR SERVER IN ANOTHER. MOST COMPUTERS RUNNING A WINDOWS CLIENT OPERATING SYSTEM HAVE MICROSOFT’S RDP CLIENT SOFTWARE PRE-INSTALLED.

      RDP IS COMMONLY USED BY SYSTEM ADMINISTERS TO PERFORM REMOTE ADMINISTRATION OR PROVIDE TECHNICAL SUPPORT, BUT DURING LOCKDOWN, MANY MORE EMPLOYEES WITHIN YOUR ORGANISATION COULD ALSO BE USING IT TO ACCESS THE TOOLS, APPS, SOFTWARE AND FILES THEY NEED TO BE ABLE TO PERFORM THEIR JOB.

      THIS PRESENTS AN INCREASED SECURITY RISK – HACKERS THAT COMPROMISE A REMOTE WORKER’S CONNECTION WILL BE ABLE TO ACCESS YOUR ORGANISATION’S CORPORATE NETWORK. IF RDP IS BEING EXPOSED DIRECTLY TO THE INTERNET WITHOUT MULTIPLE LEVELS OF ACCESS CONTROLS, YOUR ORGANISATION’S RISK IS INCREASED CONSIDERABLY.

      DURING THE CORONAVIRUS OUTBREAK, ATTACKERS ARE TARGETING USERS RELIANT ON RDP WITH FAR GREATER REGULARITY. THERE HAVE BEEN MULTIPLE INSTANCES RECORDED OF ATTACKERS BOMBARDING RDP SERVICES WITH BRUTE-FORCE ATTACKS.

      THERE ARE VARIANTS OF TRICKBOT, A PARTICULARLY AGGRESSIVE TYPE OF MALWARE, THAT HAVE BEEN UPGRADED WITH A MODULE FOR BRUTEFORCING RDP ACCOUNTS. RYUK, A TYPE OF RANSOMWARE THAT IS ALSO PARTICULARLY ACTIVE AT THIS TIME, USES RDP TO SPREAD LATERALLY THROUGH COMPROMISED NETWORKS.

      SHADOW IT, A TERM USED TO DESCRIBE THE USE OF SOFTWARE NOT PRE-AUTHORISED BY IT DEPARTMENTS, IS ALSO AN INCREASED RISK AT THIS TIME, PARTICULARLY IF EMPLOYEES ARE USING THEIR OWN PERSONAL DEVICES FOR WORK PURPOSES.

      IT MAY BE TEMPTING TO RELAX FIREWALL SECURITY CONTROLS TO MAINTAIN AVAILABILITY AND LIMIT DISRUPTIONS. HOWEVER, THIS IS LIKELY TO LEAD TO EXPOSURES SUCH AS OPEN PORTS, MISAPPLIED PORT FORWARDING RULES, A FAILURE TO KEEP AN ACCURATE INVENTORY OF SERVICES AND APPLICATIONS, AND POLICIES THAT DON’T ADHERE TO THE PRINCIPLE OF LEAST PRIVILEGE.

      ALMOST ALL FUTURE FIREWALL BREACHES WILL BE CAUSED BY MISCONFIGURATIONS.

      DURING THE CORONAVIRUS OUTBREAK, AN ABILITY TO SWIFTLY DETECT AND RESPOND TO ENDPOINT-FOCUSED THREATS IS IMPERATIVE. CORONA-VIRUS THEMED PHISHING CAMPAIGNS ARE SPREADING MANY ADVANCED FORMS OF MALWARE TO STEAL USER PASSWORDS AND BANKING INFORMATION. THREATS TO BE AWARE OF INCLUDE TRICKBOT, MAZE, RYUK AND ZBOT.

      Capt ajit vadakayil
      ..


  1. https://www.youtube.com/watch?v=tWR1KXgEYxE

    ANSIBLE IS AN OPEN-SOURCE SOFTWARE PROVISIONING, CONFIGURATION MANAGEMENT, AND APPLICATION-DEPLOYMENT TOOL.

    IT RUNS ON MANY UNIX-LIKE SYSTEMS, AND CAN CONFIGURE BOTH UNIX-LIKE SYSTEMS AS WELL AS MICROSOFT WINDOWS. IT INCLUDES ITS OWN DECLARATIVE LANGUAGE TO DESCRIBE SYSTEM CONFIGURATION.

    ANSIBLE IS AN ABSOLUTELY FREE AND OPEN SOURCE TOOL

    ANSIBLE CAN AUTOMATE IT ENVIRONMENTS WHETHER THEY ARE HOSTED ON TRADITIONAL BARE METAL SERVERS, VIRTUALIZATION PLATFORMS, OR IN THE CLOUD. IT CAN ALSO AUTOMATE THE CONFIGURATION OF A WIDE RANGE OF SYSTEMS AND DEVICES SUCH AS DATABASES, STORAGE DEVICES, NETWORKS, FIREWALLS, AND MANY OTHERS

    BY DEFAULT ANSIBLE MODULES REQUIRE PYTHON TO BE PRESENT IN THE TARGET MACHINES, SINCE THEY ARE ALL WRITTEN IN PYTHON

    ANSIBLE CANNOT RUN ON A WINDOWS HOST AND CAN ONLY MANAGE WINDOWS HOSTS, BUT ANSIBLE CAN BE RUN UNDER THE WINDOWS SUBSYSTEM FOR LINUX (WSL).

    https://www.youtube.com/watch?v=DNB7TSMPuAE

    capt ajit vadakayil
    ..


  1. https://cio.economictimes.indiatimes.com/news/enterprise-services-and-applications/alibaba-backed-chat-app-dingtalk-enters-india-to-optimize-corporate-communication/62510385

    SINCE THE COVID-19 OUTBREAK, ALIBABA CLOUD SERVICES HAVE GROWN RAPIDLY, WITH ABOUT 200 MILLION CHINESE WORKING FROM HOME USING ALIBABA COLLABORATION APP DINGTALK AND ABOUT 50 MILLION STUDENTS LEARNING FROM HOME USING THE APP.

    DINGTALK IS AN ENTERPRISE COMMUNICATION AND COLLABORATION PLATFORM DEVELOPED BY CHINESE ALIBABA GROUP.

    ALIBABA GROUP IS NVESTING $28 BILLION INTO ITS CLOUD PLATFORM OVER THE NEXT THREE YEARS IN AN ATTEMPT TO BOLSTER SUPPORT FOR SERVICES THAT HAVE SURGED IN LIGHT OF THE COVID-19 VIRUS OUTBREAK.

    WITH AMAZON AND MICROSOFT IN A GLOBAL TWO HORSE RACE OWNING THE CLOUD MARKET, ALIBABA IS MAKING ITS MOVE..

    CHINA'S CLOUD COMPUTING MARKET IS ALREADY THE WORLD'S SECOND LARGEST BUT IS STILL JUST ABOUT ONE-TENTH THE SIZE OF THE UNITED STATES (THE WORLD'S LARGEST),

    ALIBABA CLOUD IS THE WORLD’S THIRD BIGGEST IAAS CLOUD SERVICES PROVIDER AND THE BIGGEST IN ASIA FOR THE THIRD YEAR IN A ROW..

    IN A BID TO WIN OVER USERS OF RIVAL PLATFORMS, GOOGLE HAS ANNOUNCED THAT IT WILL BE MAKING MEET AVAILABLE FREE TO EVERYONE WITH A GOOGLE ACCOUNT. PREVIOUSLY, ANYONE COULD JOIN A MEET CALL, ALTHOUGH ONLY PAYING G SUITE USERS COULD START CALLS.
    ZOOM ESCALATED TO BECOME THE MOST DOWNLOADED APP IN APRIL 2020 WHILE GOOGLE MEET CLIMBED THE LADDER TO CLAIM THE EIGHT SPOT FOLLOWED BY MICROSOFT TEAMS (VIDEO CONFERENCING SOLUTION) AT TENTH NUMBER.

    GOOGLE RECENTLY ANNOUNCED TO MAKE MEET FREE FOR ALL USERS UNTIL SEPTEMBER 2020

    SENDING A WARNING CALL TO ZOOM, GOOGLE MEET HAS CROSSED 50 MILLION DOWNLOADS ON PLAY STORE, A MASSIVE 900 PER CENT INCREASE IN USER BASE IN A SPAN OF FEW WEEKS AS PEOPLE WORK FROM HOME IN THE COVID-19 PANDEMIC.

    https://www.youtube.com/watch?v=O8Y1vlfpbEU

    https://www.youtube.com/watch?v=7KWbb0yK-ao

    IT’S CRITICAL TO MONITOR WHICH CORPORATE IDS ARE LOGGED INTO YOUR INSTANCE AND WHICH ADDITIONAL TOOL SETS ARE ATTACHED TO IT. SECURITY AND IT SHOULD MANDATE THAT ALL BUSINESS COMMUNICATIONS TAKE PLACE OVER CORPORATE LICENSED INSTANCES RATHER THAN FREE ACCOUNTS ANYONE CAN USE.

    CONSIDER ENHANCING YOUR WEB SECURITY WITH A SOLUTION THAT GIVES YOU VISIBILITY INTO WHICH EMPLOYEES ARE ACCESSING ZOOM OR OTHER VIDEO CONFERENCING TOOLS. THE INCLUDES A SHADOW IT FEATURE THAT REVEALS CLOUD APPLICATIONS BEING USED WITHIN YOUR ORGANIZATION. FOR MORE COMPREHENSIVE PROTECTION, YOU CAN ADD FULL CLOUD ACCESS SECURITY BROKER (CASB) CAPABILITIES, WHICH PROVIDE VISIBILITY AND CONTROL ACROSS ALL CLOUD APPLICATIONS YOUR ORGANIZATION IS ACCESSING—WHETHER SANCTIONED OR NOT.

    IT’S IMPORTANT TO ENSURE MEETINGS INCLUDE ONLY THE PEOPLE WHO ARE SUPPOSED TO BE ATTENDING. MOST VIDEO CONFERENCING APPLICATIONS ALLOW USERS TO CREATE A SPECIFIC MEETING ID THAT CAN BE REUSED FOR GENERAL MEETINGS. BUT IN CASES WHERE MEETINGS HAVE LARGE NUMBERS OF ATTENDEES, ENCOURAGE EMPLOYEES TO CREATE UNIQUE MEETING IDS. BEYOND THAT, VIDEO CONFERENCING APPS ALLOW DIFFERENT WAYS TO CONTROL WHO ATTENDS. MAKE SURE EMPLOYEES ARE AWARE OF FEATURES LIKE WAITING ROOMS, HOW TO DISABLE VIDEO SHARING, AND HOW TO MUTE PARTICIPANTS AS A GROUP OR AT THE INDIVIDUAL LEVEL.

    CONTINUED TO 2-
    1. CONTINUED FROM 1-

      SHOW EMPLOYEES HOW TO REQUIRE PASSWORDS FOR PARTICIPANTS TO JOIN SENSITIVE MEETINGS. ZOOM NOW ENABLES WAITING ROOMS BY DEFAULT AND REQUIRES PASSWORDS FOR MEETING ROOMS. OTHER VENDORS MAY FOLLOW SUIT, BUT IT’S WORTH EITHER CONTROLLING THOSE SETTINGS AS AN ADMIN OR AT LEAST MAKING SURE USERS UNDERSTAND HOW THOSE FEATURES WORK.

      MOST VIDEOCONFERENCING APPLICATIONS ALLOW USERS TO RECORD MEETINGS. AND THEY USUALLY ALLOW A USER TO STORE THE RECORDING ON THE LOCAL ENDPOINT DEVICE THAT HOSTED THE MEETING, OR IN THE CLOUD.

      IF A USER CHOOSES TO SAVE MEETING RECORDINGS TO THE LOCAL MACHINE, YOU CAN CREATE A POLICY WITHIN YOUR DATA LOSS PREVENTION (DLP) SOLUTION—IF YOU HAVE ONE IN PLACE—THAT AUTOMATICALLY LIMITS THE MOVEMENT OF THAT TYPE OF FILE USING FILE FINGERPRINTING. THESE CONTROLS PREVENT CERTAIN TYPES OF FILES FROM BEING MOVED OFF THE ENDPOINT DEVICE OR ACROSS THE NETWORK.

      PUTTING DATA PROTECTION POLICIES IN PLACE THAT RESTRICT OR PROHIBIT SENSITIVE DATA MOVEMENT CAN LIMIT USERS FROM SHARING DATA IN A CHAT, OR KEEP IT OUT ENTIRELY.

      MANY VIDEO CONFERENCING SOLUTIONS CAN TRANSCRIBE AUDIO RECORDINGS. IF YOU ENABLE THIS FUNCTIONALITY AT AN ADMIN LEVEL, USERS CAN OPT TO RECEIVE AUDIO TRANSCRIPTS OF MEETINGS THEY RECORD. CAN PROTECT THIS FILE JUST AS RELIABLY IF IT WERE SAVED TO A LOCAL DEVICE, PREVENTING EXFILTRATION AND ENABLING YOUR TEAM TO ENFORCE UNIFIED POLICIES ACROSS YOUR ON-PREMISES ENVIRONMENT AND ANY CLOUD LOCATIONS WHERE THESE FILES ARE STORED.


      capt ajit vadakayil
      ..




















https://www.moneycontrol.com/news/trends/amuls-video-diary-on-pm-modis-milestones-goes-viral-4453571.html

ALL FOREIGN LEADERS LIKE TRUMP/ PUTIN/ BORIS JOHNSON PLEASE NOTE..

NEXT TIME WHEN MODI COMES RUNNING TO YOU TO HUG YOU REMEMBER THIS MESSAGE BELOW..

#####################################

AMUL KEEPS PRAISING MODI ..

AMUL IS THE BRAND NAME OF GUJARAT MILK MARKETING FEDERATION.. MODI IS A GUJARATI, WHO WORE ROTHSCHILD SPONSORED SIKH TURBAN IN 1976 FOR GETTING BACK ROTHSCHILDs BANKS WHICH INDIRA GANDHI NATIONALISED ..

55 YEARS AGO JEW ROTHSCHILD USED A JEW FROM MY HOMETOWN CALICUT, VERGHESE KURIAN TO CONDUCT THE "WHITE REVOLUTION"..

THIS CONSPIRACY WAS TO SWITCH OUR PRICELESS INDIAN HUMPED COWS ( WHOM HINDUS WORSHIP AS GODS ) TO "WORSE THAN PIGS" HUMPLESS JERSEY/ HOLSTEIN HUMPLESS COWS ..

OUR HUMPED BULLS WERE DECIMATED.. IN MY HOME STATE KERALA , IF YOU OWNED A HUMPED COW THE LAW WAS, YOU WILL BE JAILED..

IN EVERY INDIAN HINDU HOUSEHOLD, WOMEN GOT UP IN THE MORNING, TOUCHED THE HUMP OF A BULL ( NANDI ) AND PRAYED TO SHIVA.. IT WAS AKIN TO A TEMPLE IN YOUR OWN HOME..

http://ajitvadakayil.blogspot.com/2014/01/nandi-bull-vahana-and-gatekeeper-of.html

HUMPED COW GAVE PRICELESS A1 MILK.. AT LESSER QUANTITIES THAN THE WESTERN HUMPLESS COW WHICH GAVE HUGE QUANTITIES OF TOXIC A1 MILK, WHICH CAUSED 85% DISEASES ..

EVEN A BARREN HUMPED COW WAS PRICELESS, AS ITS URINE WAS MONOATOMIC GOLD COLLOID LADEN.. IT WAS/ IS THIS PLANETs ONLY ANTIBIOTIC WITHOUT SIDE EFFECTS ..

EVEN DURING THIS CORONAVIRUS AGE, A TEA SPOON OF HUMPED COW URINE ( DRUNK WITHIN 120 SECONDS OF EJECTION ) PROTECTS AND CURES YOU FROM CORONAVIRUS..

AS SOON AS I PENNED THE POST-- GOOGLE, A TOOL OF THE JEWISH DEEP STATE DELETED MY BLOG POST..

https://ajitvadakayil.blogspot.com/2020/04/google-deleted-my-valuable-post-on.html

HUMPED COW DUNG IS SWEET SMELLING, COVERED BY A SHINY VENEER OF ENZYMES WHICH PREVENTED FLIES .. THIS WAS OUR GREAT ORGANIC FERTILIZER FOR MILLENNIUMS ..

THE FATHER OF THE "GREEN REVOLUTION" CONVERTED OUR ORGANIC FARMING INTO INORGANIC FARMING.. WHERE WE WERE FORCED TO USE CHEMICAL FERTILIZERS DECIMATING OUR HUMUS LADEN TOP SOIL..

FOR MILLIONS OF YEARS WE HAD PRISTINE LAKES AND RIVERS.. IN A MERE 55 YEARS WE LOST 95% OF OUR LAKES ..

OUR TOP SOIL WHICH WAS SIX FEET DEEP IS NOW A MERE COUPLE OF INCHES.. KOSHER PHARMA LAUGHED ALL THE WAY TO THE BANK..

INDIA IS THE PLANETs NO 1 BEEF EXPORTER.. DESPITE CHAMPION OF HINDUS MODI ( SIC ) RULING FOR SIX YEARS..

WHY?

BECAUSE HUMPLESS WESTERN COW MEAT IS TOXIC..

http://ajitvadakayil.blogspot.com/2013/12/shocking-legacy-of-mad-cow-disease-capt.html

MODIs CREATION "AMUL" MILK , THE BRAND NAME OF GUJARAT MILK MARKETING FEDERATION ADULTERATES MILK, WHICH HAS CAUSED THE DEATHS OF HUNDREDS OF THOUSANDS OF INDIAN BABIES..

HERE MELAMINE IS ADDED TO MILK TO HOODWINK THE NITROGEN BASED LAB TEST..

MELAMINE INCREASES THE NITROGEN CONTENT OF MILK.. THIS SHOWS UP AS HIGHER PROTEIN IN USELESS WATERY SKIMMED MILK ..
WHEN CAPT AJIT VADAKAYIL COMPLAINED TO MODIs GOVT -- THE HAUGHTY RESPONSE WAS "REJECTED"..

READ THE POST BELOW--

https://ajitvadakayil.blogspot.com/2020/05/warnings-issued-to-amul-milk-marketing.html

SO TRUMP/ PUTIN ETC -- ALL WORLD LEADERS , LISTEN UP..

NEXT TIME SHAMELESS MODI RUSHES IN TO HUG YOU, I LEAVE IT TO YOUR GOOD CONSCIENCE WHETHER TO HUG HIM OR KICK HIM AWAY ..

AND EVEN IF YOU DONT KICK HIM AWAY, BE SURE CAPT AJIT VADAKAYIL WILL WRITE MODIs LEGACY..

I AM REDUCED TO THIS.. I NOW MUST TAKE A BATH..

capt ajit vadakayil
..

  1. PUT ABOVE COMMENT IN WEBSITES OF—
    RS SODHI
    GSG AIYYANGAR
    AMUL – HQ AND ALL OUTLETS
    ALL MILK MARKETING FEDERATIONS OF INDIA
    FSSAI HQ AND ALL STATE OUTLETS
    BILL GATES AND MELINDA GATES
    DR JUDY MIKOVITS
    DR SHIVA AYYADURAI
    PRINCE CHARLES
    QUEEN OF ENGLAND
    WHO CHIEF TEDROS ADHANOM GHEBREYESUS
    WHO
    US CDC
    US CDC CHIEF
    GATES FOUNDATION
    DR ANTONY FAUCI
    DR SANJAY GUPTA
    TRUMP
    PUTIN
    BORIS JOHNSON
    MACRON
    ANGELA MERKEL
    XI
    AMBASSADORS TO FROM USA/ RUSSIA/ UK/ FRANCE / GERMANY
    EDITOR GLOBAL TIMES HU XIJIN
    RULERS OF ALL MAJOR NATIONS AND THEIR AMBASSADORS
    PMO
    PM MODI
    AMIT SHAH
    HOME MINISTRY CENTRE/ STATES
    CJI BOBDE
    ATTORNEY GENERAL
    LAW MINISTER PRASAD / MINISTRY CENTRE AND STATES
    ALL CHIEF JUSTICES HIGH COURTS
    I&B MINISTER / MINISTRY
    NSA
    AJIT DOVAL
    RAW
    IB
    CBI
    NIA
    ED
    ALL DGPs OF INDIA
    ALL IGs OF INDIA
    ALL CMs OF INDIA
    ALL MLAs OF INDIA
    ALL MPs OF INDIA
    ALL COLLECTORS OF MAJOR CITIES
    ALL STATE GOVERNORS
    PRESIDENT OF INDIA
    VP OF INDIA
    SPEAKER LOK SABHA
    SPEAKER RAJYA SABHA
    ALL INDIAN THINK TANKS
    NITI AYOG
    AMITABH KANT
    SAUMYA SWAMNATHAN
    HEALTH MINISTER/ MINISTRY CENTRE AND STATES
    FOOD PROCESSING MINISTER/ MINISTRY CENTRE AND STATES
    MOHANDAS PAI
    RAJEEV CHANDRASHEKHAR
    E SREEDHARAN
    WILLIAM DALRYMPLE
    KONRAED ELST
    FRANCOIS GAUTIER
    STEPHEN KNAPP
    DAVID FRAWLEY
    GVL NARASIMHA RAO
    SAMBIT PATRA
    ASHOK PANDIT
    ANUPAM KHER
    KANGANA RANAUT
    VIVEK AGNIHOTRI
    MEENAKSHI LEKHI
    SMRITI IRANI
    PRASOON JOSHI
    SWAPAN DASGUPTA
    MADHU KISHWAR
    SUDHIR CHAUDHARY
    GEN GD BAKSHI
    RSN SINGH
    ARNAB GOSWAMI
    NAVIKA KUMAR
    ANAND NARASIMHAN
    RAHUL SHIVSHANKAR
    RAJDEEP SARDESAI
    SRINIVASAN JAIN
    SONAL MEHROTRA KAPOOR
    VIKRAM CHANDRA
    NIDHI RAZDAN
    ZAKKA JACOB
    RAHUL ANWAL
    RAVISH KUMAR
    PRANNOY JAMES ROY
    AROON PURIE
    VINEET JAIN
    RAGHAV BAHL
    SEEMA CHISTI
    DILEEP PADGOANKAR
    VIR SANGHVI
    KARAN THAPAR
    PRITISH NANDI
    ASHISH NANDI
    SHEKHAR GUPTA
    SIDHARTH VARADARAJAN
    PAVAN VARMA
    RAMACHANDRA GUHA
    THAMBI SUNDAR PICHAI
    SATYA NADELLA
    CEO OF WIKIPEDIA
    QUORA CEO ANGELO D ADAMS
    QUORA MODERATION TEAM
    KURT OF QUORA
    GAUTAM SHEWAKRAMANI
    MUKESH AMBANI
    RATAN TATA
    ANAND MAHINDRA
    KUMARAMANGALAMBIRLA
    LAXMI MNARAYAN MITTAL
    AZIM PREMJI
    KAANIYA MURTHY
    RAHUL BAJAJ
    RAJAN RAHEJA
    NAVEEN JINDAL
    GOPICHAND HINDUJA
    DILIP SHANGHVI
    GAUTAM ADANI
    SWAMY
    RAJIV MALHOTRA
    P GURUS
    RSS
    AVBP
    VHP
    MOHAN BHAGWAT
    RAM MADHAV
    MOHANLAL
    SURESH GOPI
    NALIN KOHLI.
    UDDHAV THACKREY
    RAJ THACKREY
    CHANDAN MITRA
    SADGURU JAGGI VASUDEV
    BABA RAMDEV
    SRI SRI RAVISHANKAR
    CHETAN BHAGAT
    AMISH TRIPATHI
    DEVDUTT PATTANAIK
    THE QUINT
    THE SCROLL
    THE WIRE
    THE PRINT
    MK VENU
    MADHU TREHAN
    SANJAY HEDGE
    SHOBHAA DE
    ARUNDHATI ROY
    MADHU TREHAN
    JAIRAM RAMESH
    SHASHI THAROOR
    KAPIL SIBAL
    ABHI SEX MAANGTHA SINGVI
    TEHSEEN POONAWAALA
    SHEHZAD POONAWALA
    SANJAY JHA
    SURJEWALA
    AK ANTONY
    SONIA GANDHI
    RAHUL GANDHI
    PRIYANKA VADRA
    AK ANTONY
    PC CHACKO
    JEAN DREZE
    DIG VIJAY SINGH
    JULIO RIBEIRO
    ASADDUDIN OWAISI
    SHEHLA RASHID
    RANA AYYUB
    SUHEL SETH
    SHAZIA ILMI
    MANI SHANGARAN AIYERAN
    SALMAN KHURSHEED
    GHULAM NABI AZAD
    ENTIRE BBC GANG
    SWARA BHASKAR
    ALL HINDU STALWARTS AND ORGS
    ROMILA THAPAR
    IRFAN HABIB
    NIVEDITA MENON
    AYESHA KIDWAI
    MAJOR WORLD MEDIA
    HISTORY CHANNEL
    DAVID HATCHER CHILDRESS
    SONIA GANDHI
    RAHUL GANDHI
    PRIYANKA VADRA
    SOLI BABY
    FALI BABY
    KATJU BABY
    SALVE BABY
    JOHN BRITTAS
    PRAKASH KARAT
    BRINDA KARAT
    SITARAM YECHURY
    D RAJA
    ALEX JONES
    RENSE
    DAVID ICKE
    ANGELO JOHN GAGE
    DEEPAK CHOPRA
    ROBIN SHARMA
    TAREK FATEH
    ALL INDIAN MEDIA
    GITA GOPINATH
    AMARTYA SEN
    RAGHURAM RAJAN
    SPREAD ON SOCIAL MEDIA--
CLOSET COMMIE ARNAB GOSWAMI OF REPUBLIC TV HAS BEEN WARNED AGAIN AND AGAIN BY CAPT AJIT VADAKAYIL..

DO NOT SHOW FALSE STATISTICS TO SHOW INDIA IN POOR LIGHT.

EXAMPLE: JUST NOW HE SHOWED INDIA’ CORONAVIRUS DEATHS AS A PERCENTAGE OF THE TOTAL DEATHS..

ANY RETARDED SCHOOL CHILD WHO COMES AT THE BOTTOM OF HIS CLASS KNOWS THAT THIS IS A WRONG WAY TO SHOW THINGS..

INDIA HAS 1350 MILLION PEOPLE.

YOU HAVE TO HOW DEATHS AS A PERCENTAGE OF THE “POPULATION”..

FOR EXAMPLE IN THE LINK BELOW—

https://www.worldometers.info/coronavirus/

CHECK OUT THE COLUMN , THIRD FROM THE RIGHT.. THIS IS THE CORRECT WAY.

INDIA’ DEATHS PER MILLION OF “POPULATION” ( NOT TOTAL WORLDWIDE “DEATHS” ) IS VERY LOW, A MERE 1.0 , WITH TOTAL DEATHS 1571..

BELGIUM ON THE OTHER HAND IS A HIGH 692 WITH TOTAL DEATHS 8016. ( TOTAL DEATHS ON THE PLANET IS 253404)

NATIONS SHOWING LESS THAN INDIA ARE TOO SMALL OR ARE UNDERDEVELOPED NATIONS MISREPRESENTING THE COUNT, AS THEY DON’T HAVE A CENTRAL SYSTEM.

OUR INDIAN JOURNALISTS ( LIKE OUR JUDGES ) ARE THE WORST ON THIS PLANT.. I HAVE SEEN THIS PLANT FOR 40 YEARS.

INDIA IS SHOWN AS A RAPIST/ PEDOPHILE / HOMOSEXUAL NATION BY FALSE STATISTICS—UNFIT TO BE IN UNSC.

IN REALITY—
INDIA HAS THE LOWEST ( BY PERCENTAGE OF POPULATION ) RAPES / MOLESTATION/ MURDERS / CRIMES/ LOSS OF VIRGINITY BEFORE MARRIAGE/ DIVORCES/ HOMOSEXUALS / PEDOPHILES / PROSTITUTES/ CARBON EMISSIONS/ CONSUMPTION OF ELECTRICITY / FUEL CONSUMPTION / UNHAPPINESS/ DRUG-ALCOHOL ADDICTIONS / DYSFUNCTIONAL FAMILY/ PARENTS DISCARDED IN OLD AGE HOMES / MENTAL PROBLEMS/ CRIPPLES/ SERIOUS DISEASES / INFERTILITY / LACK OF RESPECT FOR WOMEN – PARENTS / HUNGER / DEBT PER CAPITA / WIFE BEATING / IMPOTENCY ETC ETC..

WE HAVE 1350 BILLION PEOPLE..

ARNAB GOSWAMI..CLOSET COMMIE… TRAITOR.. .HERE IS SOME FACE LOTION FOR YOU …
AAAARRRGGHHH PPPTTHHEEEOOOYYY ..

capt ajit vadakayil
..


GOOGLE/ QUORA/ TWITTER/ FACEBOOK ALLOWS PAKISTANI ISI MUSLIM AGENTS WITH HINDU NAMES TO ABUSE INDIAN AND HINDU GODS..

BUT IF A DESH BHAKT HINDU / INDIAN TRIES TO REPUDIATE OR EXPOSTULATE JEWISH DEEP STATE TOOLS GOOGLE/ QUORA/ TWITTER/ FACEBOOK SINKS IT ON THE INTERNET OR DELETES IT..

THIS BLOGSITE HAS COMPLAINED TO PM MODI/ PMO/ I&B MINISTER JAVEDEKAR/ LAW MINISTER / RSS ETC MORE THAN 100 TIMES. NOBODY CARES..
#####################
EXAMPLE AAA--

IF YOU GOOGLE FOR " AGHORIS , THE CORPSE EATERS OF INDIA - CAPT AJIT VADAKAYIL "

NOTHING COMES UP ..

BUT IF YOU GOOGLE FOR THE LINK, MY POST COMES UP..

http://ajitvadakayil.blogspot.com/2014/09/aghoris-corpse-eaters-of-india-capt.html

#############

BBB- IF YOU GOOGLE FOR :---google for my post below--

REPEATED BLASPHEMY AGAINST HINDU GODS BY QUORA CEO ADAM D ANGELO, FOR WHICH PUNISHMENT UNDER INDIAN LAW IS LONG TERM IMPRISONMENT "

NOTHING COMES UP....

BUT IF YOU GOOGLE FOR THE LINK, IT SHOW UP

https://ajitvadakayil.blogspot.com/2019/04/repeated-blasphemy-against-hindu-gods_9.html

#######################

WE WONDER WHO THE PEOPLE RULING INDIA ARE ? ARE THEY TRAITORS IN FOREGN PAYROLL?

WE KNOW THAT THE FIRST PMO BOSS MO MATHAI WAS A CIA AGENT...

WE KNOW PM MORARJI DESAI WAS A CIA AGENT , WHO WAS GIVEN PAKISTANI RATNA AWARD FOR GIVING AWAY THE NAMES AND ADDRESSES OF RAW AGENTS INSIDE PAKISTAN....

WE KNOW PM MODI WORE A MOSSAD SPONSORED SIKH TURBAN IN 1976..

WE WATCH..

Capt ajit vadakayil
..

http://ajitvadakayil.blogspot.com/2013/03/pyaasa-hindi-movie-review-of-1957-capt_20.html



https://ajitvadakayil.blogspot.com/2020/05/thiyyas-of-kerala-are-not-ezhavas-capt.html

ALL IN KERALA LISTEN UP..

THIYYAS OF KERALA REFUSE TO BE PUT IN THE SAME BUCKET AS EZHAVAS..

THIS IS FINAL !

capt ajit vadakayil
..








CAPT AJIT VADAKAYIL
..

192 comments:

  1. I ASK MY READERS

    WHY DO KAYASTHAS RAVI SHANKAR PRASAD AND PRAKASH JAVEDEKAR COME ON TV TO PROTECT MODI GHADI GHADI -- WE HAVE NEVER SEEN THEM COMING ON TV TO PROTECT BHARATMATA..

    SPEAK YOUR MIND.. SPEAK FREELY..

    ReplyDelete
    Replies
    1. Because they also don't care about Bharatmata. They come on tv to protect modi and give him ego massage.

      Delete
    2. 2 meek and incompetent ministers who know that sycophancy and loyalty to one man's brand value will get them far, a lot farther than trying to rise on their own steam. you wouldnt know to look at javadekar that he is an rss guy who has been arrested before.

      Delete
    3. I posted my comment for above by mistake in the original post.. where comments are closed.. hope it doesn't get lost.. because I can't retrieve to paste here.. it was impromptu.. no saved copy..

      Delete
    4. Respected Captain, they do so that modi's image is intact and he (along with them) retains power and can continue bleeding Bharatmata. Also those traitors don't want any viewers getting inspired to start working in country's interest.

      Delete
    5. Dear Captain,
      My guess is they come to create an emotion towards Modi so people believe that Modi is such a great person and he is being criticized for doing great work! It's a stunt basically.

      Delete
    6. What I observed is only these two fellows rs Prasad and prakash javedkar comes on tv to defend modi or to refute claims of congress.There are many other ministers in modi government like piyush goyal,nitin gadkari...but they never come as spokespersons from modi government.No wonder modi along with law minister ravi shankar prasad and environment cum I and B minister prakash javedkar pushed india into adultery and homosexuality mandi,and also even tried to bleed bharatmata with cop21 bullshit climate change agenda and carbon taxes to please his jewish masters and to get kosher awards like "champion of earth".

      Rs prasad never came on tv to speak against orders of illegal collegium judiciary.He did not speak a word when deep state judge nariman bench legalised bitcoin to bleed bharatmata. He did not speak a word when illegal collegium judiciary allowed homosexuality and adultery,when it did not have the powers to make laws.Another useless fellow prakash javedkar was sent to UN kosher climate change summits as env minister.what he does there is to nod and grin for everything white jews say.He let our country down when we have the lowest percapita carbon emissions on this planet.hundreds of messages from this blogsite went to modi and env minister with clear and detailed explanations that co2 is a good gas and USA fracking is responsible for climate change and this cop21 and deep state puppet greta thunberg agenda is to bleed the world with carbon taxes.But what did they do?All the world leaders listened to you,but this modi and prakash javedkar never spoke a single word against greta thunberg.All these fellows are darlings of jewish deep state.

      Delete
    7. am glad to see my comment posted.. just thinking, why does it give my ego a boost to see my comment on this blog..

      Delete
    8. Could be 1 of the 2 reasons:

      1) Both give ego-massage to Modi that's why they have retained this high Cabinet positions for long.

      2) Both are Commie/leftists pretending to be Hindu leaders. So they are darlings of deshdrohi media.

      Javadekar promoted Saba Naqvi's book---https://mobile.twitter.com/_sabanaqvi/status/1019445344223023104?lang=en

      Ravi Shankar Prasad was a PUCL member which is a hardcore leftist organization.

      https://thewire.in/rights/human-rights-activist-bihar-pucl

      QUOTE-"Often, Ravi Shankar Prasad and I were on the team constituted to enquire into the atrocities committed against Naxals. PUCL spoke for any victim, whether a victim of police atrocity or Naxal violence or of atrocity committed by landlords or the police against the Naxals or their followers. Bihar was an area of Naxal activities right from the early ’70s (Jayaprakash Narayan spent several years at Mushahari , Muzaffarpur where the Naxals had been very active)." UNQUOTE

      Delete
    9. kayasthas have bleed bharatamata more than any other bloodline..

      Delete
    10. Pranam Guruji,

      Not just them, all the deep state agents habitually do this when they infect Bharatmata with their real masters instructions.

      We see the pattern with Sitaraman, Vardhan as well

      Like you said chane ke jaad ego massages.

      This is how the deep state would need to overcome hidden underlying patriotism, appealing to ego in as much as convincing him that all their advice and actions pertain to the greater interests of Bharatmata.

      Every drohi agenda pushed and completed receives him hajaar shabashis, even if he may have had little or nothing to do with it overall..

      Very strategically selected and placed ministers and babbus, continually push instructed and funded agendas of the deep state by the sole method of channe ke jaad ego massages.

      He's either part of it, or bides him time strategically observing it, returning much of the same in the process..

      HRGDS

      CR

      Delete
    11. Dear Captain,

      Javadekar & prasad are doing their job i.e. protecting their master modi from any abuse.the people who voted them into power are just a means or discarded curry leaves for their master. we the people are meant to hear & sing the bhajans of modi. anyone can abuse bharatmata,our culture,our history & our people,both of them don't care. if anyone abuses modi or tells him to do his job these duo will run faster than usain bolt to defend him & especially prasad frothes from his mouth while defending him. this duo has set a high benchmark even dogs can't reach.

      Delete
    12. Captain Sir,

      For both Prasad and Javadekar, like their master, nation comes last. They provide alibi to Modi, so that, any blame cannot be on him. Inturn, Modi also loves them. Though their incompetence in their respective field is widely known, he has stuck with them for this reason alone.

      Delete
    13. RS prasad & jawdekar reinforce Modi's actions (when prodded by their western masters), thereby building pro Modi public perception . It is a malignant symbiotic relationship- the only casualty being bharatmata😔

      Delete
    14. Both r traitors and puppets of masters on top kayasth

      Delete
    15. In India, mediocre people rule the roost and everyone approves of this kind of behaviour. Till the govt approves some talented individuals to come up the ranks, such as APJ Kalam, or someone succeeds by taking foreign help, such as BYJU's founder who was funded by Zuckerberg's foundation, this kind of mediocrity and lapdog behavior is the most prized attribute for getting ahead of the race. May be Kayasthas have mastered it but others are not too far behind.

      Delete
  2. CLOSET COMMIE BASTARD ARNAB GOSWAMI IS AGAIN GIVING FALSE STATISTIC OF INDIAN CORONAVIRUS DEATHS..

    THIS WAS THE BHADRALOK BASTARD WHO SPUTTERED WITH GRIEF WHEN THE JAMES BOND MOVIE KISS WAS REDUCED IN DURATION BY SIX SECONDS..

    BHADRALOKS WERE ALL ROTHSCHILD AGENTS.

    THIS WAS THE BASTARD WHO APPLAUDED SLUT REHANA FATIMA WHO WENT TO SABARIMALA TO THROW HER MENSES BLOOD SOAKED SANITARY NAPKINS INTO THE SANCTUM..

    THIS WAS THE BASTARD WHO APPLAUDED THE ROHTAK GYPSY SISTERS WHEN THEY BASHED UP AN INNOCENT BOY..

    THIS WAS THE BASTARD WHO KEPT ASKING ON TV " SO WHAT IS WRONG IN BEING A LESBIAN?"

    SUDDENLY THIS COMMIE BASTARD HAS BECOME A DESH BHAKT ?....

    capt ajit vadakayil
    ..

    ReplyDelete
    Replies
    1. He 'saw' a new road and is venturing on it.

      Delete

  3. SOMEBODY ASKED ME

    HOW DID THIS PLANETs FIRST KORAN WRITTEN IN CHERAMAN PERUMAL MOSQUE KODUNGALLUR, KERALA LAND UP IN IN A FOXHOLE IN TIMBUCKTOO MALI?

    http://ajitvadakayil.blogspot.com/2013/01/mansa-musa-king-of-mali-and-sri.html

    ANCIENT KERALA SAGES WENT UP NIGER RIVER TO MALI TO DIVINE GEM LADEN METERORITES DEEP UNDER THE DESERT SANDS..

    WELL THESE STONES WERE PART OF SHIVA LINGAM METEORITES…

    http://ajitvadakayil.blogspot.com/2019/07/shiva-lingam-meterorite-hit-65-million.html

    https://www.articlesvally.com/worldwide/rarehi/19

    THE TOP MOST PLATFORM OF THE QUTAB MINAR TOWER , ORIGINALLY MOUNTED ON A YUGA DISPLAY GYMBAL LIES DISCARDED ON THE GROUND , AFTER THE ISLAMIC INVADER STOLE THE “ THIRD EYES” OF FOUR HEADED BRAHMA ..

    FOUR HUGE DIAMONDS WHICH GLOW IN THE DARK AND CHANGE COLOUR…

    THESE DIAMONDS WHICH GLOWED BRILLIANT BLUE IN DAYTIME, BECAME FIERY RED AT NIGHT.. AS SOON AS THE DIAMOND WAS GOUGED OUT IT BECAME BLACK…

    THE WHITE INVADER CALLED THIS THE “CURSE OF BRAHMA” AND MANY SHOCKED CULPRITS DIED OF LOSS OF REM SLEEP

    THE ELECTRONS FLIPPED 180 DEGREES ANALOGOUS TO WHAT HAPPENS DURING MRI TO HUMAN BODY NUCLEI…

    http://ajitvadakayil.blogspot.com/2014/09/qutab-minar-was-dhruv-stambh-vishnu.html

    THE GREAT ORLOV DIAMOND OF 190 CARATS SET ON THE IMPERIAL SCEPTRE OF CATHERINE THE GREAT OF RUSSIA WAS INITIALLY 3 TIMES BIGGER- OR THE SIZE OF A LARGE HEN'S EGG…

    http://ajitvadakayil.blogspot.com/2011/10/total-internal-reflection-capt-ajit.html

    ALL BRAHMA IDOLS HAS A THIRD EYE KNOWS A "BRAHMAs THIRD EYE"..

    THIS WAS BASICALLY A "TIME CRYSTAL" -- A DIAMOND WHICH CHANGES COLOUR..

    SO WHAT IS THIS CHAMELEON DIAMOND --NAY-- TIME CRYSTAL ?.

    IT HAS AN ATOMIC STRUCTURE WHICH STRETCHES ATOMS APART WHILE STILL ALLOWING THEM TO INTERACT WITH EACH OTHER…

    THE ASSYMETRIC VIBRATIONS REPEAT THEMSELVES, PERPETUALLY. THIS FRACTURES THE SYMMETRY OF TIME..

    THIS 4D CRYSTAL DIAMOND WORKS BEHIND THE QUANTUM SCREEN OF MAYA..

    THE LAWS OF PHYSICS ARE NOT ONLY SYMMETRICAL IN SPACE BUT ALSO IN TIME..

    TEMPORAL SYMMETRY-BREAKING WOULD MANIFEST ITSELF IN THIS REPEATING MOTION IN TIME, JUST AS SPATIAL SYMMETRY-BREAKING MANIFESTS ITSELF AS REPEATING PATTERNS IN SPACE..

    PEOPLE HAVE NO IDEA OF THE POWER OF SHABDA BRAHMAN . BRAHMAs EYE WOULD TURN FROM BLUE IN DAYLIGHT TO BRIGHT BLOOD RED IN PITCH DARKNESS . ..

    IT HELD A CURSE FOR PEOPLE WITH CRIMINAL DNA . THE THIEVES CUT THE DIAMOND AND IT BECAME BLACK. THE ELECTRONS FLIPPED 180 DEGREES ANALOGOUS TO WHAT HAPPENS DURING MRI TO HUMAN BODY NUCLEI…

    ATOMS OF TIME CRYSTALS OPERATE IN A SORT OF TIME-ARRAY, AS OPPOSED TO A PHYSICAL ARRAY. .

    TIME CRYSTALS ARE CLOSELY RELATED TO CONCEPTS OF ZPF AND DYNAMICAL CASIMIR EFFECT..

    THE SRI YANTRA GEOMETRY CONTAINS THE THEORY OF EVERYTHING..

    http://ajitvadakayil.blogspot.com/2016/12/108-numerical-equivalent-of-hindu-king.html

    JEW ALBERT EINSTEIN DID NOT HAVE THE BRAINS TO UNDERSTAND THE VEDAS THOUGH HE STOLE 100% FROM IT .. NIKOLA TESLA KNEW IT--HE MARTYRED HIMSELF TO SCIENCE..

    USUALLY WHEN A MATERIAL IS IN GROUND STATE, ALSO KNOWN AS THE ZERO-POINT ENERGY OF A SYSTEM, IT MEANS MOVEMENT SHOULD THEORETICALLY BE IMPOSSIBLE, BECAUSE THAT WOULD REQUIRE IT TO EXPEND ENERGY.--BUT NOT A TIME CYYSTAL

    I HAVE EXPLAINED COLOR CHANGING DIAMONDS IN THE POST BELOW--

    http://ajitvadakayil.blogspot.in/2017/02/my-visit-to-bhagyalaxmi-nagar-or-modern.html

    WATCH THE MOVIE “UNCUT GEMS” WHERE LAKERS BASKET BALL STAR KEVIN GARNETT USES A METEORITE STONE WITH GEMS TO BOOST HIS PERFORMANCE

    https://en.wikipedia.org/wiki/Uncut_Gems

    capt ajit vadakayil
    ..

    ReplyDelete
    Replies
    1. PUT ABOVE COMMENT IN WEBSITES OF—
      IMA
      IMA CHIEF
      WHO
      WHO CHIEF
      US CDC
      US CDC CHIEF
      RS SODHI
      AMUL
      FSSAI
      GSG AIYYANGAR
      PUNE SERUM INSTITUTE
      CYRUS POONAWALA
      ADAR POONAWALA
      GRETA THUNBERG
      MOTHER MALENA
      BILL GATES
      MELINDA GATES
      NITA AMBANI
      MUKESH AMBANI
      ANIL AMBANI
      BILL GATES FOUNDATION
      QUEEN OF ENGLAND
      PRINCE CHARLES
      ALL MEMBERS OF BRITISH HOUSE OF COMMONS AND LORDS
      TRUMP
      EVERY US SENATOR/ CONGRESS MAN
      EXTERNAL AFFAIRS MINISTER/ MINISTRY
      PUTIN
      BORIS JOHNSON
      MACRON
      ANGELA MERKEL
      XI
      AMBASSADORS TO FROM USA/ RUSSIA/ UK/ FRANCE / GERMANY
      AMBASSADORS TO FROM ALL MAJOR EU NATIONS
      EDITOR GLOBAL TIMES HU XIJIN
      PMO
      PM MODI
      HEALTH MINISTER/ MINISTRY CENTE- STATES
      AMIT SHAH
      HOME MINISTRY CENTRE/ STATES
      CJI BOBDE
      ATTORNEY GENERAL
      LAW MINISTER PRASAD / MINISTRY CENTRE AND STATES
      ALL CHIEF JUSTICES HIGH COURTS
      I&B MINISTER / MINISTRY
      NSA
      AJIT DOVAL
      RAW
      IB
      CBI
      NIA
      ED
      ALL DGPs OF INDIA
      ALL IGs OF INDIA
      ALL CMs OF INDIA
      ALL MLAs OF INDIA
      ALL MPs OF INDIA
      ALL COLLECTORS OF MAJOR CITIES
      ALL STATE GOVERNORS
      PRESIDENT OF INDIA
      VP OF INDIA
      SPEAKER LOK SABHA
      SPEAKER RAJYA SABHA
      ALL INDIAN THINK TANKS
      NITI AYOG
      AMITABH KANT
      MOHANDAS PAI
      RAJEEV CHANDRASHEKHAR
      E SREEDHARAN
      WILLIAM DALRYMPLE
      KONRAED ELST
      FRANCOIS GAUTIER
      STEPHEN KNAPP
      DAVID FRAWLEY
      GVL NARASIMHA RAO
      SAMBIT PATRA
      ASHOK PANDIT
      ANUPAM KHER
      KANGANA RANAUT
      VIVEK AGNIHOTRI
      MEENAKSHI LEKHI
      SMRITI IRANI
      PRASOON JOSHI
      SWAPAN DASGUPTA
      MADHU KISHWAR
      SUDHIR CHAUDHARY
      GEN GD BAKSHI
      RSN SINGH
      ARNAB GOSWAMI
      NAVIKA KUMAR
      ANAND NARASIMHAN
      RAHUL SHIVSHANKAR
      RAJDEEP SARDESAI
      SRINIVASAN JAIN
      SONAL MEHROTRA KAPOOR
      VIKRAM CHANDRA
      NIDHI RAZDAN
      ZAKKA JACOB
      RAHUL ANWAL
      RAVISH KUMAR
      PRANNOY JAMES ROY
      AROON PURIE
      VINEET JAIN
      RAGHAV BAHL
      SEEMA CHISTI
      DILEEP PADGOANKAR
      VIR SANGHVI
      KARAN THAPAR
      PRITISH NANDI
      ASHISH NANDI
      SHEKHAR GUPTA
      SIDHARTH VARADARAJAN
      PAVAN VARMA
      RAMACHANDRA GUHA
      THAMBI SUNDAR PICHAI
      SATYA NADELLA
      CEO OF WIKIPEDIA
      QUORA CEO ANGELO D ADAMS
      QUORA MODERATION TEAM
      KURT OF QUORA
      GAUTAM SHEWAKRAMANI
      MUKESH AMBANI
      RATAN TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      SWAMY
      RAJIV MALHOTRA
      P GURUS
      RSS
      AVBP
      VHP
      MOHAN BHAGWAT
      RAM MADHAV
      MOHANLAL
      SURESH GOPI
      NALIN KOHLI.
      RAJ THACKREY
      CHANDAN MITRA
      SADGURU JAGGI VASUDEV
      BABA RAMDEV
      SRI SRI RAVISHANKAR
      CHETAN BHAGAT
      AMISH TRIPATHI
      DEVDUTT PATTANAIK
      THE QUINT
      THE SCROLL
      THE WIRE
      THE PRINT
      MK VENU
      MADHU TREHAN
      SANJAY HEDGE
      SHOBHAA DE
      ARUNDHATI ROY
      MADHU TREHAN
      JAIRAM RAMESH
      SHASHI THAROOR
      KAPIL SIBAL
      ABHI SEX MAANGTHA SINGVI
      TEHSEEN POONAWAALA
      SHEHZAD POONAWALA
      SANJAY JHA
      SURJEWALA
      AK ANTONY
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA VADRA
      AK ANTONY
      PC CHACKO
      JEAN DREZE
      DIG VIJAY SINGH
      JULIO RIBEIRO
      ASADDUDIN OWAISI
      SHEHLA RASHID
      RANA AYYUB
      SUHEL SETH
      SHAZIA ILMI
      MANI SHANGARAN AIYERAN
      SALMAN KHURSHEED
      GHULAM NABI AZAD
      ENTIRE BBC GANG
      SWARA BHASKAR
      ALL HINDU STALWARTS AND ORGS
      ROMILA THAPAR
      IRFAN HABIB
      NIVEDITA MENON
      AYESHA KIDWAI
      MAJOR WORLD MEDIA
      HISTORY CHANNEL
      DAVID HATCHER CHILDRESS
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA VADRA
      SOLI BABY
      FALI BABY
      KATJU BABY
      SALVE BABY
      JOHN BRITTAS
      PRAKASH KARAT
      BRINDA KARAT
      SITARAM YECHURY
      D RAJA
      ALEX JONES
      RENSE
      DAVID ICKE
      ANGELO JOHN GAGE
      DEEPAK CHOPRA
      ROBIN SHARMA
      TAREK FATEH
      ALL INDIAN MEDIA
      GITA GOPINATH
      AMARTYA SEN
      RAGHURAM RAJAN
      PRINCESS HEND AL QASSIMI
      DR SANJAY GUPTA
      SPREAD ON SOCIAL MEDIA--

      SPREAD BY WHATS APP

      Delete
    2. https://twitter.com/kannanlp/status/1261972768884551687

      Delete
  4. SOMEBODY CALLED ME UP AND CRIED..

    CAPTAIN..

    YOU SELF INFLICTED A PERSONAL POLICY ON YOURSELF " NO MORE MEDICAL BLOG POSTS"..

    YET YOU HAVE MADE FOUR CORONAVIRUS POSTS .

    https://ajitvadakayil.blogspot.com/2020/05/coronavirus-covid-19-sars-cov-2.html

    INDEED

    LISTEN..

    WHY DID I PEN A POST ON HIV/ AID?..

    PRAY?

    PRITHEE ?

    BECAUSE BILLIONS OF DOLLARS WERE BEING POURED INTO HIV VACCINES.. EVIL KOSHER PHARMA LOVED THIS..

    THEIR AGENTS IN WHO/ US CDC LIVED IN UBER LUXURY.. THEY WENT AND FUCKED UNDER AGED BOYS AND GIRLS IN BANGKOK..

    AFTER 40 YEARS , HIV VACCINE IS ELUSIVE ..

    I HAD CALLED THE BULL BY A POST BELOW--THAT HIV IS A MAN MADE VIRUS IN A LAB.. THOSE DAYS IT WAS A NEW CONCEPT..

    http://ajitvadakayil.blogspot.com/2013/06/hiv-does-not-cause-aids-many-aids.html

    FEW DAYS AGO MAGIC JOHNSON CAME ON CNN TV IN DON LEMONs SHOW.. HE LOOKED FIT AS A FIDDLE..

    THREE DECADES AGO MAGIC JOHNSON DECLARED THAT HE HAS AIDS..EVERY BODY KNEW OF JOHNSONs SEX/ DRUG ORGIES..

    https://sportsspectrum.com/sport/basketball/2017/12/20/magic-johnson-asks-forgiveness-reconciles-isiah-thomas/

    MAGIC JOHNSONs SON EJ JOHNSON IS OPENLY GAY ( ANAL SEX RECEIVING ) WITH AN ITCHY ASSHOLE .. IT RUNS IN THE GENES..

    https://www.youtube.com/watch?v=voH7QgiQkeI

    SARS-COV-2 IS A LAB MADE SPLICED/ GRAFTED RNA VIRUS, WHICH DOES NOT HAVE A SOUL..

    SUCH LAB MADE VIRUS MUST BE SEEN FROM AN "ENERGY" PERSPECTIVE -- NOT A "PROTEIN" PERSPECTIVE ..

    GOOGLE DELETED MY POST ON HUMPED COW URINE ( HAVING INHERENT MONOATOMIC GOLD NANO COLLOIDS ) ON THE BEHEST OF KOSHER EVIL PHARMA..

    https://ajitvadakayil.blogspot.com/2020/04/google-deleted-my-valuable-post-on.html

    CAPT AJIT VADAKAYIL HAS FOUGHT MANY PITCHED MEDICAL BATTLES AND WON, AGAINST ALL ODDS..

    WHEN I PENNED THE POST BELOW, SOME CLOSE WELL WISHER TOLD ME" AJIT, YOU HAVE PUT YOUR BLOGGING CAREER AT STAKE.. YOU COULD HAVE BEEN THIS PLANETs NO 1 WRITER..

    WELL TEN YEARS LATER, I AM STILL THIS PLANET NO 1 WRITER..

    NASA KEPT BUILDING UP ON TV ABOUT A "MAJOR ANNOUNCEMENT".. THEY DID IT OVER WEEKS..

    WE ALL THOUGHT NASA WOULD BE SHOWING US A ALIEN "LIVE" ON TV..

    INSTEAD IT TURNED OUT THAT IN HUMAN DNA PHOSPHORUS CAN BE SUBSTITUTED WITH ARSENIC..

    IT WENT AGAINST THE CORE PRINCIPLES OF VEDIC SRUTI DOWNLOADED 400 CENTURIES AGO AND PENNED DOWN IN SANSKRIT 70 CENTURIES AGO, THAT THIS COSMOS IS A GRAND ORCHESTRA ON MACROSCOPIC AND MICROSCOPIC SCALE..

    http://ajitvadakayil.blogspot.com/2018/11/sanatana-dharma-hinduism-exhumed-and.html

    SANSKRIT IS BASED ON DIVINE GEOMETRY OF SRI YANTRA.. THIS IS ENERGY BASED..

    AS SOON AS NASA GAVE BULL ON DNA, I RACED TO MY LAP TOP AND KICKED NASA ON THEIR COLLECTIVE TWATS AND BALLS WITHIN 40 MINUTES .. THE POST IS BELOW.. CHECK OUT THE DATE AND TIME..

    http://ajitvadakayil.blogspot.com/2010/12/dna-nasa-arsenic-and-phosphorous-capt.html

    FOR THREE DAYS MINE WAS THE SOLE VOICE OF DISSENT ON THE INTERNET..

    THEN ONE BY ONE DISSENT FROM MAIN STREAM SCIENTISTS SNOWBALLED..

    WITHIN A WEEK NASA WAS FORCED TO DECLARE THAT THEY FUCKED IT UP ROYALLY, AND THEY MUST GO BACK TO THE DRAWING BOARD.

    NASA HAS NO IDEA OF THE “SOUND OF MUSIC”

    DIMITRI MENDELEYEEVs 108 ELEMENT PERIODIC TABLE WAS BASED ON PANINIs DIVINE GRAMMAR..

    DIMITRI MENDELEEYEV HIMSELF WROTE THAT HIS PERIODIC TABLE IS LIFTED FROM THE SANSKRIT GRAMMAR OF KERALA NAMBOODIRI PANINI WRITTEN 7500 YEARS AGO...

    FOR THIS HE WAS DENIED ANY MAJOR AWARD.. SO WHAT ? HE HAS RECEIVED THE "VADAKAYIL PRIZE" AFTER NIKOLA TESLA..

    http://ajitvadakayil.blogspot.com/2016/12/108-numerical-equivalent-of-hindu-king.html

    GERMAN JEW ALBERT EINSTEIN WAS A THIEF- WHOSE AWARD WINNING THEORIES WERE LIFTED FROM 400 CENTURIES OLD VEDAS..

    http://ajitvadakayil.blogspot.com/2018/11/albert-einstein-was-thief-plagiarist.html

    LIES WONT WORK.. A BROWN BLOGGER WHO CAN THINK SUBJECTIVELY IS IN TOWN.. HE EXHUMES LONG BURIED TRUTHS ..PIECE OF CAKE.

    capt ajit vadakayil
    ..

    ReplyDelete
    Replies
    1. PUT ABOVE COMMENT IN WEBSITES OF—
      IMA
      IMA CHIEF
      WHO
      WHO CHIEF
      US CDC
      US CDC CHIEF
      RS SODHI
      AMUL
      FSSAI
      GSG AIYYANGAR
      PUNE SERUM INSTITUTE
      CYRUS POONAWALA
      ADAR POONAWALA
      GRETA THUNBERG
      MOTHER MALENA
      BILL GATES
      MELINDA GATES
      NITA AMBANI
      MUKESH AMBANI
      ANIL AMBANI
      BILL GATES FOUNDATION
      QUEEN OF ENGLAND
      PRINCE CHARLES
      ALL MEMBERS OF BRITISH HOUSE OF COMMONS AND LORDS
      TRUMP
      EVERY US SENATOR/ CONGRESS MAN
      EXTERNAL AFFAIRS MINISTER/ MINISTRY
      PUTIN
      BORIS JOHNSON
      MACRON
      ANGELA MERKEL
      XI
      AMBASSADORS TO FROM USA/ RUSSIA/ UK/ FRANCE / GERMANY
      AMBASSADORS TO FROM ALL MAJOR EU NATIONS
      EDITOR GLOBAL TIMES HU XIJIN
      PMO
      PM MODI
      HEALTH MINISTER/ MINISTRY CENTE- STATES
      AMIT SHAH
      HOME MINISTRY CENTRE/ STATES
      CJI BOBDE
      ATTORNEY GENERAL
      LAW MINISTER PRASAD / MINISTRY CENTRE AND STATES
      ALL CHIEF JUSTICES HIGH COURTS
      I&B MINISTER / MINISTRY
      NSA
      AJIT DOVAL
      RAW
      IB
      CBI
      NIA
      ED
      ALL DGPs OF INDIA
      ALL IGs OF INDIA
      ALL CMs OF INDIA
      ALL MLAs OF INDIA
      ALL MPs OF INDIA
      ALL COLLECTORS OF MAJOR CITIES
      ALL STATE GOVERNORS
      PRESIDENT OF INDIA
      VP OF INDIA
      SPEAKER LOK SABHA
      SPEAKER RAJYA SABHA
      ALL INDIAN THINK TANKS
      NITI AYOG
      AMITABH KANT
      MOHANDAS PAI
      RAJEEV CHANDRASHEKHAR
      E SREEDHARAN
      WILLIAM DALRYMPLE
      KONRAED ELST
      FRANCOIS GAUTIER
      STEPHEN KNAPP
      DAVID FRAWLEY
      GVL NARASIMHA RAO
      SAMBIT PATRA
      ASHOK PANDIT
      ANUPAM KHER
      KANGANA RANAUT
      VIVEK AGNIHOTRI
      MEENAKSHI LEKHI
      SMRITI IRANI
      PRASOON JOSHI
      SWAPAN DASGUPTA
      MADHU KISHWAR
      SUDHIR CHAUDHARY
      GEN GD BAKSHI
      RSN SINGH
      ARNAB GOSWAMI
      NAVIKA KUMAR
      ANAND NARASIMHAN
      RAHUL SHIVSHANKAR
      RAJDEEP SARDESAI
      SRINIVASAN JAIN
      SONAL MEHROTRA KAPOOR
      VIKRAM CHANDRA
      NIDHI RAZDAN
      ZAKKA JACOB
      RAHUL ANWAL
      RAVISH KUMAR
      PRANNOY JAMES ROY
      AROON PURIE
      VINEET JAIN
      RAGHAV BAHL
      SEEMA CHISTI
      DILEEP PADGOANKAR
      VIR SANGHVI
      KARAN THAPAR
      PRITISH NANDI
      ASHISH NANDI
      SHEKHAR GUPTA
      SIDHARTH VARADARAJAN
      PAVAN VARMA
      RAMACHANDRA GUHA
      THAMBI SUNDAR PICHAI
      SATYA NADELLA
      CEO OF WIKIPEDIA
      QUORA CEO ANGELO D ADAMS
      QUORA MODERATION TEAM
      KURT OF QUORA
      GAUTAM SHEWAKRAMANI
      MUKESH AMBANI
      RATAN TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      SWAMY
      RAJIV MALHOTRA
      P GURUS
      RSS
      AVBP
      VHP
      MOHAN BHAGWAT
      RAM MADHAV
      MOHANLAL
      SURESH GOPI
      NALIN KOHLI.
      RAJ THACKREY
      CHANDAN MITRA
      SADGURU JAGGI VASUDEV
      BABA RAMDEV
      SRI SRI RAVISHANKAR
      CHETAN BHAGAT
      AMISH TRIPATHI
      DEVDUTT PATTANAIK
      THE QUINT
      THE SCROLL
      THE WIRE
      THE PRINT
      MK VENU
      MADHU TREHAN
      SANJAY HEDGE
      SHOBHAA DE
      ARUNDHATI ROY
      MADHU TREHAN
      JAIRAM RAMESH
      SHASHI THAROOR
      KAPIL SIBAL
      ABHI SEX MAANGTHA SINGVI
      TEHSEEN POONAWAALA
      SHEHZAD POONAWALA
      SANJAY JHA
      SURJEWALA
      AK ANTONY
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA VADRA
      AK ANTONY
      PC CHACKO
      JEAN DREZE
      DIG VIJAY SINGH
      JULIO RIBEIRO
      ASADDUDIN OWAISI
      SHEHLA RASHID
      RANA AYYUB
      SUHEL SETH
      SHAZIA ILMI
      MANI SHANGARAN AIYERAN
      SALMAN KHURSHEED
      GHULAM NABI AZAD
      ENTIRE BBC GANG
      SWARA BHASKAR
      ALL HINDU STALWARTS AND ORGS
      ROMILA THAPAR
      IRFAN HABIB
      NIVEDITA MENON
      AYESHA KIDWAI
      MAJOR WORLD MEDIA
      HISTORY CHANNEL
      DAVID HATCHER CHILDRESS
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA VADRA
      SOLI BABY
      FALI BABY
      KATJU BABY
      SALVE BABY
      JOHN BRITTAS
      PRAKASH KARAT
      BRINDA KARAT
      SITARAM YECHURY
      D RAJA
      ALEX JONES
      RENSE
      DAVID ICKE
      ANGELO JOHN GAGE
      DEEPAK CHOPRA
      ROBIN SHARMA
      TAREK FATEH
      ALL INDIAN MEDIA
      GITA GOPINATH
      AMARTYA SEN
      RAGHURAM RAJAN
      PRINCESS HEND AL QASSIMI
      DR SANJAY GUPTA
      SPREAD ON SOCIAL MEDIA--

      SPREAD BY WHATS APP



      ALL CHICKEN HEARTED MURGI DIL READERS PILE ON..

      I WILL WATCH..

      Delete
    2. Sent to trump,putin,xi,who,cdc
      Mailed to-
      IMA,sodhi,ceo fssai,modi,amit shah,rs prasad,president,vp, ayush minister,yogi,cms,prakash j, hrd min,lekhi,irani,nadda,nitin gadkari,piyush,defence min,LS speaker.

      Delete
    3. Sent to All CMs and Collectors Via e-mail.


      Regards,
      S

      Delete
    4. Sent to

      info@vhp.org
      swamy39@gmail.com
      Srinandan@aol.com
      webmaster.indianarmy@nic.in
      dr.gsgayyangar@gmail.com
      sodhi@amul.coop
      narendramodi1234@gmail.com
      connect@mygov.nic.in
      information@cbi.gov.in
      info.nia@gov.in
      yogiadityanath72@gmail.com
      yogi.adityanath@sansad.nic.in
      cm@ap.gov.in
      cm@telangana.gov.in
      cm@karnataka.gov.in
      cmup@nic.in
      proiaf.dprmod@nic.in
      pronavy.dprmod@nic.in
      contact@amitshah.co.in
      boris.johnson.mp@parliament.uk
      amitabh.kant@nic.in
      amitshah.mp@sansad.nic.in
      Infinity.Foundation.India@gmail.com
      rana.ayyub@gmail.com
      arnab@republicworld.com

      Delete
    5. Your Grievance is registered successfully.
      Registration Number : AYUSH/E/2020/01790

      Delete
  5. https://photogallery.indiatimes.com/celebs/celeb-themes/sara-tendulkars-pictures/articleshow/66116790.cms?picid=74719444

    WHITE RACE PEASANT STOCK LEGS

    ReplyDelete
  6. SOMEBODY ASKED ME

    CAPTAIN

    WHY IS RASAM A IMMUNITY BOOSTER

    IT CONTAINS GARLIC/ INDIAN ONION SMALL / HING / FRESH TURMERIC.

    http://ajitvadakayil.blogspot.com/2017/12/testosterone-boosted-by-onion-and.html

    IF ISKCON CANNOT ADD ONION/ GARLIC IN SCHOOL MEALS-- KICK THEM OUT..

    ISKCON IS NOT A HINDU ORG -- THEY ARE A CULT WHICH PROPAGATES BHAKTI..

    SANATANA DHARMA ALLOWS ONLY SHRADDHA

    https://ajitvadakayil.blogspot.com/2020/03/sanatana-dharma-hinduism-exhumed-and.html

    HARE RAMA HAS NOTHING TO WITH LORD RAMA.. IT IS ABOUT RADHA RAMANA..

    RADHA, THE FAKE MISTRESS OF KRISHNA WAS COOKED UP BY JEW ROTHSCHILD TO MAKE THE HINDU SELF LOATHING..

    BEFORE THE WHITE INVADER CAME TO INDIA WE NEVER HEARD OF RADHA..

    capt ajit vadakayil
    ..

    ReplyDelete
    Replies
    1. PUT ABOVE COMMENT IN WEBSITES OF—
      ALL ISKCON CENTRES IN INDIA AND ABROAD ( SEARCH )
      IMA
      IMA CHIEF
      WHO
      WHO CHIEF
      US CDC
      US CDC CHIEF
      RS SODHI
      AMUL
      FSSAI
      GSG AIYYANGAR
      PUNE SERUM INSTITUTE
      CYRUS POONAWALA
      ADAR POONAWALA
      NITA AMBANI
      MUKESH AMBANI
      ANIL AMBANI
      PMO
      PM MODI
      HEALTH MINISTER/ MINISTRY CENTE- STATES
      AMIT SHAH
      HOME MINISTRY CENTRE/ STATES
      CJI BOBDE
      ATTORNEY GENERAL
      LAW MINISTER PRASAD / MINISTRY CENTRE AND STATES
      ALL CHIEF JUSTICES HIGH COURTS
      I&B MINISTER / MINISTRY
      NSA
      AJIT DOVAL
      RAW
      IB
      CBI
      NIA
      ED
      ALL DGPs OF INDIA
      ALL IGs OF INDIA
      ALL CMs OF INDIA
      ALL MLAs OF INDIA
      ALL MPs OF INDIA
      ALL COLLECTORS OF MAJOR CITIES
      ALL STATE GOVERNORS
      PRESIDENT OF INDIA
      VP OF INDIA
      SPEAKER LOK SABHA
      SPEAKER RAJYA SABHA
      ALL INDIAN THINK TANKS
      NITI AYOG
      AMITABH KANT
      MOHANDAS PAI
      RAJEEV CHANDRASHEKHAR
      E SREEDHARAN
      WILLIAM DALRYMPLE
      KONRAED ELST
      FRANCOIS GAUTIER
      STEPHEN KNAPP
      DAVID FRAWLEY
      GVL NARASIMHA RAO
      SAMBIT PATRA
      ASHOK PANDIT
      ANUPAM KHER
      KANGANA RANAUT
      VIVEK AGNIHOTRI
      MEENAKSHI LEKHI
      SMRITI IRANI
      PRASOON JOSHI
      SWAPAN DASGUPTA
      MADHU KISHWAR
      SUDHIR CHAUDHARY
      GEN GD BAKSHI
      RSN SINGH
      ARNAB GOSWAMI
      NAVIKA KUMAR
      ANAND NARASIMHAN
      RAHUL SHIVSHANKAR
      RAJDEEP SARDESAI
      SRINIVASAN JAIN
      SONAL MEHROTRA KAPOOR
      VIKRAM CHANDRA
      NIDHI RAZDAN
      ZAKKA JACOB
      RAHUL ANWAL
      RAVISH KUMAR
      PRANNOY JAMES ROY
      AROON PURIE
      VINEET JAIN
      RAGHAV BAHL
      SEEMA CHISTI
      DILEEP PADGOANKAR
      VIR SANGHVI
      KARAN THAPAR
      PRITISH NANDI
      ASHISH NANDI
      SHEKHAR GUPTA
      SIDHARTH VARADARAJAN
      PAVAN VARMA
      RAMACHANDRA GUHA
      THAMBI SUNDAR PICHAI
      SATYA NADELLA
      CEO OF WIKIPEDIA
      QUORA CEO ANGELO D ADAMS
      QUORA MODERATION TEAM
      KURT OF QUORA
      GAUTAM SHEWAKRAMANI
      MUKESH AMBANI
      RATAN TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      SWAMY
      RAJIV MALHOTRA
      P GURUS
      RSS
      AVBP
      VHP
      MOHAN BHAGWAT
      RAM MADHAV
      MOHANLAL
      SURESH GOPI
      NALIN KOHLI.
      RAJ THACKREY
      CHANDAN MITRA
      SADGURU JAGGI VASUDEV
      BABA RAMDEV
      SRI SRI RAVISHANKAR
      CHETAN BHAGAT
      AMISH TRIPATHI
      DEVDUTT PATTANAIK
      THE QUINT
      THE SCROLL
      THE WIRE
      THE PRINT
      MK VENU
      MADHU TREHAN
      SANJAY HEDGE
      SHOBHAA DE
      ARUNDHATI ROY
      MADHU TREHAN
      JAIRAM RAMESH
      SHASHI THAROOR
      KAPIL SIBAL
      ABHI SEX MAANGTHA SINGVI
      TEHSEEN POONAWAALA
      SHEHZAD POONAWALA
      SANJAY JHA
      SURJEWALA
      AK ANTONY
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA VADRA
      AK ANTONY
      PC CHACKO
      JEAN DREZE
      DIG VIJAY SINGH
      JULIO RIBEIRO
      ASADDUDIN OWAISI
      SHEHLA RASHID
      RANA AYYUB
      SUHEL SETH
      SHAZIA ILMI
      MANI SHANGARAN AIYERAN
      SALMAN KHURSHEED
      GHULAM NABI AZAD
      ENTIRE BBC GANG
      SWARA BHASKAR
      ALL HINDU STALWARTS AND ORGS
      ROMILA THAPAR
      IRFAN HABIB
      NIVEDITA MENON
      AYESHA KIDWAI
      MAJOR WORLD MEDIA
      HISTORY CHANNEL
      DAVID HATCHER CHILDRESS
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA VADRA
      SOLI BABY
      FALI BABY
      KATJU BABY
      SALVE BABY
      JOHN BRITTAS
      PRAKASH KARAT
      BRINDA KARAT
      SITARAM YECHURY
      D RAJA
      ALEX JONES
      RENSE
      DAVID ICKE
      ANGELO JOHN GAGE
      DEEPAK CHOPRA
      ROBIN SHARMA
      TAREK FATEH
      ALL INDIAN MEDIA
      GITA GOPINATH
      AMARTYA SEN
      RAGHURAM RAJAN
      PRINCESS HEND AL QASSIMI
      DR SANJAY GUPTA
      SPREAD ON SOCIAL MEDIA--

      SPREAD BY WHATS APP

      Delete
    2. https://twitter.com/kannanlp/status/1261982675541217281

      Delete
    3. Your Grievance is registered successfully.
      Registration Number : DHRES/E/2020/00705

      Delete
  7. Your comment: May 17, 2020 at 5:08 AM
    https://twitter.com/Sashwatdharma/status/1261853538730143745
    https://twitter.com/Sashwatdharma/status/1261854067564802048
    https://twitter.com/Sashwatdharma/status/1261854879238115328
    https://twitter.com/Sashwatdharma/status/1261855355123818496
    https://twitter.com/Sashwatdharma/status/1261856023926542341
    https://twitter.com/Sashwatdharma/status/1261856842050760706
    https://twitter.com/Sashwatdharma/status/1261857739589869568
    https://twitter.com/Sashwatdharma/status/1261858728321536000
    https://twitter.com/Sashwatdharma/status/1261860282478940160
    https://twitter.com/Sashwatdharma/status/1261860800014069761
    https://twitter.com/Sashwatdharma/status/1261860976925609984
    https://twitter.com/Sashwatdharma/status/1261861130844037120
    https://twitter.com/Sashwatdharma/status/1261861261190377473

    ReplyDelete
  8. Elder Figure, my twitter account is locked for 3 days.

    ReplyDelete
  9. https://twitter.com/GauravPandhi/status/1261609959269249024

    @ziddpoetry
    @vinit54298953
    @Awanikarai11
    @lothario23oct
    @PuneetKUpadhya1
    @akkimutha92
    @rntarafdar
    @RajDRahul
    @SalmanK96847850
    @amit31311
    @Avadhes37036579
    @pravinpawar313
    @as66497
    @SidharthMahala
    @Virendr69724413
    @ChhotuB03224629
    @rajverma218
    @indian14857430
    @sir_krishna_je
    @raj_samasi
    @GordhanRAMJakh1
    @ps40869
    @Subhash68060088
    @HenryAnkit
    @nitinsaxena1973
    @AnuragPatanwar
    @MithunS24117119
    @kyaukhadlegatu
    @Kundan678Kumar
    @SanjayRozario
    @akash31
    @laddinanu
    @Mkumar61129305
    @rsatnam
    @Arvindabhiyanta
    @pmg987
    @Vijay936250
    @Vishal_man17
    @Mahidha55487408
    @PalvaiShanthan
    @RishiBhoomihar
    @agnostic_mayank
    @indianathrt
    @suman_srbh
    @rahulluniyagma1
    @PrinceR54809102

    ReplyDelete
    Replies
    1. Some more ID's

      @Ameen_aksher
      @NehaKoppula
      @moizkn
      @NKGupta46607134
      @DesiBharatWasi
      @Nupur_Nupur_
      @mrgnk
      @Calm_witness
      @VeerFagga
      @ChooseGudPerson
      @joehandsome79
      @Inquilabo
      @bboyhong50
      @Mb1qevVyv3jXyBs
      @SaketKandari
      @wanderersaurabh
      @aamirsbrigade
      @YasminZafar123
      @waseem33
      @BaghelNirmal
      @BakarTabish
      @WuntakalL
      @jedi_7777
      @ashfaq4u4all
      @shiekato
      @drponabe
      @tahir_sams
      @sandeep_rayat
      @sakshie6
      @zabidasheikh
      @NasriSajid
      @stn_in
      @oyekanit
      @JyotirmayBh
      @Royal_Khan7
      @beingshaquib
      @TheNurpuriya
      @saimmahala
      @DjKaran
      @iamtabish_
      @i_moinkhan
      @Vivisash68
      @miyan_qureshi
      @Siddique_Ali_
      @md_wali08
      @classReloading
      @Shakib62384416
      @INadeemSharief
      @HumeraS82049328
      @ShibuVarkey_dr
      @DeepikaSRajawat
      @ShaikhA05957028
      @asifwangnoo1
      @SabaAhmad25
      @shufta20
      @sonitaaak0925
      @CherylPeter8
      @NadeemSyed777
      @VelahIndian
      @IftekharShap
      @shafimha
      @PPrabhu18
      @SuhailKandak
      @JawwadAliKhan8
      @ilyas027
      @GreatIndiankhan
      @mdaleembasha
      @_sanskari
      @LoveChillinBeer
      @shivendrasb
      @the_insanebeing
      @AVazeed
      @biplab68
      @Phoenix43324339

      Delete
  10. I ASK MY READERS

    WE ALL SAW THE PALGHAR LYNCHING ON REPUBLIC TV..

    TWO HINDU SADHUS IN SAFFRON WERE LYNCHED BY A NAXAL MOB.. LIKE HOW POISONOUS SNAKES ARE BEATEN TO DEATH WITH TOTAL VEHEMENCE..

    THE 70 YEAR OLD SADHU WAS KICKED FROM BEHIND TO THE CROWD , BY A POLICE MAN GIVING LICENCE TO THE MOB TO KILL..

    EXCEPT FOR REPUBLIC TV, NO OTHER TV CHANNELS SHOWED THIS GRUESOME EVENT..

    WHERE IS THE TRUTH EXPOSING MEDIA?

    WHY HAS I&B MINISTER, LAW MINISTER, PM MODI, CJI NOT ENFORCED TRANSPARENCY AND FAIRNESS ..

    IMAGINE WHAT THESE PATHETIC FELLOWS WOULD HAVE DONE IF THESE TWO SAFFRON CLAD SADHUS WERE CHRISTIAN PRIESTS / ISLAMIC MULLAHS / JAIN MONKS..

    WE WOULD HAVE US PRESIDENT AND EU RULERS WARNING HINDUS..

    WHAT ABOUT PATHETIC UDDHAV THACKREY, WHO CLAIMS TO BE A PROUD HINDU ?..

    MUKESH AMBANI AND NITA AMBANI DOES HOOO HAAA OF BEING GREAT DESH BHAKT HINDUS.. THEIR OWN TV CHANNEL BLACKED OUT THE NEWS AND THE VIDEO..

    I HAVE DUG UP AMBANIS ANCESTRY FOR 250 YEARS...

    I KNOW HOW PAPA DHIRUBHAI AMBANI BECAME RICH AT ADEN WHERE HE DID NOT HAVE TEN RUPEES IN HIS POCKET ..

    ALL IN GOOD TIME..

    capt ajit vadakayil
    ..

    ReplyDelete
    Replies
    1. PUT ABOVE COMMENT IN WEBSITES OF--
      TRUMP
      PUTIN
      BORIS JOHNSON
      MACRON
      ANGELA MERKEL
      AMBASSADORS TO FROM USA/ RUSSIA/ UK/ FRANCE / GERMANY
      EXTERNAL AFFAIRS MINISTER/ MINISTRY
      MUKESH AMBANI
      NITA AMBANI
      ANIL AMBANI
      TINA MUNIM
      ALL THREE CHILDREN OF MUKESH AMBANI
      PMO
      PM MODI
      HEALTH MINISTER/ MINISTRY CENTE- STATES
      AMIT SHAH
      HOME MINISTRY CENTRE/ STATES
      CJI BOBDE
      ATTORNEY GENERAL
      LAW MINISTER PRASAD / MINISTRY CENTRE AND STATES
      ALL CHIEF JUSTICES HIGH COURTS
      I&B MINISTER / MINISTRY
      NSA
      AJIT DOVAL
      RAW
      IB
      CBI
      NIA
      ED
      ALL DGPs OF INDIA
      ALL IGs OF INDIA
      ALL CMs OF INDIA
      ALL MLAs OF INDIA
      ALL MPs OF INDIA
      ALL COLLECTORS OF MAJOR CITIES
      ALL STATE GOVERNORS
      PRESIDENT OF INDIA
      VP OF INDIA
      SPEAKER LOK SABHA
      SPEAKER RAJYA SABHA
      ALL INDIAN THINK TANKS
      NITI AYOG
      AMITABH KANT
      MOHANDAS PAI
      RAJEEV CHANDRASHEKHAR
      E SREEDHARAN
      WILLIAM DALRYMPLE
      KONRAED ELST
      FRANCOIS GAUTIER
      STEPHEN KNAPP
      DAVID FRAWLEY
      GVL NARASIMHA RAO
      SAMBIT PATRA
      ASHOK PANDIT
      ANUPAM KHER
      KANGANA RANAUT
      VIVEK AGNIHOTRI
      MEENAKSHI LEKHI
      SMRITI IRANI
      PRASOON JOSHI
      SWAPAN DASGUPTA
      MADHU KISHWAR
      SUDHIR CHAUDHARY
      GEN GD BAKSHI
      RSN SINGH
      ARNAB GOSWAMI
      NAVIKA KUMAR
      ANAND NARASIMHAN
      RAHUL SHIVSHANKAR
      RAJDEEP SARDESAI
      SRINIVASAN JAIN
      SONAL MEHROTRA KAPOOR
      VIKRAM CHANDRA
      NIDHI RAZDAN
      ZAKKA JACOB
      RAHUL ANWAL
      RAVISH KUMAR
      PRANNOY JAMES ROY
      AROON PURIE
      VINEET JAIN
      RAGHAV BAHL
      SEEMA CHISTI
      DILEEP PADGOANKAR
      VIR SANGHVI
      KARAN THAPAR
      PRITISH NANDI
      ASHISH NANDI
      SHEKHAR GUPTA
      SIDHARTH VARADARAJAN
      PAVAN VARMA
      RAMACHANDRA GUHA
      THAMBI SUNDAR PICHAI
      SATYA NADELLA
      CEO OF WIKIPEDIA
      QUORA CEO ANGELO D ADAMS
      QUORA MODERATION TEAM
      KURT OF QUORA
      GAUTAM SHEWAKRAMANI
      MUKESH AMBANI
      RATAN TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      SWAMY
      RAJIV MALHOTRA
      P GURUS
      RSS
      AVBP
      VHP
      MOHAN BHAGWAT
      RAM MADHAV
      MOHANLAL
      SURESH GOPI
      NALIN KOHLI.
      RAJ THACKREY
      CHANDAN MITRA
      SADGURU JAGGI VASUDEV
      BABA RAMDEV
      SRI SRI RAVISHANKAR
      CHETAN BHAGAT
      AMISH TRIPATHI
      DEVDUTT PATTANAIK
      THE QUINT
      THE SCROLL
      THE WIRE
      THE PRINT
      MK VENU
      MADHU TREHAN
      SANJAY HEDGE
      SHOBHAA DE
      ARUNDHATI ROY
      MADHU TREHAN
      JAIRAM RAMESH
      SHASHI THAROOR
      KAPIL SIBAL
      ABHI SEX MAANGTHA SINGVI
      TEHSEEN POONAWAALA
      SHEHZAD POONAWALA
      SANJAY JHA
      SURJEWALA
      AK ANTONY
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA VADRA
      AK ANTONY
      PC CHACKO
      JEAN DREZE
      DIG VIJAY SINGH
      JULIO RIBEIRO
      ASADDUDIN OWAISI
      SHEHLA RASHID
      RANA AYYUB
      SUHEL SETH
      SHAZIA ILMI
      MANI SHANGARAN AIYERAN
      SALMAN KHURSHEED
      GHULAM NABI AZAD
      ENTIRE BBC GANG
      SWARA BHASKAR
      ALL HINDU STALWARTS AND ORGS
      ROMILA THAPAR
      IRFAN HABIB
      NIVEDITA MENON
      AYESHA KIDWAI
      MAJOR WORLD MEDIA
      HISTORY CHANNEL
      DAVID HATCHER CHILDRESS
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA VADRA
      SOLI BABY
      FALI BABY
      KATJU BABY
      SALVE BABY
      JOHN BRITTAS
      PRAKASH KARAT
      BRINDA KARAT
      SITARAM YECHURY
      D RAJA
      ALEX JONES
      RENSE
      DAVID ICKE
      ANGELO JOHN GAGE
      DEEPAK CHOPRA
      ROBIN SHARMA
      TAREK FATEH
      ALL INDIAN MEDIA
      GITA GOPINATH
      AMARTYA SEN
      RAGHURAM RAJAN
      PRINCESS HEND AL QASSIMI
      DR SANJAY GUPTA
      SPREAD ON SOCIAL MEDIA--

      SPREAD BY WHATS APP

      Delete
    2. Sent

      President PMO ambassadors xi global times External affairs un world bank imf, gopinath, moody, rbi, ed, nia, cbi, navy, iaf, supreme court nsitharaman,rntata, anand Mahindra, dilip shanghvi, president, Swamy, jindal, adani, Ambani, soumya,ncov, tedros, CDC director, CM's DGP's BJP Speakers Health Minister BJP President PMO

      MINHA/E/2020/05918 DEPOJ/E/2020/02367
      DPLNG/E/2020/01125 DSEHE/E/2020/02258
      MOSJE/E/2020/01279 MOMAF/E/2020/00420
      MOIAB/E/2020/01716 DCLTR/E/2020/00424
      DORLD/E/2020/01263 MTRBL/E/2020/00127
      DCOYA/E/2020/01405 DMAFF/E/2020/00509
      MODEF/E/2020/01818 LGVED/E/2020/00421
      MINPA/E/2020/00602 GOVMH/E/2020/02017
      PMOPG/E/2020/0427029

      Delete
    3. Sent to

      hfwminister@gov.in
      piyushgoyalofficial@gmail.com
      dr.harshvardhan@sansad.nic.in
      smritizirani@sansad.nic.in
      ramvilas.paswan@sansad.nic.in
      mrs.mlekhi@sansad.nic.in
      amitabh.kant@nic.in
      connect@mygov.nic.in
      prakash.j@sansad.nic.in
      narendramodi1234@gmail.com
      yogiadityanath72@gmail.com

      Delete
    4. sir, please expose dhirubhai ambani, his descendants must pay the price for taking the silence path. Are they not Hindus ?? manmandir me doubt aaya.

      Delete
    5. Posted on twitter A/Cs:

      https://twitter.com/Avii02379630/status/1261919908750782470?s=19
      https://twitter.com/Avii02379630/status/1261921113665200140?s=19
      https://twitter.com/Avii02379630/status/1261922747602497538?s=19

      Delete
    6. https://twitter.com/kannanlp/status/1261977623481085952

      Delete
    7. Sent

      Trump President PMO ambassadors xi global times External affairs un world bank imf, gopinath, moody, rbi, ed, nia, cbi, navy, iaf, supreme court nsitharaman,rntata, anand Mahindra, dilip shanghvi, president, Swamy, jindal, adani, Ambani, soumya,ncov, tedros, CDC director, CM's DGP's BJP Speakers Health Minister BJP President PMO

      info@vedicculturalcenter.org
      info@torontokrishna.com
      hkffl@ymail.com
      srimandasa@yahoo.com
      richmondkrishna@gmail.com
      admin@harekrishnatempleofaustin.com
      Annhowyou@gmail.com
      iskconlansing@gmail.com
      berksbhaktiyoga@gmail.com
      info@mantraphilly.com
      arcanasiddhi@yahoo.com
      bhaktiyogasatsang@gmail.com
      kbd.sdg@gmail.com
      centruldestudiivedice@gmail.com
      acyutananda@mail.ru
      hkc.ljubljana@gmail.com
      iskconfs@telkomsa.net
      iskcon.newcastle.za@gmail.com
      info@iskconcape.org.za
      infodesk@akshayapatra.org
      piyali@apusa.org
      office@tapf.org.uk
      mathan.varkey@akshayapatra.org

      PMOPG/E/2020/0427802 MINHA/E/2020/05932
      DEPOJ/E/2020/02375 MOIAB/E/2020/01720
      DEPOJ/E/2020/02376 DSEHE/E/2020/02261
      MOSJE/E/2020/01284 DCLTR/E/2020/00426
      DOFPD/E/2020/00897 AYUSH/E/2020/01781
      DHRES/E/2020/00701 DMAFF/E/2020/00514
      LGVED/E/2020/00424 MINPA/E/2020/00605
      DOCAF/E/2020/01704

      Delete
    8. Emailed to the list peovidwd by Mr Debdoot Sarkar

      admin@harekrishnatempleofaustin.com
      iskconfs@telkomsa.net
      Annhowyou@gmail.com
      iskcon.newcastle.za@gmail.com
      hkc.ljubljana@gmail.com
      hkffl@ymail.com
      centruldestudiivedice@gmail.com
      srimandasa@yahoo.com
      acyutananda@mail.ru
      info@vedicculturalcenter.org
      bhaktiyogasatsang@gmail.com
      mathan.varkey@akshayapatra.org
      info@torontokrishna.com
      kbd.sdg@gmail.com
      info@mantraphilly.com
      piyali@apusa.org
      arcanasiddhi@yahoo.com
      office@tapf.org.uk
      iskconlansing@gmail.com
      info@iskconcape.org.za
      berksbhaktiyoga@gmail.com
      infodesk@akshayapatra.org
      richmondkrishna@gmail.com

      Delete
    9. Your Grievance is registered successfully.
      Registration Number : MOIAB/E/2020/01734

      Delete
  11. Guruji pranam
    Guruji we Hindus should get on silent mode and let things as it happen.we don't have any options so instead we should mobilize all our sources try to keep our temples religion and family safe.when the time will be ripe let there be such an attack on all traitors that they can't escape.as u said Kalki Avtar is coming so instead of attacking traitors straightly and then risking our identity out let's work in secret.let each and every Hindu mobilize all his resources gather all his strength make himself strong physically financially and mentally
    Then only we can beat the traitors out.it will take time but this is the only way out.
    Sir my English is weak but I hope I have made myself clear.please forgive me if my suggestion is wrong.

    ReplyDelete
  12. Captain, what do you think about JAPANESE TECH MEN?

    I have realised that Jap tech, like I was discussing and I was invalidating theJap's points, - he kepton saying i have 25 years of experience, I said I have recently graduated. So he kept on telling me I am a noob, but my technocal points were correct.

    The more I started to prove him incorrect, he just started to ignore me I think.

    ReplyDelete
  13. An Anti-Hindu trend is trending on twitter #आदिवासी_हिंदू_नहीं_है-

    https://twitter.com/Rajesh_Tribal/status/1261903920651096064?s=19

    ReplyDelete
  14. Aadarniya Ajitsir pranaam

    Please check this, he says kashmiri pandit genocide is a myth


    https://mobile.twitter.com/cjwerleman/status/1261887267062218752


    https://www.google.co.in/amp/s/theprint.in/theprint-profile/cj-werleman-a-bigot-turned-crusader-against-islamophobia-whos-taking-on-the-indian-state/217429/%3famp


    https://www.google.co.in/amp/s/m.timesofindia.com/times-fact-check/news/fake-alert-cj-werleman-tweets-old-video-to-claim-clashes-between-kashmiri-locals-and-security-forces/amp_articleshow/71153781.cms

    ReplyDelete
  15. Hi capt,

    just finished watching the series you suggested on vietnam war. Heart wrenching.
    it nowhere mentioned Saigon rose. Not one picture of agent orange affected kids, though mentioned briefly. Nevertheless an excellent doccumentary.

    ReplyDelete
  16. Coronavirus feels like phase 1 in returning to Satya yuga. Lower levels of evil are getting caught and removed. The earth is going through a cleansing process. Jai Hind.

    ReplyDelete
  17. Sir,
    Modi is a puppet of d kosher deep state - He has sold Bharatmata for a piece of kosher silver He has insulted we d ppl by making Indians a laughing stock in d eyes of d world He is neither a Hindu bhakt nor is he a saviour of Sanatana Dharma -in fact he has done d opposite He has tried to destroy d worlds no. 1 pilgrmage, Sabarimala by not bringing in an ordinance. He has done nothing for d kashmiri pandits He has allowed adultery n homosxuality laws illegally - thru d judiciary He is allowing Pak ISI to rule india via pil route We gave him a second chance (second term) but to no avail He has not mended his ways This guy is a disgrace -d worst pm india had Its high time to write his legacy
    Gratitude

    ReplyDelete
  18. We need to remove Prasad and Javdekar who are deflectors of India's progress.

    ReplyDelete
  19. https://ajitvadakayil.blogspot.com/2020/05/economist-thomas-piketty-you-shall-lay.html

    WATCH THIS SPACE..

    CAPT AJIT VADAKAYIL WILL TEAR APART PRIME KOSHER ECONOMIST ASS.

    Capt ajit vadakayil
    ..

    ReplyDelete
    Replies
    1. PUT ABOVE COMMENT IN WEBSITES OF-
      THOMAS PIKETTY
      HIS PIKETTY THINK TANK TEAM
      PARIS SCHOOL OF ECONOMICS
      LONDON SCHOOL OF ECONOMICS
      MIT
      ROGER GUESNERIE
      FRENCH NATIONAL CENTRE FOR SCIENTIFIC RESEARCH (CNRS)
      FRENCH NEWSPAPERS LIBÉRATION, AND LE MONDE.
      YRJÖ JAHNSSON AWARD PANEL
      JULIA CAGÉ
      IMF
      GITA GOPINATH
      WORLD BANK
      WORLD BANK CHIEF
      MOODYs
      FITCH
      S&P
      RAGHURAM RAJAN
      ABHIJEET BANNERJEE
      AMARTYA SEN
      MANMOHAN SINGH
      MONTEK SINGH AHLUWALIA
      CHID BABY
      PRANAB MUKHERJEE
      YESHWANT SINHA
      RUCHIR SHARMA
      RBI
      RBI GOVERNOR
      ALL INDIAN BUSINESS SCHOOL DEANS
      FINANCE MINISTER/MINISTRY CENTRE AND STATES
      JAYATI GHOSH
      ENTIRE BBC GANG
      ENTIRE US MEDIA
      MAJOR WORLD MEDIA
      THOMAS FRIEDMAN
      JAGDISH BHAGWATI
      KAUSHIK BASU
      ARVIND SUBRAMANIAN
      BIMAL JAIN
      ARVIND PANAGARIYA
      TRUMP
      PUTIN
      BORIS JONSON
      MACRON
      ANGELA MERKEL
      XI
      AMBASSADORS TO FROM USA/ RUSSIA/ UK/ FRANCE / GERMANY
      EDITOR GLOBAL TIMES HU XIJIN
      BILL GATES
      MELINDA GATES
      BILL GATES FOUNDATION
      QUEEN OF ENGLAND
      PRINCE CHARLES
      PMO
      PM MODI
      HEALTH MINISTER/ MINISTRY CENTE- STATES
      AMIT SHAH
      HOME MINISTRY CENTRE/ STATES
      CJI BOBDE
      ATTORNEY GENERAL
      LAW MINISTER PRASAD / MINISTRY CENTRE AND STATES
      ALL CHIEF JUSTICES HIGH COURTS
      I&B MINISTER / MINISTRY
      NSA
      AJIT DOVAL
      RAW
      IB
      CBI
      NIA
      ED
      ALL DGPs OF INDIA
      ALL IGs OF INDIA
      ALL CMs OF INDIA
      ALL MLAs OF INDIA
      ALL MPs OF INDIA
      ALL COLLECTORS OF MAJOR CITIES
      ALL STATE GOVERNORS
      PRESIDENT OF INDIA
      VP OF INDIA
      SPEAKER LOK SABHA
      SPEAKER RAJYA SABHA
      ALL INDIAN THINK TANKS
      NITI AYOG
      AMITABH KANT
      MOHANDAS PAI
      RAJEEV CHANDRASHEKHAR
      E SREEDHARAN
      WILLIAM DALRYMPLE
      KONRAED ELST
      FRANCOIS GAUTIER
      STEPHEN KNAPP
      DAVID FRAWLEY
      GVL NARASIMHA RAO
      SAMBIT PATRA
      ASHOK PANDIT
      ANUPAM KHER
      KANGANA RANAUT
      VIVEK AGNIHOTRI
      MEENAKSHI LEKHI
      SMRITI IRANI
      PRASOON JOSHI
      SWAPAN DASGUPTA
      MADHU KISHWAR
      SUDHIR CHAUDHARY
      GEN GD BAKSHI
      RSN SINGH
      ARNAB GOSWAMI
      NAVIKA KUMAR
      ANAND NARASIMHAN
      RAHUL SHIVSHANKAR
      RAJDEEP SARDESAI
      SRINIVASAN JAIN
      SONAL MEHROTRA KAPOOR
      VIKRAM CHANDRA
      NIDHI RAZDAN
      ZAKKA JACOB
      RAHUL ANWAL
      RAVISH KUMAR
      PRANNOY JAMES ROY
      AROON PURIE
      VINEET JAIN
      RAGHAV BAHL
      SEEMA CHISTI
      DILEEP PADGOANKAR
      VIR SANGHVI
      KARAN THAPAR
      PRITISH NANDI
      ASHISH NANDI
      SHEKHAR GUPTA
      SIDHARTH VARADARAJAN
      PAVAN VARMA
      RAMACHANDRA GUHA
      THAMBI SUNDAR PICHAI
      SATYA NADELLA
      CEO OF WIKIPEDIA
      QUORA CEO ANGELO D ADAMS
      QUORA MODERATION TEAM
      KURT OF QUORA
      GAUTAM SHEWAKRAMANI
      MUKESH AMBANI
      RATAN TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      SWAMY
      RAJIV MALHOTRA
      P GURUS
      RSS
      AVBP
      VHP
      MOHAN BHAGWAT
      RAM MADHAV
      MOHANLAL
      SURESH GOPI
      NALIN KOHLI.
      RAJ THACKREY
      CHANDAN MITRA
      SADGURU JAGGI VASUDEV
      BABA RAMDEV
      SRI SRI RAVISHANKAR
      CHETAN BHAGAT
      AMISH TRIPATHI
      DEVDUTT PATTANAIK
      THE QUINT
      THE SCROLL
      THE WIRE
      THE PRINT
      MK VENU
      MADHU TREHAN
      SANJAY HEDGE
      SHOBHAA DE
      ARUNDHATI ROY
      MADHU TREHAN
      JAIRAM RAMESH
      SHASHI THAROOR
      KAPIL SIBAL
      ABHI SEX MAANGTHA SINGVI
      TEHSEEN POONAWAALA
      SHEHZAD POONAWALA
      SANJAY JHA
      SURJEWALA
      AK ANTONY
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA VADRA
      AK ANTONY
      PC CHACKO
      JEAN DREZE
      DIG VIJAY SINGH
      JULIO RIBEIRO
      ASADDUDIN OWAISI
      SHEHLA RASHID
      RANA AYYUB
      SUHEL SETH
      SHAZIA ILMI
      MANI SHANGARAN AIYERAN
      SALMAN KHURSHEED
      GHULAM NABI AZAD
      SWARA BHASKAR
      ALL HINDU STALWARTS AND ORGS
      ROMILA THAPAR
      IRFAN HABIB
      NIVEDITA MENON
      AYESHA KIDWAI
      HISTORY CHANNEL
      DAVID HATCHER CHILDRESS
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA VADRA
      SOLI BABY
      FALI BABY
      KATJU BABY
      SALVE BABY
      JOHN BRITTAS
      PRAKASH KARAT
      BRINDA KARAT
      SITARAM YECHURY
      D RAJA
      ALEX JONES
      RENSE
      DAVID ICKE
      ANGELO JOHN GAGE
      DEEPAK CHOPRA
      ROBIN SHARMA
      TAREK FATEH
      ALL INDIAN MEDIA
      PRINCESS HEND AL QASSIMI
      MUKESH AMBANI
      RATAN TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      SPREAD ON SOCIAL MEDIA--

      SPREAD BY WHATS APP

      Delete
    2. also to

      PAUL KRUGMAN

      THOMAS FRIEDMAN

      Delete
    3. our Grievance is registered successfully.
      Registration Number : AYUSH/E/2020/01791

      Delete
    4. https://www.facebook.com/thomaspikettyofficiel/posts/1072064509845945?comment_id=1076630802722649

      Delete
  20. https://www.thehindu.com/sci-tech/science/why-dead-bodies-do-not-spread-novel-coronavirus/article31602218.ece/amp/

    Captain
    False news being spread that dead bodies dont spread corona.

    ReplyDelete
  21. IMPORTANT:

    CHINA IS GIVING INDIA PIN PRICKS IN THIS HOUR OF PANDEMIC BY BORDER INCURSIONS.

    CHINA HAD DONE IT BEFORE AT DOLKAM , THREATENING FIRE AND BRIMSTONE, AND THEN GAVE UP—AS PRESIDENT XI FEARED HIS OWN PEOPLE WOULD HANG HIM … BASED ON THE POST BELOW--

    READ BOTH PARTS OF THE POST BELOW—

    http://ajitvadakayil.blogspot.com/2017/07/can-china-afford-war-with-india-come-on.html

    INDIA WILL NOW PUNISH CHINA BY BLAMING CHINA FOR SPREADING COVID-19 PANDEMIC.

    USA MUST TAKE THE LEAD BY CANCELLING ONE TRILLION USD DEBT TO CHINA, AS A PUNISHMENT AND REPARATION FOR SCREWING THIS PLANET..

    CHINA OWNS ABOUT $1.1 TRILLION IN U.S. DEBT, CHINA INVESTS HEAVILY IN U.S. TREASURY BONDS TO KEEP ITS EXPORT PRICES LOWER.

    Capt ajit vadakayil
    ..

    ReplyDelete
    Replies
    1. PUT ABOVE COMMENT IN WEBSITES OF-
      THOMAS PIKETTY
      HIS PIKETTY THINK TANK TEAM
      PARIS SCHOOL OF ECONOMICS
      LONDON SCHOOL OF ECONOMICS
      MIT
      ROGER GUESNERIE
      FRENCH NATIONAL CENTRE FOR SCIENTIFIC RESEARCH (CNRS)
      FRENCH NEWSPAPERS LIBÉRATION, AND LE MONDE.
      YRJÖ JAHNSSON AWARD PANEL
      JULIA CAGÉ
      IMF
      GITA GOPINATH
      WORLD BANK
      WORLD BANK CHIEF
      MOODYs
      FITCH
      S&P
      RAGHURAM RAJAN
      ABHIJEET BANNERJEE
      AMARTYA SEN
      MANMOHAN SINGH
      MONTEK SINGH AHLUWALIA
      CHID BABY
      PRANAB MUKHERJEE
      YESHWANT SINHA
      RUCHIR SHARMA
      RBI
      RBI GOVERNOR
      ALL INDIAN BUSINESS SCHOOL DEANS
      FINANCE MINISTER/MINISTRY CENTRE AND STATES
      JAYATI GHOSH
      ENTIRE BBC GANG
      ENTIRE US MEDIA
      MAJOR WORLD MEDIA
      THOMAS FRIEDMAN
      JAGDISH BHAGWATI
      KAUSHIK BASU
      ARVIND SUBRAMANIAN
      BIMAL JAIN
      ARVIND PANAGARIYA
      TRUMP
      PUTIN
      BORIS JONSON
      MACRON
      ANGELA MERKEL
      XI
      AMBASSADORS TO FROM USA/ RUSSIA/ UK/ FRANCE / GERMANY
      EDITOR GLOBAL TIMES HU XIJIN
      BILL GATES
      MELINDA GATES
      BILL GATES FOUNDATION
      QUEEN OF ENGLAND
      PRINCE CHARLES
      PMO
      PM MODI
      HEALTH MINISTER/ MINISTRY CENTE- STATES
      AMIT SHAH
      HOME MINISTRY CENTRE/ STATES
      CJI BOBDE
      ATTORNEY GENERAL
      LAW MINISTER PRASAD / MINISTRY CENTRE AND STATES
      ALL CHIEF JUSTICES HIGH COURTS
      I&B MINISTER / MINISTRY
      NSA
      AJIT DOVAL
      RAW
      IB
      CBI
      NIA
      ED
      ALL DGPs OF INDIA
      ALL IGs OF INDIA
      ALL CMs OF INDIA
      ALL MLAs OF INDIA
      ALL MPs OF INDIA
      ALL COLLECTORS OF MAJOR CITIES
      ALL STATE GOVERNORS
      PRESIDENT OF INDIA
      VP OF INDIA
      SPEAKER LOK SABHA
      SPEAKER RAJYA SABHA
      ALL INDIAN THINK TANKS
      NITI AYOG
      AMITABH KANT
      MOHANDAS PAI
      RAJEEV CHANDRASHEKHAR
      E SREEDHARAN
      WILLIAM DALRYMPLE
      KONRAED ELST
      FRANCOIS GAUTIER
      STEPHEN KNAPP
      DAVID FRAWLEY
      GVL NARASIMHA RAO
      SAMBIT PATRA
      ASHOK PANDIT
      ANUPAM KHER
      KANGANA RANAUT
      VIVEK AGNIHOTRI
      MEENAKSHI LEKHI
      SMRITI IRANI
      PRASOON JOSHI
      SWAPAN DASGUPTA
      MADHU KISHWAR
      SUDHIR CHAUDHARY
      GEN GD BAKSHI
      RSN SINGH
      ARNAB GOSWAMI
      NAVIKA KUMAR
      ANAND NARASIMHAN
      RAHUL SHIVSHANKAR
      RAJDEEP SARDESAI
      SRINIVASAN JAIN
      SONAL MEHROTRA KAPOOR
      VIKRAM CHANDRA
      NIDHI RAZDAN
      ZAKKA JACOB
      RAHUL ANWAL
      RAVISH KUMAR
      PRANNOY JAMES ROY
      AROON PURIE
      VINEET JAIN
      RAGHAV BAHL
      SEEMA CHISTI
      DILEEP PADGOANKAR
      VIR SANGHVI
      KARAN THAPAR
      PRITISH NANDI
      ASHISH NANDI
      SHEKHAR GUPTA
      SIDHARTH VARADARAJAN
      PAVAN VARMA
      RAMACHANDRA GUHA
      THAMBI SUNDAR PICHAI
      SATYA NADELLA
      CEO OF WIKIPEDIA
      QUORA CEO ANGELO D ADAMS
      QUORA MODERATION TEAM
      KURT OF QUORA
      GAUTAM SHEWAKRAMANI
      MUKESH AMBANI
      RATAN TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      SWAMY
      RAJIV MALHOTRA
      P GURUS
      RSS
      AVBP
      VHP
      MOHAN BHAGWAT
      RAM MADHAV
      MOHANLAL
      SURESH GOPI
      NALIN KOHLI.
      RAJ THACKREY
      CHANDAN MITRA
      SADGURU JAGGI VASUDEV
      BABA RAMDEV
      SRI SRI RAVISHANKAR
      CHETAN BHAGAT
      AMISH TRIPATHI
      DEVDUTT PATTANAIK
      THE QUINT
      THE SCROLL
      THE WIRE
      THE PRINT
      MK VENU
      MADHU TREHAN
      SANJAY HEDGE
      SHOBHAA DE
      ARUNDHATI ROY
      MADHU TREHAN
      JAIRAM RAMESH
      SHASHI THAROOR
      KAPIL SIBAL
      ABHI SEX MAANGTHA SINGVI
      TEHSEEN POONAWAALA
      SHEHZAD POONAWALA
      SANJAY JHA
      SURJEWALA
      AK ANTONY
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA VADRA
      AK ANTONY
      PC CHACKO
      JEAN DREZE
      DIG VIJAY SINGH
      JULIO RIBEIRO
      ASADDUDIN OWAISI
      SHEHLA RASHID
      RANA AYYUB
      SUHEL SETH
      SHAZIA ILMI
      MANI SHANGARAN AIYERAN
      SALMAN KHURSHEED
      GHULAM NABI AZAD
      SWARA BHASKAR
      ALL HINDU STALWARTS AND ORGS
      ROMILA THAPAR
      IRFAN HABIB
      NIVEDITA MENON
      AYESHA KIDWAI
      HISTORY CHANNEL
      DAVID HATCHER CHILDRESS
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA VADRA
      SOLI BABY
      FALI BABY
      KATJU BABY
      SALVE BABY
      JOHN BRITTAS
      PRAKASH KARAT
      BRINDA KARAT
      SITARAM YECHURY
      D RAJA
      ALEX JONES
      RENSE
      DAVID ICKE
      ANGELO JOHN GAGE
      DEEPAK CHOPRA
      ROBIN SHARMA
      TAREK FATEH
      ALL INDIAN MEDIA
      PRINCESS HEND AL QASSIMI
      MUKESH AMBANI
      RATAN TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      SPREAD ON SOCIAL MEDIA--

      SPREAD BY WHATS APP

      Delete
    2. Sent

      Trump Macron Merkel President PMO ambassadors xi global times External affairs un world bank imf, gopinath, moody, rbi, ed, nia, cbi, navy, iaf, supreme court nsitharaman,rntata, anand Mahindra, dilip shanghvi, president, Swamy, jindal, adani, Ambani, soumya,ncov, tedros, CDC director, CM's DGP's BJP Speakers Health Minister BJP President PMO

      thomas.piketty@psemail.eu;
      alvaredo@gmail.com;
      lydia.assouad@psemail.eu;
      peisenha@uni-bonn.de;
      lucas.chancel@sciencespo.fr;
      esaez@berkeley.edu;
      zucman@berkeley.edu;
      li.yang@psemail.eu celine.jambon@psemail.eu;
      samuel.chich@psemail.eu;
      m.ghatak@lse.ac.uk;
      newsoffice@mit.edu;
      guesnerie@pse.ens.fr;
      silvia.esteban@cnrs.fr;
      courrier-des-lecteurs@lemonde.fr;
      Elli.dahl@yjs.fi;
      terhi.maczulskij@yjs.fi;
      julia.cage@sciencespo.fr

      PMOPG/E/2020/0428321 MINHA/E/2020/05943
      DEPOJ/E/2020/02383 MOIAB/E/2020/01722
      DPLNG/E/2020/01131 DSEHE/E/2020/02265
      MOSJE/E/2020/01285 DOEAF/E/2020/00622
      DORVU/E/2020/01000 DODIV/E/2020/00203
      CBODT/E/2020/10228 DOEXP/E/2020/02867
      DMAFF/E/2020/00518 MODEF/E/2020/01826
      LGVED/E/2020/00426 MINPA/E/2020/00607

      Delete
    3. Your Grievance is registered successfully.
      Registration Number : DOSIR/E/2020/00271

      Delete
    4. sent emails to addresses provided by Debdoot above

      Delete
  22. https://mobile.twitter.com/SupremeDharma/status/1262020561934282755

    ReplyDelete
  23. https://greatgameindia.com/italian-politician-demand-bill-gates-arrest-for-crimes-against-humanity/

    ReplyDelete
  24. https://www.instagram.com/p/B-moNMAAK49/comments/

    Look at the comments, people are waking up!

    ReplyDelete
  25. Dear Captain,

    You foresee what will be the next move of the deep state and through your blogs you warn the rulers to take necessary action to counter such move.

    After Modi govt took charge, he provided people platforms like PMOPG, Facebook, Twitter, etc asking them to give their suggestions for good governance. But it proved to be a farce, because all most all our suggestions posted were sarcastically closed without providing genuine reason. In some cases it was termed as your fiction.

    It shows that they are least interested in implementing our suggestions, because they will neither provide much needed ego massage nor please their jewish masters, for whom they have acquired power, by fooling the entire country.

    You have rightly said that he still believes that Amit Shaw has given him success in elections. After assuming charge as PM, you had asked Modi to go for quick wins. Some of such suggestions were:
    1. Rehabilitation of Kashmiri Pandits.
    2. Dismantling of collegium judiciary.
    3. Freedom to lakhs of under-trials (petty cases) rotting in jails.
    4. Reviving water resources.
    5. Releasing of Asaaram Bapu, who is in jail on false charges.

    But Modi fulfilled none of them. Instead, he continued his agenda of self glorification and ego massage, throughout his 6 year tenure. We observe that his praise of Rothschild stooges continues unabated.

    I think, LK Advani had an idea of how cunning Modi is, and kept him at a spot he deserved. But AB Vajpey stood by his side and promoted him.

    nowadays, the Break India forces are in full swing. We find no other able leader who can withstand the onslaught of such anti-nation traitors. The alternate before us, against him is more detrimental to our country.

    In my opinion, we need a leader like you, who is committed to the service of our Watan. But that is possible only if you decide so.

    Otherwise, Captain, you only can make Modi to perform, in the interest of the country. We await for a post, writing his legacy, which makes him to shed his ego and serve Bharatmata.

    According to me, we expect the following jobs to be accomplished by Modi on top priority:

    1. Dismantling collegium judiciary.
    2. Curbing benami foreign funded NGOs and media houses.
    3. Rehabilitation of Kashmiri pandits.
    4. Declaring all the judgements passed by collegium judiciary through PIL route as null & void.
    5. Re-instilling pride among Hindus.

    With Regards and Gratitude.

    Prakash Kulkarni

    ReplyDelete
    Replies
    1. Lastly this is more to be done discreetly .Seperate t from LGB
      And reinstat sec 377

      Delete
    2. ON a related note we must find ways to deal with LGB propoganda in schools and colleges especially with that disease spreading like wildfire it wll cause 110 problems in the future with our next generation present 3 yr olds etc.
      Readers pl take note of this very very important.Also encourage Bhramacharya(Vadakayil version) among youth .Many nowadays are completely addicted to internet porn or mobile games etc.

      Delete
  26. .
    CHEATING ON THE TIME AXIS

    LOOKS LIKE ITALIAN HALF BREED MAINI JEW RAHUL GANDHI AND HIS MENTORS ARE READING MY BLOGPOSTS

    http://ajitvadakayil.blogspot.com/2013/06/travesty-of-justice-sreesanth-and.html

    THE INTERVIEW WHICH HAD A CLOCK BEHIND RAHUL GANDHIs HEAD—WAS BEING EDITED .

    ANY IDIOT CAN FIGURE THIS OUT.

    SAM PITRODAs UNDERWEAR NAY ENDEAVOUR TO MAKE A MORON A GENIUS WONT WORK

    https://www.youtube.com/watch?v=9N_NSzDQDJk

    capt ajit vadakayil
    ..

    ReplyDelete
  27. https://timesofindia.indiatimes.com/sports/cricket/news/never-again-harbhajan-yuvraj-regret-appeal-for-help-to-afridis-foundation/articleshow/75790907.cms

    AFRIDI IS A JEW..

    SAME CLAN AS OUR PAST PRESIDENT AKIR HUSSAIN, WHOSE GRANDSON IS SALMAN KHURSHID..

    ROTHSCHILD CREATED THE AFRIDI CLAN TO GUARD THE BOLAN AND KHYBER PASS..

    capt ajit vadakayil
    ..

    PUT ABOVE COMMENT IN WEBSITES OF--
    CURRENT PAKISTANI TEAM
    CURRENT INDIAN TEAM
    PAST PAKISTANI/ INDIAN GREATS
    BCCI
    PMO
    PM MODI
    HEALTH MINISTER/ MINISTRY CENTE- STATES
    AMIT SHAH
    HOME MINISTRY CENTRE/ STATES
    CJI BOBDE
    ATTORNEY GENERAL
    LAW MINISTER PRASAD / MINISTRY CENTRE AND STATES
    ALL CHIEF JUSTICES HIGH COURTS
    I&B MINISTER / MINISTRY
    NSA
    AJIT DOVAL
    RAW
    IB
    CBI
    NIA
    ED
    ALL DGPs OF INDIA
    ALL IGs OF INDIA
    ALL CMs OF INDIA
    ALL MLAs OF INDIA
    ALL MPs OF INDIA
    ALL COLLECTORS OF MAJOR CITIES
    ALL STATE GOVERNORS
    PRESIDENT OF INDIA
    VP OF INDIA
    SPEAKER LOK SABHA
    SPEAKER RAJYA SABHA
    ALL INDIAN THINK TANKS
    NITI AYOG
    AMITABH KANT
    MOHANDAS PAI
    RAJEEV CHANDRASHEKHAR
    E SREEDHARAN
    WILLIAM DALRYMPLE
    KONRAED ELST
    FRANCOIS GAUTIER
    STEPHEN KNAPP
    DAVID FRAWLEY
    GVL NARASIMHA RAO
    SAMBIT PATRA
    ASHOK PANDIT
    ANUPAM KHER
    KANGANA RANAUT
    VIVEK AGNIHOTRI
    MEENAKSHI LEKHI
    SMRITI IRANI
    PRASOON JOSHI
    SWAPAN DASGUPTA
    MADHU KISHWAR
    SUDHIR CHAUDHARY
    GEN GD BAKSHI
    RSN SINGH
    ARNAB GOSWAMI
    NAVIKA KUMAR
    ANAND NARASIMHAN
    RAHUL SHIVSHANKAR
    RAJDEEP SARDESAI
    SRINIVASAN JAIN
    SONAL MEHROTRA KAPOOR
    VIKRAM CHANDRA
    NIDHI RAZDAN
    ZAKKA JACOB
    RAHUL ANWAL
    RAVISH KUMAR
    PRANNOY JAMES ROY
    AROON PURIE
    VINEET JAIN
    RAGHAV BAHL
    SEEMA CHISTI
    DILEEP PADGOANKAR
    VIR SANGHVI
    KARAN THAPAR
    PRITISH NANDI
    ASHISH NANDI
    SHEKHAR GUPTA
    SIDHARTH VARADARAJAN
    PAVAN VARMA
    RAMACHANDRA GUHA
    THAMBI SUNDAR PICHAI
    SATYA NADELLA
    CEO OF WIKIPEDIA
    QUORA CEO ANGELO D ADAMS
    QUORA MODERATION TEAM
    KURT OF QUORA
    GAUTAM SHEWAKRAMANI
    MUKESH AMBANI
    RATAN TATA
    ANAND MAHINDRA
    KUMARAMANGALAMBIRLA
    LAXMI MNARAYAN MITTAL
    AZIM PREMJI
    KAANIYA MURTHY
    RAHUL BAJAJ
    RAJAN RAHEJA
    NAVEEN JINDAL
    GOPICHAND HINDUJA
    DILIP SHANGHVI
    GAUTAM ADANI
    SWAMY
    RAJIV MALHOTRA
    P GURUS
    RSS
    AVBP
    VHP
    MOHAN BHAGWAT
    RAM MADHAV
    MOHANLAL
    SURESH GOPI
    NALIN KOHLI.
    RAJ THACKREY
    CHANDAN MITRA
    SADGURU JAGGI VASUDEV
    BABA RAMDEV
    SRI SRI RAVISHANKAR
    CHETAN BHAGAT
    AMISH TRIPATHI
    DEVDUTT PATTANAIK
    THE QUINT
    THE SCROLL
    THE WIRE
    THE PRINT
    MK VENU
    MADHU TREHAN
    SANJAY HEDGE
    SHOBHAA DE
    ARUNDHATI ROY
    MADHU TREHAN
    JAIRAM RAMESH
    SHASHI THAROOR
    KAPIL SIBAL
    ABHI SEX MAANGTHA SINGVI
    TEHSEEN POONAWAALA
    SHEHZAD POONAWALA
    SANJAY JHA
    SURJEWALA
    AK ANTONY
    SONIA GANDHI
    RAHUL GANDHI
    PRIYANKA VADRA
    AK ANTONY
    PC CHACKO
    JEAN DREZE
    DIG VIJAY SINGH
    JULIO RIBEIRO
    ASADDUDIN OWAISI
    SHEHLA RASHID
    RANA AYYUB
    SUHEL SETH
    SHAZIA ILMI
    MANI SHANGARAN AIYERAN
    SALMAN KHURSHEED
    GHULAM NABI AZAD
    SWARA BHASKAR
    ALL HINDU STALWARTS AND ORGS
    ROMILA THAPAR
    IRFAN HABIB
    NIVEDITA MENON
    AYESHA KIDWAI
    HISTORY CHANNEL
    DAVID HATCHER CHILDRESS
    SONIA GANDHI
    RAHUL GANDHI
    PRIYANKA VADRA
    SOLI BABY
    FALI BABY
    KATJU BABY
    SALVE BABY
    JOHN BRITTAS
    PRAKASH KARAT
    BRINDA KARAT
    SITARAM YECHURY
    D RAJA
    ALEX JONES
    RENSE
    DAVID ICKE
    ANGELO JOHN GAGE
    DEEPAK CHOPRA
    ROBIN SHARMA
    TAREK FATEH
    ALL INDIAN MEDIA
    PRINCESS HEND AL QASSIMI
    MUKESH AMBANI
    RATAN TATA
    ANAND MAHINDRA
    KUMARAMANGALAMBIRLA
    LAXMI MNARAYAN MITTAL
    AZIM PREMJI
    KAANIYA MURTHY
    RAHUL BAJAJ
    RAJAN RAHEJA
    NAVEEN JINDAL
    GOPICHAND HINDUJA
    DILIP SHANGHVI
    GAUTAM ADANI
    SPREAD ON SOCIAL MEDIA--

    SPREAD BY WHATS APP

    ReplyDelete
    Replies
    1. Twitted ( copy paste comment )
      To
      Pcb
      Pakistan super league
      Rameez raza
      Shoaib mallick
      Shoaib akhtar
      Waqar younis
      Wasim akram
      Pmo
      Narender modi
      Amit shah
      Hmo
      Rajnath singh
      Up police
      Dgp up
      Fovt of up
      Abp news
      Aaj tak
      Zee news hindi
      Ratan tata
      Anand mahindra
      Naveen jindal
      Cmo maharastra
      Cmo telengana
      Cmo chattisgarh
      Cmo haryana
      Cmo gyjrat
      Cmo kerela
      Mamata baneerjee
      Sitaram yechury
      Nitish kumar
      Sushil kumar modi

      Delete
  28. https://twitter.com/asyounotwish?lang=en

    ReplyDelete

  29. RohitMay 17, 2020 at 8:42 PM
    Pranaam Captain,


    I read a book on economics by a noted chemist from the early 1900s, Frederick Soddy. It talks about how modern economics understanding of wealth is incorrect. The book is called Wealth, Virtual Wealth and Debt.

    What do you think of this work? Soddy was ostracized for this and his legacy tarnished in his later years.


    Respectfully,
    Rohit.

    ReplyDelete

  30. Yadagiri gawrayyaMay 17, 2020 at 9:12 AM
    We had made mistake by electing Modi , he sis selfish and cunning and man with zero integrity !!!

    ReplyDelete

    saurabh giriMay 17, 2020 at 2:35 PM
    Zee news also showed truth and complete truth in case of Palghar lynching .

    ReplyDelete
  31. WE ASK CM PINARAYI VIJAYAN TO CONTACT MAHARASHTRA CM UDDHAV THACKET AND ADVIDE HIM ON AYURVEDIC METHOD OF BOOSTING IMMUNITY BY FOOD INTAKE ALONE..

    FRESH TURMERIC/ GARLIC/ VIRGIN COCONUT OIL/ ORGANIC NON-GMO FOODS/ HUMPED COW GHEE / IDLI AND A2 MILK CURD- COCONUT CHUTNEY BREAKFAST / ORGANIC BROWN MATTA RICE ..

    capt ajit vadakayil
    ..

    PUT ABOVE COMMENT IN WEBSITES OF--
    CM PINARAYI VIJAYAN
    CM UDDHAV THACKREY
    GOVERNOR OF KERALA
    GOVERNOR OF MAHARASHTRA
    PMO
    PM MODI

    ReplyDelete
    Replies
    1. https://twitter.com/Ramchan38705812/status/1262073239410376704?s=20
      Narendra modi
      https://twitter.com/Ramchan38705812/status/1262073154412806144?s=20
      Pmo india
      https://twitter.com/Ramchan38705812/status/1262072965455208448?s=20
      Cmo maharastra
      https://twitter.com/Ramchan38705812/status/1262072725725573123?s=20
      Office of uddhav thackery
      https://twitter.com/Ramchan38705812/status/1262072580355194880?s=20
      Kerela governor
      https://twitter.com/Ramchan38705812/status/1262072211722039297?s=20
      Cmo kerela
      https://twitter.com/Ramchan38705812/status/1262072104549150721?s=20
      Pinayrayi vijayan

      Delete
    2. https://www.facebook.com/PinarayiVijayan/posts/3038904956201314?comment_id=717180325703161

      Delete
    3. Sent to-
      chiefminister@kerala.gov.in
      keralagovernor@gmail.com
      connect@mygov.nic.in
      narendramodi1234@gmail.com
      cc:
      cm@maharashtra.gov.in

      Delete
    4. Received ack from maha cmo.They forwarded this to principal secretary health and copied to me..

      माननिय श्री / श्रीमती

      धन्यवाद, 

      आपला "ईमेल" मुख्यमंत्री कार्यालयास प्राप्त झाला असून तो पुढील कार्यवाहीसाठी संबंधीत विभागास पाठविण्यात आला आहे. 

      नोंदणी शाखा,

      मुख्यमंत्री कार्यालय.

      Delete
  32. BEFORE THE COVID-19 CRISIS, A LOT OF PEOPLE HAVEN’T EVEN HEARD OF VIDEO CONFERENCING APPLICATION ZOOM.

    AS CORONAVIRUS HAS MOVED MANY IN-PERSON ACTIVITIES ONLINE, THE USE OF VIDEO CONFERENCING APPLICATIONS HAS ALSO SEEN A SURGE IN DEMAND IN THE PAST TWO MONTHS.

    ZOOM IS A PRIME TARGET FOR FOREIGN SPIES, ESPECIALLY CHINESE INTELLIGENCE OPERATIVES, THE DEPARTMENT OF HOMELAND SECURITY HAS WARNED U.S. GOVERNMENT AGENCIES AND LAW-ENFORCEMENT AGENCIES,

    CHINA'S ACCESS TO ZOOM SERVERS MAKES BEIJING UNIQUELY POSITIONED TO TARGET U.S. PUBLIC AND PRIVATE SECTOR USERS

    INDIA MUST CREATE OUR OWN VIDEO CONFERENCING SYSTEM LIKE ZOOM

    ZOOM IS EASY TO SET UP, EASY TO USE AND LETS UP TO 100 PEOPLE JOIN A MEETING FOR FREE. IT JUST WORKS.

    https://www.youtube.com/watch?v=fnfsbjfvk2o
    ZOOM'S EASE OF USE MAKES IT EASY FOR TROUBLEMAKERS TO "BOMB" OPEN ZOOM MEETINGS..

    IF YOU ARE HOSTING A ZOOM MEETING, ASK THAT MEETING PARTICIPANTS SIGN IN WITH A PASSWORD. THAT WILL MAKE ZOOM-BOMBING MUCH LESS LIKELY.

    UNTIL RECENTLY ZOOM HAD THE RIGHT TO DO WHATEVER IT WANTED WITH USERS' PERSONAL DATA, AND ITS ENCRYPTION POLICIES, WHICH HAVE BEEN MORE THAN A TAD MISLEADING.

    ZOOM CREATES A HUGE "ATTACK SURFACE" AND HACKERS ARE GOING TO COME AT IT EVERY WAY THEY CAN

    CYBERCRIMINALS MAY HAVE REGISTERED HUNDREDS OF NEW ZOOM-RELATED WEBSITE ADDRESSES IN THE PAST FEW WEEKS

    MANY OF THESE SITES ARE BEING USED IN PHISHING ATTACKS TO GRAB VICTIMS' ZOOM USERNAMES AND PASSWORDS, AND SIMILAR SCAMS ARE LEVERAGING RIVAL VIDEO-CONFERENCING PLATFORMS SUCH AS GOOGLE MEET AND MICROSOFT TEAMS.

    RESEARCHERS AT TREND MICRO SPOTTED ANOTHER ZOOM INSTALLER FILE THAT HAD BEEN CORRUPTED WITH MALWARE.

    IN THIS CASE, IT'S SPYWARE THAT CAN TURN ON THE WEBCAM, TAKE SCREENSHOTS AND LOG KEYSTRKES, AS WELL AS COLLECTING DIAGNOSTIC DATA ABOUT THE SYSTEM IT'S RUNNING ON. IT ALSO INSTALLS A FULLY WORKING VERSION OF THE ZOOM DESKTOP CLIENT.

    NO END-TO-END ENCRYPTION: ZOOM HAS FALSELY ADVERTISED THAT IT IS USING END-TO-END ENCRYPTION POLICY ON IT’S PLATFORM. END-TO-END ENCRYPTION MEANS A SYSTEM THAT SECURES COMMUNICATION SO THAT THE DATA CAN ONLY BE READ BY THE INTENDED AUDIENCE.

    LATER, IT WAS ADMITTED BY ZOOM, THAT CURRENT SURGE IN DEMAND LEADS TO MISSTEPS IN THE SECURITY AND PRIVACY IMPLEMENTATION IN THE NEW MODULES AND END-TO-END ENCRYPTION IS CURRENTLY NOT POSSIBLE.

    SECURITY FLAWS: A NUMBER OF SECURITY FLAWS HAVE BEEN DETECTED IN THE RECENT WEEK:

    A HIDDEN WEB SERVER WAS INSTALLED ON THE USER MACHINE SO THAT THE USER CAN BE ADDED TO A CALL WITHOUT THEIR PERMISSION.
    A BUG WAS DISCOVERED, THAT CAN TAKE OVER THE CONTROL OF ZOOM USER’S MAC, INCLUDING TAPPING INTO THE WEBCAM AND HACKING THE MICROPHONE.

    IN-APP SURVEILLANCE MEASURES: ZOOM HAS INTRODUCED A “ATTENTION TRACKING” FEATURE. THIS FEATURE ALLOWS THE HOST TO SEE IF THE USER CLICKS AWAY FROM THE ZOOM WINDOW FOR 30 SECONDS OR MORE. THIS FEATURE HELPED THE EMPLOYERS TO SEE IF THE EMPLOYEE IS REALLY TURNED INTO THE MEETING OR IF THE STUDENTS ARE REALLY WATCHING CLASSROOM PRESENTATIONS REMOTELY.

    CONTINUED TO 2-

    ReplyDelete
    Replies
    1. CONTINUED FROM 1--

      SELLING OF USER DATA: ZOOM HAS SAID THAT THE COMPANY HAS NEVER SOLD USER DATA IN THE PAST AND HAS NO INTENTION OF SELLING USERS DATA. CUBER SECURITY RESEARCHERS HAVE FOUND MULTIPLE DATABASES CONTAINING ZOOM CREDENTIALS AND STARTED ANALYZING HOW HACKERS GOT HOLD OF THEM IN THE FIRST PLACE.

      CREATE A ‘WORKING COMMUNICATION PLAN REMOTELY’ TO GIVE REASSURANCE TO YOUR REMOTE WORKERS THAT ALL COMMUNICATIONS WILL STAY SAFE AND SECURE.

      PROVIDE CYBERSECURITY TRAINING FOR YOUR REMOTE WORKERS ON HOW TO STAY SAFE AND SECURE WHILE WORKING FROM HOME.

      MOVE YOUR DATA FILES TO THE CLOUD IF YOU HAVEN’T ALREADY DONE SO. THE CLOUD PROVIDES BETTER SECURITY AND PROTECTION, KEEPING VITAL DATA SAFE. DATA STORED IN THE CLOUD IS EASILY ACCESSIBLE BY APPROVED USERS.

      ESTABLISH A VIRTUAL PRIVATE NETWORK (VPN) TO PROTECT REMOTE WORKERS. PUT A BUSINESS VPN IN PLACE TO ENCRYPT THOSE CONNECTIONS FOR ADDED SECURITY. CYBERCRIMINALS CAN’T GET INTO CLOUD-BASED APPLICATIONS AT THE SAME REMOTE WORKERS ARE ACCESSING IT.

      CHECK YOUR REMOTE IT SUPPORT OPTIONS. IF REMOTE WORKERS ARE HAVING AN IT ISSUE, APPOINT A TRUSTED IT PRO AND ALLOW THEM TO LOG IN REMOTELY.

      https://ajitvadakayil.blogspot.com/2020/05/what-artificial-intelligence-cannot-do.html

      THUMBRULE: NEVER LOCK THE STABLE DOORS AFTER THE HORSES HAVE BOLTED..

      Capt ajit vadakayil
      ..

      Delete
    2. PMO
      PM MODI
      HEALTH MINISTER/ MINISTRY CENTE- STATES
      AMIT SHAH
      HOME MINISTRY CENTRE/ STATES
      CJI BOBDE
      ATTORNEY GENERAL
      LAW MINISTER PRASAD / MINISTRY CENTRE AND STATES
      ALL CHIEF JUSTICES HIGH COURTS
      I&B MINISTER / MINISTRY
      NSA
      AJIT DOVAL
      RAW
      IB
      CBI
      NIA
      ED
      ALL DGPs OF INDIA
      ALL IGs OF INDIA
      ALL CMs OF INDIA
      ALL MLAs OF INDIA
      ALL MPs OF INDIA
      ALL COLLECTORS OF MAJOR CITIES
      ALL STATE GOVERNORS
      PRESIDENT OF INDIA
      VP OF INDIA
      SPEAKER LOK SABHA
      SPEAKER RAJYA SABHA
      ALL INDIAN THINK TANKS
      NITI AYOG
      AMITABH KANT

      Delete
    3. Sir

      See an important meeting of defence personals

      https://www.google.com/amp/s/english.manoramaonline.com/news/nation/2020/04/13/zoom-app-union-ministers-video-conference-china-servers.amp.html

      china is using our data.

      https://www.google.com/amp/s/www.forbes.com/sites/daveywinder/2020/04/28/zoom-gets-stuffed-heres-how-hackers-got-hold-of-500000-passwords/amp/

      Thankyou sir

      Delete
    4. Sent

      CM's DGP'S BJP Speakers Health Minister BJP President Law Minister Amitabh Kant

      PMOPG/E/2020/0428903 MINHA/E/2020/05956
      DEPOJ/E/2020/02389 MOIAB/E/2020/01732
      DPLNG/E/2020/01136 MINIT/E/2020/01369
      DSEHE/E/2020/02270 DMAFF/E/2020/00520
      MODEF/E/2020/01833 LGVED/E/2020/00430
      MINPA/E/2020/00611 DHRES/E/2020/00704

      Delete
    5. https://www.facebook.com/RaviShankarPrasadOfficial/posts/10158147240773329?comment_id=10158150228453329

      Delete
    6. Sent to cyber laws and e security group of meity,secretary of meity
      ravis@sansad.nic.in
      mljoffice@gov.in
      connect@mygov.nic.in
      narendramodi1234@gmail.com
      contact@amitshah.co.in
      amitshah.mp@sansad.nic.in
      jscpg-mha@nic.in
      17akbarroad@gmail.com
      38ashokroad@gmail.com
      prakash.j@sansad.nic.in
      minister.hrd@gov.in
      minister.inb@gov.in
      amitabh.kant@nic.in
      vch-niti@gov.in
      yogiadityanath72@gmail.com

      Delete
  33. Dear Capt Ajit sir,

    Von Wellx products are sold in over 80 countries with more than 100 million customers across the globe has decided to move to Bharat and to Uttar Pradesh. This will generate 10,000 jobs...is this being dumped by China because it's a polluting Industry there or not ? Pls clarify, if this is good for India ?

    ReplyDelete
  34. Dear Capt Ajit Sir,
    China's ambassador to Israel, Du Wei, died at his home in Tel Aviv on Sunday (May 17), apparently from natural causes, a statement from Beijing said.

    The 57-year-old envoy, who had arrived in Israel in mid-February, was found dead in his home in Herzliya, north of the city, spokesman Micky Rosenfeld told AFP...

    https://www.channelnewsasia.com/news/asia/chinese-envoy-israel-found-dead-health-reasons-12742798

    ReplyDelete
  35. Name Of Complainant jayasree
    Date of Receipt 13/05/2020
    Received By Ministry/Department
    Financial Services (Banking Division)
    Grievance Description
    Financial Services (Banking Division) >> Service Matter Related

    Department/Bank/Financial Institute : Department of Financial Services
    -----------------------
    www.newindianexpress.com/nation/2020/may/13/borrow-gold-from-religious-bodies-for-covid-fight-prithviraj-chavan-2142910.html
    INDIA HAS MORE THAN 55,000 TONNES OF PRIVATE GOLD..ALMOST ALL OF IT IN KERALA.
    BIG BROTHER JEW ROTHSCHILD WANTS IT FOR HIS PRIVATE VAULTS.
    IN HIS PUBLIC BANK VAULTS HE HAS FAKE TUNGSTEN BARS COATED WITH GOLD.
    www.silverbearcafe.com/private/03.10/phonygold.html
    AFTER DUNKIRK WAR INDIAN POWs WERE SHIPPED OFF TO ROTHSCHILDs TUNGSTEN MINES
    Grievance Document
    Current Status Case closed
    Date of Action 16/05/2020
    Remarks
    It is observed that the complaint is not clear to figure-out exact nature of the grievance. The complaint is incoherent and not specific. We observe that your grievance is more in the nature of your observations which are not clear. In view of this we request you to clearly indicate the exact nature of your grievance, so as to enable us to take-up the matter with the respective bank/FI.
    Officer Concerns To
    Officer Name Shri R Kamalakannan
    Officer Designation General Manager
    Contact Address
    Email Address
    cms.cepdco@rbi.org.in
    Contact Number
    02222631447

    ReplyDelete
  36. Dear Capt Ajit sir,

    Obama slams Trump for the chaos of huge Covid-19 deaths, breaks the protocol of criticizing the current Prez of India by former Prez...

    ReplyDelete
  37. THIS STUPID WOMAN FEELS THAT SHE CAN INFLUENCE INDIA BECAUSE SOME INDIANS WORK THERE.

    SHE DOES PROPAGANDA THAT SHE IS A MUSLIM.. WHEN SHE IS A JEWESS.

    ReplyDelete
    Replies
    1. Captain, I am not your detractor and I am not doing any hate-speech/defamation/etc. I am not some Islamophobic or Hindutva-extremist or whatever false label one would want to put on me. This is a honest opinion & question from a pro-India, pro-Hindu Indian living in India.

      All these Islamic nations have declared indirect Jihad against Indian-Hindus ! They want to defame and punish India at international level ! They want to silence and punish the Indian Hindus in their nations ! Their DNA of bullying, punishing non-muslims right from their early days has once again reared it's ugly head ! This is open Jihad against Hindus by the muslims led by their Arab masters !

      Inspite of seeing all this mess, you always cover up for all the muslims by wiping their tracks clean claiming that each and every bad person who is a muslim is actually (according to you) a jew or a crypto-jew. How much will you clean their shit ? Is this all you will do for the rest of your life ?

      I have observed that you have 4-pillars of your intellectual-POV --- [Kerala, India, Islam, Hinduism] --- in that order. You use your KIIH (Kerala-India-Islam-Hinduism in that priority) value system rationalizng/excusing Islam not realizing (or not wanting to realize) that no muslim will migrate to islamic-nation because they want to convert their resident-nation into an islamic-nation ! That is the entire concept of Taqqiya and Jihad, to deceitfully or forcibly convert the native-population and to conquer the land thereby establishing the rule of Islam !

      How can you be so naive Captain ? How long will you clean the mess they create ? You are not even 50% as forgiving to Hindus, Jews, Christians, Whites, Blacks, etc. but for the Muslims you will bend in multiple ways ! You scold people of Indian-regions like Marathas, Sikhs, Tamils, Telugus, etc. etc. as traitors and shout how Indian-Hindus are traitors and so on ! But Muslims get a free pass, especially if they are Indian muslims ? What a logic sirjee !

      The only muslims (& not called crypto-jews) whom you have exposed are those who have harmed Kerala (Mappilas) and India (Razikars, Pakistanis, Kashmiri-terrorists) but those who harmed Hinduism (Islamic-invaders) and World (all terrorist-orgs, radical-preachers, etc.) are conveniently labelled either jew or crypto jew by you.

      See this. Muslims (even Indian ones) ganging up on Indian Hindus ! Will you call them all crypto-jews as well ? How much will you excuse/rationalize/justify their actions ? They have declared Jihad on Hindus indirectly and you will still bend multiple ways for them !

      How much wil you defend these people with your claims of them being Cryto-Jews Captain ? What is the difference between you and Modi and others whom you claim to be anti-Hindu anti-India people ? Courage of Conviction ? LOL ! And yet you continue your KIIH philosophy, as if all the appeasement, anti-Hindu behaviour of ruling class in India was not enough to poison/destroy Hinduism. You were/are one of the best hopes for India and Hinduism yet you do this.

      I know you will not publish my comment and even if you do you will tell me to "fuck off from this blogsite". But due to your KIIH philosophy, all the muslims who did bad things got blamed as jews and Islam used this convenient escape route to shed blame allowing them to propagate their "muslim-victimhood" theories. Now the birds of your "KIIH-exceptionalism" are coming home to roost, yet you still continue your KIIH-system. You were/are one of the best hopes for India and Hinduism, yet you do this. Again, I never was/am/will-be your detractor but this is dissappointing.

      Delete
    2. Indian Muslims are infected, just as much as Hindus.

      Since His Son was at school,
      He & His Wife have seen & understood them first hand.

      Whatever His reasons are, they will be based on truth & reality of each individual groups history, behaviour, and triggers.

      Hinduism & Islam belong to India

      Delete
    3. captain soft selling islamic extremism puzzled me since many years tbh. i initially used to think that maybe because he is from Muslim dominated Malabar he tries to maintain plausible deniability by blaming Jews for whatever the Muslims seem to do. but when you read his post on mohammed it is quite a damning indictment on the whole religion without him explicitly saying so, that there is nothing divine about it all save for some uncultured desert bedouins finding a way to survive which is foolishly followed all around the world till date.
      the end result for us - hindus - is the same tbh. it does not matter whether the perpetrators are Jews or crypto jews or neither if their behavior and resultant end goal vis a vis us is the same. We are not on a crusade to educate these unwashed Abduls even if it may be true or they think it is true like their Friday speeches which blame Yehudis and Yindoos for everything in the world seem to think so or that they have been subjugated by Jews often. The 'patriotic' Muslim that we like to think exists either don't speak out when they are in a minority and so aren't going to move that needle enough when push comes to shove. Blaming the jews for it is neither here nor there.

      Delete
    4. Do you think captain has time for small fishes when these brain dead people are under control of others. Most of muslim are leading by jews, same as hindus by fake math and leaders. Hindus dont make time to read their dharmic books and believe whatever in produced in front of them by social media. They will never go and check things themselves. Similarly muslims are totally under influence of jew masters. Poor they dont know their true history and lost their true book in desert. People are not ready to accept truth, they are happy in their matrix world. All the relevantions of captain should have caused stir in world but people wont care. Hindus are awakening but Muslims jews and christian not ready to hear the truth. They are ashamed to be indians. Latest relevation of captain that all christian are indeed indians should have created a strom in kerala nd tamil nadu. They should have a celebration for the masses but still they hate to be in india and hate hindus. Wont blame and suggest captain. He has seen world. Even though we all selfish people has never supported him he has given true knowledge, without any ego worked for world welfare like kaamdhenu cow. We are lucky to have him in our life.

      Delete
  38. Namaste capt. ji,

    last 24 hours, dont know from where a gang comes & starting abusing us readers, you & your family on twitter.

    this all started from my reply to a traitor who ask hindus to "accept that animal sacrifice is part of sanatana dharma"-

    https://twitter.com/sukarma000/status/1261663937512173570?s=20

    my reply-

    https://twitter.com/AKJANGRA17/status/1261714094626750464?s=20

    after that a twitter handle with 32k followers @AgentSaffron mocking my reply. then a gang come & start targeting us..

    most of them also @trueindology followers.

    They all support animal sacrifice in hindu temple.

    we readers repeatedly tells them this 'Bali pratha & sati pratha' is started by britishers.. we provide direct ur blogpost link but no one accept the truth. they all hate word vadakayil.

    capt. personally I feel they all are "paid & have hidden agenda" bcoz truth seeker never behave like this.

    Below is list of these tritors:-

    1. Name - Vanara

    Twitter handle - @AgentSaffron 32k followers.

    https://twitter.com/AgentSaffron/status/1261900210491531264?s=20

    https://twitter.com/AgentSaffron/status/1261900356155592706?s=20

    2. Name - Arjuna

    Twitter handle - @sukarma000

    https://twitter.com/sukarma000/status/1261663937512173570?s=20

    3. Name - Āryāvarta

    Twitter handle - @mlEchCha_slayer

    4. Name - MiiRA

    Twitter handle - @miiranarayan

    5. Name - Aryaveer..ॐ

    Twitter handle -@VedicWisdom1

    6. Twitter handle - @SkandaBhata

    https://twitter.com/SkandaBhata/status/1261958075256147971?s=20

    7. ।।श्री।।

    Twitter handle - @sanharini

    https://twitter.com/sanharini/status/1261900672208945153?s=20

    8. Name - ࿗HINDBOL 2024࿗

    Twitter handle - @Kaundinya19

    9. Name - Bharath

    Twitter handle - @metheonlyb

    10. user name - 𑒀 S M B࿗

    Twitter handle - @Dizazster

    11. Name- Kraken B

    @YearOfTheKraken

    https://twitter.com/YearOfTheKraken/status/1261903770268516352?s=20

    12. Akshay

    @Dhvamsaka

    13. Arjuna । അർജ്ജുനൻ । अर्जुनः

    @PolitikKarma

    14.卐 അഭിരാം 卐

    @Abhiramann

    15. 卐 AshMan 卐

    @Ashy1313

    16. విశ్వంభర

    @_viswambhara

    17. Roaring Gabbar

    @roaring_gabbar

    18. @kaalaagni

    19. kavadh01

    @kavadh01

    20. Suraj Sharma

    @12surajsharma

    21. Govind

    @govindaramanbe

    22. Vanar Sena Chief Kan Ki

    @huzarath

    23 A&S L

    @ASL91685500

    24. bala subbu

    @thambi501

    25. narbrahmin21

    @narbrahmin21

    26. अभिषेक Abhishek

    @Abhishek960215

    27. Babu

    @Babubabybob

    28. Bahubali N Prajapati

    @Bahubali1897

    29. Secret Singh.Flag of IndiaFlag of India

    @Secret_Agent02

    30. Mish

    @BeingTheShakti

    to be continued--

    ReplyDelete
    Replies
    1. @AgentSaffron is a LEFTIST BASTARD & has marketed himself under the brand as ex-LEFTIST.

      Too many Bastards are on Social Media especially on Twitter where they use Ex-(A B C) to build a name.

      Vivek Agnihotri calls himself Ex-Urban Naxal.
      Likewise another fellow closely associated with him calls himself ex-Marxist.
      They have built humongous follower base just by calling themselves "Ex-"

      @AgentSaffron is from Tamil Nadu & most of his Nonsense followers are idiot Tamils for whom Tamil Agama Literature is everything.
      They say Shiva is more powerful than Vishnu & all other such kind of Bakwaas.
      They consider Tamil to be the Oldest language & a brigade of Tamil trolls always pile up if Tamil fake heritages are challenged.

      Most of the time this opportunist Crypto-leftist only criticise Conversion Mafia related activities in Tamil Nadu & else where in India for which he has made a name.
      Fact is that this handle is very selfish & always wants to take lead.
      You will not be allowed to take a lead.
      Also almost all kind of Vulgarity which are wrongly associated with Hinduism is strongly supported by this handles & his followers.

      Where there exists Tamil pride as the hidden core, making any right wing activism as the mere front, such handles are only into one mission, creating their own brigade & suppressing every kind of voice whether it's good or bad.

      His handle name itself is hypocritical.
      One need not need to flaunt "Saffron" as nomenclature in one's Handle.
      Actions/deeds should speak/reflect regarding the identity of a handle than the handle flaunting passionate attractive names.

      Delete
  39. 31. Pushyamitra Shunga

    @Kashyapa2002

    32. Locked-Down Chax

    @ChaxCR

    33. Aboobakker Al Banglori

    @notthatsid

    34. Hinduism FAQ

    @HinduismFaq

    35. .

    @paanibhaat

    36. Paint Drape Cut

    @Shivamda

    37. Shanteehee

    @shanteehee

    38. 'আত্মনিৰ্ভৰ' অজয়

    @RongKalita

    39. సూర్య

    @lifeofsurya

    40. कर्मयोगी आम ®

    @Go_Movie_Mango

    41. DR.Kermit Puns

    @KermitPuns

    42. mukhtalif jaadugar | مختلف جادوگر

    @MJaadugar

    43. Kirron

    @kirron909

    44. TK

    @t428190191a

    45. Kerala Temple History

    @templefable

    46. Sunny Deol FC

    @TheDeolsFC

    47. prasanna bhat
    @hvbhat


    48. Aboobakker Al Banglori

    @notthatsid

    49. statcommune

    @NuclearFab

    50. Pagan-paigamboar

    @keetanashin

    51. mukhtalif jaadugar | مختلف جادوگر

    @MJaadugar

    52. Vanar Sena Chief Kan Ki

    @huzarath

    53. The Narrator

    @__Rgaur

    54. Saraswati Films

    @mmpandit

    55. Aditya Sharma

    @Aadii009

    56. व्यासोन्मुख

    @Vyasonmukh

    57. 卐दुर्योधन卐

    @I_love_im_dim

    58. Hrishikesh

    @notaretard8

    59. आलाप

    @nivrittijnandev

    60. Shanmukh

    @maidros78

    61. manasataramgini

    @blog_supplement

    62. suchittayashaH

    @ArmchairPseph

    63. 1D

    @Humblefool_14

    64. ਜ਼ੂਮਰ BARFi

    @sembula_cheru

    65. ꯃꯥꯀꯨ

    @porbotialora

    66. Average Hindu.

    @AverageHindu

    67. R&AW ka Agent

    @voortrekker15

    68. karmana

    @Shamana40185761

    69. zhadeshwar

    @zhadeshwar

    70. Bharath

    @metheonlyb

    71. Mish

    @BeingTheShakti

    72. Dwelling in the basement Beetle Brahma.

    @Beetle__Brahma

    https://twitter.com/Beetle__Brahma/status/1261883547088039936?s=20

    73. Surashatruhan

    @Surashatruhan

    74. Pushyamitra Shunga

    @Kashyapa2002

    75. ANON FOR HINDU RASHTRA ࿗

    @youranonfren

    76. paarthurñax

    @sullabeaterrrr_

    77. dot

    @dhiroalta

    to be continued --

    ReplyDelete
    Replies
    1. Captain,add all these idiots to desh drohi database. All these twitter handles are scum of this planet.Their job is to propagate all the superstitious practices started by white invader to make hindus self loathing. This blog site has achieved many big things,influenced and saved millions of lives worldwide.These wee useless twitter handles cant even move a small stone leave alone big ocean currents created by this blog site which displaced even large mountains.These pea brained twitter handles are morons who cannot understand that sanathana dharma is advanced quantum science.These termites to sanathana dharma will bite the dust.

      Delete
    2. Don't know about the other handles but that Vanara handle reads your blogs,he once acknowledged your blog on negative ion generators and has quoted you sometimes, however on social media almost all these so called big handles are interested only in pushing their own agenda, very few are interested in debating or discussion,they want to only increase followers and get retweets and likes.

      Delete
  40. one mc cross all limit & abuse your family. i feel ashamed.. i can't do any thing.. sorry capt.:-

    https://twitter.com/eaglepeacock2/status/1262067962430631936?s=20

    https://twitter.com/eaglepeacock2/status/1262067891995766784?s=20

    ReplyDelete
    Replies
    1. ALL READERS

      SEND THIS TO THE CYBER CELL CENTRAL AND STATES..AND ALSO TO HOME MINISTRY / AMIT SHAH..

      https://twitter.com/eaglepeacock2/status/1262067962430631936?s=20

      https://twitter.com/eaglepeacock2/status/1262067891995766784?s=20

      Delete
    2. Im sorry .


      Some more names to this list

      @YearOfTheKraken

      @Dhvamsaka

      @eaglepeacock2

      @PolitikKarma

      @Ashy1313

      @Abhiramann

      @_viswambhara

      @roaring_gabbar

      @kavadh01

      @roaring_gabbar

      @kaalaagni

      @12surajsharma

      @govindaramanbe

      @huzarath

      @ASL91685500

      @thambi501

      @narbrahmin21

      @Abhishek960215

      @Babubabybob

      @Bahubali1897

      @Secret_Agent02

      @BeingTheShakti

      @sanharini

      @Kashyapa2002

      @ChaxCR

      @notthatsid

      @HinduismFaq

      @paanibhaat

      @Shivamda

      @shanteehee

      @RongKalita

      @lifeofsurya

      @VedicWisdom1

      @Go_Movie_Mango

      @sukarma000

      @miiranarayan

      @KermitPuns

      @mlEchCha_slayer

      @MJaadugar

      @kirron909

      @t428190191a

      @KermitPuns

      @templefable

      @TheDeolsFC

      @hvbhat

      @mlEchCha_slayer

      @notthatsid

      @NuclearFab

      @keetanashin

      @MJaadugar

      @huzarath

      @__Rgaur

      @mmpandit

      @aadii009

      @vyasonmukh

      @I_love_im_dim

      @notaretard8

      @nivrittijnandev

      @maidros78

      @Bhaktirassagar

      @blog_supplement

      @ArmchairPseph

      @Humblefool_14

      @sembula_cheru

      @porbotialora

      @AverageHindu

      @voortrekker15

      @Shamana40185761

      @youranonfren

      @kandan_adimai

      @Warriormonk_01

      @AverageHindu

      @Shamana40185761

      @zhadeshwar

      @AgentSaffron

      @metheonlyb

      @BeingTheShakti

      @Beetle__Brahma

      @Surashatruhan

      @Kashyapa2002

      @youranonfren

      @eaglepeacock2

      @sullabeaterrrr_

      Delete
    3. Namaste Captain Ajitji,

      Reported to cyber crime
      A grievance has been reported successfully on cybercrime.gov.in with Acknowledgement No: 22905200029948

      https://drive.google.com/open?id=1VatPaAUbFhFif5yF9sNJLIWFas_sLVjE

      Delete
    4. https://mobile.twitter.com/kannanlp/status/1262212412880515073

      Reported to twitter as disrespectful haharassment tweet with 5 evidences and reported to Amitshah Malaysia police cyber crime Delhi and Mumbai police

      Delete
    5. Reported to Malaysia Police and cyber crime https://mobile.twitter.com/kannanlp/status/1262219070268567557

      Delete
    6. https://www.facebook.com/amitshahofficial/posts/3907729939268385?comment_id=3920681677973211

      Delete
    7. Sent to

      cybercrimes-cid@ap.gov.in
      cybercell-bih@nic.in
      dig-chd@nic.in
      acp.cybercell@delhipolice.gov.in
      cc-cid@gujarat.gov.in
      igcrime-jk@nic.in
      badri@ksp.gov.in
      igpcrimes.pol@kerala.gov.in
      sp.cbr-mah@gov.in
      dirscrb.odpol@nic.in
      cbcyber@nic.in
      sp1-ccdtnpolice@gov.in
      ccps.deh@uttarakhandpolice.uk.gov.in
      ccps.cid@tspolice.gov.in
      sp-cyber.lu@up.gov.in
      ccpwb@cidwestbengal.gov.in
      contact@amitshah.co.in
      jscpg-mha@nic.in

      PMOPG/E/2020/0429467 MINHA/E/2020/05970

      Delete
    8. All of them are fake hindu chutiyaas, dum hain to samne yeh bolke dikha, gaand tod ke haath main de dunga.. bastards can play brave only on social media... intellectual my ass!!

      Delete
    9. done capt.

      succesfully reported central cyber portal.


      National Cyber Crime Reporting Portal cyberpolice.mha@gov.in via gov.in
      Attachments
      11:41 AM (3 minutes ago)
      to me

      Dear Sir/Madam,

      A grievance has been reported successfully on cybercrime.gov.in with Acknowledgement No.21305200021877.Follow our Twitter handle @CyberDost for tips on cybercrime prevention.


      Regards,
      National Cyber Crime Reporting Portal.


      below is email address of all state cyber cell:-

      igpint.and@nic.in,
      dgp.and@nic.in,
      cybercrimes-cid@ap.gov.in,
      spcr@arunpol.nic.in,
      sit@arunpol.nic.in,
      digp-cid@assampolice.gov.in,
      igp-cid@assampolice.gov.in,
      cybercell-bih@nic.in,
      dgp-bih@nic.in,
      dig-chd@nic.in,
      pssput-chd@nic.in,
      aigtech-phq.cg@gov.in,
      vijrk@gov.in,
      itcell-dnhp@mha.gov.in,
      sp-sil-dnh@nic.in,
      sp-diu-dd@nic.in,
      sp-dmn-dd@nic.in,
      acp.cybercell@delhipolice.gov.in,
      jtcp-ops-dl@delhipolice.gov.in,
      picyber@goapolice.gov.in,
      digpgoa@goapolice.gov.in,
      cc-cid@gujarat.gov.in,
      shocyberpkl.pol-hry@gov.in,
      igp.crime2-hry@nic.in,
      polcyberps-shi-hp@nic.in,
      sp-cyber-hp@nic.in,
      igcrime-jk@nic.in,
      adgpcidjk@jkpolice.gov.in,
      cyberps@jhpolice.gov.in,
      ig-orgcid@jhpolice.gov.in,
      badri@ksp.gov.in,
      digadmincod@ksp.gov.in,
      igpcrimes.pol@kerala.gov.in,
      adgpcrimes.pol@kerala.gov.in,
      lak-sop@nic.in,
      mpcyberpolice@mppolice.gov.in,
      spl.dgp-cybercell@mppolice.gov.in,
      sp.cbr-mah@gov.in,
      ig.cbr-mah@gov.in,
      cidcb-mn@nic.in,
      themthing.ng@gov.in,
      sspcid-meg@gov.in,
      fg.kharshiing@ips.gov.in,
      cidcrime-mz@nic.in,
      polmizo@rediffmail.com,
      cybercrimeps-ngl@gov.in,
      renchamo.p@gov.in,
      dirscrb.odpol@nic.in,
      sp1cidcb.orpol@nic.in,
      cybercell-police.py@gov.in,
      dig.pon@nic.in,
      aigcc@punjabpolice.gov.in,
      shocc@punjabpolice.gov.in,
      ccps-raj@nic.in,
      sharat.kaviraj@rajasthan.gov.in,
      spcid@sikkimpolice.nic.in,
      sp1-ccdtnpolice@gov.in,
      cbcyber@nic.in,
      spcybercbcid.tnpol@nic.in,
      ccps.cid@tspolice.gov.in,
      igp_wpc@cid.tspolice.gov.in,
      spcybercrime@tripurapolice.nic.in,
      aigcrime@tripurapolice.nic.in,
      ccps.deh@uttarakhandpolice.uk.gov.in,
      dgc-police-ua@nic.in,
      sp-cyber.lu@up.gov.in,
      ccpsstf.gb-up@gov.in,
      ccpwb@cidwestbengal.gov.in,
      ig2@cidwestbengal.gov.in

      Delete
    10. Dear Capt Ajit sir,

      https://twitter.com/IwerePm/status/1262275879910047745
      https://twitter.com/IwerePm/status/1262275879910047745?s=20

      Delete
    11. also send online complaint our local police, haryana CID & put in the website of amit shah.

      below is email address of all these-

      contact@amitshah.co.in

      spl-haryana@nic.in,
      igpcmfs.pol-hry@gov.in,
      igp.security@hry.nic.in,
      dig.security@hry.nic.in,
      sp.security1@hry.nic.in,
      spintelli.cid-hry@nic.in

      also via twitter:-

      https://twitter.com/AKJANGRA17/status/1262268023278166016?s=20

      Delete
    12. I have reported to the concerned authorities.

      Delete
    13. Namaskar Guruji, Following message lodged in https://pgportal.gov.in.
      Please find the below disrespectful harassment tweets to Capt Ajit Vadakayil. Capt Ajit Vadakayil is No1 in social media and has many followers. We cannot bear to see such abuses to Our Capt who is spreading his intellectual suggestions to the Indian Bureaucrats. Kindly take necessary actions against the below persons for the misconduct. They should use good language to appreciate others suggestions.
      twitter.com/eaglepeacock2/status/1262067962430631936?s20
      twitter.com/eaglepeacock2/status/1262067891995766784?s20
      Your Grievance is registered successfully.
      Registration Number : MOYAS/E/2020/00128

      Delete
    14. Reported him on Twitter. Also complained to -
      @narendramodi
      @PMOIndia
      @NSAAjitDoval
      @rajnathsingh
      @NITIAayog
      @rsprasad
      @PrakashJavdekar
      @AmitShah
      @AmitShahOffice
      @DelhiPolice
      @MumbaiPolice
      @MalaysiaPolice
      @MLY_Polis
      @cyber
      @CybercrimeCID

      Delete
  41. TO THE PRESIDENT OF INDIA/ CEC / CJI / SPEAKERS OF LOK-RAJYA SABHA..

    WE THE PEOPLE OF INDIA DO NOT WANT JEWISH ARMS COMPANIES AND JEWISH BIG PHARMA TO MAKE ANY DONATIONS TO BJP OR ANY OTHER POLITICAL PARTY..

    WE KNOW WHAT THE HELL IS GOING ON..

    PUNISHMENT MUST BE IMMEDIATE DISMISSAL OF THE GUILTY , NAME AND SHAME , COMPLETE BAN FROM CONTESTING POLLS FOR LIFE , LOSS OF ALL RETIREMENT PERKS, A LONG JAIL TERM.

    http://ajitvadakayil.blogspot.com/2018/03/treason-from-within-biggest-cut-on.html

    WHISTLE BLOWERS MUST BE REWARDED AND PROTECTED..

    http://ajitvadakayil.blogspot.com/2016/11/protect-whistle-blowers-if-india-must.html

    capt ajit vadakayil
    ..

    ReplyDelete
    Replies
    1. PUT ABOVE COMMENT IN WEBSITES OF--
      CEC
      AL EC MEMBERS
      PMO
      PM MODI
      HEALTH MINISTER/ MINISTRY CENTE- STATES
      AMIT SHAH
      HOME MINISTRY CENTRE/ STATES
      CJI BOBDE
      ATTORNEY GENERAL
      LAW MINISTER PRASAD / MINISTRY CENTRE AND STATES
      ALL CHIEF JUSTICES HIGH COURTS
      I&B MINISTER / MINISTRY
      NSA
      AJIT DOVAL
      RAW
      IB
      CBI
      NIA
      ED
      ALL DGPs OF INDIA
      ALL IGs OF INDIA
      ALL CMs OF INDIA
      ALL MLAs OF INDIA
      ALL MPs OF INDIA
      ALL COLLECTORS OF MAJOR CITIES
      ALL STATE GOVERNORS
      PRESIDENT OF INDIA
      VP OF INDIA
      SPEAKER LOK SABHA
      SPEAKER RAJYA SABHA
      ALL INDIAN THINK TANKS
      NITI AYOG
      AMITABH KANT

      Delete
    2. https://www.facebook.com/ECI/posts/1626313054188700?comment_id=1628102297343109

      Delete
    3. Sent to-
      cec@eci.gov.in
      presidentofindia@rb.nic.in
      vpindia@nic.in
      supremecourt@nic.in
      connect@mygov.nic.in
      narendramodi1234@gmail.com
      amitshah.mp@sansad.nic.in
      contact@amitshah.co.in
      dr.harshvardhan@sansad.nic.in
      ashwinikumar.choubey@sansad.nic.in
      ravis@sansad.nic.in
      prakash.j@sansad.nic.in
      minister.inb@gov.in
      minister.hrd@gov.in
      secy.president@rb.nic.in
      alavasa@eci.gov.in
      decus@eci.gov.in
      ombirlakota@gmail.com
      amitabh.kant@nic.in

      Delete
    4. Your Grievance is registered successfully.
      Registration Number : DEPOJ/E/2020/02409

      Delete
    5. PMOPG/E/2020/0431377 MINHA/E/2020/06014
      DEPOJ/E/2020/02411 MOIAB/E/2020/01746
      DPLNG/E/2020/01145 MOSJE/E/2020/01297
      DMAFF/E/2020/00529 MODEF/E/2020/01851
      LGVED/E/2020/00439 MINPA/E/2020/00621

      Delete
  42. why is Modi selling all assets of mother India including ISRO to private enterprises?

    ReplyDelete
    Replies
    1. MARK MY WORDS..

      VERY SOON ISRAEL WILL OWN ISRO..

      capt ajit vadakayil
      ..

      Delete
    2. PUT ABOVE COMMENT IN WEBSITES OF--
      ISRO
      ISRO CHIEF
      DRDO
      DRDO CHIEF
      PMO
      PM MODI
      EXTERNAL AFFAIRS MINISTER/ MINISTRY
      AMIT SHAH
      HOME MINISTRY CENTRE/ STATES
      CJI BOBDE
      ATTORNEY GENERAL
      LAW MINISTER PRASAD / MINISTRY CENTRE AND STATES
      ALL CHIEF JUSTICES HIGH COURTS
      I&B MINISTER / MINISTRY
      NSA
      AJIT DOVAL
      RAW
      IB
      CBI
      NIA
      ED
      ALL DGPs OF INDIA
      ALL IGs OF INDIA
      ALL CMs OF INDIA
      ALL MLAs OF INDIA
      ALL MPs OF INDIA
      ALL COLLECTORS OF MAJOR CITIES
      ALL STATE GOVERNORS
      PRESIDENT OF INDIA
      VP OF INDIA
      SPEAKER LOK SABHA
      SPEAKER RAJYA SABHA
      ALL INDIAN THINK TANKS
      NITI AYOG
      AMITABH KANT

      Delete
    3. Sent to

      CM's DGP'S BJP Speakers Health Minister BJP President Law Minister Amitabh Kant

      PMOPG/E/2020/0429773 MINHA/E/2020/05978
      DEPOJ/E/2020/02396 MOIAB/E/2020/01736
      MODEF/E/2020/01837 DSPAC/E/2020/00070
      MINPA/E/2020/00613 MEAPD/E/2020/02561

      Delete
    4. Opening up of isros facilities to private companies is a risky affair.we already know how our isro scientists and nuclear scientists are dying in mysterious ways.In defense too when 74% of investment is made by foreign company under direct route then foreign companies will hold the major share and it's a threat to nations security.Already 100% fdi is allowed in defence through government approval route.

      Delete
    5. Your Grievance is registered successfully.
      Registration Number : DOTEL/E/2020/13263

      Delete
    6. Your Grievance is registered successfully.
      Registration Number : AYUSH/E/2020/01803

      Delete
  43. Finally, Italian MP calls for arresting Bill Gates as a vaccine criminal, Captain.
    https://trump.news/2020-05-17-italian-member-of-parliament-demands-arrest-bill-gates-as-vaccine-criminal.html

    ReplyDelete
  44. Dear Captain,

    i had this query since long and could not find any answers to it. Only you can shed light on it, if you think the query makes any sense.

    1) Like human beings do idols also have chakras (some idol might be having a powerful manipura chakra so a devotee who bows to the idol picks up some power and heals his own chakra)
    2) does mother earth also have chakras like humans??
    3) Why is earth though being a planet not part of Navgrahas??

    kind Regards,
    SB

    ReplyDelete
  45. Elder Figure, my twitter account is suspended.

    ReplyDelete
  46. HULLO JEWESS PRINCESS HEND AL QASSIMI….

    YOUR DAILY DOSE VIA TWITTER ACCUSING INDIA OF ISLAMOPHOBIA WILL NOT WORK ANYMORE.. IT IS GETTING RIDICULOUS..

    YOUR ISLAMIC TERRORIST FOLLOWERS ON TWITTER ARE MOSTLY JEWISH…

    HEND AL QASSIMI , THERE ARE MANY JEWESSES LIKE YOU , TRYING TO HOODWINK GOOD MUSLIMS OF THE PLANET. CIA/ RAW/ KGB ARE AWARE OF THIS GREAT KOSHER GAME…

    CHRISTIANE AMANPOUR IS AN IRANIAN JEWESS PRETENDING TO BE A MUSLIM. . THE CURRENT RULERS OF IRAN KNOW THIS.. THIS MESSAGE IS BEING COPIED TO HER..

    http://ajitvadakayil.blogspot.com/2017/04/the-most-evil-journalist-capt-ajit.html

    PRESIDENT BARACK OBAMA IS A JEW, NOT A BLACK MUSLIM.. HIS MOTHER IS WHITE AMERICAN JEWESS ANN DUNHAM WHO WAS A FRONT FOR ISLAMIC PAKISTANI BANK BCCI...

    IN REALITY BCCI IS A JEWISH BANK INVOLVED IN LAUNDERING ( COLUMBIAN – MEXICAN COCAINE FOR NICARAGUA CONTRA GUNS) MONEY FOR THREE AMERICAN PRESIDENTS REAGAN/ BUSH SR/ CLINTON..

    PM OF PAKISTAN IMRAN KHAN IS A PASHTUN JEW THOUGH HER PEPPERS EVERY SENTENCE OF HIS WITH TWO INSHAH ALLAHS, AND LIKE YOU ACCUSES INDIA OF ISLAMOPHOBIA.. THIS MESSAGE IS BEING COPED TO HIM..

    NOBEL PRIZE WINNER MALALA YOUSAFZAI IS A JEWESS..

    THE NATIONAL POET OF PAKISTAN IQBAL WAS A JEW..

    http://ajitvadakayil.blogspot.com/2012/12/sir-muhammed-iqbal-knighted-for.html

    THE GREATEST BRITISH MUSLIM HEROINE NOOR INAYAT KHAN WAS A JEWESS, LIKE YOU HEND AL QASSIMI .. THIS MESSAGE IS BEING COPIED TO THE QUEEN OF ENGLAND… ENGLISH ROYALTY IS GERMAN JEW ALL BRITS KNOW THAT..

    http://ajitvadakayil.blogspot.com/2012/11/noor-inayat-khan-new-mata-hari-reloaded.html

    THE CURRENT MAYOR OF LONDON SADIQ KHAN IS A JEW.. IMAGINE HE BEAT JEW ZAC GOLDSMITH TO THE MAYORs POST.. BRAAAAYYYYYYYYY. THIS MESSAGE IS BEING COPIED TO SADIQ KHAN AND ZAC ..

    THE LAST 70% OF OTTOMAN SULTANS WERE JEWS.. HERO OF ISLAM SULTAN MEHMED IIs BIOLOGICAL MOTHER WAS A JEWESS..

    THE JEWISH DEEP STATE WAS CREATED IN ISTANBUL BY A JEWESS NAMED QUEEN HELENA..

    http://ajitvadakayil.blogspot.com/2019/09/istanbul-deep-seat-of-jewish-deep-state.html

    ALL MUGHAL EMPERORS AFTER HUMAYUN WERE JEWS..

    Read all 5 parts of the post below.
    http://ajitvadakayil.blogspot.com/2018/03/fatawa-e-alamgiri-kosher-document-of.html

    WHEN INDIA BECAE INDEPENDENT IN 1947, ALL MAJOR MUSLIM KINGDOMS WERE RULED BY JEW KINGS WITH MUSLIM NAMES.. TIPU SULTAN WAS A JEW.. NIZAM OF HYDERABAD WAS A JEW..

    http://ajitvadakayil.blogspot.com/2013/04/razakers-of-mim-operation-polo-to-annex.html

    WHEN INDIA BECAME INDEPENDENT IN 1947, ALMOST ALL INDIAN NATIONAL CONGRESS PARTY MUSLIM MEMBERS WERE JEWS WITH MUSLIM NAMES..

    KHAN ABDUL GHAFFAR KHAN WAS A JEW.. MAULANA AZAD WAS A JEW.. GANDHI WAS A KATIAWARI JEW..

    EVERY HEARD OF A FAMOUS ITALIAN MAINO JEWESS NAMED ANTONIA EVIGE ALBINA MAINO WHO BECAME PRESIDENT OF INDIAN CONGRESS BY LOCKING HER HINDU OPPONENT SITARAM KESRI IN THE TOILET ?

    ALL INDIAN / PAKISTANI/ BANGLADESH MADRASSA FUNDS ARE JEWISH..

    WATCH THIS SPACE JEWESS PRINCESS HEND AL QASSIMI. .. I WILL DIG BACK YOUR ANCESTRY BY 300 YEARS.. KNOW THYSELF..

    Capt ajit vadakayil
    ..

    ReplyDelete
    Replies




    1. PUT ABOVE COMMENT IN WEBSITES OF ( USE SCREEN SHOTS )..
      PRINCESS HEND AL QASSIMI
      CHRISTIANE AMANPOUR
      PRESIDENT OF IRAN
      PM OF IRAN
      SADIQ KHAN
      MALALA YOUSAFZAI
      ZAC GOLDSMITH
      QUEEN OF ENGLAND
      PRINCE CHARLES
      AMBASSADORS FROM TO USA/ RUSSIA/ UK/ FRANCE/ GERMANY / IRAN/ PAKISTAN
      PAKISTANI CRICKETER JEW AFRIDI
      CURRENT PAKISTANI TEAM
      CURRENT INDIAN TEAM
      PAST PAKISTANI/ INDIAN CRICKET GREATS
      BCCI
      PMO
      PM MODI
      EXTERNAL AFFAIRS MINISTER/ MINISTRY
      AMIT SHAH
      HOME MINISTRY CENTRE/ STATES
      CJI BOBDE
      ATTORNEY GENERAL
      LAW MINISTER PRASAD / MINISTRY CENTRE AND STATES
      ALL CHIEF JUSTICES HIGH COURTS
      I&B MINISTER / MINISTRY
      NSA
      AJIT DOVAL
      RAW
      IB
      CBI
      NIA
      ED
      ALL DGPs OF INDIA
      ALL IGs OF INDIA
      ALL CMs OF INDIA
      ALL MLAs OF INDIA
      ALL MPs OF INDIA
      ALL COLLECTORS OF MAJOR CITIES
      ALL STATE GOVERNORS
      PRESIDENT OF INDIA
      VP OF INDIA
      SPEAKER LOK SABHA
      SPEAKER RAJYA SABHA
      ALL INDIAN THINK TANKS
      NITI AYOG
      AMITABH KANT
      MOHANDAS PAI
      RAJEEV CHANDRASHEKHAR
      E SREEDHARAN
      WILLIAM DALRYMPLE
      KONRAED ELST
      FRANCOIS GAUTIER
      STEPHEN KNAPP
      DAVID FRAWLEY
      GVL NARASIMHA RAO
      SAMBIT PATRA
      ASHOK PANDIT
      ANUPAM KHER
      KANGANA RANAUT
      VIVEK AGNIHOTRI
      MEENAKSHI LEKHI
      SMRITI IRANI
      PRASOON JOSHI
      SWAPAN DASGUPTA
      MADHU KISHWAR
      SUDHIR CHAUDHARY
      GEN GD BAKSHI
      RSN SINGH
      ARNAB GOSWAMI
      NAVIKA KUMAR
      ANAND NARASIMHAN
      RAHUL SHIVSHANKAR
      RAJDEEP SARDESAI
      SRINIVASAN JAIN
      SONAL MEHROTRA KAPOOR
      VIKRAM CHANDRA
      NIDHI RAZDAN
      ZAKKA JACOB
      RAHUL ANWAL
      RAVISH KUMAR
      PRANNOY JAMES ROY
      AROON PURIE
      VINEET JAIN
      RAGHAV BAHL
      SEEMA CHISTI
      DILEEP PADGOANKAR
      VIR SANGHVI
      KARAN THAPAR
      PRITISH NANDI
      ASHISH NANDI
      SHEKHAR GUPTA
      SIDHARTH VARADARAJAN
      PAVAN VARMA
      RAMACHANDRA GUHA
      THAMBI SUNDAR PICHAI
      SATYA NADELLA
      CEO OF WIKIPEDIA
      QUORA CEO ANGELO D ADAMS
      QUORA MODERATION TEAM
      KURT OF QUORA
      GAUTAM SHEWAKRAMANI
      MUKESH AMBANI
      RATAN TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      SWAMY
      RAJIV MALHOTRA
      P GURUS
      RSS
      AVBP
      VHP
      MOHAN BHAGWAT
      RAM MADHAV
      MOHANLAL
      SURESH GOPI
      NALIN KOHLI.
      RAJ THACKREY
      CHANDAN MITRA
      SADGURU JAGGI VASUDEV
      BABA RAMDEV
      SRI SRI RAVISHANKAR
      CHETAN BHAGAT
      AMISH TRIPATHI
      DEVDUTT PATTANAIK
      THE QUINT
      THE SCROLL
      THE WIRE
      THE PRINT
      MK VENU
      MADHU TREHAN
      SANJAY HEDGE
      SHOBHAA DE
      ARUNDHATI ROY
      MADHU TREHAN
      JAIRAM RAMESH
      SHASHI THAROOR
      KAPIL SIBAL
      ABHI SEX MAANGTHA SINGVI
      TEHSEEN POONAWAALA
      SHEHZAD POONAWALA
      SANJAY JHA
      SURJEWALA
      AK ANTONY
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA VADRA
      AK ANTONY
      PC CHACKO
      JEAN DREZE
      DIG VIJAY SINGH
      JULIO RIBEIRO
      ASADDUDIN OWAISI
      SHEHLA RASHID
      RANA AYYUB
      SUHEL SETH
      SHAZIA ILMI
      MANI SHANGARAN AIYERAN
      SALMAN KHURSHEED
      GHULAM NABI AZAD
      SWARA BHASKAR
      ALL HINDU STALWARTS AND ORGS
      ROMILA THAPAR
      IRFAN HABIB
      NIVEDITA MENON
      AYESHA KIDWAI
      HISTORY CHANNEL
      DAVID HATCHER CHILDRESS
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA VADRA
      SOLI BABY
      FALI BABY
      KATJU BABY
      SALVE BABY
      JOHN BRITTAS
      PRAKASH KARAT
      BRINDA KARAT
      SITARAM YECHURY
      D RAJA
      ALEX JONES
      RENSE
      DAVID ICKE
      ANGELO JOHN GAGE
      DEEPAK CHOPRA
      ROBIN SHARMA
      TAREK FATEH
      ALL INDIAN MEDIA
      MUKESH AMBANI
      RATAN TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      SPREAD ON SOCIAL MEDIA--

      SPREAD BY WHATS APP

      Delete
    2. Posted https://twitter.com/Avii02379630/status/1262261438640316417?s=19

      Delete
    3. Sent

      Macron Merkel President PMO ambassadors xi global times External affairs un world bank imf, gopinath, moody, rbi, ed, nia, cbi, navy, iaf, supreme court nsitharaman,rntata, anand Mahindra, dilip shanghvi, president, Swamy, jindal, adani, Ambani, soumya,ncov, tedros, CDC director, CM's DGP's BJP Speakers Health Minister BJP President PMO

      PMOPG/E/2020/0430030 MINHA/E/2020/06005
      DEPOJ/E/2020/02407 MOIAB/E/2020/01740
      DPLNG/E/2020/01142 DSEHE/E/2020/02282
      MOSJE/E/2020/01295 DCLTR/E/2020/00433
      MOMAF/E/2020/00430 DMAFF/E/2020/00526
      MODEF/E/2020/01847 LGVED/E/2020/00437
      MINPA/E/2020/00619

      Delete
    4. Your Grievance is registered successfully.
      Registration Number : MINHA/E/2020/06011

      Delete
  47. Dear Captain,
    You suggested us to watch movie FAUDA during lockdown and Swamy did it!🤣
    https://twitter.com/Swamy39/status/1262189183226933249?s=19

    ReplyDelete
    Replies
    1. NETFLIX SERIAL FAUDA MUST BE SEEN BY ALL INDIAN SECURITY AGENCIES.

      IT SHOWS HOW A TEAM OF SIX, PROTECTS ISRAEL.. THEY DONT INVOLVE JUDICIARY.

      IT SHOWS HAHAS IS CONTROLLED AND FUNDED BY JEWS..

      IF YOU WANT TO CONTROL THE OPPOSITION LEAD IT YOURSELF..

      https://en.wikipedia.org/wiki/Fauda

      IN THE SERIES A FEMALE SHIRIN COMMITS SUICIDE.. WELL DIRECTED..

      https://en.wikipedia.org/wiki/La%C3%ABtitia_E%C3%AFdo

      capt ajit vadakayil
      ..

      Delete
    2. PUT ABOVE COMMENT IN WEBSITES OF-
      NSA
      AJIT DOVAL
      RAW
      IB
      CBI
      NIA
      ED
      ALL DGPs OF INDIA
      ALL IGs OF INDIA
      ALL INDIAN THINK TANKS
      NITI AYOG
      AMITABH KANT
      CDS
      ALL 3 ARMED FORCE CHIEFS
      DEFENCE MINISTER/ MINISTRY

      Delete
    3. Verified

      https://twitter.com/NIA_India/status/1261361052475813889?s=20

      Delete
    4. Hi Sir,

      I have watched it after you recommended. But I find it little bit far fetched that 6 people go and do all that stunts and Hamas is just mindless people.but yes it shows that mossad knew each and everything happening in HAMAS.

      Thanks,
      Srini

      Delete
  48. Sir and readers

    You can give suggestions to PM for Mann Ki Baat.

    https://twitter.com/narendramodi/status/1262222017526284288?s=20

    ReplyDelete
  49. Sent mails about Jewish Arms and Pharma companies donating to BJP, Captain.

    ReplyDelete
  50. https://ajitvadakayil.blogspot.com/2020/05/database-of-anti-watan-anti-hindu.html

    ZAKIR NAIK HAS BEEN DANCING WITH A HIGHEST 33 DEGREE FREEMASON TURKISH JEW NAMED ADNAN OKTAR..

    HE HAS BEEN FOOLING MUSLIMS OF MALAYSIA..

    http://ajitvadakayil.blogspot.com/2019/09/istanbul-deep-seat-of-jewish-deep-state.html

    capt ajit vadakayil
    ..

    ReplyDelete
    Replies
    1. PUT ABOVE COMMENT IN WEBSITES OF ( USE SCREEN SHOTS )..
      PM OF MALAYSIA
      AMBASSADOR TO FROM MALAYSIA
      ZAKIR NAIK
      PRINCESS HEND AL QASSIMI
      CHRISTIANE AMANPOUR
      PRESIDENT OF IRAN
      PM OF IRAN
      SADIQ KHAN
      MALALA YOUSAFZAI
      ZAC GOLDSMITH
      QUEEN OF ENGLAND
      PRINCE CHARLES
      AMBASSADORS FROM TO USA/ RUSSIA/ UK/ FRANCE/ GERMANY / IRAN/ PAKISTAN
      PAKISTANI CRICKETER JEW AFRIDI
      CURRENT PAKISTANI TEAM
      CURRENT INDIAN TEAM
      PAST PAKISTANI/ INDIAN CRICKET GREATS
      BCCI
      PMO
      PM MODI
      EXTERNAL AFFAIRS MINISTER/ MINISTRY
      AMIT SHAH
      HOME MINISTRY CENTRE/ STATES
      CJI BOBDE
      ATTORNEY GENERAL
      LAW MINISTER PRASAD / MINISTRY CENTRE AND STATES
      ALL CHIEF JUSTICES HIGH COURTS
      I&B MINISTER / MINISTRY
      NSA
      AJIT DOVAL
      RAW
      IB
      CBI
      NIA
      ED
      ALL DGPs OF INDIA
      ALL IGs OF INDIA
      ALL CMs OF INDIA
      ALL MLAs OF INDIA
      ALL MPs OF INDIA
      ALL COLLECTORS OF MAJOR CITIES
      ALL STATE GOVERNORS
      PRESIDENT OF INDIA
      VP OF INDIA
      SPEAKER LOK SABHA
      SPEAKER RAJYA SABHA
      ALL INDIAN THINK TANKS
      NITI AYOG
      AMITABH KANT
      MOHANDAS PAI
      RAJEEV CHANDRASHEKHAR
      E SREEDHARAN
      WILLIAM DALRYMPLE
      KONRAED ELST
      FRANCOIS GAUTIER
      STEPHEN KNAPP
      DAVID FRAWLEY
      GVL NARASIMHA RAO
      SAMBIT PATRA
      ASHOK PANDIT
      ANUPAM KHER
      KANGANA RANAUT
      VIVEK AGNIHOTRI
      MEENAKSHI LEKHI
      SMRITI IRANI
      PRASOON JOSHI
      SWAPAN DASGUPTA
      MADHU KISHWAR
      SUDHIR CHAUDHARY
      GEN GD BAKSHI
      RSN SINGH
      ARNAB GOSWAMI
      NAVIKA KUMAR
      ANAND NARASIMHAN
      RAHUL SHIVSHANKAR
      RAJDEEP SARDESAI
      SRINIVASAN JAIN
      SONAL MEHROTRA KAPOOR
      VIKRAM CHANDRA
      NIDHI RAZDAN
      ZAKKA JACOB
      RAHUL ANWAL
      RAVISH KUMAR
      PRANNOY JAMES ROY
      AROON PURIE
      VINEET JAIN
      RAGHAV BAHL
      SEEMA CHISTI
      DILEEP PADGOANKAR
      VIR SANGHVI
      KARAN THAPAR
      PRITISH NANDI
      ASHISH NANDI
      SHEKHAR GUPTA
      SIDHARTH VARADARAJAN
      PAVAN VARMA
      RAMACHANDRA GUHA
      THAMBI SUNDAR PICHAI
      SATYA NADELLA
      CEO OF WIKIPEDIA
      QUORA CEO ANGELO D ADAMS
      QUORA MODERATION TEAM
      KURT OF QUORA
      GAUTAM SHEWAKRAMANI
      MUKESH AMBANI
      RATAN TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      SWAMY
      RAJIV MALHOTRA
      P GURUS
      RSS
      AVBP
      VHP
      MOHAN BHAGWAT
      RAM MADHAV
      MOHANLAL
      SURESH GOPI
      NALIN KOHLI.
      RAJ THACKREY
      CHANDAN MITRA
      SADGURU JAGGI VASUDEV
      BABA RAMDEV
      SRI SRI RAVISHANKAR
      CHETAN BHAGAT
      AMISH TRIPATHI
      DEVDUTT PATTANAIK
      THE QUINT
      THE SCROLL
      THE WIRE
      THE PRINT
      MK VENU
      MADHU TREHAN
      SANJAY HEDGE
      SHOBHAA DE
      ARUNDHATI ROY
      MADHU TREHAN
      JAIRAM RAMESH
      SHASHI THAROOR
      KAPIL SIBAL
      ABHI SEX MAANGTHA SINGVI
      TEHSEEN POONAWAALA
      SHEHZAD POONAWALA
      SANJAY JHA
      SURJEWALA
      AK ANTONY
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA VADRA
      AK ANTONY
      PC CHACKO
      JEAN DREZE
      DIG VIJAY SINGH
      JULIO RIBEIRO
      ASADDUDIN OWAISI
      SHEHLA RASHID
      RANA AYYUB
      SUHEL SETH
      SHAZIA ILMI
      MANI SHANGARAN AIYERAN
      SALMAN KHURSHEED
      GHULAM NABI AZAD
      SWARA BHASKAR
      ALL HINDU STALWARTS AND ORGS
      ROMILA THAPAR
      IRFAN HABIB
      NIVEDITA MENON
      AYESHA KIDWAI
      HISTORY CHANNEL
      DAVID HATCHER CHILDRESS
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA VADRA
      SOLI BABY
      FALI BABY
      KATJU BABY
      SALVE BABY
      JOHN BRITTAS
      PRAKASH KARAT
      BRINDA KARAT
      SITARAM YECHURY
      D RAJA
      ALEX JONES
      RENSE
      DAVID ICKE
      ANGELO JOHN GAGE
      DEEPAK CHOPRA
      ROBIN SHARMA
      TAREK FATEH
      ALL INDIAN MEDIA
      MUKESH AMBANI
      RATAN TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      SPREAD ON SOCIAL MEDIA--

      SPREAD BY WHATS APP

      Delete
    2. Your Grievance is registered successfully.
      Registration Number : MOIAB/E/2020/01743

      Delete
  51. https://timesofindia.indiatimes.com/india/anybody-can-start-business-in-any-sector-compete-with-pses-in-strategic-ones-fm/articleshow/75796081.cms

    DURING THE COVID PANDEMIC --

    GIVE FREE FOOD AND FREE MEDICARE TO THE POOR.

    DONT GIVE MONEY FOR POOR INDIANS TO BUILD UP A BANK BALANCE

    INDIA IS NOT HAND TO MOUTH LIKE AMERICANS OR JAPANESE OR BRITS OR WHATEVER..

    POOR PEOPLE MOAN " WE DONT HAVE MONEY"'.. THEY ALL HAVE A STASH, IT IS OUR MINDSET TO SQUIRREL AWAY SOME SAVINGS

    ReplyDelete
  52. We ask pm modi to call up Bangladesh PM and offer advise and help.

    They have no idea of the power of cyclone amphan heading their way..

    The triangular shape of the Bay of Bengal acts to funnel storm-surge waters into Bangladesh, and the very shallow bottom of the bay allows the surge to pile up to very high heights.

    Shift all coastal people to more than 35 feet above normal sea level.

    Do not forget Cyclone Bhola of Nove 3rd 1970 when more than 500,000 people lost their lives in the storm, primarily as a result of the storm surge that flooded much of the low-lying islands of the Ganges Delta

    Also warn stupid woman Momoto ..

    Capt ajit vadakayil
    ..

    ReplyDelete
    Replies
    1. PMO
      PM MODI
      EXTERNAL AFFAIRS MINISTER/ MINISTRY
      INDIAN AMBASSADOR TO BANGLADESH

      Delete
    2. https://twitter.com/Ramchan38705812/status/1262268024029016064?s=20
      Pmo
      https://twitter.com/Ramchan38705812/status/1262268101371949057?s=20
      Narendra modi
      https://twitter.com/Ramchan38705812/status/1262268385401823237?s=20
      Mos mea
      https://twitter.com/Ramchan38705812/status/1262268479714914307?s=20
      S jaishankar
      https://twitter.com/Ramchan38705812/status/1262269134617763840?s=20
      Indian high commisioner bangladesh

      Delete
    3. Verified

      https://twitter.com/ihcdhaka/status/1262264165571297280?s=20

      Delete
    4. Sent to-
      connect@mygov.nic.in
      narendramodi1234@gmail.com
      eam@mea.gov.in
      hc.dhaka@mea.gov.in

      Delete
    5. https://timesofindia.indiatimes.com/india/cyclone-amphan-odisha-west-bengal-brace-to-fight-cyclone-amid-covid-crisis/articleshow/75800035.cms

      Delete
    6. https://twitter.com/sangeethikaraj/status/1262292428687433728

      Delete
    7. Your Grievance is registered successfully.
      Registration Number : MEAPD/E/2020/02568

      Delete
    8. Your Grievance is registered successfully.
      Registration Number : MOEAF/E/2020/00671

      Delete
    9. done capt.

      send to pm modi, mea, indian ambasdor to dhaka, amit shah & dr s jaishankar--

      https://twitter.com/AKJANGRA17/status/1262379358729179138?s=20

      https://twitter.com/AKJANGRA17/status/1262413734292492291?s=20

      https://twitter.com/AKJANGRA17/status/1262414599027961856?s=20

      https://twitter.com/AKJANGRA17/status/1262417184527024128?s=20

      also tweeted from home page-

      https://twitter.com/AKJANGRA17/status/1262352229295517696?s=20

      Delete
  53. Dear Capt Ajit sir,

    Odisha CM Naveen Patnaik has scored over Modi - now he's announced inter state buses to ply with 50% occupancy...back to normal in phased manner.
    What do you say - to lift the lockdown by 1 June or not ?

    ReplyDelete
    Replies
    1. But the private Bus owners are reluctant to operate their services as it will incur loss.
      Only government buses will be running for movement of people but under strict surveillance & monitoring.

      Odisha has crossed 876 mark, an unexpected figure for COVID-19 infected individuals.

      Odisha has kept it's fingers crossed.

      If Tribal pockets get infected by this Virus, the CMO will become totally clueless how to handle the situation as access to interior pockets of Odisha is very difficult.

      Not everything is running well in Odisha though, but we are not under panic attack.
      We are surplus in food.

      Anyways, God save everyone...!

      Delete
  54. Dear Capt Ajit sir,

    MHA has sent advisory on 'Amphan' to Odisha, WB Govt.

    ReplyDelete
  55. When in true distress a Muslim does not mind saying a prayer to Hindu or christian gods besides his Allah.

    Similarly a Hindu in true distress will say a prayer to Allah as well God besides his own Hindu Gods.

    True for christians as well as any common man on earth.

    While Sanatan dharam openly acknowledges this phenomenon, islam and Christianity does not.

    This is because Sanatan Dharam is scientific to the quantam level, factoring in intentions, consciousness, entangelment etc.






    ReplyDelete
  56. https://timesofindia.indiatimes.com/india/on-or-off-why-the-ac-debate-is-heating-up/articleshow/75753124.cms

    CUNTS

    ReplyDelete
  57. https://www.facebook.com/lalsa.kumari.378
    https://twitter.com/lalsakumari2
    sir include this bihari congresswoman in deshdrohi database. during delhi riots she did propaganda that JAI SHRI RAM shouting crowd killed intelligence officer Ankit sharma.

    ReplyDelete
  58. https://youtu.be/v-6Ljyp3HuQ

    ReplyDelete
  59. Hello Captain,

    As you asked in response to the below:

    ALL READERS

    SEND THIS TO THE CYBER CELL CENTRAL AND STATES..AND ALSO TO HOME MINISTRY / AMIT SHAH..

    https://twitter.com/eaglepeacock2/status/1262067962430631936?s=20

    https://twitter.com/eaglepeacock2/status/1262067891995766784?s=20

    Here are the links:

    https://twitter.com/manntharkan/status/1262326463451353089
    https://twitter.com/manntharkan/status/1262326656166961152
    https://twitter.com/manntharkan/status/1262326830943686656

    Kind regards,

    ReplyDelete
  60. SOMEBODY CALLED ME UP AD CRIED

    NOWHERE IS IT WRITTEN THAT FRENCH JEW ROTHSCHILD GREW OPIUM IN VIETNAM FOR A 100 YEARS ..

    OK--

    DID ANYBODY EVER WRITE THAT JEW ROTHSCHILD ETHNICALLY CLEANSED ARUNACHAL PRADESH OFF INDIA DNA PEOPLE AND REPLACED THEM WITH SPLICED/ GRAFTED DNA OF HUNNAN CHINESE/ MAYANMAR / TIBETAN TRIBAL HEAD HUNTERSS .. SO THAT HE CAN GROW OPIUM ?.....

    READ BOTH PARTS BELOW--

    https://ajitvadakayil.blogspot.com/2019/12/ilp-cab-nrc-why-china-wants-arunachal.html

    DID JEW GANDHI, WHO QUELLED OPIUM FARMER REVOLTS MENTION OR WRITE THE WORD OPIUM EVEN ONCE?..

    http://ajitvadakayil.blogspot.com/2019/07/how-gandhi-converted-opium-to-indigo-in.html

    DID FREE AND HONEST WRITER GEORGE ORWELL MENTION OPIUM EVEN ONCE..HE WROTE ANIMAL FARM BASED ON OPIUM SLAVERY IN INDIA ..

    http://ajitvadakayil.blogspot.com/2018/04/fake-champaran-satyagraha-of-gandhi.html

    DID THE RICHEST FAMILIES OF INDIA IN 1947, TATA/ BIRLA/ JK ETC ( ALL OPIUM AGENTS OF JEW ROTHSCHILD ) MENTION THE WORD OPIUM EVEN ONCE?.. DID NEHRU/ PATEL/ INC FREEDOM FIGHTERS / MEDIA / JUDICIARY MENTION THE WORD EVEN ONCE..

    http://ajitvadakayil.blogspot.com/2010/11/drug-runners-of-india-capt-ajit.html

    DID TAGORE / RAJA RAMOHAN ROY UTTER THE WORD OPIUM EVEN ONCE?

    http://ajitvadakayil.blogspot.com/2011/08/opium-drug-running-tagore-family-capt.html

    http://ajitvadakayil.blogspot.com/2011/07/opium-raja-british-stooge-ram-mohan-roy.html

    DID THE FAMILIES WHO CONTROL AND RULE USA TODAY MENTION THE WORD OPIUM EVEN ONCE?

    http://ajitvadakayil.blogspot.com/2010/12/dirty-secrets-of-boston-tea-party-capt.html\

    I ASK MY READERS-

    IF CAPT AJIT VADAKAYIL HAD NOT WRITTEN ABOUT ROTHSCHILD AND OPIUM DO YOU THINK ANYBODY ON THIS PLANET WOULD HAVE KNOWN ABOUT IT?..

    TODAY THE CHINESE IN AMERICAN CHINA TOWNS OF SAN FRANSISCO DO NOT KNOW THAT THEIR FOREFATHERS WERE SLAVES WHO SUFFERED TEN TIMES MORE THAN BLACK SLAVES .. ONLY BLACKS MOAN ( LIKE JEWS )..

    READ BOTH PARTS BELOW-

    http://ajitvadakayil.blogspot.com/2020/03/chinese-slavery-capt-ajit-vadakayil.html

    I ASK MY READERS , INDIANS WENT ABROAD AS SLAVES.. THEY WERE PUNISHED BY STARVATION FOR OBJECTING TO OPIUM BEING GROWN ON THEIR FIELDS..

    http://ajitvadakayil.blogspot.com/2010/04/indentured-coolie-slavery-reinvented.html

    ROTHSCHILD THOUGHT AMARTYA SEN COULD KOSHER WHITEWASH HIS OPIUM RELATED DELIBERATE FAMINE CRIMES IN INDIA.. HE EVEN GAVE AMARTYA SEN A ROTHSCHILD WOMAN EMMA TO MARRY.

    http://ajitvadakayil.blogspot.com/2011/09/amartya-sen-gets-nobel-prize-for.html

    I ASK MY READERS -- SHOULD WE NOT TEACH OUR CHILDREN THESE CRIMES MOST FOUL IN OUR NCERT TEXT BOOKS.. SPEAK FREELY..

    DO YOU THINK MODI / SWAMY HAS THE GAAAND MEIN TATTI TO UTTER THE WORD "ROTHSCHILD" OR "OPIUM" EVEN ONCE.. AFTER ALL BOTH WORE A MOSSAD SPONSORED SIKH TURBAN IN 1976..

    capt ajit vadakayil
    ..

    ReplyDelete
    Replies
    1. PUT ABOVE COMMENT IN WEBSITES OF-
      UN
      UN CHIEF
      PUITZER PRIZE COMMITTEE
      RHODES SCHOLARSHIP COMMITEE
      GRETA THUNBERG
      NOBEL PEACE PRIZE COMMITTEE
      THOMAS PIKETTY
      HIS PIKETTY THINK TANK TEAM
      PARIS SCHOOL OF ECONOMICS
      LONDON SCHOOL OF ECONOMICS
      MIT
      ROGER GUESNERIE
      FRENCH NATIONAL CENTRE FOR SCIENTIFIC RESEARCH (CNRS)
      FRENCH NEWSPAPERS LIBÉRATION, AND LE MONDE.
      YRJÖ JAHNSSON AWARD PANEL
      JULIA CAGÉ
      IMF
      GITA GOPINATH
      WORLD BANK
      WORLD BANK CHIEF
      MOODYs
      FITCH
      S&P
      RAGHURAM RAJAN
      ABHIJEET BANNERJEE
      AMARTYA SEN
      MANMOHAN SINGH
      MONTEK SINGH AHLUWALIA
      CHID BABY
      PRANAB MUKHERJEE
      YESHWANT SINHA
      RUCHIR SHARMA
      RBI
      RBI GOVERNOR
      ALL INDIAN BUSINESS SCHOOL DEANS
      FINANCE MINISTER/MINISTRY CENTRE AND STATES
      JAYATI GHOSH
      ENTIRE BBC GANG
      ENTIRE US MEDIA
      MAJOR WORLD MEDIA
      THOMAS FRIEDMAN
      JAGDISH BHAGWATI
      KAUSHIK BASU
      ARVIND SUBRAMANIAN
      BIMAL JAIN
      ARVIND PANAGARIYA
      TRUMP
      PUTIN
      BORIS JONSON
      MACRON
      ANGELA MERKEL
      XI
      RUERS OF AJOR EU NATIONS
      AMBASSADORS TO FROM USA/ RUSSIA/ UK/ FRANCE / GERMANY/ EU NATIONS
      EDITOR GLOBAL TIMES HU XIJIN
      BILL GATES
      MELINDA GATES
      BILL GATES FOUNDATION
      QUEEN OF ENGLAND
      PRINCE CHARLES
      PMO
      PM MODI
      HEALTH MINISTER/ MINISTRY CENTE- STATES
      AMIT SHAH
      HOME MINISTRY CENTRE/ STATES
      CJI BOBDE
      ATTORNEY GENERAL
      LAW MINISTER PRASAD / MINISTRY CENTRE AND STATES
      ALL CHIEF JUSTICES HIGH COURTS
      I&B MINISTER / MINISTRY
      NSA
      AJIT DOVAL
      RAW
      IB
      CBI
      NIA
      ED
      ALL DGPs OF INDIA
      ALL IGs OF INDIA
      ALL CMs OF INDIA
      ALL MLAs OF INDIA
      ALL MPs OF INDIA
      ALL COLLECTORS OF MAJOR CITIES
      ALL STATE GOVERNORS
      PRESIDENT OF INDIA
      VP OF INDIA
      SPEAKER LOK SABHA
      SPEAKER RAJYA SABHA
      ALL INDIAN THINK TANKS
      NITI AYOG
      AMITABH KANT
      MOHANDAS PAI
      RAJEEV CHANDRASHEKHAR
      E SREEDHARAN
      WILLIAM DALRYMPLE
      KONRAED ELST
      FRANCOIS GAUTIER
      STEPHEN KNAPP
      DAVID FRAWLEY
      GVL NARASIMHA RAO
      SAMBIT PATRA
      ASHOK PANDIT
      ANUPAM KHER
      KANGANA RANAUT
      VIVEK AGNIHOTRI
      MEENAKSHI LEKHI
      SMRITI IRANI
      PRASOON JOSHI
      SWAPAN DASGUPTA
      MADHU KISHWAR
      SUDHIR CHAUDHARY
      GEN GD BAKSHI
      RSN SINGH
      ARNAB GOSWAMI
      NAVIKA KUMAR
      ANAND NARASIMHAN
      RAHUL SHIVSHANKAR
      RAJDEEP SARDESAI
      SRINIVASAN JAIN
      SONAL MEHROTRA KAPOOR
      VIKRAM CHANDRA
      NIDHI RAZDAN
      ZAKKA JACOB
      RAHUL ANWAL
      RAVISH KUMAR
      PRANNOY JAMES ROY
      AROON PURIE
      VINEET JAIN
      RAGHAV BAHL
      SEEMA CHISTI
      DILEEP PADGOANKAR
      VIR SANGHVI
      KARAN THAPAR
      PRITISH NANDI
      ASHISH NANDI
      SHEKHAR GUPTA
      SIDHARTH VARADARAJAN
      PAVAN VARMA
      RAMACHANDRA GUHA
      THAMBI SUNDAR PICHAI
      SATYA NADELLA
      CEO OF WIKIPEDIA
      QUORA CEO ANGELO D ADAMS
      QUORA MODERATION TEAM
      KURT OF QUORA
      GAUTAM SHEWAKRAMANI
      MUKESH AMBANI
      RATAN TATA
      ANAND MAHINDRA
      KUMARAMANGALAMBIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      SWAMY
      RAJIV MALHOTRA
      P GURUS
      RSS
      AVBP
      VHP
      MOHAN BHAGWAT
      RAM MADHAV
      MOHANLAL
      SURESH GOPI
      NALIN KOHLI.
      RAJ THACKREY
      CHANDAN MITRA
      SADGURU JAGGI VASUDEV
      BABA RAMDEV
      SRI SRI RAVISHANKAR
      CHETAN BHAGAT
      AMISH TRIPATHI
      DEVDUTT PATTANAIK
      THE QUINT
      THE SCROLL
      THE WIRE
      THE PRINT
      MK VENU
      MADHU TREHAN
      SANJAY HEDGE
      SHOBHAA DE
      ARUNDHATI ROY
      MADHU TREHAN
      JAIRAM RAMESH
      SHASHI THAROOR
      KAPIL SIBAL
      ABHI SEX MAANGTHA SINGVI
      TEHSEEN POONAWAALA
      SHEHZAD POONAWALA
      SANJAY JHA
      SURJEWALA
      AK ANTONY
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA VADRA
      AK ANTONY
      PC CHACKO
      JEAN DREZE
      DIG VIJAY SINGH
      JULIO RIBEIRO
      ASADDUDIN OWAISI
      SHEHLA RASHID
      RANA AYYUB
      SUHEL SETH
      SHAZIA ILMI
      MANI SHANGARAN AIYERAN
      SALMAN KHURSHEED
      GHULAM NABI AZAD
      SWARA BHASKAR
      ALL HINDU STALWARTS AND ORGS
      ROMILA THAPAR
      IRFAN HABIB
      NIVEDITA MENON
      AYESHA KIDWAI
      HISTORY CHANNEL
      DAVID HATCHER CHILDRESS
      SONIA GANDHI
      RAHUL GANDHI
      PRIYANKA VADRA
      SOLI BABY
      FALI BABY
      KATJU BABY
      SALVE BABY
      JOHN BRITTAS
      PRAKASH KARAT
      BRINDA KARAT
      SITARAM YECHURY
      D RAJA
      ALEX JONES
      RENSE
      DAVID ICKE
      ANGELO JOHN GAGE
      DEEPAK CHOPRA
      ROBIN SHARMA
      TAREK FATEH
      ALL INDIAN MEDIA
      PRINCESS HEND AL QASSIMI
      MUKESH AMBANI
      TINA AMBANI
      ANIL AMBANI
      RATAN TATA
      ANAND MAHINDRA
      KUMARAMANGALAM BIRLA
      LAXMI MNARAYAN MITTAL
      AZIM PREMJI
      KAANIYA MURTHY
      RISHI SUNAK
      RAHUL BAJAJ
      RAJAN RAHEJA
      NAVEEN JINDAL
      GOPICHAND HINDUJA
      DILIP SHANGHVI
      GAUTAM ADANI
      NCERT
      EDUCATION MINISTER/ MINISTRY CENTRE AND STATES
      SPREAD ON SOCIAL MEDIA--

      SPREAD BY WHATS APP

      Delete
    2. Your Grievance is registered successfully.
      Registration Number : MOIAB/E/2020/01742

      Delete
    3. Respected Captain, we really need to know true history so that we can accordingly deal with the culprits and victims and also to prevent the same methods/techniques from being used against us in future.

      Delete
    4. Your Grievance is registered successfully.
      Registration Number : DOSEL/E/2020/02418

      Delete
    5. Yes definitely these truths should be uncovered in our history text books.

      Information formats the mind and true information formats it correctly. As it is said...if history is not remembered it is repeated.

      It doesn't mean the victimized janta should carry victim mentality for eternity and derive benefits for generations to come. It only means that certain people behaved inhumanly and the receiving party should be aware of it; esp the slimy tactics of divide and rule.

      West always enjoys whitewashing all history to suit their needs and start afresh so many f**king times it is mind bowling that people don't realize.

      Namaste Captain!
      Saurin Purohit

      Delete
    6. Sent to

      Trump Putin Macron Merkel President PMO ambassadors xi global times External affairs un world bank imf, gopinath, moody, rbi, ed, nia, cbi, navy, iaf, supreme court nsitharaman,rntata, anand Mahindra, dilip shanghvi, president, Swamy, jindal, adani, Ambani, soumya,ncov, tedros, CDC director, CM's DGP's BJP Speakers Health Minister BJP President PMO

      thomas.piketty@psemail.eu;
      alvaredo@gmail.com;
      lydia.assouad@psemail.eu;
      peisenha@uni-bonn.de;
      lucas.chancel@sciencespo.fr;
      esaez@berkeley.edu;
      zucman@berkeley.edu;
      li.yang@psemail.eu
      celine.jambon@psemail.eu;
      samuel.chich@psemail.eu;
      m.ghatak@lse.ac.uk;
      newsoffice@mit.edu;
      guesnerie@pse.ens.fr;
      silvia.esteban@cnrs.fr;
      courrier-des-lecteurs@lemonde.fr;
      Elli.dahl@yjs.fi;
      terhi.maczulskij@yjs.fi;
      julia.cage@sciencespo.fr;
      pulitzer@pulitzer.org;
      banerjee@mit.edu;
      asen@fas.harvard.edu

      PMOPG/E/2020/0431239 MINHA/E/2020/06013
      DEPOJ/E/2020/02410 MOIAB/E/2020/01745
      DPLNG/E/2020/01144 DSEHE/E/2020/02285
      MOSJE/E/2020/01296 DCLTR/E/2020/00434
      DMAFF/E/2020/00528 MODEF/E/2020/01850
      LGVED/E/2020/00438 MINPA/E/2020/00620
      DOARE/E/2020/00310

      Delete
  61. Name Of Complainant jayasree
    Date of Receipt 18/05/2020
    Received By Ministry/Department Ayush
    Grievance Description
    Thanks to read, understand and acknowledge the attached critical comment from Captain Ajit Vadakayil blog
    SOMEBODY CALLED ME UP AND CRIED..
    CAPTAIN..YOU SELF INFLICTED A PERSONAL POLICY ON YOURSELF " NO MORE MEDICAL BLOG POSTS"..YET YOU HAVE MADE FOUR CORONAVIRUS POSTS .
    ajitvadakayil.blogspot.com/2020/05/coronavirus-covid-19-sars-cov-2.html
    WHY DID I PEN A POST ON HIV/ AID?..PRAY? PRITHEE ? BECAUSE BILLIONS OF DOLLARS WERE BEING POURED INTO HIV VACCINES.. EVIL KOSHER PHARMA LOVED THIS. THEIR AGENTS IN WHO/ US CDC LIVED IN UBER LUXURY.. THEY WENT AND FUCKED UNDER AGED BOYS AND GIRLS IN BANGKOK..AFTER 40 YEARS , HIV VACCINE IS ELUSIVE ..I HAD CALLED THE BULL BY A POST BELOW--THAT HIV IS A MAN MADE VIRUS IN A LAB.. THOSE DAYS IT WAS A NEW CONCEPT..
    ajitvadakayil.blogspot.com/2013/06/hiv-does-not-cause-aids-many-aids.html
    FEW DAYS AGO MAGIC JOHNSON CAME ON CNN TV IN DON LEMONs SHOW.. HE LOOKED FIT AS A FIDDLE..THREE DECADES AGO MAGIC JOHNSON DECLARED THAT HE HAS AIDS..EVERY BODY KNEW OF JOHNSONs SEX/ DRUG ORGIES..
    sportsspectrum.com/sport/basketball/2017/12/20/magic-johnson-asks-forgiveness-reconciles-isiah-thomas/
    MAGIC JOHNSONs SON EJ JOHNSON IS OPENLY GAY ( ANAL SEX RECEIVING ) WITH AN ITCHY ASSHOLE .. IT RUNS IN THE GENES..
    www.youtube.com/watch?vvoH7QgiQkeI
    SARS-COV-2 IS A LAB MADE SPLICED/ GRAFTED RNA VIRUS, WHICH DOES NOT HAVE A SOUL..SUCH LAB MADE VIRUS MUST BE SEEN FROM AN "ENERGY" PERSPECTIVE -- NOT A "PROTEIN" PERSPECTIVE ..GOOGLE DELETED MY POST ON HUMPED COW URINE ( HAVING INHERENT MONOATOMIC GOLD NANO COLLOIDS ) ON THE BEHEST OF KOSHER EVIL PHARMA..ajit vadakayil.blogspot.com/2020/04/google-deleted-my-valuable-post-on.html

    CAPT AJIT VADAKAYIL HAS FOUGHT MANY PITCHED MEDICAL BATTLES AND WON, AGAINST ALL ODDS.WHEN I PENNED THE POST BELOW, SOME CLOSE WELL WISHER TOLD ME" AJIT, YOU HAVE PUT YOUR BLOGGING CAREER AT STAKE.. YOU COULD HAPRIZE" AFTER NIKOLA TESLA..

    ajitvadakayil.blogspot.com/2016/12/108-numerical-equivalent-of-hindu-king.html

    GERMAN JEW ALBERT EINSTEIN WAS A THIEF- WHOSE AWARD WINNING THEORIES WERE LIFTED FROM 400 CENTURIES OLD VEDAS..

    ajitvadakayil.blogspot.com/2018/11/albert-einstein-was-thief-plagiarist.html

    LIES WONT WORK.. A BROWN BLOGGER WHO CAN THINK SUBJECTIVELY IS IN TOWN.. HE EXHUMES LONG BURIED TRUTHS ..PIECE OF CAKE.

    capt ajit vadakayil
    Current Status Case closed
    Date of Action 18/05/2020
    Remarks
    suggestion
    Officer Concerns To
    Officer Name
    Shri S.K. Ahuja
    Officer Designation
    Director
    Contact Address
    Email Address
    sk.ahuja07@nic.in
    Contact Number
    01124651644

    ReplyDelete
  62. Name Of Complainant jayasree
    Date of Receipt 18/05/2020
    Received By Ministry/Department Ayush
    Grievance Description
    Thanks to read, understand and acknowledge the attached critical comment from Captain Ajit Vadakayil's blog
    ajitvadakayil.blogspot.com/2020/05/economist-thomas-piketty-you-shall-lay.html

    WATCH THIS SPACE..

    CAPT AJIT VADAKAYIL WILL TEAR APART PRIME KOSHER ECONOMIST ASS.

    Capt ajit vadakayil
    Current Status Case closed
    Date of Action 18/05/2020
    Remarks suggestio n
    Officer Concerns To
    Officer Name
    Shri S.K. Ahuja
    Officer Designation
    Director
    Contact Address
    Email Address
    sk.ahuja07@nic.in
    Contact Number
    01124651644

    ReplyDelete
  63. Name Of Complainant jayasree
    Date of Receipt 18/05/2020
    Received By Ministry/Department Health Research
    Grievance Description
    Thanks to read, understand and acknowledge the attached critical comment from Captain Ajit Vadakayil's blog
    SOMEBODY ASKED ME
    CAPTAIN
    WHY IS RASAM A IMMUNITY BOOSTER
    IT CONTAINS GARLIC/ INDIAN ONION SMALL / HING / FRESH TURMERIC.
    ajitvadakayil.blogspot.com/2017/12/testosterone-boosted-by-onion-and.html
    IF ISKCON CANNOT ADD ONION/ GARLIC IN SCHOOL MEALS-- KICK THEM OUT..
    ISKCON IS NOT A HINDU ORG -- THEY ARE A CULT WHICH PROPAGATES BHAKTI..
    SANATANA DHARMA ALLOWS ONLY SHRADDHA
    ://ajitvadakayil.blogspot.com/2020/03/sanatana-dharma-hinduism-exhumed-and.html
    HARE RAMA HAS NOTHING TO WITH LORD RAMA.. IT IS ABOUT RADHA RAMANA..
    RADHA, THE FAKE MISTRESS OF KRISHNA WAS COOKED UP BY JEW ROTHSCHILD TO MAKE THE HINDU SELF LOATHING..
    BEFORE THE WHITE INVADER CAME TO INDIA WE NEVER HEARD OF RADHA..
    capt ajit vadakayil
    Current Status Case closed
    Date of Action 18/05/2020
    Remarks : This is a blog of third party. Further, no substantive issue has been raised in the petition which require examination. Petitioner has used the CPGRAM platform as a tool to publicize the blog written by third party. Hence, no action is required to be taken.
    Officer Concerns To
    Officer Name
    Shri D.R. Meena
    Officer Designation
    Deputy Secretary
    Contact Address
    Email Address
    daulat.meena@gov.in
    Contact Number
    01123736901

    ReplyDelete
  64. Name Of Complainant jayasree
    Date of Receipt 09/05/2020
    Received By Ministry/Department
    Scientific & Industrial Research
    Grievance Description
    Thanks to read, understand and acknowledge the attached critical comment from Captain Ajit Vadakayil's blog
    timesofindia.indiatimes.com/india/visakhapatnam-gas-leak-lg-polymers-apologises-offers-every-support-to-affected/articleshow/75647348.cms
    LG BASTARDS HAVE BEEN TELLING LIES , ABOUT REFRIGERATION FAILURE..
    I HAVE CARRIED THIS CARGO STYRENE MONOMER ALL MY IFE .. IT DOES NOT REQUIRE REFRIGERATION--LIKE PROPYLENE OXIDE..
    PUNISH LG.. LONG TIME JAIL- LYING BASTARDS WHO FEEL THEY ARE SAFE BY GIVING POLITICAL DONATIONS AND BRIBES TO JUDICIARY / POLICE / MINISTERS
    ://ajitvadakayil.blogspot.com/2020/05/styrene-monomer-gas-leak-at.html
    WE WATCH..
    ://ajitvadakayil.blogspot.com/2010/12/propylene-oxide-on-chemical-tankers.html
    capt ajit vadakayil
    Current Status Case closed
    Date of Action 10/05/2020
    Reason Others
    Remarks: no action required on the part of DSIR
    Officer Concerns To
    Officer Name
    Shri K.R. Vaidheeswaran
    Officer Designation
    Joint Secretary Admn.
    Contact Address
    Anusandhan Bhawan, Rafi Marg, New Delhi
    Email Address
    jsa@csir.res.in
    Contact Number
    23716582

    ReplyDelete
  65. Name Of Complainant jayasree
    Date of Receipt 18/05/2020
    Received By Ministry/Department
    Scientific & Industrial Research
    Grievance Description
    Thanks to read, understand and acknowledge the attached critical comment
    from Captain Ajit Vadakayil's blog
    IMPORTANT: CHINA IS GIVING INDIA PIN PRICKS IN THIS HOUR OF PANDEMIC BY BORDER INCURSIONS. CHINA HAD DONE IT BEFORE AT DOLKAM , THREATENING FIRE AND BRIMSTONE, AND THEN GAVE UP AS PRESIDENT XI FEARED HIS OWN PEOPLE WOULD HANG HIM BASED ON THE POST BELOW
    READ BOTH PARTS OF THE POST BELOW ajitvadakayil.blogspot.com/2017/07/can-china-afford-war-with-india-come-on.html
    INDIA WILL NOW PUNISH CHINA BY BLAMING CHINA FOR SPREADING COVID-19 PANDEMIC.
    USA MUST TAKE THE LEAD BY CANCELLING ONE TRILLION USD DEBT TO CHINA, AS A PUNISHMENT AND REPARATION FOR SCREWING THIS PLANET.. CHINA OWNS ABOUT $1.1 TRILLION IN U.S. DEBT, CHINA INVESTS HEAVILY IN U.S. TREASURY BONDS TO KEEP ITS EXPORT PRICES LOWER.

    Capt ajit vadakayil
    Current Status : Case closed
    Date of Action : 18/05/2020
    Reason : Others
    Remarks : Matter not pertaining to DSIR at all.
    Officer Concerns To
    Officer Name
    Shri K.R. Vaidheeswaran
    Officer Designation
    Joint Secretary Admn.
    Contact Address
    Anusandhan Bhawan, Rafi Marg, New Delhi
    Email Address
    jsa@csir.res.in
    Contact Number
    23716582

    ReplyDelete

  66. UnknownMay 18, 2020 at 3:16 PM
    Hello Captain! Big fan. Can you tell me something about the life of Karna? Many self proclaimed hindu scholars and gurus on various media platforms are continuously bashing him and deglorifying his character for views.
    Can you tell us the truth about Karna, his character and its significance?

    ReplyDelete
  67. COMMENTS IN THIS POST IS NOW CLOSED

    MAKE FURTHER COMMENTS IN THE POST BELOW--

    https://ajitvadakayil.blogspot.com/2020/05/mappila-nabatean-nasrani-nazarene.html

    ReplyDelete