Friday, September 25, 2020

WHAT ARTIFICIAL INTELLIGENCE CANNOT DO , a grim note to the top 100 intellectuals of this planet , Part 20 - Capt Ajit Vadakayil

 

THIS POST IS CONTINUED FROM PART 19, BELOW--


https://ajitvadakayil.blogspot.com/2020/05/what-artificial-intelligence-cannot-do.html







  1. AMERICA MUST NOW STOP BOASTING THAT IN USA, POOR HONEST PEOPLE CAN COME UP IN LIFE..

    THE REALITY?

    ONLY CHEATERS PROSPERS IN AMERICA..

    PROOF?

    FIND OUT THE PERCENTAGE OF JEWS IN THE 1% CREAM OF AMERICA.. ALMOST ALL ARE JEWS OR CRYPTO JEWS..

    AN EXAMPLE:

    MARK ZUCKERBERG WHO STOLE FACEBOOK FROM INDIAN DIVYA NARENDRA.

    https://en.wikipedia.org/wiki/Divya_Narendra

    MARK ZUCKERBERG IS WORTH 104 BILLION USD DOLLARS TODAY..

    I HAD A RUSSIAN CHIEF ENGINEER.. HE WAS VERY GOOD.

    HE WAS A RUSSIAN COMMUNIST PARTY MEMBER IN THE USSR COMMIE ERA.

    ONE DAY THEY HAD A CONFERENCE.. THERE WERE MORE THAN 500 INTELLECTUALS IN THE HALL.

    WHEN IT GOT BORING , IT WAS SUGGESTED THAT AFTER THE COFFEE BREAK THERE WILL BE A JOKE SESSION..

    THERE WAS A HEAVY CASH PRIZE, AND A VOTE AT THE END..

    SEVERAL INTELLECTUALS CAME TO THE PODIUM AND GAVE JOKES..

    NOBODY CLAPPED.

    THEN ONE VERY OLD MAN HOBBLED UP ON THE STATEH.

    HE STARTED " THERE WAS THIS JEW WHO WAS VERY HARD WORKING AND HONEST............. "

    HE PAUSED THERE AND GLARED AT THE AUDIENCE..

    AFTER ABOUT 45 SECONDS PIN DROP SILENCE , ONE MAN IN THE AUDIENCE ( A FAMOUS INTELLECTUAL , A JEW HIMSELF ) GOT UP AND STARTED CLAPPING..

    VERY SOON THE ENTIRE AUDIENCE GAVE A STANDING OVATION.

    SOME WERE ROLLING ON THE FLOOR IS EXTREME MIRTH.

    I ASK-- COULD ARTIFICIAL INTELLIGENCE EVERY GET THE CONTEXT AND UNDERSTAND A SUBTLE JOKE?

    THIS IS THE MEANING OF CONSCIOUSNESS.

    https://ajitvadakayil.blogspot.com/2020/09/what-artificial-intelligence-cannot-do.html

    capt ajit vadakayil
    ..


Nicolas C.D  September 16, 2020 at 1:16 AM

This is insane, imagine 10 years from now.

https://ajitvadakayil.blogspot.com/2020/09/punishment-for-making-deep-fake-porn.html

 

 

Capt. Ajit Vadakayil  September 16, 2020 at 4:40 AM 

 

DEEP FAKES HAVE THE CAPABILITY TO START WORLD WARS..

 

THE FRENCH QUEEN WAS BEHEADED BY HER OWN PEOPLE BECAUSE JEW ROTHSCHILD WROTE IN HIS NEWSPAPER THAT SHE SAID  " IF PEOPLE DONT GAVE BREAD THEN THEY CAN EAT CAKE"

 

THE QUEEN NEVER SAID THAT.. SHE WAS A KIND LADY..

 

http://ajitvadakayil.blogspot.com/2015/11/the-french-revolution-conceived-and.html

 

IN THE SHRADDHA KAPOOR DEEP FAKE , THE ONLY WAY I COULD MAKE OUT THAT THE VIDEO IS A DEEP FAKE IS --

 

-- BECAUSE THE WASTED FAKE WHITE WOMAN DID NOT HAVE A SVELTE TONED FIGURE LIKE SHRADDHA KAPOOR .. SHE WOULD NOT EVEN KNOW WHAT A GYM LOOKS LIKE..


capt ajit vadakayil

..





CAPT AJIT VADAKAYIL SAYS  A MUST MEAN  “INTELLIGENCE AUGUMENTATION “  IN FUTURE ..

Let this be IA


OBJECTIVE AI CANNOT HAVE A VISION,  
IT CANNOT PRIORITIZE,   
IT CANT GLEAN CONTEXT,   
IT CANT TELL THE MORAL OF A STORY ,  
IT CANT RECOGNIZE A JOKE, OR BE A JUDGE IN A JOKE CONTEST  
IT CANT DRIVE CHANGE,    
IT CANNOT INNOVATE, 
IT CANNOT DO ROOT CAUSE ANALYSIS ,  
IT CANNOT MULTI-TASK,   
IT CANNOT DETECT SARCASM,  
IT CANNOT DECIPHER TONE ( I KILLED THE CLERK !? --OF MY COUSIN VINNY )
IT CANNOT DO DYNAMIC RISK ASSESSMENT ,  
IT IS UNABLE TO REFINE OWN KNOWLEDGE TO WISDOM, 
IT IS BLIND TO SUBJECTIVITY,  
IT CANNOT EVALUATE POTENTIAL,   
IT CANNOT SELF IMPROVE WITH EXPERIENCE,
IT CANNOT UNLEARN
IT IS PRONE TO CATASTROPHIC FORGETTING    
IT DOES NOT UNDERSTAND BASICS OF CAUSE AND EFFECT,   
IT CANNOT JUDGE SUBJECTIVELY TO VETO/ ABORT,    
IT CANNOT FOSTER TEAMWORK DUE TO RESTRICTED SCOPE,  
IT CANNOT MENTOR,   
IT CANNOT BE CREATIVE,  
IT CANNOT THINK FOR ITSELF, 
IT CANNOT TEACH OR ANSWER STUDENTs QUESTIONS,  
IT CANNOT PATENT AN INVENTION, 
IT CANNOT SEE THE BIG PICTURE , 
IT CANNOT FIGURE OUT WHAT IS MORALLY WRONG, 
IT CANNOT PROVIDE NATURAL JUSTICE, 
IT CANNOT FORMULATE LAWS
IT CANNOT FIGURE OUT WHAT GOES AGAINST HUMAN DIGNITY
IT CAN BE FOOLED EASILY USING DECOYS WHICH CANT FOOL A CHILD, 
IT CANNOT BE A SELF STARTER, 
IT CANNOT UNDERSTAND APT TIMING, 
IT CANNOT FEEL
IT CANNOT GET INSPIRED
IT CANNOT USE PAIN AS FEEDBACK,
IT CANNOT GET EXCITED BY ANYTHING
IT HAS NO SPONTANEITY TO MAKE THE BEST OUT OF  SITUATION 
IT CAN BE CONFOUNDED BY NEW SITUATIONS
IT CANNOT FIGURE OUT GREY AREAS,
IT CANNOT GLEAN WORTH OR VALUE
IT CANNOT UNDERSTAND TEAMWORK DYNAMICS 
IT HAS NO INTENTION
IT HAS NO INTUITION,
IT HAS NO FREE WILL
IT HAS NO DESIRE
IT CANNOT CREATE PATH BREAKING SCIENTIFIC TOOLS.
IT CANNOT SET A GOAL
IT CANNOT START FROM SCRATCH

IT CANNOT BE SUBJECTED TO THE LAWS OF KARMA

ON THE CONTRARY IT CAN SPAWN FOUL AND RUTHLESS GLOBAL FRAUD ( CLIMATE CHANGE DUE TO CO2 ) WITH DELIBERATE BLACK BOX ALGORITHMS,  JUST FEW AMONG MORE THAN 60 CRITICAL INHERENT DEFICIENCIES.




HUMANS HAVE THINGS A COMPUTER CAN NEVER HAVE.. A SUBCONSCIOUS BRAIN LOBE,  REM SLEEP WHICH BACKS UP BETWEEN RIGHT/ LEFT BRAIN LOBES AND FROM AAKASHA BANK,  A GUT WHICH INTUITS,   30 TRILLION BODY CELLS WHICH HOLD MEMORY,   A VAGUS NERVE , AN AMYGDALA ,  73% WATER IN BRAIN FOR MEMORY,  10 BILLION MILES ORGANIC DNA MOBIUS WIRING ETC.



SINGULARITY ,  MY ASS !

.

 CLOUD COMPUTING IS AN ARENA WHERE BUSINESS LEADERS ALL OVER THE WORLD CAN BYPASS IT DEPARTMENTS TO GET ACCESS TO THE MOST EXPENSIVE, HIGH POWERED, AND TECHNOLOGY-DRIVEN APPLICATIONS, ALSO KNOWN AS SAAS, BY PAYING FOR THEM JUST LIKE THEY WOULD PAY FOR MAGAZINE SUBSCRIPTIONS.

IT IS ESTIMATED THAT BY 2021 WE WILL HAVE OVER 98.2 % OF ORGANIZATIONS THAT WILL MOVE TO ADOPT A MULTI-CLOUD ENVIRONMENT.

ENTERPRISES PURCHASE SAAS OR IAAS SERVICES FROM DIFFERENT VENDORS FOR DIFFERENT BUSINESS FUNCTIONS. WHEN THIS HAPPENS, CYBERSECURITY TEAMS ARE UNABLE TO APPLY A UNIFIED SET OF DATA USE POLICIES. 

THEY ARE UNABLE TO SET ACCESS CONTROL PROTOCOLS TO EXECUTE ACROSS ALL THE CLOUD APPLICATIONS PURCHASED FROM DIFFERENT VENDORS. 

AS A RESULT, WHEN CRITICAL DATA PASSES FROM ONE CLOUD TO ANOTHER, THE SECURITY RULES GOVERNING IT MAY CHANGE, LEADING TO POTENTIAL DATA LEAKS, SHADOW IT AND OTHER INTENTIONAL MISUSES.  

CONVENTIONAL CYBERSECURITY SOLUTIONS ARE OFTEN UNABLE TO PROVIDE NETWORK-WIDE PROTECTION TO MULTIPLE CLOUD SETUP.

A SIMPLE EXAMPLE OF SAAS IS AN ONLINE EMAIL SERVICE, LIKE GMAIL. IF YOU USE GMAIL, YOU ARE NOT HOSTING YOUR OWN EMAIL SERVER. GOOGLE IS HOSTING IT, AND YOU ARE SIMPLY ACCESSING IT THROUGH YOUR BROWSER-AS-CLIENT SAAS ENSURES THAT CONSUMERS ARE ALWAYS UP TO DATE WITH THE LATEST VERSION 

THE THREE MAJOR CLOUD SERVICE MODELS ARE SAAS, PAAS, AND IAAS. THESE STAND FOR SOFTWARE AS A SERVICE, PLATFORM AS A SERVICE, AND INFRASTRUCTURE AS A SERVICE. MANY BUSINESS OWNERS DO NOT KNOW THE DIFFERENCE BETWEEN THESE OFFERINGS AND ARE THEREFORE UNAWARE OF WHICH OPTION IS BEST FOR THEIR COMPANY. 

PLATFORM AS A SERVICE (PAAS) PROVIDES DEVELOPERS WITH A COMPLETE ENVIRONMENT FOR DEVELOPMENT AND DEPLOYMENT OVER THE INTERNET. WITH PAAS, DEVELOPERS CAN CREATE EVERYTHING FROM SIMPLE APPS TO COMPLEX CLOUD-BASED BUSINESS SOFTWARE. 

SIMILAR TO SAAS, IT ALLOWS ITS USERS TO ACCESS UP-TO-DATE, POWERFUL TOOLS THAT THEY MAY NOT OTHERWISE BE ABLE TO AFFORD OR MAINTAIN.

INFRASTRUCTURE AS A SERVICE (IAAS) PROVIDE USERS WITH HARDWARE TO PERFORM VARIOUS TASKS WITH. THIS COULD MEAN STORAGE SPACE, COMPUTING TIME WITH ADVANCE OR SPECIALIZED PROCESSORS, OR VIRTUALIZATION SERVICES. IAAS IS USED BY THOSE WHO WANT TO ALLEVIATE THE NEED TO MAINTAIN THEIR OWN ON-PREMISE DATA CENTERS.

WHEN IT COMES TO MANAGING THE OPERATING SYSTEM THAT THE SOFTWARE RUNS ON, PAAS JOINS SAAS IN HANDLING THIS FOR THE USERS. IAAS USERS ARE STILL LEFT TO HANDLE THIS ASPECT OF THEIR TECHNOLOGY STACK BY THEMSELVES.

THE PLATFORM AS A SERVICE MODEL PAAS  IS GOOD FOR MANY MEDIUM/LARGE BUSINESSES BECAUSE IT COMES ALMOST AS READY TO GO AS A SAAS OFFERING WOULD. YOU'LL NEED AN IT TEAM TO HANDLE THE DATA USAGE AND SOFTWARE, BUT IN EXCHANGE FOR THAT YOU'LL GET MORE CONTROL OVER WHAT THOSE THINGS CAN DO FOR YOU. COMPANIES WITH AN EXISTING IT INFRASTRUCTURE MAY FIND THIS OPTION PREFERABLE.

FOR BUSINESSES THAT WANT NEARLY THE SAME LEVEL OF CONTROL AS AN ON-PREMISE SOLUTION WITHOUT THE EXPENSE OF UPKEEP, AND WITH THE ADDED SPEED AND FLEXIBILITY OF CLOUD COMPUTING, IAAS IS A LOGICAL CHOICE.  

 WITH SO MANY NEW REMOTE WORKERS, THERE'S BEEN A HUGE SURGE IN THE NUMBER OF REMOTE DESKTOP CONNECTIONS FROM HOME TO WORK (OR THE CLOUD).  THERE'S BEEN OVER A 40% SURGE IN MACHINES RUNNING RDP (REMOTE DESKTOP PROTOCOL). 

THE ISSUE WITH UNSECURED MACHINES IS THAT CRIMINALS CAN USE BRUTE FORCE ATTACKS TO GAIN ACCESS TO A DESKTOP MACHINE. 

A BRUTE FORCE ATTACK, IS A CRYPTOGRAPHIC HACK THAT RELIES ON GUESSING POSSIBLE COMBINATIONS OF A TARGETED PASSWORD UNTIL THE CORRECT PASSWORD IS DISCOVERED. THE LONGER THE PASSWORD, THE MORE COMBINATIONS THAT WILL NEED TO BE TESTED. 

A BRUTE FORCE ATTACK IS A METHOD USED TO OBTAIN PRIVATE USER INFORMATION SUCH AS USERNAMES, PASSWORDS, PASSPHRASES, OR PERSONAL IDENTIFICATION NUMBERS (PINS). THESE ATTACKS ARE TYPICALLY CARRIED OUT USING A SCRIPT OR BOT TO 'GUESS' THE DESIRED INFORMATION UNTIL A CORRECT ENTRY IS CONFIRMED 

FOR EXAMPLE, WHILE AN 8-CHARACTER ALPHANUMERIC PASSWORD CAN HAVE 2.8 TRILLION POSSIBLE VALUES, MANY PEOPLE WILL SELECT THEIR PASSWORDS FROM A MUCH SMALLER SUBSET CONSISTING OF COMMON WORDS AND TERMS. 

STANDARD USER ACCOUNTS SHOULD HAVE AT LEAST EIGHT LETTERS, A NUMBER, UPPERCASE AND LOWERCASE LETTERS, AND A SPECIAL CHARACTER. MOREOVER, SERVERS SHOULD REQUIRE FREQUENT PASSWORD CHANGES. 

THE KEY INDICATION A BAD ACTOR IS TRYING TO BRUTE FORCE THEIR WAY INTO YOUR SYSTEM IS TO MONITOR UNSUCCESSFUL LOGIN ATTEMPTS. IF YOU SEE THERE HAVE BEEN MANY REPEATED FAILED LOGIN ATTEMPTS, BE SUSPICIOUS. WATCH FOR SIGNS RELATED TO MULTIPLE FAILED LOGIN ATTEMPTS FROM THE SAME IP ADDRESS AND THE USE OF MULTIPLE USERNAMES FROM THE SAME IP ADDRESS. 

OTHER SIGNS CAN INCLUDE A VARIETY OF UNRECOGNIZED IP ADDRESSES UNSUCCESSFULLY ATTEMPTING TO LOGIN TO A SINGLE ACCOUNT, AN UNUSUAL NUMERICAL OR ALPHABETICAL PATTERN OF FAILED LOGINS, AND MULTIPLE LOGIN ATTEMPTS IN A SHORT TIME PERIOD.

BRUTE-FORCE ATTACKS TAKE ADVANTAGE OF AUTOMATION TO TRY MANY MORE PASSWORDS THAN A HUMAN COULD, BREAKING INTO A SYSTEM THROUGH TRIAL AND ERROR. MORE TARGETED BRUTE-FORCE ATTACKS USE A LIST OF COMMON PASSWORDS TO SPEED THIS UP, CALLED DICTIONARY ATTACKS, AND USING THIS TECHNIQUE TO CHECK FOR WEAK PASSWORDS IS OFTEN THE FIRST ATTACK A HACKER WILL TRY AGAINST A SYSTEM.

 

THERE HAS BEEN A HUGE INCREASE IN BRUTE FORCE ATTACKS TARGETING RDP ENDPOINTS SINCE THE ONSET OF THE COVID-19 PANDEMIC. THE REMOTE DESKTOP PROTOCOL (RDP) IS A PROTOCOL, OR TECHNICAL STANDARD, FOR USING A DESKTOP COMPUTER REMOTELY. REMOTE DESKTOP SOFTWARE CAN USE SEVERAL DIFFERENT PROTOCOLS, INCLUDING RDP, INDEPENDENT COMPUTING ARCHITECTURE (ICA), AND VIRTUAL NETWORK COMPUTING (VNC), BUT RDP IS THE MOST COMMONLY USED PROTOCOL.

 

REMOTE DESKTOP IS THE ABILITY TO CONNECT WITH AND USE A FARAWAY DESKTOP COMPUTER FROM A SEPARATE COMPUTER. REMOTE DESKTOP USERS CAN ACCESS THEIR DESKTOP, OPEN AND EDIT FILES, AND USE APPLICATIONS AS IF THEY WERE ACTUALLY SITTING AT THEIR DESKTOP COMPUTER. EMPLOYEES OFTEN USE REMOTE DESKTOP SOFTWARE TO ACCESS THEIR WORK COMPUTERS WHEN THEY ARE TRAVELING OR WORKING FROM HOME.

 

REMOTE DESKTOP ACCESS IS VERY DIFFERENT FROM CLOUD COMPUTING, EVEN THOUGH BOTH ALLOW EMPLOYEES TO WORK REMOTELY. IN CLOUD COMPUTING, USERS ACCESS FILES AND APPLICATIONS THAT ARE STORED IN THE CLOUD — SPECIFICALLY, IN CLOUD SERVERS. 


IN CONTRAST, WHEN USING REMOTE DESKTOP SOFTWARE, USERS ARE ACTUALLY ACCESSING THEIR PHYSICAL DESKTOP COMPUTER, AND CAN ONLY USE FILES AND APPLICATIONS SAVED LOCALLY ON THAT DESKTOP.

 

CLOUD COMPUTING IS SOMETIMES EASIER TO USE AND MORE EFFICIENT TO IMPLEMENT FOR REMOTE WORKFORCES, BUT MANY COMPANIES HAVE NOT MIGRATED TO THE CLOUD, OR CANNOT FOR SECURITY OR REGULATORY REASONS. USING RDP IS SOMEWHAT LIKE THAT: THE USER'S MOUSE MOVEMENTS AND KEYSTROKES ARE TRANSMITTED TO THEIR DESKTOP COMPUTER REMOTELY, BUT OVER THE INTERNET INSTEAD OF OVER RADIO WAVES. THE USER'S DESKTOP IS DISPLAYED ON THE COMPUTER THEY ARE CONNECTING FROM, JUST AS IF THEY WERE SITTING IN FRONT OF IT.

 

THE RDP PROTOCOL OPENS A DEDICATED NETWORK CHANNEL FOR SENDING DATA BACK AND FORTH BETWEEN THE CONNECTED MACHINES (THE REMOTE DESKTOP AND THE COMPUTER CURRENTLY IN USE) THERE ARE SEVERAL ADVANTAGES TO RDP. ONE ADVANTAGE IS THAT IT DOES NOT REQUIRE A VPN.

 

IT ALSO KEEPS DATA STORED SECURELY ON THE USER'S DESKTOP, INSTEAD OF STORING IT ON CLOUD SERVERS OR ON THE USER'S UNSECURED PERSONAL DEVICES. FURTHERMORE, RDP ENABLES COMPANIES WITH A LEGACY ON-PREMISES IT SETUP TO ALLOW THEIR EMPLOYEES TO WORK FROM HOME. 

 

ALL THESE NEW REMOTE DESKTOP CONNECTIONS CREATE A TARGET-RICH ENVIRONMENT.

 

JUST AS THERE HAS BEEN A RISE IN REMOTE WORK AND REMOTE DESKTOP, THERE HAS BEEN AN UNPRECEDENTED RISE IN DESKTOP VIDEO CONFERENCING, MOSTLY USING ZOOM NEW PRACTICE CALLED "ZOOM BOMBING,"  REFERS TO THE UNWANTED, DISRUPTIVE INTRUSION, GENERALLY BY INTERNET TROLLS AND HACKERS, INTO A VIDEO CONFERENCE CALL.


AS BUSINESSES, SCHOOLS AND COLLEGES AND MILLIONS OF SMBS USE VIDEO CONFERENCING TOOL ZOOM DURING THE WORK-FROM-HOME SCENARIO, THE FBI WARNED PEOPLE ABOUT PORN MATERIAL ( BESTIALITY/ DEEPFAKE DEVIANT PORN ) BEING POPPED UP DURING THE VIDEO MEETINGS.

 

THERE ARE SOME STEPS YOU CAN USE TO HELP KEEP YOUR ZOOM VIDEO CALLS MORE SECURE AND PREVENT HACKERS FROM ZOOM BOMBING YOUR ZOOM VIDEO CALLS.

 

1) USE A UNIQUE ID AND PASSWORD

INITIALLY, WHEN YOU CREATE A ZOOM ACCOUNT, THE APP ASSIGNS YOU A PERSONAL MEETING ID (PMI). IT’S A CODE THAT YOU CAN GIVE OUT TO PEOPLE WHEN YOU WANT TO CHAT WITH THEM. HOWEVER, IN ORDER TO PREVENT ZOOM BOMBING, YOU HAVE TO GENERATE A UNIQUE ID INSTEAD OF USING THE PMI.

THE BEST THING ABOUT A UNIQUE ID IS THAT THE ID IS DIFFERENT EVERY TIME YOU SCHEDULE A NEW MEETING. MOREOVER, IT GENERATES A PASSWORD AUTOMATICALLY THAT YOU EITHER USE AS IT IS OR CAN CHANGE IT TO YOUR LIKING. THUS, MAKING IT MORE SECURE THAN A PMI.

 

2) MANAGE SCREEN SHARING

 

THE BEST WAY TO PREVENT HACKERS FROM DISRUPTING YOUR ZOOM VIDEO CALLS IS TO MANAGE SCREEN SHARING. THIS WILL PREVENT ANYONE FROM HIJACKING THE SCREEN DURING A ZOOM CALL TO SHOW OFF DISTURBING FOOTAGE TO EVERYONE ON THE CALL, AS ONLY THE HOSTS ARE ALLOWED TO SHARE THEIR SCREENS. YOU CAN SIMPLY ENABLE THIS SETTING IN ADVANCE OR DURING THE VIDEO CALL.

 

3)CREATE AN INVITE-ONLY MEETING

ANOTHER WAY TO PREVENT HACKERS FROM ZOOM BOMBING YOUR VIDEO CALLS IS TO CREATE AN INVITE-ONLY MEETING. THAT MEANS THE ONLY PEOPLE WHO CAN JOIN THE CALL ARE THOSE YOU INVITED, AND THEY MUST SIGN IN USING THE SAME EMAIL ADDRESS YOU USED TO INVITE THEM. IT GIVES YOU MUCH MORE ASSURANCE THAT PEOPLE ARE WHO THEY SAY THEY ARE.

 

TO CREATE AN “INVITE-ONLY MEETING” ALL YOU HAVE TO DO IS ENABLE THE AUTHENTICATION PROFILE. THIS MOVE WILL DEFINITELY HELP TO KEEP THE TROLLS OUT AND STOP ZOOMBOMBING ATTEMPTS.

  

4) LOCK A MEETING ONCE IT STARTS

TO SECURE YOUR ZOOM MEETING, YOU CAN LOCK A MEETING ONCE IT STARTS THAT IS IF WHEN EVERYONE YOU WOULD HAVE INVITED HAS JOINED. THIS MOVE WILL PREVENT HACKERS AND UNINVITED PARTICIPANTS FROM GATE CRUSHING YOUR VIDEO CALLS.

 

TO STAY CONNECTED AS YOU PRACTICE SOCIAL DISTANCING JUST SIMPLY FOLLOW THE AFOREMENTIONED TIPS TO PREVENT HACKERS FROM ZOOM BOMBING YOUR VIDEO CALLS.

 

AMID INDIA'S CRACKDOWN ON CHINESE COMPANIES ENGAGED IN SUSPICIOUS ACTIVITIES, ALIBABA CLOUD, THE DATA INTELLIGENCE BACKBONE OF CHINESE E-COMMERCE GIANT ALIBABA GROUP,DENIED A REPORT ON DATA THEFT OF INDIAN USERS. 

 

MORE THAN 74 SERVERS BASED IN INDIA ARE  SENDING DATA OF INDIAN USERS TO CHINA, AND AT THE CENTRE OF THIS ARE CLOUD DATA SERVERS OF CHINESE TECHNOLOGY GROUP, ALIBABA, ALIBABA’S CLOUD DATA SERVERS ARE WIDELY POPULAR AMONG BUSINESSES BECAUSE THEY OFFER SERVICES AT A FAR CHEAPER RATE THAN EUROPEAN SERVERS.

 

THESE DATA SERVERS SEEMINGLY OFFER FREE TRIAL USAGE PERIODS TO ORGANISATIONS IN A BID TO TRAP THEM IN. ONCE THEY ARE IN THE SYSTEM, THE DATA SERVERS ENSURE THAT ALL SENSITIVE AND ANCILLARY FORMS OF DATA IS RELAYED OVER TO REMOTE SERVERS LOCATED IN CHINA.

 

60 % OF INDIAN COMPANIES HAVE EXPERIENCED A DATA BREACH INVOLVING THE LOSS OR THEFT OF MORE THAN 1,000 RECORDS CONTAINING SENSITIVE OR CONFIDENTIAL CUSTOMER OR BUSINESS INFORMATION IN THE PAST 2 YEARS AND THE COVID-19 HAS ONLY ACCELERATED THE CYBER ATTACKS,

 

TO HELP YOU PROTECT YOUR ORGANIZATION AND REMOTE WORKERS FROM CYBERATTACK, HERE IS SOMEADVICE:

 

PROVIDE REGULAR USER TRAINING ON HOW TO IDENTIFY SUSPICIOUS LINKS AND ATTACHMENTS AND HOW TO REPORT THEM.

ENABLE CONTINUOUS IT AUDITING WITH ALERTS ON SIGNS OF RANSOMWARE IN PROGRESS, SUCH AS UNUSUAL SPIKES OF ACTIVITY ACROSS FILE REPOSITORIES.

HARDEN DATA ACCESS GOVERNANCE BY REVOKING EXCESSIVE ACCESS RIGHTS.

ESTABLISH AND RIGOROUSLY ENFORCE A LEAST-PRIVILEGE MODEL.

UTILIZE PRIVILEGED ACCESS MANAGEMENT (PAM) SOLUTIONS TO RESTRICT ADMIN ACTIVITY.

AUTOMATE CHANGE AUDITING ACROSS KEY IT SYSTEMS TO DETECT ISSUES AS THEY EMERGE.

CONDUCT PERIODIC REVIEWS TO SPOT ANY DEVIATIONS IN SYSTEM CONFIGURATION FROM A HEALTHY BASELINE.

TODAY IF YOU GOOGLE FOR ZOOM 1.7 BILLION POSTS POP UP.. JUST SIX MONTHS AGO ONLY A COUPE OF MILLION POPPED UP

THERE HAD BEEN AS MANY AS 726 MILLION CONFIRMED CYBER-ATTACKS SINCE THE START OF THE YEAR,

 

DUE TO THE REMOTE WORKING MANDATE IN MANY PARTS OF THE WORLD, THE VIDEO CONFERENCING APP HAS BEEN GROWING IN POPULARITY – NOT ONLY AMONGST END-USERS BUT ALSO CYBER-CRIMINALS.

 

ELON MUSK, JOE BIDEN, JEFF BEZOS, MICHAEL BLOOMBERG, KIM KARDASHIAN WEST AND BILL GATES WERE AMONG THE ACCOUNTS PUSHING OUT TWEETS CLAIMING THAT FOLLOWERS WOULD RECEIVE DOUBLE THE MONEY THEY SEND TO A CERTAIN BITCOIN ADDRESS. 

 

 YET MODI ALLOWED DESH DROHI SUPREME COURT TO LEGALIZE BITCOIN BECAUSE HIS GUJARATI  JEW POLITICAL DONORS WANTED SO

 

IN APRIL 2020, AS THE PANDEMIC WAS RATCHETING UP INTO FIFTH GEAR, ZOOM SUFFERED A HUMILIATING DATA BREACH THAT SAW CYBER CRIMINALS MAKE OFF WITH THE LOG IN CREDENTIALS OF OVER 500,000 USERS.

 

HACKERS THEN SOLD LOG IN DETAILS TO THOSE ACCOUNTS ON THE DARK WEB, ENABLING PRANKSTERS AND CRIMINALS TO LOG IN AND JOIN MEETINGS MID-STREAM. THE HACKERS WERE ALSO ABLE TO HARVEST THE PERSONAL DETAILS OF THE ZOOM MEMBERS, INCLUDING EMAIL ADDRESSES AND OTHER CONTACT INFORMATION.

 

ZOOM IS FACING MASSIVE PRIVACY AND SECURITY BACKLASH GLOBALLY.

 

THE FBI SAID DO NOT MAKE MEETINGS OR CLASSROOMS PUBLIC ON ZOOM.

 

IN ZOOM, THERE ARE TWO OPTIONS TO MAKE A MEETING PRIVATE: REQUIRE A MEETING PASSWORD OR USE THE WAITING ROOM FEATURE AND CONTROL THE ADMITTANCE OF GUESTS.

 

DO NOT SHARE A LINK TO A TELECONFERENCE OR CLASSROOM ON AN UNRESTRICTED PUBLICLY AVAILABLE SOCIAL MEDIA POST. PROVIDE THE LINK DIRECTLY TO SPECIFIC PEOPLE 

IN ZOOM, CHANGE SCREENSHARING TO "HOST ONLY." 

.



  1. DONALD TRUMP

    LISTEN UP AND LISTEN GOOD

    THE JUDIARY OF USA HAS NO POWERS OVER AMERICAs NATIONAL SECURITY.. THIS IS A PARAMOUNT CLAUSE.. DON’T LET ROTHCHILDs MEDIA BRAINWASH YOU..

    THE FIRST AMENDMENT QUOTED BY COMMIE JEWESS JUDGE LAUREL BEELER CANNOT OVER RIDE NATIONAL SECURITY..

    BERKELEY COMMIE LAUREL BEELER IS AN AGENT OF THE JEWISH DEEP STATE AND WANTS JOE BIDEN TO WIN THE ELECTIONS BY HIJACKING THE US POSTAL SYSTEM VIA CHINA ..

    THE US POSTAL SYSTEM WAS INFILTRATED BY CHINA DURING THE FINAL TENURE OF OBAMA, WHO KNEW HE WOULD LOSE TO TRUMP IN 2016..

    CHINESE GOVERNMENT HACKERS HAVE ALREADY BREACHED THE COMPUTER NETWORKS OF THE UNITED STATES POSTAL SERVICE, COMPROMISING THE DATA OF MORE THAN 810,000 EMPLOYEES — INCLUDING THE POSTMASTER GENERAL’S. THIS IS KNOWN TO OBAMA AND HE HAS SPONSORED IT

    THE CHINA VIRUS IS JUST A PLOY TO CONVERT ELECTIONS OF 2020 TO A POSTAL BALLOT SYSTEM WHICH WILL BE CONTROLLED BY CHINA.. CHINA DOES NOT LIKE TRUMP..

    WE HAVE TRAITOR JUDGES IN INDIA TOO. THEY ARE ALL SHIT SCARED TODAY..

    http://ajitvadakayil.blogspot.com/2020/06/nsa-must-form-military-courts-bypass.html

    BANNING AMERICANS FROM USING THE WECHAT /TIKTOK APP WOULD INFRINGE THE FIRST AMENDMENT RIGHTS OF THOSE USERS TO EXPRESS THEMSELVES ONLINE SAYS COMMIE JEWESS JUDGE LAUREL BEELER – THIS IS ABSOLUTE BULLSHIT..

    SHE MUST BE PUNISHED AND DISGRACED

    THE FIRST AMENDMENT TO THE U.S. CONSTITUTION PROTECTS THE FREEDOM OF SPEECH, RELIGION AND THE PRESS. IT ALSO PROTECTS THE RIGHT TO PEACEFUL PROTEST AND TO PETITION THE GOVERNMENT. THAT IS ALL..

    PREIDENT TRUMP RIGHTFULLY BANNING WECHAT ON GROUNDS OF NATIONAL SECURITY HAS NOTHING TO DO WITH BEING LOGGER HEADS WITH THE FIRST AMENDMENT..

    CHINA AND JOE BIDEN WORK TOGETHER TO HIJACK THE US POSTAL BALLOT INTEGRITY.. FIRST AMENDMENT DOES NOT MEAN ALLOWING AN ENEMY NATION CHINA TO TAKE CONTROL OF US SECURITY

    ARE THESE CHINESE APPs INTEGRAL TO THE FREEDOM OF SPEECH OF AMERICANS? BALLS !!.

    WECHAT IS OWNED BY CHINESE TECH GIANT TENCENT. WECHAT HAS APPROXIMATELY 21 MILLION ACTIVE DAILY USERS IN THE U.S. IN A RANGE OF FORMATS, INCLUDING TEXT, IMAGES, VIDEO, AND AUDIO.

    INDIA HAS ALREADY BANNED OVER 200 CHINESE APPS OVER NATIONAL SECURITY AND DATA PROTECTION CONCERNS AMID BORDER TENSION IN LADAKH.

    DONALD TRUMP

    CUT THE STRENGTH OF THE JEWISH DEEP STATE WHICH CONTROLS THE AMERICAN JUDICIARY.

    http://ajitvadakayil.blogspot.com/2018/10/second-defeat-for-deep-state-capt-ajit.html

    ENSURE YOU FIND A REPLACEMENT FOR OBAMAs DARLING JUDGE , THAT OLD JEWESS HAG JUDGE WHO JUST DIED..

    CHINA HAS THE WHEREWITHAL TO FIGURE OUT HOW TO MAKE THE EXACT BALLOT OF VOTERS ON A LARGE SCALE—WITH EACH BALLOT DIFFERING IN TERMS OF THE RACES COVERED, DUPLICATE THE SAME PAPER STOCK, REPLICATE BAR CODES ON MANY STATE BALLOT ENVELOPES, FORGE SIGNATURES (AND POTENTIALLY WITNESS SIGNATURES) AND HAVE DETAILED VOTER INFORMATION, SUCH AS LAST FEW DIGITS OF A DRIVERS’ LICENSE.

    INTEAD OF SIGNATURES ON POSTAL BALLOTS , USE THUMB PRINTS ( NOT OF PATIENTS IN DRUGGED SEMI COMA IN OLD AGE HOMES.).

    IT IS EASY FOR COMPUTERS TO REJECT POSTAL BALLOTS SUPPORTING TRUMP, STATING THAT SIGNATURES DON’T MATCH..

    DO NOT ALLOW PEDOPHILE JOE BIDEN AND LESBIAN KAMALA HARRIS ( MALE HORMONES ) TO RULE AMAERICA

    Capt ajit vadakayil
    ..

  1. https://ajitvadakayil.blogspot.com/2020/03/what-artificial-intelligence-cannot-do_15.html

    WHEN YOU ARE IN THE OFFICE, WHETHER IT'S AN ACTUAL THING HAPPENING OR NOT, YOU FEEL LIKE PEOPLE ARE WATCHING. WHEN YOU ARE AT HOME, YOU DON'T FEEL THAT, SO PEOPLE DO FEEL A LITTLE BIT MORE ENTITLED TO PULL INFORMATION ( STEAL INTELLECTUAL RIGHTS ) OFF THEIR WORK MACHINE, OR SHARE THINGS IN A CERTAIN WAY.

    71% OF BREACHES OVER THE PAST YEAR HAVE BEEN TIED TO INSIDE JOBS.

    THE ABILITY TO WORK FROM HOME IS A PRIZED EMPLOYEE PERK THAT OFFERS WORKERS THE CHANCE TO FREE THEMSELVES FROM THE DAILY COMMUTE AND COMPLETE THEIR TASKS.

    BEFORE THE PANDEMIC A LOT OF COMPANIES WERE AT MAYBE 25% OF THE SEATS AVAILABLE FOR WORK-FROM-HOME, AND NOW IN THIS NEW ENVIRONMENT YOU ARE CLOSE TO 98-100% WORK-FROM-HOME—OR COMPANIES LOSE BIG MONEY AND CANNOT SURVIVE.

    EVEN IF YOUR COMPANY PROVIDES VIRTUAL PRIVATE NETWORK (VPN) ACCESS, YOUR COMPUTER (AND THE DATA IT STORES) – COULD BE COMPROMISED IF SOMEONE HACKS INTO YOUR HOME WI-FI NETWORK.

    HENCE FORTH EMPLOYEE CONTRACTS, AND EMPLOYMENT AGREEMENTS… NEED TO MAKE IT VERY CLEAR THAT “THOU SHALT NOT STEAL OUR IP ”.

    YOU HAVE TO LAY OUT CLEAR ACCESS PRIVILEGES, ACCESS RIGHTS

    YOU NEED TO BE ABLE TO SHOW THAT SOMEONE EXCEEDED THEIR AUTHORIZED ACCESS TO A PROTECTED COMPUTER SYSTEM… WHICH BOILS DOWN TO, 'DID THEY DO SOMETHING THEY KNEW THEY SHOULDN’T HAVE?'"

    SOME COMPANIES ARE ALLOWING LOCAL PRINTING; THAT IS SOMETHING WHICH MUST BE DISABLED. USB PORTS THAT ARE OPEN SHOULD BE LOCKED DOWN . CAREFULLY MONITOR THOSE GIVING NOTICE OR BEING LET GO OR EVEN WHO GOT A BAD REVIEW / YEARLY RAISE ; THAT'S A POINT WHERE PEOPLE MAY TAKE DATA THEY SHOULD NOT BE TAKING..

    MOST COMPANIES HAVE EVERYTHING LOGGED, BUT ACTIVE MONITORING NEEDS TO BE IN PLACE. AT LEAST YOU HAVE THE DETECTIVE CONTROL IF YOU CAN'T PREVENT IT

    BRAINSTORMING NEEDS TO BE DONE-- HOW WE CAN ADAPT OUR IT SECURITY PORTFOLIO TO AN ENVIRONMENT WHERE EVERYONE IS WORKING FROM HOME, BUT STILL NEEDS ACCESS TO ALL THE TOOLS AND RESOURCES THEY HAD BEFORE?

    HOW HAVE OUR POLICIES, AND SYSTEMS HELD UP TO THE UPSWING IN VPN USE, DISTRIBUTED WORKERS, SHIFTING MEETINGS ON-LINE, AND EVERYTHING ELSE THAT WE’VE HAD TO CHANGE TO ADAPT TO THIS “NEW NORMAL?”

    THERE ARE SOME COMMON THREADS – FOR EXAMPLE, THE ADAGE ABOUT “UNKNOWN UNKNOWNS.”.. MAKING SURE THAT SENSITIVE DOCUMENTS AND FILES REMAIN CONFIDENTIAL IS DEFINITELY AN ISSUE REMOTE EMPLOYEES NEED TO TACKLE

    IN COMPLICATED TIMES – LIKE THE NOVEL CORONAVIRUS PANDEMIC – PHISHERS ARE HOPING TO TAKE ADVANTAGE OF TRUSTING VICTIMS. THEY'LL OFTEN PRETEND THEY'RE SOMEONE WITHIN THE COMPANY, LIKE THE CEO OR A MANAGER, TO ESTABLISH FALSE TRUST. REMOTE WORKERS ARE EASY TARGETS BECAUSE THEY'RE NOT IN THE OFFICE AND, THEREFORE, HACKERS ARE HOPING THEY WON'T CHECK TO SEE IF THE EMAIL IS LEGITIMATE.

    MANY REMOTE EMPLOYEES ARE USING THEIR PRIVATE HOME NETWORK, WHICH CAN INCREASE THE RISK OF LEAKED DATA. THIRD PARTIES MIGHT BE ABLE TO INTERCEPT AND ACCESS SENSITIVE EMAILS, PASSWORDS AND MESSAGES. THERE IS ALSO THE RISK THAT OTHERS WHO LIVE THE EMPLOYEE'S HOME (WHO USE THE SAME INTERNET CONNECTION) MAY SEE VALUABLE COMPANY DATA.

    MORE THAN 50% OF EMPLOYEES REPORT TRANSFERRING FILES BETWEEN THEIR WORK AND PERSONAL COMPUTERS. IF EMPLOYEES OBTAIN SENSITIVE DATA AND STORE IT ON THEIR PERSONAL DEVICES, THAT PUTS MANY COMPANIES AT RISK – ESPECIALLY IF SAID DISGRUNTLED EMPLOYEE ENDS LEAVES THE COMPANY.

    ANOTHER SOURCE OF VULNERABILITY IS THAT IF YOU, AS A REMOTE EMPLOYEE, ARE USING YOUR PERSONAL COMPUTER AND ARE NOT DOWNLOADING THE LATEST UPDATES, YOU COULD BE MORE VULNERABLE TO CYBERATTACKS.

    MULTIFACTOR AUTHENTICATION GRANTS ACCESS TO THE DEVICE AND ALL SOFTWARE AFTER THE EMPLOYEE PROVIDES MORE THAN ONE FORM OF IDENTIFICATION.

    ANYONE CAN MEMORIZE A PASSWORD OR STEAL A PHYSICAL DEVICE AND UNLOCK A COMPUTER. MULTIFACTOR AUTHENTICATION CAN PREVENT HACKERS FROM PHYSICALLY ACCESSING YOUR COMPANY DEVICE.

    CONTINUED TO 2--
    1. CONTINUED FROM 1--

      DATA ENCRYPTION HELPS PROTECT SENSITIVE INFORMATION BY TRANSLATING IT INTO A CODE THAT ONLY PEOPLE WITHIN YOUR COMPANY CAN ACCESS THROUGH A SECRET KEY OR PASSWORD. EVEN IF SCAMMERS INTERCEPT YOUR DATA, THEY WON'T BE ABLE TO INTERPRET IT PROPERLY. THIS GOES FOR ANY MESSAGES OR INFORMATION YOU SEND, RECEIVE OR STORE ON YOUR DEVICES.

      TAKING THE FOLLOWING PRECAUTIONS TO LIMIT SECURITY RISKS WHILE EMPLOYEES WORK FROM HOME.

      REQUIRE THAT EMPLOYEES USE A NON-STORED PASSWORD TO CONNECT TO THE NETWORK, ESPECIALLY FOR VPN ACCESS.

      ENFORCE REASONABLE SESSION TIMEOUTS FOR SENSITIVE PROGRAMS OR APPS. A USER SHOULD NOT HAVE TO RECONNECT AFTER WALKING TO THE KITCHEN TO POUR A CUP OF COFFEE, BUT AT THE SAME TIME, YOU CANNOT TRUST THAT EVERY EMPLOYEE WILL ALWAYS LOG OUT WHEN THEY ARE DONE FOR THE DAY.

      LIMIT PROGRAM/FILE ACCESS TO ONLY THOSE AREAS THAT ARE ABSOLUTELY NEEDED BY THAT EMPLOYEE.

      RESERVE THE RIGHT TO TERMINATE EMPLOYEE ACCESS AT ANY MOMENT.

      PROVIDE SERVICES FOR REMOTE FILE STORAGE AND OTHER TASKS; DON'T RELY ON INDIVIDUALS TO USE THEIR PERSONAL PROGRAMS AND ACCOUNTS TO STORE YOUR COMPANY'S DATA.

      ADVANCED ANALYTICS CAN BRING IT ALL TOGETHER. TAKE THE OVERWHELMING FLOOD OF INFORMATION AND CONSOLIDATE IT INTO ONE PLACE, THEN RUN IT THROUGH A MACHINE LEARNING ENGINE TO IDENTIFY THE ANOMALIES AND OUTLIERS.

      THIS ENABLES AN ORGANIZATION’S SECURITY OPERATIONS TEAM TO IDENTIFY ISSUES THEY COULD NOT HAVE SEEN BEFORE, AND A SINGLE CONSOLIDATED AND CORRELATED RISK SCORE MAKES IT MUCH EASIER TO RESPOND TO THREATS. WITH THIS NEW PERSPECTIVE, ANALYSTS CAN UNCOVER SOME OF THOSE PREVIOUSLY UNKNOWN THREATS.

      Capt ajit vadakayil
      ..




  1. https://ajitvadakayil.blogspot.com/2020/05/what-artificial-intelligence-cannot-do.html

    IN ADDITION TO M SEVERAL WARNINGS TO PMO ABOUT ZOOM THAT IT LACKS THE FULL TYPE OF END-TO-END ENCRYPTION ..

    ZOOM COMPANY GOT SHIT ON FACE OVER SECURITY AND PRIVACY-RELATED ISSUES EVER SINCE THE REPORTS OF ZOOMBOMBING CAME TO LIGHT.

    ZOOMBOMBING OR ZOOM RAIDING IS THE UNWANTED INTRUSION INTO A VIDEO CONFERENCE CALL BY AN INDIVIDUAL, CAUSING DISRUPTION. THE TERM BECAME POPULARIZED IN 2020, AFTER THE COVID-19 PANDEMIC FORCED MANY PEOPLE TO STAY AT HOME AND VIDEOCONFERENCING IS USED ON A LARGE SCALE BY BUSINESSES, SCHOOLS, AND SOCIAL GROUPS.

    FBI SAID THAT THEY HAVE RECEIVED OVER 240 REPORTS OF “ZOOM-BOMBING” IN WHICH HIJACKERS BROADCASTED MATERIAL DEPICTING CHILD SEXUAL ABUSE TO UNSUSPECTING USERS.

    ENCRYPTION IS USED TO PROTECT THE IDENTITY OF USERS, CALL DATA BETWEEN ZOOM CLIENTS AND ZOOM'S INFRASTRUCTURE, AND MEETING CONTENTS.

    WHEN A ZOOM CLIENT IS AUTHORIZED TO JOIN A MEETING, THAT CLIENT IS GIVEN A 256-BIT SECURITY KEY FROM ZOOM'S SERVER.

    BUT THE ZOOM SERVER RETAINS THE SECURITY KEY PROVIDED TO MEETING PARTICIPANTS, THEREBY LACKING TRUE END-TO-END KEY MANAGEMENT AND ENCRYPTION.

    THE LACK OF FULL END-TO-END ENCRYPTION MEANS THAT AN ATTACKER WHO CAN MONITOR ZOOM'S SERVER INFRASTRUCTURE AND GAIN ACCESS TO THE MEMORY OF THE RELEVANT ZOOM SERVERS COULD DEFEAT THE ENCRYPTION FOR A SPECIFIC MEETING.

    AS SUCH, THAT PERSON COULD THEN VIEW THE SHARED MEETING KEY, DERIVE SESSION KEYS, AND DECRYPT ALL MEETING DATA.

    https://support.zoom.us/hc/en-us/articles/201361943-New-updates-for-iOS

    NEW DOCUMENT FROM ZOOM ILLUSTRATES HOW THE COMPANY HOPES TO CHICKEN UP—NAY-- BEEF UP THE SECURITY AND PRIVACY OF ITS VIRTUAL MEETING PLATFORM.

    ALL ZOOM ROOMS WILL HAVE ENHANCED ENCRYPTION BETWEEN ZOOM ROOMS CONTROLLER AND ZOOM ROOMS ENABLED STARTING JUNE 30, 2020..

    TO FIX SOME OF ITS SECURITY HOLES, ZOOM OUTLINED THE GOALS OF ITS PROPOSAL AS FOLLOWS: 1) ONLY AUTHORIZED MEETING PARTICIPANTS SHOULD HAVE ACCESS TO THEIR MEETING'S DATA; 2) ANYONE EXCLUDED FROM A MEETING SHOULD NOT HAVE THE ABILITY TO CORRUPT THE CONTENT OF THAT MEETING; 3) IF A MEETING PARTICIPANT ENGAGES IN ABUSIVE BEHAVIOR, THERE SHOULD BE AN EFFECTIVE WAY TO REPORT THAT PERSON TO PREVENT FURTHER ABUSE.

    https://www.youtube.com/watch?v=-dgW6_n8XsQ

    WITH ZOOM 5.0 UPDATE, SUPPORT FOR AES 256 BIT GCM ENCRYPTION WAS ADDED 256-BIT ENCRYPTION IS MUCH STRONGER THAN 128 BIT AS A BIGGER KEY SIZE HAS A HIGHER CHANCE OF REMAINING SECURE. THIS MEANS THAT IF SOMEONE WERE TO ATTEMPT TO HACK ENCRYPTED DATA, 256-BIT ENCRYPTED DATA WOULD TAKE SIGNIFICANTLY LONGER TO CRACK.

    AES 256-BIT GCM ENCRYPTION WILL BE ENABLED SYSTEM-WIDE FROM MAY 30 IN ZOOM AND USERS WILL NEED TO HAVE UPDATED CLIENTS AND APP TO JOIN MEETINGS. THE SECURITY ICON IN THE MEETING WILL LET THE HOST EASILY LOCK/UNLOCK MEETINGS, ENABLE/DISABLE WAITING ROOMS, ENABLE/DISABLE IN-MEETING CHAT, ENABLE/DISABLE PARTICIPANT RENAMING, ENABLE/DISABLE SCREEN SHARING, REMOVE A PARTICIPANT, AND REPORT A PARTICIPANT..

    ON JUNE 30, ENHANCED ENCRYPTION BETWEEN ZOOM ROOMS CONTROLLER AND ZOOM ROOMS WILL BE ENABLED. ZOOM ROOMS CONTROLLERS THAT DO NOT HAVE THE RECOMMENDED VERSION 5.0 OR HIGHER WILL STOP FUNCTIONING.
    ZOOM 5.0 INCLUDES SECURITY ENHANCEMENTS AND A STRONGER ENCRYPTION STANDARD, TO FURTHER ENSURE THAT ZOOM CONFERENCES CANNOT BE INTERCEPTED BY UNINVITED PEOPLE.

    AFTER THE MEETING STARTS, ALL PARTICIPANTS WILL SEE A MEETING SECURITY CODE THEY CAN USE TO VERIFY THAT NO ONE'S CONNECTION TO THE MEETING WAS INTERCEPTED. THE HOST CAN READ THIS CODE OUT LOUD, AND ALL PARTICIPANTS CAN CHECK THAT THEIR CLIENTS DISPLAY THE SAME CODE.

    IF THE HOST LEAVES, THEY CAN NOW EASILY SELECT A NEW HOST AND HAVE THE CONFIDENCE THAT THE RIGHT PERSON IS LEFT WITH HOST PRIVILEGES..

    CM OR GALOIS / COUNTER MODE ENCRYPTION IS AN ALGORITHM FOR AUTHENTICATED ENCRYPTION OF DATA THAT PROVIDES ASSURANCE OF AUTHENTICITY OF THE CONFIDENTIAL DATA.

    CONTINUED TO 2--
    1. CONTINUED FROM 1--

      IT IS A MODE OF OPERATION OF THE ADVANCED ENCRYPTION STANDARD (AES) ALGORITHM CONSTRUCTED FROM A BLOCK SIZE OF 128-BITS. ESSENTIALLY, GCM ENCRYPTION PROVIDES A LAYER OF PROTECTION FOR YOUR DATA AND RESISTANCE TO TAMPERING.

      AFTER MAY 30, THE SHIELD WILL BE GREEN FOR ALL USERS, DENOTING ENHANCED GCM ENCRYPTION.

      ZOOM ROOMS CONTROLLERS (INCLUDING ZOOM ROOMS SCHEDULING DISPLAYS) WILL NOT FUNCTION IF THEY ARE NOT RUNNING THE MINIMUM VERSIONS.

      CLICKING THE ICON TAKES THE USER TO THE STATISTICS PAGE FOR ADDITIONAL ENCRYPTION DETAILS. ADDITIONALLY, MEETING HOSTS CAN NOW SELECT DATA CENTER REGIONS AT THE SCHEDULING LEVEL FOR MEETINGS AND WEBINARS.

      ZOOM 5.0 MAKES PASSWORDS FOR MEETINGS ACTIVE BY DEFAULT, IN ORDER TO REDUCE S ZOOM-BOMBINGS - THE INTRUSION OF UNINVITED INDIVIDUALS IN OTHERS' VIDEO CONFERENCES.

      INITIALLY BY DEFAULT, A ZOOM MEETING DELIBERATELY DID NOT REQUIRE A PASSWORD. THAT MEANS IT IS ALL TOO EASY FOR NEW WORK-AT-HOME MEETING ORGANIZERS TO LEAVE THEIR FRIENDS' GET-TOGETHERS, PROGRESS MEETINGS, OR VIRTUAL CLASSROOMS OPEN TO SNOOPS OR ABUSERS.

      BOTTOM LINE WARNING;; THIS LOLLIPOP STILL ISN’T THE FULL-PROOF END-TO-END ENCRYPTION ONE WOULD IDEALLY WANT FROM THE SERVICE

      capt ajit vadakayil
      ..



https://www.youtube.com/watch?v=qatcinfrz_e

LARGE ORGANIZATIONS FACE THE CHALLENGE OF HOW TO DISTINGUISH 'AUTHORIZED' ACCESS FROM ONE THAT IS NOT FOR A LEGITIMATE WORK-RELATED PURPOSE, DURING THIS COVID-19 PANDEMIC WHERE WORK AT HOME REMOTE ACCESS CANOT BE AVOIDED

ORGANIZATIONS MUST BUILD A FOOL-PROOF AND EFFECTIVE FOUNDATION FOR A REMOTE WORKPLACE.

THIS INCLUDES TAKING STOCK OF COMPANY ASSETS, METHODICALLY ENCRYPTING ON-PREMISES, MOBILE DEVICES AND APPLICATIONS, PLUS PROVIDING ACCESS TO CORPORATE DATA AND COLLABORATION CHANNELS, SUCH AS THROUGH A SECURE VIRTUAL PRIVATE NETWORK (VPN).

WITH THE INCREASING NUMBER OF PEOPLE BRINGING THEIR DEVICES TO WORK AND THE CONSTANT APPEARANCE OF NEW SOFTWARE SOLUTIONS AND CLOUD SERVICES, EMPLOYEES ARE USING MORE AND MORE TECHNOLOGIES WITHOUT NOTIFYING THE CORPORATE IT TEAM ABOUT THEM

MULTI-FACTOR AUTHENTICATION / MFA REQUIRES AN EXTRA LAYER OF AUTHENTICATION, SUCH AS ENTERING A ONE-TIME PIN NUMBER OR FACIAL RECOGNITION IN ADDITION TO CREDENTIALS. THIS PROCESS ENSURES THE PERSON ACCESSING YOUR NETWORK IS WHO THEY SAY THEY ARE.

PRIVILEGED USERS, SUCH AS DATA ADMINISTRATORS, TYPICALLY HAVE COMPLETE ACCESS TO THEIR ORGANIZATION'S DATA, AND WHEN A WORK FROM HOME SITUATION IS MANDATED, THESE PERSONNEL WILL HAVE TO FACE THE ADDITIONAL CHALLENGE OF PROVIDING GRANULAR ACCESS TO CORPORATE RESOURCES.

THERE IS OFTEN A LACK OF CONTEXTUAL INFORMATION ABOUT USERS AND REQUESTERS OF DATA, WHICH IS A SIGNIFICANT FACTOR TO CONSIDER BEFORE GRANTING DATA PRIVILEGES.

THIS IS WHERE A PRIVILEGED ACCESS MANAGEMENT (PAM) STRATEGY PLAYS AN ESSENTIAL ROLE IN MAINTAINING DATA INTEGRITY. IMPLEMENTING AUTHENTICATION PROTOCOLS, AUTOMATED PASSWORD ENCRYPTION, AND REGULAR AUDITING AND REPORTING CAN ALL HELP ENTERPRISES MAINTAIN DATA SECURITY.

PRIVILEGE PROVIDES THE AUTHORIZATION TO OVERRIDE, OR BYPASS, CERTAIN SECURITY RESTRAINTS, AND MAY INCLUDE PERMISSIONS TO PERFORM SUCH ACTIONS AS SHUTTING DOWN SYSTEMS, LOADING DEVICE DRIVERS, CONFIGURING NETWORKS OR SYSTEMS, PROVISIONING AND CONFIGURING ACCOUNTS AND CLOUD INSTANCES, ETC.

BY DIALING IN THE APPROPRIATE LEVEL OF PRIVILEGED ACCESS CONTROLS, PAM HELPS ORGANIZATIONS CONDENSE THEIR ORGANIZATION’S ATTACK SURFACE, AND PREVENT, OR AT LEAST MITIGATE, THE DAMAGE ARISING FROM EXTERNAL ATTACKS AS WELL AS FROM INSIDER MALFEASANCE OR NEGLIGENCE.

A CENTRAL GOAL IS THE ENFORCEMENT OF LEAST PRIVILEGE, DEFINED AS THE RESTRICTION OF ACCESS RIGHTS AND PERMISSIONS FOR USERS, ACCOUNTS, APPLICATIONS, SYSTEMS, DEVICES (SUCH AS IOT) AND COMPUTING PROCESSES TO THE ABSOLUTE MINIMUM NECESSARY TO PERFORM ROUTINE, AUTHORIZED ACTIVITIES.

SHADOW IT DESCRIBES THOSE APPLICATIONS AND DEVICES EMPLOYEES USE FOR WORK BUT ARE NOT MANAGED BY THE IT ORGANIZATION

LACK OF SECURITY – LACK OF VISIBILITY AND CONTROL OVER NETWORK ELEMENTS ARE THE MAIN CYBERSECURITY RISKS OF USING SHADOW IT. THEY CREATE NUMEROUS WEAK SPOTS THAT HACKERS MAY USE FOR COMPROMISING A SYSTEM AND COLLECTING OR STEALING SENSITIVE BUSINESS INFORMATION

https://www.youtube.com/watch?v=vnz3txfrhtc

EXAMPLES OF SOME FREE OR FREEMIUM SHADOW IT SERVICES ARE GOOGLE DOCS, DROPBOX AND ZOOM. SHADOW IT HAS BECOME MORE PERVASIVE AS A RESULT OF THE WORK-FROM-HOME SHIFT. THE RISK LIES IN SHARING OR STORING BUSINESS FILES WITHIN THESE SHADOW IT APPS AND DEVICES. WHEN THIS HAPPENS, THE ORGANIZATION LOSES CONTROL OF DATA AND EXPOSES ITSELF TO A BREACH.

MOST EMPLOYEES USE SHADOW IT WITH THE GOOD INTENTION OF GETTING THEIR WORK DONE. HOWEVER, ORGANIZATIONS NEED POLICIES THAT SET CLEAR EXPECTATIONS AROUND USING OFFICE TECHNOLOGIES AND DATA. SUCH POLICIES CAN SIGNIFICANTLY REDUCE THE RISKS BROUGHT ON BY SHADOW IT.

CONTINUED TO 2--
  1. CONTINUED FROM 1--

    EMPLOYEES’ BEHAVIORAL CHANGES CAN INDICATE THAT THE COMPANY IS ABOUT TO BE COMPROMISED. IF AN EMPLOYEE IS ACCESSING SYSTEMS OR FILES AT UNUSUAL HOURS (GIVEN THEIR WORK HISTORY), IF THEY SUDDENLY START WORKING REMOTELY/START WORKING REMOTELY FREQUENTLY WITHOUT EXPLANATION, IF LOGON ATTEMPTS APPEAR TO BE ORIGINATING FROM UNEXPECTED LOCATIONS, IF AN EMPLOYEE IS ACCESSING UNUSUALLY LARGE AMOUNTS OF DATA OR IS ABUSING PERMISSIONS TO ACCESS NEVER-BEFORE-ACCESSED DATA, OR IF TECH TEAMS SEE UNAUTHORIZED ATTEMPTS TO ACCESS SERVERS AND DATA, THERE MIGHT BE AN INSIDER THREAT TO INVESTIGATE.

    BEHAVIOR CHANGES ARE EASY TO DETECT WITH SECURITY TOOLS LIKE DATA LOSS PREVENTION (DLP), INTRUSION DETECTION SYSTEMS (IDS), AND ENDPOINT AND MOBILE SECURITY, BUT TRADITIONAL TOOLING IS REACTIVE, WHICH MEANS THAT SOMETHING BAD HAS TO HAPPEN BEFORE IT CAN BE STOPPED AND (HOPEFULLY) MITIGATED BEFORE TOO MUCH DAMAGE IS DONE.

    SETTING UP THE RIGHT LEVELS OF ACCESS FOR EVERY EMPLOYEE AND SYSTEM, MAINTAINING APPROPRIATE PERMISSIONS OVER TIME, AND UNDERSTANDING THE SENSITIVITY OF DATA TO WHICH BOTH EMPLOYEES AND SYSTEMS HAVE ACCESS (FOR STARTERS) IS A MASSIVE RESPONSIBILITY. THIS IS WHY EXCESSIVE ACCESS PRIVILEGES, GROWING AMOUNTS OF DATA AND NETWORKED PARTNER ECOSYSTEMS, SHADOW IT, IOT, AND EXPLODING MOBILE AND CLOUD USAGE PLAGUE NEARLY EVERY ORGANIZATION.

    OVERLY PERMISSIVE ACCESS CONTROLS ARE A KEY FACILITATOR OF INSIDER THREAT. THE PRINCIPLE OF LEAST PRIVILEGE LIMITS THE ACCESS THAT USERS, SYSTEMS, AND PROCESSES HAVE TO NETWORKED RESOURCES BASED ON ROLES AND RESPONSIBILITIES. ELIMINATING UNNECESSARY OR OVERLY PERMISSIVE ACCESS REDUCES THE NETWORK ATTACK SURFACE AND HELPS MITIGATE THE PROBABILITY OF ATTACKERS ESCALATING PRIVILEGES AND ACCOMPLISHING A BREACH.

    HISTORICALLY, NETWORK ACCESS WORKED MUCH LIKE A LOCK ON A FRONT DOOR; ANYONE WITH THE RIGHT KEY WAS ABLE TO GET INSIDE. ONCE INSIDE THE BUILDING, THAT PERSON WAS FREE TO GO WHEREVER THEY PLEASED. OVER TIME, NETWORK AND SECURITY ADMINS REALIZED THAT A ONE-TIME SECURITY AUTHENTICATION AT THE “FRONT DOOR” (I.E., PERIMETER) WASN’T ENOUGH AND SET UP ADDITIONAL PERIMETERS THROUGH WHICH USERS AND PROCESSES HAD TO AUTHENTICATE BEFORE BEING ALLOWED TO ACCESS CRITICAL DATA, APPLICATIONS, OR SERVICES.

    HOWEVER, THE IDEA OF TRUST REMAINED. CREDENTIALS CHECKED ONE TIME AT EACH JUNCTURE PERMITTED THE USER/PROCESS EASY ACCESS TO ANYTHING INSIDE.

    ZERO TRUST ABANDONS THE IDEA OF A TRUSTED USER OR PROCESS AND REQUIRES A CHECK ON AUTHORIZATION AND AUTHENTICATION EVERY TIME ACCESS IS REQUESTED; PREVIOUS ACCESS DOESN’T DETERMINE FUTURE ACCESS (BECAUSE ATTACKERS CAN INTERCEPT COMMUNICATIONS). TO PREVENT AN ATTACKER FROM PIGGYBACKING ON AUTHORIZED USERS OR PROCESSES, A ZERO TRUST NETWORK CREATES ACCESS PERMISSIONS THAT ARE DYNAMIC AND BASED ON A WIDE COLLECTION OF ATTRIBUTES — AS OPPOSED TO A USERNAME+PASSWORD COMBINATION, LOCATION-BASED PROTOCOLS, OR OTHER STATIC INFORMATION.

    THIS COMBINATION OF ATTRIBUTES FORMS AN IDENTITY FOR EVERY USER AND PROCESS, AND IF THE IDENTITY IS ALTERED, ACCESS IS DENIED. IF THE USER/PROCESS IS ACTING IN AN UNEXPECTED WAY (E.G., SENDING EXCESSIVE AMOUNTS OF DATA), THE ACTION IS BLOCKED. CONTINUOUS AUTHENTICATION AND AUTHORIZATION PREVENTS “BAD” FROM HAPPENING BECAUSE EVERY ACTION IS CHECKED.

    IN A ZERO TRUST NETWORK, ASSETS/RESOURCES ARE ASSIGNED AN IDENTITY (JUST LIKE USERS), BUT EACH IDENTITY IS BASED ON A COLLECTION OF ATTRIBUTES TAKEN FROM SOURCE DATA (RATHER THAN NETWORK-BASED INFORMATION OR A PASSWORD+USERNAME COMBO).

    THIS PROCESS PROVIDES THE CONTEXTUAL INFORMATION WHICH ALLOWS THE SYSTEM TO DETERMINE THE TRUE AUTHENTICITY OF NETWORK COMMUNICATION REQUESTS, ONLY WITHOUT REQUIRING A USER OR ADMINISTRATOR TO TAKE FURTHER ACTION. MULTI-FACTOR AUTHENTICATION IN USERLAND IS OFTEN RESISTED BECAUSE IT MEANS THE USER MUST SUPPLY ADDITIONAL INFORMATION BEFORE RECEIVING PERMISSION TO ACCESS THE REQUESTED RESOURCE.

    CONTINUED TO 3--

  2. CONTINUED FROM 2--

    BUT MULTI-FACTOR AUTHENTICATION IN A ZERO TRUST NETWORK CAN HAPPEN AUTOMATICALLY AND SEAMLESSLY BECAUSE IDENTITIES ARE COLLECTIONS OF MULTIPLE FACTORS WHICH, IN AGGREGATE, CANNOT BE CHANGED BY AN ATTACKER — BE THAT PERSON AN EMPLOYEE OR AN EXTERNAL THREAT ACTOR.

    COMPANIES, HAVE IMPLEMENTED VARYING SEGMENTATION METHODS OVER THE YEARS TO KEEP SENSITIVE DATA SEGREGATED FROM OTHER PARTS OF THE NETWORK. FIREWALLS ARE THE MOST COMMON TOOL IN THE SECURITY PRACTITIONER’S TOOLBOX, BUT FIREWALLS ONLY WORK INSOMUCH AS NETWORK CONSTRUCTS AND LOCATION DATA ARE ACCURATE.

    A MODERN, ZERO TRUST SEGMENTATION STRATEGY SHIFTS FOCUS AWAY FROM THE NETWORK TO WHAT IS COMMUNICATING ON THE NETWORK — HOSTS, SERVERS, APPLICATIONS, ETC. RATHER THAN CREATING PERIMETERS AROUND THE WHOLE NETWORK OR MICRO-PERIMETERS AROUND SECTIONS OF THE NETWORK, ZERO TRUST SEGMENTATION A) USES IDENTITY AS THE BASIS FOR PERIMETERIZATION, B) CONTINUOUSLY AUTHORIZES AND AUTHENTICATES COMMUNICATING ASSETS, AND C) ENFORCES CONTROL BASED ON COMMUNICATING ASSETS.

    THIS LAST POINT IS ESPECIALLY CRITICAL WHEN TRYING TO PREVENT ATTACKS. IF THE SECURITY/NETWORKING TEAM CAN SEGMENT THE NETWORK BASED ON ASSETS RATHER THAN NETWORK CONSTRUCTS, THE HASSLE OF TRADITIONAL SEGMENTATION IS ELIMINATED AND SECURITY POLICIES REMAIN IN PLACE EVEN IF THE NETWORK CHANGES.

    THE VAST MAJORITY OF INSIDER ATTACKS HAPPEN BECAUSE AN EMPLOYEE WANTS TO STEAL OR DESTROY COMPANY-PROPRIETARY DATA. THEREFORE, WHEN LOOKING AT SECURITY STRATEGIES TO PREVENT INSIDER THREAT, IT MAKES SENSE TO PUT SECURITY CONTROL AS CLOSE AS POSSIBLE TO THE THING ATTACKERS WANT: THE DATA. TRADITIONAL SECURITY TOOLING FOCUSES ON PROTECTING THE NETWORK IN WHICH THE DATA LIVES, OR DETECTING ABNORMAL OR UNAUTHORIZED ACTIVITY BY A USER. BUT A ZERO TRUST NETWORK PLACES THE STRONGEST PROTECTION AROUND THE MOST SOUGHT-AFTER ASSET INSTEAD OF THE ENVIRONMENT IN WHICH THE ASSET IS COMMUNICATING.
    SECURE MOBILITY AND CLIENT-BASED VPN WITH ENFORCED, RISK-AWARE, AND ADAPTIVE ACCESS POLICIES
    SECURE ALL LOCAL NETWORK ACCESS THROUGH CLOUD-BASED DNS SECURE INTERNET GATEWAY FOR WEB AND APP-BASED PROXY CONTROL
    DEPLOY CLOUD-BASED ADAPTIVE MULTIFACTOR AUTHENTICATION (MFA) TO ENSURE THE TRUSTWORTHINESS OF USERS AND DEVICES
    PROTECT END-POINTS WITH EDR (END-POINT DETECTION AND RESPONSE) AND DATA LEAK PREVENTION
    TIGHTEN SECURITY OPERATIONS (SECOPS) MANAGEMENT FOR ENHANCED THREAT DETECTION AND PREVENTION

    ESTABLISH A CLEAR POLICY AS TO WHICH DEVICES, SYSTEMS AND SOFTWARE EMPLOYEES CAN USE. THEN COMMUNICATE THAT POLICY TO ALL EMPLOYEES — NOT JUST ONCE, BUT OFTEN. ESTABLISH A CLEAR POLICY AS TO WHICH DEVICES, SYSTEMS AND SOFTWARE EMPLOYEES CAN USE. THEN COMMUNICATE THAT POLICY TO ALL EMPLOYEES — NOT JUST ONCE, BUT OFTEN. A CLOUD ACCESS SECURITY BROKER (CASB), ENSURES REAL-TIME DATA PROTECTION. RUN STRATEGIC ANALYSIS OF USAGE PATTERNS. RECOGNIZE THAT THE ORGANIZATION NEEDS A FULL RANGE OF TOOLS AND SERVICES IN ORDER TO FUNCTION PROPERLY..

    EMPLOYEES ARE CONSTANTLY TRYING TO DO THEIR JOBS AS EFFICIENTLY AS POSSIBLE, PARTICULARLY WHEN THEY ARE WORKING OUT OF THE OFFICE. IT’S UP TO IT TO PROVIDE EMPLOYEES WITH SYSTEMS THAT MAKE THEIR JOBS EASIER, WHILE ENSURING SECURITY.

    Capt ajit vadakayil
    ..

https://timesofindia.indiatimes.com/gadgets-news/zoom-announces-rollout-of-end-to-end-encryption-for-video-conferences/articleshow/78674303.cms

TAURIA OFFERS “THE ONLY END-TO-END ENCRYPTED VIDEO CONFERENCING SOLUTION FOR GROUP CALLS OF UP TO 50 PEOPLE, ONE-TO-ONE, AND SCREEN SHARING.” ACCORDING TO TAURIA, THIS WORKS BY “MILITARY-GRADE 256-BIT ENCRYPTION KEYS.”

https://www.youtube.com/watch?v=9duipjUjE80

capt ajit vadakayil
..



  1. https://www.youtube.com/watch?v=jI8IKpjiCSM

    HYBRID CLOUD SERVICES ARE POWERFUL BECAUSE THEY GIVE BUSINESSES GREATER CONTROL OVER THEIR PRIVATE DATA.

    HYBRID CLOUD IS A SOLUTION THAT COMBINES A PRIVATE CLOUD WITH ONE OR MORE PUBLIC CLOUD SERVICES, WITH PROPRIETARY SOFTWARE ENABLING COMMUNICATION BETWEEN EACH DISTINCT SERVICE. A HYBRID CLOUD STRATEGY PROVIDES BUSINESSES WITH GREATER FLEXIBILITY BY MOVING WORKLOADS BETWEEN CLOUD SOLUTIONS AS NEEDS AND COSTS FLUCTUATE.

    WHILE THE PUBLIC CLOUD OFFERS FLEXIBILITY AND SCALABILITY, THE PRIVATE CLOUD OFFERS SECURITY – THE BEST OF BOTH WORLDS.

    EVERY SUCCESSFUL COMPANY NEEDS A SCALABLE INFRASTRUCTURE THAT CAN SUPPORT COMPLEX FUNCTIONS, FASTER DELIVERY OF TIME-SENSITIVE INFORMATION, DATA TRANSFORMATION, AND VISIBILITY ON ALL DATA THAT FLOWS IN AND OUT OF THEIR ECOSYSTEMS. HENCE MAJOR BUSINESSES ACROSS VERTICALS ARE NOW ADOPTING THE CLOUD.

    CRITICAL INDUSTRIES LIKE BANKING, HEALTHCARE, GOVERNMENT, MANUFACTURING, RETAIL, TECH, CUSTOMER SERVICING, ETC. ARE NOW MOVING TO THE CLOUD DUE TO AVOID THE HIGH COSTS INVOLVED IN BUILDING, MAINTAINING, AND RAISING THOSE FACILITIES TO CURRENT STANDARDS

    CIRCUMVENTING THESE NEGATIVE EFFECTS OF THE COVID-19 PANDEMIC REQUIRED COMPANIES TO BUILD TECHNOLOGICAL INFRASTRUCTURES, SECURE BUSINESS CONTINUITY, AND MANAGE DATA.

    THE HYBRID CLOUD IS A COMBINATION OF CLOUD SERVICES AND AN ON-PREMISES DATA CENTER. HYBRID CLOUD IS A COMPUTING ENVIRONMENT THAT CONNECTS A COMPANY’S ON-PREMISES PRIVATE CLOUD SERVICES AND THIRD-PARTY PUBLIC CLOUD INTO A SINGLE, FLEXIBLE INFRASTRUCTURE FOR RUNNING THE ORGANIZATION’S APPLICATIONS AND WORKLOAD

    HYBRID CLOUD IS A TERM USED TO REFER TO THE IT SETUP OR ARCHITECTURE – AND CONNECTION OF – TWO OR MORE TYPES OF IT ENVIRONMENTS, WHICH USE BOTH ON-PREMISES DATACENTER AND CLOUD ENVIRONMENTS, WHETHER PUBLIC OR PRIVATE.

    COMPARED TO THE PUBLIC CLOUD, A HYBRID CLOUD OFFERS A HIGHER LEVEL OF SECURITY, BECAUSE BUSINESSES HAVE CONTROL OVER THEIR MISSION-CRITICAL DATA. WITH THIS CLOUD SOLUTION, YOU CAN DECIDE WHICH APPLICATION AND SERVICES CAN REMAIN IN THE PUBLIC CLOUD AND WHICH SHOULD BE PRIVATE.

    A HYBRID CLOUD INFRASTRUCTURE OFFERS THE FLEXIBILITY AND SCALABILITY OF THE CLOUD WHILE ENABLING BUSINESS TO MAINTAIN ON-PREMISES TOOLS FOR MISSION-CRITICAL APPLICATIONS — ALLOWING BUSINESSES TO ADD RESOURCES AND MAKE CHANGES TO ACCOMMODATE HIGHER DEMAND QUICKLY.

    MULTI-CLOUD IS AN APPLICATION ENVIRONMENT THAT RELIES ON MORE THAN ONE PUBLIC CLOUD PROVIDER. WHILE A MULTI-CLOUD DEPLOYMENT CAN REFER TO ANY IMPLEMENTATION OF MULTIPLE SOFTWARE AS A SERVICE (SAAS) OR PLATFORM AS A SERVICE (PAAS) CLOUD OFFERINGS, TODAY, IT GENERALLY REFERS TO A MIX OF PUBLIC INFRASTRUCTURE AS A SERVICE (IAAS) ENVIRONMENTS, SUCH AS AMAZON WEB SERVICES AND MICROSOFT AZURE.

    HYBRID HAS TRADITIONALLY MEANT THE COMBINATION OF PRIVATE (EITHER ON-PREMISES OR HOSTED IN A COLOCATION FACILITY) AND PUBLIC CLOUD INFRASTRUCTURE, WITH ORCHESTRATION TOOLS USED TO DEPLOY WORKLOADS AND MANAGE THE BALANCE BETWEEN THE TWO — EMPLOYING PUBLIC CLOUD RESOURCES FOR REGULAR OR EPISODIC BURSTS OF COMPUTE AND/OR STORAGE REQUIREMENTS,

    FOR EXAMPLE. ‘MULTI CLOUD’, BY CONTRAST, HAS MORE OF A STRATEGIC EMPHASIS, DESCRIBING HOW ENTERPRISES USE MULTIPLE CLOUD PROVIDERS TO MEET DIFFERENT TECHNICAL OR BUSINESS REQUIREMENTS.

    AT ITS MOST GRANULAR, MULTI CLOUD MEANS CLOUD-NATIVE APPLICATIONS BUILT FROM CONTAINERS AND MICROSERVICES USING COMPONENT SERVICES FROM DIFFERENT CLOUD PROVIDERS. A MULTI CLOUD APPROACH COULD INVOLVE 2 PUBLIC CLOUD ENVIRONMENTS OR 2 PRIVATE CLOUD ENVIRONMENTS.

    A HYBRID CLOUD APPROACH COULD INVOLVE A PUBLIC CLOUD ENVIRONMENT AND A PRIVATE CLOUD ENVIRONMENT WITH INFRASTRUCTURE (FACILITATED BY APPLICATION PROGRAMMING INTERFACES, MIDDLEWARE, OR CONTAINERS) FACILITATING WORKLOAD PORTABILITY.

    https://www.youtube.com/watch?v=CDtjlshp1KI

    http://ajitvadakayil.blogspot.com/2020/09/what-artificial-intelligence-cannot-do.html

    capt ajit vadakayil
    ..



  1. https://timesofindia.indiatimes.com/home/sunday-times/delhi-born-mit-grads-headset-makes-it-to-times-100-best-inventions-of-2020/articleshow/79343666.cms

    100 % BULLSHIT..

    TOWARDS THE END OF HIS LIFE STEPHEN HAWKING WAS TELLING US HOW BAD A GAS CO2 IS , AND WHY WE SHOULD HAVE CARBON TAXES SO THAT JEWS CAN LAUGH ALL THE WAY TO THE BANK..

    NOT ONE THOUGHT OR REAL WORD WAS STEPHEN HAWKING'S ..

    BEWARE OF JEWISH DEEP STATE AGENDA..

    WE DONT NEED PESHAWARI KHATRI JEW ARNAV KAPUR TO HELP THIS PLANET..

    READ ALL 20 PARTS OF THE POST BELOW-

    https://ajitvadakayil.blogspot.com/2020/09/what-artificial-intelligence-cannot-do.html

    http://ajitvadakayil.blogspot.com/2020/07/pm-modi-ignored-dire-warning-of-capt.html

    capt ajit vadakayil
    ..

























  1. https://www.oneindia.com/india/salman-rushdie-arundhati-roy-chomsky-others-demand-release-of-umar-khalid-3154200.html

    THE USUAL DESH DROHIS SALMAN RUSHDIE, AMITAV GHOSH, ARUNDHATI ROY, RAMACHANDRA GUHA , RAJMOHAN GANDHI, MIRA NAIR ANAND PATWARDHAN, ROMILA THAPAR, RAMCHANDRA GUHA, IRFAN HABIB, MEDHA PATKAR, ARUNA ROY.. PATHETIC WORMS NAY VERMIM .

    HEY SALMAN RUSHDIE, CAPT AJIT VADAKAYIL HAS DUG INTO YOU PAST-- YOU ARE A JEW.. DEAL WITH IT..

    HEY JEW NOAM CHOMSKY, IS INDIA YOUR POPs PROPERTY?

    PEOPLE LIKE NOAM CHOMSKY MUST BE SHOT WITH THEIR OWN SHIT.

    BRAIN DEAD NOAM CHOMSKY STOLE FROM INDIAN LINGUIST BHARTRHARI ( 7000 BC ) AND PANINI ( 5500 BC ) WITH 5% UNDERSTANDING.

    CAPT AJIT VADAKAYIL CAN ENGAGE IN A LIVE DEBATE WITH NOAM CHOMSKY ON HIS PET SUBJECT OF “LINGUISTICS” AND RAPE HIM MENTALLY LIVE ON TV..

    UNIVERSAL GRAMMAR (UG) IN LINGUISTICS, IS THE THEORY OF THE GENETIC COMPONENT OF THE LANGUAGE FACULTY, CREDITED TO NOAM CHOMSKY.

    CHOMSKY , A FELLOW OF INFERIOR INTELLECT , NEVER UNDERSTOOD PANINI .. FOR PAแน†INI, A STRUCTURE COULD NEVER BE SEEN AS DEEP AND SURFACE, BUT ON PAIRS IN ONE UNIQUE LEVEL. WHAT MAKES THE STRUCTURE (SYNTAX) MUCH MORE “COMPUTABLE”.

    WHAT CHOMSKY CALLS PRINCIPLES AND PARAMETERS MODEL IS EXACTLY WHAT PAแน†INI CALLS SAMANYA (GENERAL) AND VISEแนขA (PARTICULAR) AND ALL HIS GRAMMAR IS DELINEATED WITH THEM.

    VAKYAPADIYA OF BHARTRIHARI ( CONSTITUTE THE FUNDAMENTAL TEXTS FOR THE SCHOOL OF PANINI’S GRAMMAR.

    NOAM CHOMSKY'S CONCEPT OF "DEEP STRUCTURE" AND "SURFACE STRUCTURE" WAS LIFTED FROM BHARTRHARI.


    DEEP STRUCTURE AND SURFACE STRUCTURE (ALSO D-STRUCTURE AND S-STRUCTURE, ALTHOUGH THESE ABBREVIATED FORMS ARE SOMETIMES USED WITH DISTINCT MEANINGS) ARE CONCEPTS USED IN LINGUISTICS, SPECIFICALLY IN THE STUDY OF SYNTAX IN THE CHOMSKYAN TRADITION OF TRANSFORMATIONAL GENERATIVE GRAMMAR.

    NOAM CHOMSKY DEVELOPED THE BULLSHIT IDEA THAT EACH SENTENCE IN A LANGUAGE HAS TWO LEVELS OF REPRESENTATION — A DEEP STRUCTURE AND A SURFACE STRUCTURE.

    THE DEEP STRUCTURE REPRESENTS THE CORE SEMANTIC RELATIONS OF A SENTENCE, AND IS MAPPED ONTO THE SURFACE STRUCTURE (WHICH FOLLOWS THE PHONOLOGICAL FORM OF THE SENTENCE VERY CLOSELY) VIA TRANSFORMATIONS.

    ALL THIS IN A BULLSHIT LANGUAGE CALLED ENGLISH WHICH WORSHIPS SYNTAX..

    NOAM CHOMSKY INVENTED SOMETHING CALLED 'UNIVERSAL GRAMMAR' WHICH IS SOMEHOW PROGRAMMED INTO US AT BIRTH. IN INDIA ALMOST EVERYBODY KNOWS AT LEAST 3 LANGUAGES . IT IS PRETTY OBVIOUS TO US THAT THERE IS NO SUCH THING AS 'UNIVERSAL GRAMMAR'.

    IT IS BULLSHIT THAT WE FORMULATE 'DEEP STRUCTURES' IN OUR HEADS USING 'UNIVERSAL GRAMMAR'—AND THAT TOO IN A STUPID LANGUAGE CALLED ENGLISH

    NOAM CHOMSKY WORKS ARE USELESS AS HE LIFTED WITHOUT UNDERSTANDING FROM A PERFECT DIVINE LANGUAGE SANSKRIT FOR APPLICATION TO A RIDICULOUS LANGUAGE OF SYNTAX CALLED ENGLISH.

    THIEF NOAM CHOMSKY SHOWED THAT SYNTAX IS INDEPENDENT FROM PHONOLOGY AND SEMANTICS. THIS LED TO MAJOR ADVANCES IN LINGUISTICS BUT THE ANALYSIS CONTINUED TO BE PHRASED IN TERMS OF RULES..

    THEN CHOMSKY MADE ANOTHER RADICAL CHANGE- HE SHOWED THAT THE FORMAL PROPERTIES OF SYNTAX MAY BE DERIVED FROM MORE ABSTRACT PRINCIPLES.

    JEW NOAM CHOMSKY, IS CALLED THE THE GREATEST LINGUIST SINCE PANINI—BALLS !

    HE LIFTED EVERYTHING HALFBAKED FROM SANSKRIT GRAMMAR. PANINI'S WORK IS PURELY GRAMMATICAL AND LEXICOGRAPHIC, CULTURAL AND GEOGRAPHICAL INFERENCES CAN BE DRAWN FROM THE VOCABULARY HE USES IN EXAMPLES.

    PREDECESSORS OF NOAM CHOMSKY WERE ALL SANSKRIT SCHOLARS—TODAY THEY ADMIT “NONE OF US DRINK FROM WELLS THAT WE HAVE DUG AND CHOMSKY IS NO EXCEPTION”.

    THE DEEP STRUCTURE GIVES THE SEMANTIC COMPONENT OF A SENTENCE, WHILE THE SURFACE STRUCTURE GIVES THE PROPER PHONOLOGICAL INFORMATION TO EXPRESS THAT THOUGHT.

    CHOMSKY COINED AND POPULARIZED THE TERMS "DEEP STRUCTURE" AND "SURFACE STRUCTURE" IN THE EARLY 1960S. CHOMSKY DID NOT BORROW FROM HOCKETT AS WRITTEN BY THE WHITE MAN --- THIEF CHOMSKY LIFTED IT FROM BHARTRHARI..

    CONTINUED TO 2--


    1. CONTINUED FROM 1--

      CHOMSKY FIRST REFERRED TO THESE CONCEPTS IN HIS 1962 PAPER THE LOGICAL BASIS OF LINGUISTIC THEORY (LATER PUBLISHED AS CURRENT ISSUES IN LINGUISTIC THEORY IN 1964).

      THERE IS NO SUCH THING AS A LANGUAGE WITHOUT GRAMMAR.

      THE LINGUISTICS PART OF NLP - FOUNDED BY CONMAN BANDLER AND CONMAN GRINDER ARE DERIVED FROM NOAM CHOMSKYs LINGUISTIC SHIT - TRANSFORMATIONAL GRAMMAR, SYNTAX AND DELETION PHENOMENA

      NOAM CHOMSKY'S BULLSHIT BOOK SYNTACTIC STRUCTURES ON TRANSFORMATIONAL GRAMMAR DOMINATES THE FIELD OF LINGUISTICS TODAY

      NOAM CHOMSKY’S BULLSHIT BOOK ASPECTS OF THE THEORY OF SYNTAX DEVELOPED THE IDEA THAT EACH SENTENCE IN A LANGUAGE HAS TWO LEVELS OF REPRESENTATION — A DEEP STRUCTURE AND A SURFACE STRUCTURE.

      THE DEEP STRUCTURE REPRESENTS THE CORE SEMANTIC RELATIONS OF A SENTENCE, AND IS MAPPED ONTO THE SURFACE STRUCTURE..

      THE COGNITIVE REVOLUTION IS THE NAME FOR A PSEUDO INTELLECTUAL MOVEMENT SIX DECADES AGO. IT BEGAN IN THE MODERN CONTEXT OF GREATER INTERDISCIPLINARY COMMUNICATION AND RESEARCH.

      THE RELEVANT AREAS OF INTERCHANGE WERE THE COMBINATION OF PSYCHOLOGY, ANTHROPOLOGY, AND LINGUISTICS ( MINDLESS BULLSHIT OF NOAM CHOMSKY ) WITH APPROACHES DEVELOPED WITHIN THE THEN-NASCENT FIELDS OF ARTIFICIAL INTELLIGENCE, COMPUTER SCIENCE, AND NEUROSCIENCE.

      THIS WAS MINDLESS REVERSE ENGINEERING OF THE HUMAN THOUGHT PROCESS.

      THE COMBINATION OF JUNK SCIENCE AND JUNK POLITICS HAS MADE JEW NOAM CHOMSKY AN ATTRACTIVE - AND UNSTOPPABLE - JUGGERNAUT IN THE KOSHER CONTROLLED WESTERN ACADEMIC WORLD.

      LINGUISTS WHO REJECT THE BULLSHIT CHOMSKYAN PARADIGM ARE MARGINALIZED , BLACKBALLED AND SHUT OUT OF THE PROFESSION ENTIRELY

      JEW CHOMSKY IS A ROTHSCHILD BACKED PROPHET WHO DEMANDS THAT PEOPLE BELIEVE HIM. SINCE HIS CLAIMS CANNOT BE PROVED, THEY HAVE TO BE TAKEN ON FAITH.

      FERDINAND DE SAUSSURE IS CONSIDERED ONE OF THE FOUNDERS OF 20TH-CENTURY LINGUISTICS

      NOAM CHOMSKY PLACED HIMSELF EXPLICITLY IN THE TRADITION OF SAUSSUREAN LINGUISTICS.

      ACCORDING TO NOAM CHOMSKY, THE MIND COMPRISES AN EXTENSIVE CLUSTER OF INNATE “MODULES,” ONE OF WHICH IS LANGUAGE. EACH MODULE OPERATES AUTOMATICALLY, INDEPENDENTLY OF INDIVIDUAL CONTROL, ON THE BASIS OF A DISTINCT, DOMAIN-SPECIFIC SET OF RULES THAT TAKE DETERMINATE INPUTS FROM SOME MODULES AND YIELD DETERMINATE OUTPUTS FOR OTHERS.

      IN EARLIER WORK THESE OPERATIONS WERE CALLED “DERIVATIONS”; MORE RECENTLY THEY HAVE BEEN CALLED “COMPUTATIONS.” THE VARIOUS MODULES INTERACT IN COMPLEX WAYS TO YIELD PERCEPTION, THOUGHT, AND A LARGE NUMBER OF OTHER COGNITIVE PRODUCTS.

      FOR EXAMPLE, A BEE’S GENOME DOES NOT HAVE TO DIRECT IT TO BUILD HIVES IN A HEXAGONAL LATTICE. THE LATTICE IS A REQUIREMENT IMPOSED BY PHYSICS, SINCE THIS STRUCTURE IS THE MOST STABLE AND EFFICIENT OF THE RELEVANT SORT. ANALOGOUS POINTS CAN BE MADE ABOUT THE GROWTH, STRUCTURE, AND OPERATION OF THE HUMAN BRAIN.

      IN LINGUISTICS CHOMKSY’S MAIN CONTRIBUTION IS THE INFLUENTIAL TRANSFORMATIVE-GENERATIVE GRAMMAR “WHICH IS AN ATTEMPT TO DESCRIBE THE SYNTACTICAL PROCESSES COMMON TO ALL HUMAN LANGUAGE MATHEMATICALLY”

      LATER ON, NOAM CHOMSKY WOULD CALL A RELATED DISTINCTION AS THAT BETWEEN E-LANGUAGE AND I-LANGUAGE, WHICH WAS RELATED TO THE COMPETENCE (THE KNOWLEDGE THAT ALLOWS PEOPLE TO CONSTRUCT AND UNDERSTAND GRAMMATICAL SENTENCES), AND PERFORMANCE (THE ACTUAL SENTENCES).

      LANGUAGE HAS BEEN THOUGHT TO BE THE OBJECT OF LINGUISTICS. BUT NOAM CHOMSKY INSISTS THAT LANGUAGE AS A USELESS NOTION FOR LINGUISTIC SCIENCE. HE ARGUES THAT LINGUISTICS SHOULD BE CONCERNED WITH GRAMMAR.

      CUNT CHOMKY RENAMES LANGUAGE AND GRAMMAR, EXTERNALIZED LANGUAGE (E-LANGUAGE) AND INTERNALIZED LANGUAGE (I-LANGUAGE) RESPECTIVELY.

      ACCORDING TO CHOMSKY, E-LANGUAGE (LANGUAGE) IS SOMETHING ABSTRACT EXTERNALIZED FROM THE ACTUAL APPARATUS OF OUR MIND AND I-LANGUAGE (GRAMMAR) IS THE PHYSICAL MECHANISM OF OUR BRAIN. .. TEE HEEEEEEE..

      Capt ajit vadakayil
      ..


  1. CYBERSECURITY IS NO LONGER JUST A CTO’S RESPONSIBILITY.

    WITH WORK AT HOME COVID PROTOCOLS THE OPPORTUNITY FOR A SECURITY BREACH HAS SIGNIFICANTLY INCREASED.

    THE INTERNET IS LOOSELY CLASSIFIED INTO 3 REGIONS BASED ON HOW ACCESSIBLE THE INFORMATION IS THERE:

    CLEAR WEB OR SURFACE WEB – THE REGION OF THE INTERNET THAT MOST OF US ARE FAMILIAR WITH, THIS IS PUBLICLY ACCESSIBLE WEB PAGES THAT ARE LARGELY INDEXED ON SEARCH ENGINES.

    EVERYTHING THAT WE CAN FIND ON SEARCH ENGINES MAKES UP JUST 7% OF THE WEB.

    DEEP WEB – THE DEEP WEB ARE REGIONS OF THE INTERNET THAT ARE HIDDEN FROM THE PUBLIC BUT NOT MEANT FOR MALICIOUS ACTIVITY. YOUR EMAIL, FOR EXAMPLE, IS THE DEEP WEB (IT’S NOT INDEXED BY SEARCH ENGINES BUT FULLY ACCESSIBLE).

    MARKETING SAAS PLATFORMS, FOR INSTANCE, ARE BUILT IN THE DEEP WEB. THEY REQUIRE AUTHENTICATION TO ACCESS THE DATA WITHIN. 96% OF THE INTERNET IS THE DEEP WEB. SAAS STANDS FOR SOFTWARE AS A SERVICE.

    SAAS MARKETING IS SIMPLY THE METHOD YOU USE TO MARKET THIS KIND OF SOFTWARE AS SERVICES. SAAS IS A METHOD OF SOFTWARE DELIVERY THAT ALLOWS DATA TO BE ACCESSED FROM ANY DEVICE WITH AN INTERNET CONNECTION AND A WEB BROWSER. IN THIS WEB-BASED MODEL, SOFTWARE VENDORS HOST AND MAINTAIN THE SERVERS, DATABASES, AND

    THE CODE THAT MAKES UP AN APPLICATION. NETFLIX IS A SAAS COMPANY THAT SELLS SOFTWARE TO WATCH LICENSED VIDEOS ON DEMAND. AS A SAAS SERVICE PROVIDER, AMAZON FACILITATES ITS CLIENTS WITH COMPLETE SOLUTIONS THAT IS COMPLETELY RUN AND MANAGED BY AWS.

    DARK WEB – WITHIN THE DEEP WEB ARE REGIONS OF THE INTERNET THAT ARE INTENTIONALLY AND SECURELY HIDDEN FROM VIEW. IT’S AN AREA OF THE WEB WHERE ANONYMITY IS CRITICAL SO CRIMINAL ACTIVITY IS MORE PREVALENT. BREACHED DATA, ILLICIT CRIMINAL ACTIVITY, AND ILLEGAL MEDIA CAN BE FOUND, BOUGHT, AND SOLD HERE.

    FAKE COVID-19 VACCINES ARE BEING SOLD LIKE HOT CAKES ON THE DARK WEB FOR BITCOIN! TODAY BITCOIN HAS REACHED 34734 USD.. ON JAN 31ST LAST YEAR THE VALUE WAS 3394 USD.

    . FACEBOOK, , IS AVAILABLE VIA THE DARK WEB.

    THE MOST COMMON ACCESS TO THE DARK WEB IS THROUGH A TOR NETWORK. TOR IS SHORT FOR THE ONION ROUTER.. TOR BROWSERS DISGUISE YOUR ONLINE . THE DARK WEB ITSELF IS A POWERFUL TOOL TO PROTECT PRIVACY AND FREE SPEECH. USING TOR IS NOT A CRIMINAL ACT.

    TOR AIMS TO CONCEAL ITS USERS' IDENTITIES AND THEIR ONLINE ACTIVITY FROM SURVEILLANCE AND TRAFFIC ANALYSIS BY SEPARATING IDENTIFICATION AND ROUTING. IT IS AN IMPLEMENTATION OF ONION ROUTING, WHICH ENCRYPTS AND THEN RANDOMLY BOUNCES COMMUNICATIONS THROUGH A NETWORK OF RELAYS RUN BY VOLUNTEERS AROUND THE GLOBE.

    BECAUSE THE TRAFFIC HAS PASSED THROUGH SEVERAL ADDITIONAL NODES WHILE ENCRYPTED, IT CAN'T BE TRACED BACK TO YOU. TOR IS A FREE SOFTWARE PROGRAM THAT YOU LOAD ONTO YOUR COMPUTER (LIKE A BROWSER) THAT HIDES YOUR IP ADDRESS EVERY TIME YOU SEND OR REQUEST DATA ON THE INTERNET. THE PROCESS IS LAYERED WITH HEAVY-DUTY ENCRYPTION, WHICH MEANS YOUR DATA IS LAYERED WITH PRIVACY PROTECTION

    PRIVACY IS ACCOMPLISHED BY WRAPPING EVERY COMMUNICATION IN MULTIPLE LAYERS OF ENCRYPTION THAT ARE TRANSPORTED THROUGH MULTIPLE ROUTING POINTS. TOR COMMUNICATION INITIATES AT RANDOM TO ONE OF THE PUBLICLY LISTED ENTRY NODES, BOUNCES THAT TRAFFIC THROUGH A RANDOMLY SELECTED MIDDLE RELAY, AND FINALLY RESOLVES YOUR REQUEST AND RESPONSE THROUGH A FINAL EXIT NODE.

    THE MAJORITY OF CRIMINAL DATA THAT IS BOUGHT AND SOLD ON THE DARK WEB ARE BREACHED DATABASES, DRUGS, WEAPONS, AND COUNTERFEIT ITEMS LIKE FAKE COVID VACCINES . USERS UTILIZE CRYTPOCURRENCY LIKE BITCOIN TO MAKE EVERY CURRENCY TRANSACTION DECENTRALIZED AND ANONYMIZED AS WELL.

    BRANDS DON’T WANT TO FIND THEIR BREACHED DATA ON THE DARK WEB

    CONTINUED TO 2--

    ReplyDelete
    Replies
    1. CONTINUED FROM 1-

      PUBLIC AND HOME WIRELESS NETWORKS MAY NOT BE AS SECURE AS YOU THINK. USE VPN SOFTWARE ( VIRTUAL PRIVATE NETWORK ) TO ESTABLISH SECURE NETWORK COMMUNICATIONS. VPN, OR VIRTUAL PRIVATE NETWORK, SOFTWARE ALLOWS REMOTE EMPLOYEES TO SECURELY ACCESS CORPORATE NETWORK THROUGH AN ENCRYPTED CONNECTION.

      A VPN CONNECTION ESTABLISHES A SECURE CONNECTION BETWEEN YOU AND THE INTERNET. VIA THE VPN, ALL YOUR DATA TRAFFIC IS ROUTED THROUGH AN ENCRYPTED VIRTUAL TUNNEL. THIS DISGUISES YOUR IP ADDRESS WHEN YOU USE THE INTERNET, MAKING ITS LOCATION INVISIBLE TO EVERYONE.

      A VPN CONNECTION IS ALSO SECURE AGAINST EXTERNAL ATTACKS. WHILE USING A VPN IS COMPLETELY LEGAL, YOU SHOULD NEVER ENGAGE IN ILLEGAL ACTIVITY WHILE USING A VPN..

      YOUR ONLINE BANKING IS SAFER WHEN YOU USE A VPN BECAUSE YOUR INFORMATION IS ENCRYPTED. INSTEAD OF CONNECTING STRAIGHT THROUGH THE PUBLIC WI-FI, THE VPN ALLOWS YOU TO ACCESS THE INTERNET THROUGH AN ENCRYPTED “TUNNEL.” THE VPN TUNNEL GIVES YOU THE ABILITY TO USE THE INTERNET WITH MORE FREEDOM, PRIVACY, AND SAFETY.

      WHILE A VPN WILL PROTECT YOUR CONNECTION TO THE INTERNET FROM BEING SPIED ON AND COMPROMISED, YOU CAN STILL GET HACKED WHEN USING A VPN IF YOU BRING THE MALWARE IN YOURSELF OR ALLOW SOMEONE TO FIND OUT YOUR USERNAME AND PASSWORD.

      IF USERS IN INDIA USE A VPN FOR ILLEGAL ACTIVITIES ONLINE, INCLUDING COPYRIGHT INFRINGEMENT OR ACCESSING BANNED WEBSITES, THERE MAY BE LEGAL CONSEQUENCES.

      LOOK FOR A PADLOCK OR HTTPS IN YOUR BROWSER WINDOW – ESPECIALLY WHEN ONLINE SHOPPING. THE LOCK SYMBOL AND RELATED URL CONTAINING 'HTTPS' SIMPLY MEAN THAT THE CONNECTION BETWEEN YOUR WEB BROWSER AND THE WEBSITE SERVER IS ENCRYPTED.

      THAT’S AN INDICATION THAT YOU HAVE A SECURE, ENCRYPTED CONNECTION BETWEEN YOUR BROWSER AND THE DESTINATION YOU’RE VISITING. THIS BASICALLY MEANS THAT SOMEONE SNOOPING IN ON YOUR NETWORK TRAFFIC CAN’T SEE THE INFORMATION YOU’RE PASSING BACK AND FORTH.

      DON’T OPEN OR DOWNLOAD ATTACHMENTS FROM UNKNOWN EMAIL ADDRESSES.
      DON’T CLICK ANY LINKS WITHIN EMAIL MESSAGES IF YOU DON’T KNOW THE SENDER.

      MAKE SURE YOUR VPN AND FIREWALL ARE ENABLED. IN COMPUTING, A FIREWALL IS A NETWORK SECURITY SYSTEM THAT MONITORS AND CONTROLS INCOMING AND OUTGOING NETWORK TRAFFIC BASED ON PREDETERMINED SECURITY RULES. A FIREWALL TYPICALLY ESTABLISHES A BARRIER BETWEEN A TRUSTED NETWORK AND AN UNTRUSTED NETWORK, SUCH AS THE INTERNET.

      HAVE A SET-LIMIT ON YOUR CREDIT CARD FOR ONLINE TRANSACTIONS.

      https://ajitvadakayil.blogspot.com/2020/09/what-artificial-intelligence-cannot-do.html

      Capt ajit vadakayil
      ..

  1. SOMEBODY CALLED ME UP AND CRIED

    CAPTAIN

    YOU HAVE WRITTEN THAT BLUE OCEAN LEADERSHIP IS A LOT LIKE SOCCER TEAM DYNAMICS..

    http://ajitvadakayil.blogspot.com/2010/12/team-work-team-dynamics-capt-ajit.html

    http://ajitvadakayil.blogspot.com/2010/11/blue-ocean-leadership-capt-ajit.html

    INDEED

    IN THIRTY YEARS OF COMMAND CAPT AJIT VADAKAYILs SHIP NEVER FAILED AN INSPECTION AND ALWAYS OVER PERFORMED.

    YOU CAN CALL THIS LUCK, BUT BELIEVE ME , THERE IS A METHOD TO THE MADNESS..

    I PUSHED MY TEAM HAAAARD .. BUT NEVER ALLOWED MY TEAM TO BURN OUT..

    I HAD A FINGER ON THEIR PULSE.

    http://ajitvadakayil.blogspot.com/2010/11/old-sea-dog-capt-ajit-vadakayil.html

    MY NEXT POST WILL BE ON THIS SUBJECT..

    EVER HEARD OF " BIELSA BURNOUT "?

    TO UNDERSTAND WHAT I WRITE

    BINGE WATCH THE TV SERIAL ON AMAZON PRIME-- "TAKE US HOME , LEEDS UNITED "..

    https://www.youtube.com/watch?v=iGJRWuJMpVo

    CARLOS TEVEZ CALLS " EL LOCO " ( MAD MAN ) MARCELO BIELSA THE BEST COACH ON THE PLANET..

    http://ajitvadakayil.blogspot.com/2011/09/tevez-mancini-fight-advise-to-soccer.html

    BIELSA SPOTTED THE TALENT OF CARLOS TEVEZ EARLY..

    GOLDEN BOOT WINNER TEVEZ, GAVE BIELSA AND ARGENTINA THE 2004 OLYMPICS SOCCER CUP.

    WATCH THIS SPACE..

    capt ajit vadakayil
    ..






Boom shack a lak to all the people that want

Women them a flex and the man them a chant

Got the Sixties style it have to comeback

Draw fe your bell-bottom, block heel and frock

Boom shack a lak, Rude Boy

You don't know sir

 

Wind your body, wriggle your belly

Dip and go down in a new style-ee

Wind and go up, wind and go down

Bobble and a rock to the new style around

Are you fe line it up

Are you fe wind it up

Do the Boom shack a lak till the dance hall full up

 

I say the Boom shack a lak it the brand new style

Wicked say it wicked, Jah Jah no say it wild

Raggamuffin style a fe the disciplined child

Dip and go down, like it a well versatile

You move fe your waist, move fe your back

Wind and go down do the shack a lak a lak

Get in on the groove cause you are the top notch

Bobble and a wind, gal right 'pon the

 

You fe wind you body, wriggle you belly

You dip and go down in a new style-ee

Wind and go up, wind and go down

Bobble and a rock to the new style around

Are you fe ram it up, are you fe jam it up

Do the Boom shack a lak till the dance hall full up

Me see the English gal a do the Boom shack a lak

The American gal a do the Boom shack a lak

Me see the Indian posse do the Boom shack a lak

And the Yardie gal a do the Boom shack a lak

Me see the Japanese them a do the Boom shack a lak

And the German gal a do the Boom shack a lak

 

You fe wind you body, wriggle you belly

You dip and go down in a new style-ee

Wind and go up, wind and go down

Bobble and a rock I got the new style around

Are you fe ram it up, are you fe jam it up

Do the Boom shack a lak till the dance hall full up

 

A fe wind your body, you wriggle your belly

You dip and go down in a new style-ee

Wind and go up, wind and go down

Bobble and a rock I got the new style around

Are you fe line it up, are you fe fine it up

Do the Boom shack a lak a till the dance hall full up

 

Put your hands in the air

Like you just don't care

Raggamuffin they bolt

So you better be aware

Not an assault

Everybody everywhere

A flex out, shake out

Can hear vibes in the air

A bobble and a wind, can a gal draw near

Everybody sing out when the DJ say

Wind your body, you wriggle your belly

You dip and go down in a new style-ee

Wind and go up, wind and go down

A bobble and a rock I got the new style around

Are you fe line it up

Are you fe grind it up

Do the Boom shack a lak a til the dance hall full



  1. https://www.sikhnet.com/news/brave-general-zorawar-singhs-conquest-ladakh-and-tibet

    SIKHISM WAS CREATED BY JEW ROTHSCHILD.. AND WE DONT CARE FOR ROTHSCHILDs HISTORY.

    TIBET WAS PART OF INDIA IN ANTIQUITY. IN MAHABHARATA WAR TIBET SUPPORTED KAURAVAS.. MOUNT KAILASH HAS ALWAYS BEEN PART OF INDIA..

    IN THE MAHABHATARA THE PANDAVAS , DRAUPADI AND A DOG PROCEED TOWARDS MOUNT KAILASH..

    SIKHS ARE SO PROUD OF MAHARAJA RANJIT SINGH, WHO WAS AN AGENT OF ROTHSCHILD..

    http://ajitvadakayil.blogspot.com/2013/02/maharaja-ranjit-singh-rise-and-fall-of.html

    SIKH HOLY BOOK GURU GRANTH SABIB WAS WRITTEN BY ROTHSCHILDs AGENT , A WHITE JEW WEARING SIKH TURBAN NAMED MAX ARTHUR MACAULIFFE..

    http://ajitvadakayil.blogspot.com/2013/07/unknown-history-of-sikhs-and-sikhism.html

    SIKHS WERE TRAITORS TILL INDIRA GANDHI BROKE THEIR SPINE..  SIKHS SUPPORTED THE WHITE INVADER IN 1857 AND 1942..

    ALL SIKH KINGS TILL 1947 WERE CRYPTO JEWS -- PESHAWARI KHATRI..

    ALL TEN SIKH GURUS AND THEIR WAVES WERE PUNJABI HINDU KHATRIS ( CRYPTO JEWS ). ALL KHALISTANI LEADERS WERE KHATRI JEWS..

    TODAY BOLLYWOOD IS PACKED WITH PESHWARI KHATRI JEW STAR KIDS -- THE PALE EYED KAPOOR TYPES..

    TODAY BOLLYWOOD IS PACKED WITH PASHTUN KHAN JEWS.. THEIR ANCESTORS WERE SECOND GRADE EXPORT OPIUM REJECT STREET RUNNERS FOR ROTHSCHILD..

    http://ajitvadakayil.blogspot.com/2020/06/sikhs-must-stop-moaning-about-1984.html

    IT IS NO WONDER THAT PAKISTANIS AND SIKHS MARCH TOGETHER IN ONE PROCESSION HOLDING PAKISTANI/ KHALISTANI FLAGS SHOUTING "INDIA TERRORIST"..

    JEW GANDHI RECRUITED SIKHS AND MAHARS IN LARGE NUMBERS TO FIGHT FOR ROTHSCHILD IN WW1 AND WW2..

    SIKHS WERE FOOLED BY ROTHSCHILD INTO REJECTING THEIR ELEVENTH GURU A HINDU NAMED BANDA BAHADUR ..

    WHEN ALL TEN SIKH GURUS DIED NAIVE SIKHS DID NOT OWN AN INCH OF LAND.. BANDA BAHADUR GAVE SIKHS A MIGHTY KINGDOM AND IT DID NOT SUIT ROTHSCHILD..

    HE DELETED BANDA BAHADUR FROM HISTORY AND CALLED THE HOLY BOOK GURU GRANTH SAHIB AS THE "LIVING GURU" --

    THIS BOOK CREATED BY ROTHSCHILD AS PACKED WITH DASA VERSES.. DASAS OF FAKE BHAKTI MOVEMENT NEVER EXISTED.

    WHAT IS THE MOST RIDICULOUS THING THIS PLANET HAS EVER SEEN?

    BRAVE BUT GULLIBLE SIKHS LED INTO WAR BY THE HOLY BOOK GURU GRANTH SAHIB HELD ON THE HEAD OF A CRYPTO JEW SIKH ..

    GERMAN JEW ROTHSCHILD CREATED HUNDREDS OF HUGE HARD BOUND BOOKS WITH GOLD PLATED COVERS.

    https://www.indiatimes.com/trending/human-interest/sikh-soldiers-marched-into-mesopotamia-during-wwi-with-guru-granth-sahib-leading-the-battalion-356491.html

    THIS BOOK WAS USED AS A LIVING ORACLE ( LIKE THE ORACLE AT DELHPI, GREECE ) TO PREDICT OF SIKHS WOULD WIN A TRENCH BATTLE.. LAKHS OF SIKHS HAPPILY DIED FOR THE HOLY BOOK IN WWI AND WW2..

    WHEN THIS BOOK WENT PAST ALL WHITE OFFICERS HAD TO GET UP AND SALUTE.. PUNISHMENT FOR NOT DOING WAS WHIPPING WITH A HORSE WHIP AND JAIL WITH LOSS OF PAY..

    THE INDIAN CAUSALITY OF WW1 WAS 1.24 LAKHS ( 124,000 ) , FIGHTING IN TRENCHES WITH SPEARS AND SWORDS WHILE THE COWARDLY THE MAN STOOD IN SAFE PLACES ..

    GANDHI RECRUITED 13 LAKH ( 1.3 MILLION ) INDIAN SOLDIERS IN THE FIRST WORLD WAR..

    THE INDIAN CAUSALITY OF WW2 WAS 4.18 LAKHS ( 418,000 ) .. FIGHTING IN THE MOST DANGEROUS PLACES WHILE THE COWARDLY WHITE MAN STOOD IN SAFE PLACES.

    GANDHI RECRUITED 25 LAKH ( 2.5 MILLION ) INDIAN SOLDIERS IN THE SECOND WORLD WAR.

    YOU SEE APOSTLE OF PEACE GANDHI WOULD RATHER HAVE INDIANS FIGHT FOR THE WHITE INVADER THAN BHARATMATA..

    WHO RECRUITED INDIAN SOLDIER FOR WW1 ?

    WHEN WW2 BROKE OUT GANDHIs SHIP FROM SOUTH AFRICA WAS HEADED UP THE THAMES RIVER.. GANDHI WOULD MEET ROTHSCHILD..

    WHO RECRUITED INDIAN SOLDIERS FOR WW2?

    GUJJU NO 1 JEW GANDHI ( APOSTLE OF PEACE ) AND BR AMBEDKAR , WHOSE NAMES ROTHSCHILD DARLING GUJJU NO 2 NARENDRA DAMODARDAS MODI BREATHES OUT EVERY SINGLE DAY .. TO WRANGLE A NOBEL PRIZE FOR HIMSELF..

    IN DUNKIRK HOLLYWOOD MOVIE , INDIANS ARE NOT SHOWN AT ALL..

    http://ajitvadakayil.blogspot.com/2017/07/dunkirk-christopher-nolan-2017-movie.html

    CONTINUED TO 2--


    1. CONTINUED FROM 1--

      IN THE WW1 DOCUMENTARY ABOUT GRUESOME TRENCH WARFARE .. NOT A SINGLE INDIAN WAS SHOWN.. I WANT MY READERS TO WATCH IT..

      https://en.wikipedia.org/wiki/They_Shall_Not_Grow_Old

      THE ROTHSCHILD PEER REVIEWED WAR HISTORIAN HID THE FACT THAT INDIAN SOLDIERS FOUGHT IN WW1 AND WW2.. CAPT AJIT VADAKAYIL EXHUMED THE TRUTH ..

      TODAY WIKIPEDIA ACCEPTS THIS TRUTH AND THIS IS THE NO 1 ACHIEVEMENT OF THIS BLOGSITE..

      GANDHI/ NEHRU/ PATEL NEVER DELIVERED FREEDOM TO INDIA IN 1947..

      THERE WAS A MILITARY REVOLT TRIGGERED BY THE INDIANS IN THE ROYAL NAVY IN 1946.. PRETTY SOON AIR FORCE AND ARMY JOINED IN.

      THESE BATTLE HARDENED SOLDIERS AFTER TWO WORLD WARS LOST RESPECT FOR COWARDLY WHITE SOLDIERS..

      http://ajitvadakayil.blogspot.com/2013/02/the-indian-navy-mutiny-of-1946-only-war.html

      ROTHSCHILD BRUTALLY SUPPRESSED THE REVOLT AS INDIAN POLICE WAS ON HIS SIDE..

      THEN CAME THE SUNK REVOLT BY THE MALABAR SPECIAL POLICE -- 800 KALARI EXPERTS , ALL MORE THAN SIX FEET TALL, CREATED TO CAPTURE ALIVE MALABAR MUSLIMS WHO KILLED SEVERAL WHITE WOMEN AND CHILDREN DURING THE MOPLAH REVOLT ..

      ROTHSCHILD KNEW HIS GAME WAS UP AND IMMEDIATELY ANNOUNCED THAT BRITAIN WOULD BE LEAVING INDIA IN AUGUST 1947..

      MALABAR SPECIAL POLICE WERE ALL RSS MEMBERS WHO DID SURYA NAMASKAR AT CALICUT MANANCHIRA MAIDAN.. MY FATHER WAS A SHAKHA LEADER WHOM GOLWALKAR KNEW PERSONALLY ..

      WHEN MY FATHER WAS IN HIGH SPIRITS HE WOULD SHOUT " KAIKE VAASTE KAIYYUM KAALUM"..

      GOLWALKAR HAD ONCE EXHORTED MY DAD.. "WHY DO YOU HAVE HANDS AND LEGS".. MEANING, GET PHYSICAL AGAINST THE WHITE INVADER , DONT BE NON-VIOLENT THE WAY GANDHI WANTS ..

      "ERANJI PAALAM IDINJU POLINJU KADALEKKU JAYENGA"

      MEANING-- YOU RSS SHOULD BE SO FULL OF ENERGY THAT WHEN YOU MARCH ON ERANJI PAALAM , THE BRIDGE SHOULD CRACK AND FALL INTO THE SEA..

      http://ajitvadakayil.blogspot.com/2012/08/rss-rashtriya-swayamsevak-sangh-brief.html

      WE WANT TRUE HISTORY TO BE TAUGHT IN OUR SCHOOLS..

      http://ajitvadakayil.blogspot.com/2020/01/the-father-of-our-nation-is-chanakya.html

      GANDHI WAS A PEDOPHILE.

      http://ajitvadakayil.blogspot.com/2019/08/kathiawari-jain-jew-gandhi-and-kayastha.html

      GANDHI CALLED OPIUM, AS INDIGO..

      http://ajitvadakayil.blogspot.com/2019/07/how-gandhi-converted-opium-to-indigo-in.html

      WE ARE KEEPING A COUNT AS TO HOW MANY TIMES MODI HAS UTTERED THE WORLD "GANDHI" SINCE HE SAT ON THE PM CHAIR.. THOUSANDS OF TIMES..

      BUT MODI HAS NEVER UTTERED THE WORD "METHANE" EVEN ONCE , THOUGH AKED MYCAT AJIT VADAKAYIL MORE THAN 500 TIMES.

      http://ajitvadakayil.blogspot.com/2020/07/pm-modi-ignored-dire-warning-of-capt.html

      MODI WORE A ROTHSCHILD SPONSORED SIKH TURBAN IN 1976.. ROTHSCHILD WANTED INDIRA GANDHI OUT-- WHO NATIONALIZED HIS BANKS..

      ROTHSCHILD WOULD USE SIKHS TO MURDER INDIRA GANDHI..

      TODAY MODI PRETENDS TO BE A GREAT DESH BHAKT..

      CHECK OUT WHAT MY READERS HAVE SAID IN THE POST BELOW-- AS TO WHO IS THE GREATER TRAITOR TO BHARATMATA MODI OR GANDHI..

      READ BOTH PARTS OF THE POST BELOW--

      http://ajitvadakayil.blogspot.com/2020/06/who-had-bled-bharatmata-more-gujju-no-1.html

      capt ajit vadakayil
      ..


TO BE CONTINUED 




CAPT AJIT VADAKAYIL

..

202 comments:

  1. https://www.amazon.in/dp/1649838298/ref=cm_sw_r_wa_awdb_imm_t1_3tKwFb990G6HA

    ReplyDelete
  2. Thank you soooooooooooooooo much Sri Ajit VADAKAYIL ji lot's of knowledge importe our mind ๐Ÿ™๐Ÿ™

    ReplyDelete

  3. https://ajitvadakayil.blogspot.com/2020/09/president-donald-trump-versus-joe-biden.html

    LESBIAN KAMALA HARRIS ( MALE HORMONES ) WAS MARRYING LESBIANS AT CITY HALLS..

    KAMALA HARRIS OFFICIATED AT THE WEDDING OF KRIS PERRY AND SANDY STIER, THE FIRST SAME-SEX WEDDING AFTER THE RULING, AND INSTRUCTED CLERKS TO MARRY SAME-SEX COUPLES SEEKING A LICENSE WITH “NO EXCEPTIONS.”

    CHECK OUT THE LOUD CHEERS.

    https://www.youtube.com/watch?v=XwEja24RALA

    LESBIAN KAMALA HARRIS ENSURED SHE HAS UNDERAGE LESBIANS IN HER VICINITY ALWAYS..

    https://www.them.us/story/kamala-harris-names-black-lesbian-chief-of-staff

    KAMALA HARRIS IS AN OPEN SOCIETY MEMBER OF GEORGE SOROS JUST LIKE HER COMMIE MOTHER FROM BEREKELEY UNIVERSITY.

    WATCH HER BELOW WITH ALEXANDER SOROS , SON OF JEW GEORGE SOROS AN AGENT OF JEW ROTHSCHILD ..

    SOROS IS RABIDLY ANTI-INDIA AND ANTI-HINDU. HE IS AN OPEN SUPPORTER OF JEW IMRAN KHAN THE PM OF PAKISTAN..

    https://m.facebook.com/Alexandersorospublic/photos/a.482314728597548/1659641070864902/?type=3&source=48

    ALEXANDER SOROS IS DEPUTY CHAIR OF THE OPEN SOCIETY FOUNDATIONS

    CHILDLESS PM MODI HAS DESTROYED INDIAN CULTURE AND OUR ANCIENT PRICELESS VALUES..

    ALREADY MODI HAS LEGALIZED ADULTERY/ RHEA CHAKRABORTY TYPE LIVE IN MARRIAGES/ HOMOSEXUALITY ETC.

    ALL THAT REMAINS BALANCE IS FOR CHILDLESS MODI TO CONDUCT GAY MARRIAGES LIKE KAMALA HARRIS .. HE WILL GET NOBEL PRIZE.

    CHILDLESS PM ATAL BIHARI VAJPAYEE WAS THE FIRST PM TO SPONSOR HOMOSEXUALITY OPENLY..

    WE KNOW WHY NOT A SINGLE RSS CHIEF HAS MARRIED TILL TODAY.. WE KNOW WHY THEY WANTED LOOSE AND EXTRA LARGE KHAKI SHORTS FOR THE CADRE..

    Capt ajit vadakayil
    ..

    ReplyDelete
    Replies
    1. PUT ABOVE COMMENT IN WEBSITES OF-
      TRUMP
      IVANKA
      MELANIA
      JARED KUSHNER

      DEBDOOT/ CHARISHA / MOHIT TAKE CARE OF THE 4 ABOVE

      ALSO SEND TO
      PMO
      PM MODI
      INDIAN AMBASSADOR TO USA
      MINISTER/ MINISTRY EXTERNAL AFFAIRS
      AJIT DOVAL
      RAW

      Delete
    2. Sent to trump.
      connect@mygov.nic.in
      narendramodi1234@gmail.com

      Delete
    3. Sent

      TRUMP
      MELANIA
      JARED KUSHNER

      INDIAN AMBASSADOR TO USA
      MINISTER/ MINISTRY EXTERNAL AFFAIRS
      NIA NIB
      PMOPG/E/2020/0885345

      Delete
  4. https://photogallery.indiatimes.com/sports/other-sports/these-pictures-of-dinesh-karthiks-wife-dipika-pallikal-prove-she-is-a-glam-queen/articleshow/71375847.cms?picid=71375918

    USUALLY CRICKETEERS MARRY SLUTS

    KARTHIK MARRIED A MALAYALI WOMAN, THE FITTEST WOMAN IN INDIA..

    https://en.wikipedia.org/wiki/Dipika_Pallikal_Karthik

    KARTHIKs SHIT LOOKING / CHEATING FIRST WIFE RAN AWAY AND MARRIED HIS TEAM MATE MURALI VIJAY..

    HE AINT COMPLAINING..

    https://www.youtube.com/watch?v=xcpRt6rYWvM

    https://www.youtube.com/watch?v=CeDxmj5R3RY

    ReplyDelete
    Replies
    1. An observation - Dinesh Karthik's first wife's surname is "Vanjara"

      Delete
  5. https://timesofindia.indiatimes.com/india/covid-19-a-warning-to-world-against-unsustainable-food-habits-javadekar/articleshow/78421137.cms

    GANDHIJI NEH CHARKHA GHUMAAKE GLOBAL WARMING SEH BACHCHAAYA..

    ReplyDelete
  6. Happy birthday Sir - in advance.

    Best wishes
    Avinash

    ReplyDelete
  7. Aadarniya Ajitsir pranaam

    Received acknowledgement regarding underwater methane clatherates

    Sir/Madam

    Respectfully forwarding the email* received through the Presidential Complaint Center (PCC) email address pcc@malacanang.gov.ph, for appropriate action, consistent with existing laws, rules and regulations on the matter, seeking intercession relative to issues and concerns which may be best addressed/coordinated by that Office.

    A reply direct to the party/ies concerned copy furnished the Center citing PCC Code No., will be highly appreciated. Expeditious action is requested in accordance with the provisions of Republic Act No. 11032, otherwise known as the Ease of Doing Business and Efficient Government Service Delivery Act of 2018.
    Thank you.

    PRESIDENTIAL COMPLAINT CENTER

    8736 8629 / 8736 8645 / 8736 8621

    PCC OFFICE HOURS
    Monday to Friday (except National Holidays and Work Suspensions)
    8:00am to 5:00 pm

    * OFFICIAL PCC TRANSMITTAL TO FOLLOW

    If you have any questions/comments/queries/suggestions, please email us at pcc@malacanang.gov.ph

    IMPORTANT:
    The information contained in the communication is privileged and confidential and intended solely for the use of the individual or entity to whom it is addressed and others authorized to receive it. If you are not the intended recipient, you must not disclose or use the information contained in it. If you have received this email in error, please notify us immediately by return email and delete the document. The Center is neither liable for the proper and complete transmission of the information nor for any delay in its receipt. The Center accepts no liability for any damage caused by this email or its attachments due to viruses, interference, interception, corruption or unauthorized access.

    ReplyDelete
  8. Gurunatha Namaskaram!
    Sneham Niranja Pirannal aashamsagal!
    I request your blessings in this divine day!

    Nanniyodu/Vinith

    ReplyDelete
  9. Hi Captain,

    Wishing you a happy birthday and a wonderful year!

    Rgds,

    ReplyDelete
  10. ๐ŸŽ† happy birthday capt ๐ŸŽ‰
    ๐Ÿฅ‚

    ReplyDelete
  11. Wishing you a very happy birthday Captain!!

    My God protect you...always.
    ๐Ÿฅณ๐Ÿฅณ๐Ÿฅณ๐ŸŒน๐ŸŒน๐ŸŒน๐Ÿ™๐Ÿ™๐Ÿ™

    ReplyDelete
  12. ♪แƒฆ♪*•.¸¸.•*¨¨*•.♪แƒฆ♪*•.¸¸.•*¨¨*•.♪แƒฆ♪
    ░H░A░P░P░Y░♪░B░I░R░T░H░D░A░Y░
    ♪แƒฆ♪*•.¸¸.•*¨¨*•.♪แƒฆ♪*•.¸¸.•*¨¨*•.♪แƒฆ♪

    Wishing Captain Ajitji - A very very very Happy Birthday.
    ------------------------------------------------------------------------

    Namaste Captain Ajitji,

    So today I am going to try something different.

    LIVE
    LIVE
    LIVE

    LIVE Birthday Celebrations starts at 11:00 PM today 1st Oct-2020.

    And wait for 00:00 hrs for the moment.
    Be on the live stream below without fail.

    https://youtu.be/R7n-RHLXLuk


    -----------------------------------------------
    Another Surprise

    We have seen so many AZ Quotes from captain. But now we will have our own source to see all our priceless quotes from Captain Ajitji.

    It will be AV Quotes. You know what AV means.

    Bookmark this link without fail.
    www.flickr.com/photos/185478574@N06/albums/72157716205689487

    ------------------------------------------------
    ▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
    ┊ ┊ ┊ ┊ ┊ ┊
    ┊ ┊ ┊ ┊ ˚✩ ⋆。˚ ✩
    ┊ ┊ ┊ ✫
    ┊ ┊ ︎✧
    ┊ ┊ ✯
    ┊ . ˚ ˚✩
    ┊ ┊ ┊ ┊ ┊ ┊
    ┊ ┊ ┊ ┊ ˚✩ ⋆。˚ ✩
    ┊ ┊ ┊ ✫
    ┊ ┊ ︎✧
    ┊ ┊ ✯
    ┊ . ˚ ˚✩
    ┊ ┊ ┊ ┊ ┊ ┊
    ┊ ┊ ┊ ┊ ˚✩ ⋆。˚ ✩
    ┊ ┊ ┊ ✫
    ┊ ┊ ︎✧
    ┊ ┊ ✯
    ┊ . ˚ ˚✩

    May our Captain receive all the blessings from the COSMOS.
    www.flickr.com/photos/185478574@N06/50403684791/in/album-72157716205689487/

    ReplyDelete
  13. A wish from the Heart,
    To the Eon of the times,
    Bright light in the night,
    Pearls of wisdom and hindsight,
    A soul’s immortal delight,
    As You mould and frame,
    Countless destinies forever and today,
    Wish You many galore Happy Returns of the Day.

    *HAPPY BIRTHDAY*
    *HAPPY BIRTHDAY*

    ReplyDelete
  14. Charan sparsh Captain
    Seeing Gujju No.1 propoganda on tv every hour on Capt. Vadakayil bday eve giving me headache and nausea. Feel like puking.
    Will have a beer to celebrate Capt. Vadakayil bday.

    ReplyDelete
  15. Dear Captain,
    Many happy returns of the day
    May you always continue to be blessed with divine grace, health, wealth and loving relationships.

    ReplyDelete
  16. Namaskar guruji, Advanced Birthday wishes. Awaiting for some block buster revelations from you. Our journey with you is really a great blessings. It is like "we have met you but have not seen you". I call it a virtual voyage with you where we get wisdom, jokes, shocks and many more. We as readers are grateful to you as you have chosen us to stay with us inspite of all ups and downs. Thanks to share the pics of your celebrations - Covid birthday celebrations. Love you always :-)

    ReplyDelete
  17. Happy birthday dear Captain Ajith Vadakayil sir.

    ReplyDelete
  18. Happy birthday Captain. All the best.

    Cheers
    Ravi
    KL

    ReplyDelete
  19. Dear beloved Captainji,

    Many many many more happy returns of the day, Sir. May God bless you with a long healthy life filled with lots of love, success, peace, prosperity etc.

    You are a shining light for many of us. Just the same, may God bestow His shining light upon you and protect you from danger and harm.

    Love you very much and have an amazing birthday, Sir.

    Regards,
    Bunga

    ReplyDelete
  20. Sir can you tell us how much time a soul takes to take a new body or get a new life

    ReplyDelete
  21. Priyapetta Ajit,

    Janmadhina ashamsakal nerunnu!

    Ennu

    Aneesh Somanath

    ReplyDelete
  22. Namaste Sir

    Wishing you a Blissful and Happy Birthday sir. I am grateful to God to have born in your times.

    With Gratitude
    HemaV

    ReplyDelete
  23. Dear Captain,

    Happy birthday

    Regards,
    Ajith.

    ReplyDelete
  24. Happy Birthday Captainji, may god bless you and your family. Ram Ram Ram

    ReplyDelete
  25. https://timesofindia.indiatimes.com/entertainment/hindi/bollywood/news/aamir-khan-i-was-not-chasing-success-somebody-up-there-loves-me/articleshow/78432260.cms

    TEE HEEEEEEE

    ReplyDelete
    Replies
    1. Offensive comment deleted
      Inbox

      The Times of India
      11:14 PM (21 minutes ago)
      to me

      Dear Reader,
      Thanks for posting a comment on our article!.

      We appreciate your engagement on our website. But we are sorry, we cannot publish your comment as the content is not compliant with our editorial policies. While we do encourage you to participate in conversations on the website, we request you to refrain from posting any obscene, defamatory, or inflammatory comments. We also request you not to indulge in any personal attacks, name calling or inciting hatred against any community through your comments. Also, please do not copy message from the article itself.
      Comment Removed: TEE HEEEEEEEE
      Best wishes,
      Team TOI

      ###############

      READERS

      PUT " TEEE HEEEEEEEEEEE " IN THE COMMENTS

      LET TOILET PAPER DELETE ALL OF THEM..

      Delete
    2. Sir sir sir..

      Janam Din ki vadhaiyaan sir..

      You have been the light guiding me and many more.. Glad and grateful. Forever to have found you..

      May we reach the end of darkness and the start and enjoyment of thr light.. The Satiyuga together..
      May I and many forgotten wronged souls do good karma and be lead towards being good.. For strength.. And honour.. For DHARMA for BHA RA TA

      I love you sir.. U r the only true guru (living) I feel I have.. Or even amongst thr so called dead greats...

      Always there were for you.. And who knows.. Might even meet u..

      Delete
  26. Just was about to upvote Mohit's comment on Quora and add comment, realised that quora has banned me ..... earlier they had just restricted me to read mode ..... i think they have their own pro india, pro hindu database

    ReplyDelete
  27. Wish you a very happy birthday Captainji ๐Ÿ™๐Ÿ™๐Ÿ™

    ReplyDelete
  28. Pranaam Gurudev

    Many Happy Returns Of The Day๐ŸŽˆ๐ŸŽˆ๐ŸŽˆ

    A Small Gift For The Real Father Of The Nation

    https://drive.google.com/file/d/1eqaibbesYrSJSJK_SmnoNtp1tzqX3L4l/view?usp=drivesdk

    Thanks & Regards
    Debdoot Sarkar

    ReplyDelete
  29. Namaste ๐Ÿ™๐Ÿป

    Happy birthday Captian Ajit Vadakayil

    Pranaam ๐Ÿ™๐Ÿป

    ReplyDelete
  30. https://timesofindia.indiatimes.com/entertainment/hindi/bollywood/news/aamir-khan-i-was-not-chasing-success-somebody-up-there-loves-me/articleshow/78432260.cms

    THE CRYING BOLLYWOOD SUPERSTAR WHO DANCES WITH THE ENEMY ( PAKISTAN/ TURKEY/ CHINA ) I CALLED FOR BENNET UNIVERSITY CONVOCATION? WHY?

    MODI , ON WHO FACE THIS FELLOW HAS SPAT ON REGULARLY, THANKED HIM PROFUSELY WHEN HE WISHED HIM HAPPY BIRTHDAY.

    BENNET UNIVERSITY WAS FOUNDED BY DESH DROHI MIDGET VINEET JAIN WHO IS ALSO THE CHANCELLOR . THIS UNIVERSITY CHURNS OUT TRAITORS.

    capt ajit vadakayil
    ..



    ReplyDelete
    Replies
    1. PUT ABOVE COMMENT IN WEBSITES OF--
      EDUCATION MINISTRY CENTRAL/ STATES
      QANON
      ALL MAJOR INDIAN MEDIA
      EXTERNAL AFFAIRS MINISTER/ MINISTRY
      PMO
      PM MODI
      EXTERNAL AFFAIRS MINISTER/ MINISTRY
      AMIT SHAH
      HOME MINISTRY CENTRE/ STATES
      CJI BOBDE
      ATTORNEY GENERAL
      LAW MINISTER PRASAD / MINISTRY CENTRE AND STATES
      ALL CHIEF JUSTICES HIGH COURTS
      I&B MINISTER / MINISTRY
      NSA
      AJIT DOVAL
      RAW
      IB
      CBI
      NIA
      ED
      ALL DGPs OF INDIA
      ALL IGs OF INDIA
      ALL 3 ARMED FORCE CHIEF
      CDS
      DEFENCE MINISTER/ MINISTRY
      HEALTH MINISTER MINISTRY CENTRE AND STATES
      ALL CMs OF INDIA
      ALL MLAs OF INDIA
      ALL MPs OF INDIA
      ALL COLLECTORS OF MAJOR CITIES
      ALL STATE GOVERNORS
      PRESIDENT OF INDIA
      VP OF INDIA
      SPEAKER LOK SABHA
      SPEAKER RAJYA SABHA
      ALL INDIAN THINK TANKS
      NITI AYOG
      AMITABH KANT
      MOHANDAS PAI
      RAJEEV CHANDRASHEKHAR
      GITA GOPINATH
      SAUMYA SWAMINATHAN
      E SREEDHARAN
      WILLIAM DALRYMPLE
      KONRAED ELST
      FRANCOIS GAUTIER
      STEPHEN KNAPP
      DAVID FRAWLEY
      GVL NARASIMHA RAO
      SAMBIT PATRA
      ASHOK PANDIT
      ANUPAM KHER
      KANGANA RANAUT
      VIVEK AGNIHOTRI
      MEENAKSHI LEKHI
      SMRITI IRANI
      PRASOON JOSHI
      SWAPAN DASGUPTA
      MADHU KISHWAR
      SUDHIR CHAUDHARY
      GEN GD BAKSHI
      RSN SINGH
      SUDHANSHU TRIVEDI
      TEJASVI SURYA
      ARNAB GOSWAMI
      NAVIKA KUMAR
      ANAND NARASIMHAN
      RAHUL SHIVSHANKAR
      VINEET JAIN
      Dr. Raghunath K. Shevgaonkar
      Col. Guljit Singh Chadha
      Sudhanshu Varma
      M. Sridhar Acharyulu
      Prof. Sunil Saxena
      SWAMY
      RAJIV MALHOTRA
      P GURUS
      RSS
      AVBP
      VHP
      MOHAN BHAGWAT
      NALIN KOHLI.
      RAJ THACKREY
      CHANDAN MITRA
      SADGURU JAGGI VASUDEV
      BABA RAMDEV
      SRI SRI RAVISHANKAR
      CHETAN BHAGAT

      Delete
    2. Sent to

      PMO CM's DGP's BJP Speakers Health Minister BJP President Law Minister Amitabh Kant, HRD Minister, I&B Minister

      vineet.jain@timesgroup.com
      Subramanian Swamy • swamy39@gmail.com
      si@pgurus.com
      rajthackeray@gmail.com
      17akbarroad@gmail.com
      eam@mea.gov.in
      arnab@republicworld.com
      rajeev.c@sansad.nic.in
      ed-del-rev@nic.in
      info.nia@gov.in
      information@cbi.gov.in
      webmaster.indianarmy@nic.in
      PRO IAF • proiaf.dprmod@nic.in
      pronavy.dprmod@nic.in

      PMOPG/E/2020/0885633 MINHA/E/2020/12532
      DEPOJ/E/2020/05189 MOIAB/E/2020/03516
      DPLNG/E/2020/02546 DSEHE/E/2020/05468
      MOSJE/E/2020/03007 DCLTR/E/2020/01241
      MOMAF/E/2020/01182 DOWCD/E/2020/04245
      DMAFF/E/2020/01630 MODEF/E/2020/03886
      LGVED/E/2020/01335 MINPA/E/2020/01712

      Delete
    3. Sent

      minister.hrd@gov.in,
      mos-mhrd@gov.in,
      madhu.ranjan@gov.in,
      maneesh.garg@nic.in
      nishankramesh@gmail.com,
      eam@mea.gov.in,
      CONTACT@amitshah.co.in,
      jscpg-mha@nic.in,
      info.nia@gov.in,
      ed-del-rev@nic.in
      amitabh.kant@nic.in,
      vch-niti@gov.in,
      Narendramodi1234@gmail.com
      All CMs
      Indian Media
      Tarek.Fatah@gmail.com,
      soumya.s@nic.in,
      doctorsoumya@yahoo.com,
      gopinath@fas.harvard.edu,
      rajeev@rajeev.in,
      vedicinstitute@gmail.com,
      fgautier26@gmail.com,
      sambitpatrabjp@gmail.com,
      infinity.foundation.india@gmail.com

      Delete
    4. Namaste Captain,

      Sent above message as mail to

      narendramodi1234@gmail.com
      contact@amitshah.co.in
      eam@mea.gov.in
      prakash.j@sansad.nic.in
      presidentofindia@rb.nic.in
      vpindia@nic.in
      drhrshvardhan@gmail.com
      amitabh.kant@nic.in
      swami39@gmail.com
      Kohli_nalin@yahoo.com
      info.nia@gov.in
      information@cbi.gov.in
      editoral@thewire.in
      editor@swarajyamag.com
      38ashokroad@gmail.com
      chiefminister@kerala.gov.in
      chiefminister@karnataka.gov.in
      cmdelhi@nic.in
      cm@maharashtra.gov.in
      cmo@punjab.gov.in
      cm.goa@nic.in
      cm@telangana.gov.in
      cm_nagaland@yahoo.com
      cmguj@gujarat.gov.in
      cm-hp@nic.in
      cm-skm@hub.nic.in
      cm-ua@nic.in
      cmodisha@nic.in
      cmoffice-arn@gov.in
      cm@ap.gov.in
      cmharyana@nic.in
      cmrajasthan@nic.in
      cmcg@nic.in
      cm@mizoram.gov.in
      tjr.sangma@nic.in
      cm@assam.gov.in
      yogiadityanath72@gmail.com
      cm-secretariat-bih@gov.in
      dit-mn@nic.in
      cm.pon@nic.in
      cmo-trp@hub.nic.in
      piyushgoyalofficial@gmail.com
      sambitpatrabjp@gmail.com
      madhukishwar@manushi-india.org
      info@vhp.org
      editor@opindia.com
      bjphqo@gmail.com


      Thanks and regards,
      Hemanth

      Delete
  31. Pranaam Captain,

    Wish you a very Happy Birthday.
    May God give you strength and happiness always.


    Respectfully,
    Rohit.

    ReplyDelete
  32. Dear Captain

    เดœเดจ്เดฎเดฆിเดจാเดถംเดธเด•เตพ๐Ÿ™๐Ÿป


    With Respect
    K

    ReplyDelete
  33. Shraddheya Shri Gurudev

    A Very Happy Birthday to you gurudev , may the Brahman shower you with all power and might and success.

    Shraddha , Strength and Honor Always

    Pranam

    ReplyDelete
  34. Dear Captain , Wish you a very happy birthday . A zillion thank you is not enough for all the tireless work. Have a great year ahead .

    ReplyDelete
  35. https://twitter.com/Ravinder536R/status/1311432052453986305

    ReplyDelete
  36. Pranam Guru Ji

    Wishing You A Blessed Happy Birthday, May God Bless You With Long Healthy Life With Love and Peace Forever. I Bow and Touch Feet.
    With Love

    ReplyDelete
  37. Happy Birthday Captain SIr:)) _/\_

    ReplyDelete
  38. Many many Hammy Returns of the Day, Happy Birthday Guruji!

    ReplyDelete
  39. Wishing you a very happy birthday to our one and only Captain!
    Pray to God for your good health and happiness!!


    Hope rather wish to see you in person some day!!

    Blessed to have discovered a gem like you and of course this blogsite!!
    You Rock ๐Ÿค˜๐Ÿค˜!!! Long live Captain

    With gratitude and love ๐Ÿ™

    Harsh



    ReplyDelete
  40. Dear Ajit Sir,
    Its not just on 2nd October but an everyday wish for you to remain healthy, remain happy & remain safe.
    I'm very lucky to have come across you, no one told me but my fate got me to you.
    A very Happy birthday to you & lots of happiness to your family members.
    I only know that 2nd October is a special day bcoz it's your Birthday.
    That's all.
    Let Bhagwaan Shri Jagannatha,Bhagwaan Shri Narasimha always protect you & your family members.

    ReplyDelete
  41. Dearest Sir,
    Happy Birthday to you Guruji!!
    Wishing you another fantabulous year filled with all the things and memories that your heart would cherish!!
    May God bless you and your family with health, happiness,peace and prosperity always!!
    More power to you sir ๐Ÿ‘๐Ÿ‘๐Ÿ‘
    Tons of Love and best wishes to you and your family ❤️❤️❤️!!
    Captainji ki jai !!๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿ™๐Ÿ™๐Ÿ™๐Ÿ’๐ŸŽ‚๐ŸŽŠ๐ŸŽŠ๐ŸŽŠ

    ReplyDelete
  42. Happy birthday Guruji, may good bless you with all the happiness and a long and healthy life

    ReplyDelete
  43. A very HAPPY BIRTHDAY CAPTAIN! LOVE YOU..

    ReplyDelete
  44. Dear Sir,
    Wishing you a very happy birthday. You have brought eternal light in the beings on this planet. I pray to God for your health and happiness.
    May God bless you with all you need.

    Best wishes

    ReplyDelete
  45. Hi Sir,

    Many happy returns of the day

    Thanks,
    Srini

    ReplyDelete
  46. Dear Captain,

    We wish you a very happy birthday.

    When I told my wife today is your birthday, my 2.5 yr old daughter started uttering 'happy birthday, happy birthday'. You had blessed her as srestham putri when I had shared the news of her birth.

    Best wishes,

    Suman

    ReplyDelete
  47. Wish you a Happy Birthday. May God bless you Sir.

    ReplyDelete
  48. Wishing a you very happy birthday, Captain. I can't express how grateful I am to for your blogs. More I read your blogs, more I move away from darkness and into light. Thank you.

    ReplyDelete
  49. My Dear Captain,
    Wish you a Great and Happy Birthday..! Hope you enjoy this fullest with your family and loved ones..3 Cheers for our beloved Captain Sir. The true Son of modern day Bharath. Pranams.

    ReplyDelete
  50. Happy Birthday Captain.
    May God bless you with divine light, divine love and divine will.
    May your silent revolution reach to the every house, every individual.
    May you attain moksha.

    ReplyDelete
  51. Namaskaram Captain,

    Wish you a very Joyous Happy Day๐Ÿ™
    Have a nice time with your family n friends.

    Maybe we can celebrate your birthday with a good beer!๐Ÿป

    You have transformed us mentally, physically n spiritually!
    You have enhanced our perception!
    Cleared our clouded minds!
    Your presence is no coincidence, it's due to our virtues of past life!

    We are eternally grateful for your love towards humanity, which has caused the silent revolution for human awakening!

    We request you to take care of your health. You are our guiding light, which we resort to at the times of our darkness.

    Please do ignore n pay no heed to criticisms, they are real ignorants, digging their own pits. You are too grand n great to even acknowledge such petty matters. We apologise for their ignorance.

    Wish you a wonderful birthday ๐Ÿ’Ÿ☀️๐ŸŒป๐ŸŒบ๐ŸŒน๐Ÿป๐Ÿ™

    Gratitude,
    Manoj Kumar

    ReplyDelete
  52. Happy Birthday Captain.

    There may have been many Vishnu Avtars, many Maharishis. But there can never be another Capt Vadakayil.
    God bless you Sir.

    ReplyDelete
  53. Happy Birthday guru ji๐Ÿ™๐Ÿ™๐Ÿ™

    Wish I wud like to touch your feet once


    Mandar

    ReplyDelete
  54. A Very Happy Birthday to the Worlds Greatest (Living) Legend. May God Shower All His Blessings on You

    ReplyDelete
  55. Many Many Happy Returns Of The Day Captain Sir
    Aap jeeyo hazaro saal...
    May you and your family live a very happy and healthy life by the grace of God Almighty...

    ReplyDelete
  56. Dear Captain Sir Pranamam.

    Wishing you A Happy Birthday.

    Seeking your and Amma blessings on this great day. Thank you Maharishi for being the Guiding light.
    Praying for your Good Health and Happiness.Namaste.

    Dedicate this beautiful Sanskrit song to you.

    https://m.youtube.com/watch?v=2HEfbridQaY

    With Gratitude

    RVK

    ReplyDelete
  57. Pranam Capt. ||เฅ เคจเคฎः เคถिเคตाเคฏ||
    Happy Birthday!
    Grateful for your guidance and time. Thank you!
    Regards, OM

    ReplyDelete
  58. Pranam Capt. ||เฅ เคจเคฎः เคถिเคตाเคฏ||
    Happy Birthday!
    Grateful for your guidance and time. Thank you!
    Regards, OM

    ReplyDelete
  59. Namaste

    Wish you a very happy birthday, sir! May you be hale and hearty, in the pink of health for many many years to come _/\_

    ReplyDelete
  60. Pranaam guruji,
    Happy birthday guruji,It's been a infinite honour that I came across your blogs which are the infinite source of wisdom.May god bless you with infinite source of pure energy.
    With Shraddha.

    ReplyDelete
  61. https://www.youtube.com/watch?v=R7n-RHLXLuk&feature=youtu.be

    ReplyDelete
  62. Pranam Capt. ||เฅ เคจเคฎः เคถिเคตाเคฏ||
    Happy Birthday!
    Grateful for your guidance and time. Thank you!
    Regards, OM

    ReplyDelete
  63. Dear Captain Ajit Vadakayil ji,

    Wish You a Very Happy Birthday.

    You are Gift of our Destiny, Born to Guide us to understand Truth about our Sanatana Dharma and History of the world. We, as members of your Readers' Family are greatful to Your entire Family.

    Please continue to guide us to fulfil the Goal of your silent revolution in the days to come.

    https://twitter.com/JeevaJagat_108/status/1311745888776192001?s=19

    With Gratitude & Regards

    Prakash Kulkarni

    ReplyDelete
  64. This comment has been removed by the author.

    ReplyDelete
  65. Wish you a very happy birthday Captainji.

    ReplyDelete
  66. Namaste Master Ji,

    Wishing you a fantabulous birthday all year , My prayers to God to bless you all throughout your life with everlasting grace and blessings to you and your family.

    Namaskaram to Master Ji

    ReplyDelete
  67. Happy Birthday Captain ji.

    Regards,
    Sanjay Poola

    ReplyDelete
  68. Pranaam Guruji,
    Wish You Many More Happy Returns Of The Day. ๐Ÿ™

    ReplyDelete
  69. Happy birthday sir!!! Love and respect to you!!
    Jai shri krishna!!

    ReplyDelete
  70. Happy Birthday Captain Sir!!!

    ReplyDelete
  71. Happy birthday Ajit Sir. Charan Sparsh ๐Ÿ™

    ReplyDelete
  72. Wishing you a Very Happy Birthday Captain

    May God give you long long healthy life.

    Have a great time with your loving friends and family

    God Bless

    Om Namaha Shivaya... Love you Captain

    ReplyDelete
  73. Many many more happy returns of the day dear captain..๐Ÿ™

    ReplyDelete
  74. Happy Birthday Captain May God Bless You
    May Lord Bless You

    ReplyDelete
  75. To,

    Highly respected captain Ajit Vadakayil sir ji.

    Cheers to another year of making your students the smartest people on Earth! I genuinely believe that you are the best teacher in the whole world. May your wisdom help everyone you meet.

    I’m so glad I was lucky enough to have you as my teacher. I appreciate the knowledge and wisdom you shared with me more than you know. May your amazing experience inspire others to do great things with their lives.

    Many congratulations to you on your birthday aye captain sir ji.

    Hariom...
    Nishant Goyal and family.

    ReplyDelete
  76. Wishing you a very happy birthday Captain!

    May bhagawan bless you and your family!

    ReplyDelete
  77. Happy birthday Captain. || เคœीเคตेเคค् เคถเคฐเคฆः เคถเคคเคฎ् ||
    Regards
    Amrita

    ReplyDelete
  78. Many More Happy Returns of the Day Captain Sir. Wishing you the best.
    With Gratitude and Pranaams
    Kumar

    ReplyDelete
  79. Namaste Captain,I will ensure that I follow your teachings and wisdom for protecting Sanatan Dharma and Bharat Mata.

    Wish you many many happy returns of the day!

    ReplyDelete
  80. Captainji, please resume Sanatana Dharma blog, hum Hinduo ki raksha Karee, we will align and fight the evil forces. OM TAT SAT

    ReplyDelete
  81. Happy birthday captain sir, Today is a guru poornima for we all.

    ReplyDelete
  82. Wish You A Very Very Happy Birthday Sir

    ReplyDelete
  83. Many many happy returns of the day.
    Happy birthday

    ReplyDelete
  84. Happy Birthday Sir !!!!! What does one ask for a man who is one with the universe/brahman ..... We are blessed to have you as our guru ..... Have an amazing day !!!!!

    ReplyDelete
  85. Many many happy returns of the day guruji. Have a blast ๐Ÿฌ๐Ÿญ๐ŸŽ‚๐Ÿฅž๐Ÿจ๐Ÿ’ช๐Ÿป๐ŸŽ‰๐ŸŽŠ

    ReplyDelete
  86. Dear Captain,
    Many many happy returns of the day!!!

    You’re the Lord of truth seekers of this planet. Had you not spoken, the truths would have remained buried for longer.
    The more I learn from you the more I find myself thinking - “ It is no measure of health to be well adjusted to this profoundly sick society. In a time of universal deceit, telling the truth is a revolutionary act.”

    Ever grateful
    Anish.

    ReplyDelete
  87. Dear Captain Ajit Vadakayil ji
    Sir.. wish you a very happy birthday.. full of love and happiness..
    Thank you
    Regards and Gratitude
    Sameer agarwal

    ReplyDelete
  88. Dear Captain,

    It was indeed a great blessing to experience your online presence on Mohit's live session today.

    Best wishes on your special day! May you be bestowed with good health and cheer always!! More power to your silent revolution!

    You're the only true guiding light during these dark and difficult times.

    With gratitude and respects,

    - Srinath


    ReplyDelete
  89. Hi captain
    A very very happy birthday to you..

    ReplyDelete
  90. Namaste Captain,

    ๐Ÿ™๐Ÿ™

    Wish you happy birthday ..
    Wish you many many happy returns of the day..

    May the Hindu Gods, Hindu Goddesses, ParamaPurusha , Prakriti , Brahmaan , Brahma Saraswathi, Vishnu Lakshmi, Eshwara Parvati Subramanya Ganapati shower you with blessings, good health, happiness, prosperity, long life ..

    Regards,
    Hemanth Kumar Bhongole

    ReplyDelete
  91. Happy birthday Captain ji. Mahadev bless wuth you good health, Maa saraswati bless you with all knowledge to make Bharat great again.

    ReplyDelete
  92. http://ajitvadakayil.blogspot.in/2010/05/lascar-original-indian-merchant-navy.html- Sir you're this post is not opening... It's saying "This site can't be reached" Don't know why sir... Google is after this.... How can we get this post back sir??

    ReplyDelete
  93. http://ajitvadakayil.blogspot.in/2010/05/lascar-original-indian-merchant-navy.html - Sir you're this post is not opening... Google is after this...when i tried to open the link it's saying-'This site can't be reached'.. Sir what can we do to bring this post back....

    ReplyDelete
  94. Happy Birthday Captain Sir... wish you a long, happy, healthy and more successful life ahead.
    _/\_
    Regards
    Anukul

    ReplyDelete
  95. Wish all the best wishes for your birthday Captain!

    ReplyDelete
  96. Shubh prabhatam Guru jee
    Janam din ki shubham kamna ishwar aap ko sab kuch de
    Rajesh

    ReplyDelete
  97. Wish you many many returns of the day Captain. Janam din ki hardik shubhkamanay. May god bless you and your family.

    ReplyDelete
  98. Dear Guruji,

    A very happy birthday to you. May God bless you and your family all the time. You are an one time phenomenon never before ever after & let all your wishes come true. The greatest person with a largest heart & a never give up spirit. I just hope all your readers to get at least 1% of your strength & courage Which will make this planet a better place for all Our future generations.

    Hari Om!

    Om namah Shivaya!

    "Bharat maata ki jai"

    Thanks & regards
    Prashanth

    ReplyDelete
  99. Pranam Ajit uncle _/\_

    Happy birthday uncle.. may God bless you with good health, prosperity and give u more strength to serve sanatana Dharma.

    With love & gratitude
    Jeet

    ReplyDelete
  100. Dear Captain,

    Greetings,
    Wishing you a very happy and wonderful birthday..
    Your contribution to our generation is priceless and immeasurable.
    With sincere gratitude for all your efforts in leading the silent revolution.

    Seeking blessings from the Almighty for you and your family..for a blissful life.

    Work has taken a toll on me, on the verge of burnout....and I'm unable to contribute, participate in the mailer campaigns in the last couple of months...My sincere apologies..

    Will be back soon to actively participate.

    Sincere gratitude,
    Grace & Peace,
    JTA

    ReplyDelete
  101. Pranam Ajit uncle _/\_

    Happy birthday uncle.. may God bless you with good health, prosperity and give u more strength to serve sanatana Dharma.

    With love & gratitude
    Jeet

    ReplyDelete
  102. Dear Captain,

    Wish you a very HAPPY BIRTHDAY !!

    Regards

    ReplyDelete
  103. Dear Captain,

    Greetings,
    Wishing you a very happy and wonderful birthday, Health, peace and prosperity.

    Your contribution to our generation is priceless and immeasurable.
    With sincere gratitude for all your efforts in leading the silent revolution.

    Seeking blessings from the Almighty for you and your family..for a blissful life.

    Work has taken a toll on me, on the verge of burnout....and I'm unable to contribute, participate in the mailer campaigns in the last couple of months...My sincere apologies..

    Will be back soon to actively participate.

    Sincere gratitude,
    Grace & Peace,
    JTA

    ReplyDelete
  104. Dear Captain,

    Greetings,
    Wishing you a very happy and wonderful birthday, Health, peace and prosperity.

    Your contribution to our generation is priceless and immeasurable.
    With sincere gratitude for all your efforts in leading the silent revolution.

    Seeking blessings from the Almighty for you and your family..for a blissful life.

    Work has taken a toll on me, on the verge of burnout....and I'm unable to contribute, participate in the mailer campaigns in the last couple of months...My sincere apologies..

    Will be back soon to actively participate.

    Sincere gratitude,
    Grace & Peace,
    JTA

    ReplyDelete
  105. Many many happy returns of the day sir.god bless.#HBDCAPTVADAKAYIL

    ReplyDelete
  106. Wishing you a very happy birthday Captain. May God grant you abundance on all front. May you lead us all on the path of Dharma with greater and greater enthusiasm.

    Heartfelt gratitude and Pranaams,
    Prapulla

    ReplyDelete
  107. Wish You a very Happy birthday Ajit Sir
    With Regards
    Sarada

    ReplyDelete
  108. happy birthday dear captain. as readers, its some good karma of our past lives, we all got connected to you through this blog spot. we are indebted to everything you gave us.

    ReplyDelete
  109. Happy birthday Captain sahab.may u live healthy and happily .what u have given to me,i can't repay it.right now i can just bow down for your endless sacrifices.love u sir

    ReplyDelete
  110. Happy Birthday Sirji. God bless you

    ReplyDelete
  111. ALL READERS

    GOOGLE HAS SCREWED ME BY NOT ALLOWING ANY BLOG POSTS ENDING WITH " DOT.IN " TO OPEN..

    TO OPEN THE POST SUBSTITUTE " IN " WITH " COM "..

    ReplyDelete
    Replies
    1. This is an old news, published in the month of july

      Google’s ownership over domain blogspot.in has expired

      https://www.indiatoday.in/technology/news/story/google-loses-ownership-over-blogspot-in-users-face-issues-accessing-their-blogs-1698430-2020-07-08

      Delete
    2. Google is afraid of you sir...

      Delete
  112. Wish you happy Birthday Sir.

    ReplyDelete
  113. Happy Birthday Guruji. Wishing you love and Bliss on your Birthday.
    Pranam with deepest gratitude for liberating us from the ignorance

    ReplyDelete
  114. Wishing you a very happy Birthday, prosperous and healthy life you Guruji ๐Ÿ’๐Ÿ’.

    ReplyDelete
  115. Happy Birthday Captain sir ๐Ÿ˜Š

    ReplyDelete
  116. https://timesofindia.indiatimes.com/entertainment/hindi/bollywood/news/have-fun-be-sensitive-aamir-khan-gives-a-virtual-send-off-to-bennett-universitys-batch-of-2020/articleshow/78434996.cms

    ENTER YOUR POINT OF VIEW IN THE COMMENTS COLUMN.. DARLING OF PAKISTAN/ CHINA/ TURKEY..

    ReplyDelete
  117. Manyy happy returns of the day captain saab
    thanks for being the in our life

    ReplyDelete
  118. Happy Birthday Sir...Stay Blessed!

    ReplyDelete
  119. Dear Captain,
    Warm greetings on your Birthday. More power to you!!
    Regards

    ReplyDelete
  120. Dear captain,

    Wish you a very happy birthday๐ŸŽ‚๐ŸŽ‰๐ŸŽ and a healthy long life.

    Regards
    Harish

    ReplyDelete
  121. Dear Reader,
    Thanks for posting a comment on our article!.

    We appreciate your engagement on our website. But we are sorry, we cannot publish your comment as the content is not compliant with our editorial policies. While we do encourage you to participate in conversations on the website, we request you to refrain from posting any obscene, defamatory, or inflammatory comments. We also request you not to indulge in any personal attacks, name calling or inciting hatred against any community through your comments. Also, please do not copy message from the article itself.
    Comment Removed: TEE HEEEEEEEE
    Best wishes,
    Team TOI

    sir this reply , i wonder kaunsi language yeh gali hai

    ReplyDelete
  122. Many many happy returns of the day Captain. Keep guiding us.

    With gratitude,
    Basavaraj

    ReplyDelete
  123. A very Happy birthday to you Captain. :) May you find infinite strength and health and happiness,We wish well for all your family too, may prosperity never leave your side. have a blast and a great day!

    ReplyDelete
  124. Dear Captain,

    A very very happy birthday to you.

    ReplyDelete
  125. Happy Birthday Captain ๐Ÿ™ God bless you

    ReplyDelete
  126. Birth Day Wishes for the Light from Sathya Lokha to this young Earth- Bhoo Lokha. Keep travelling infinite. With Gratitude.

    ReplyDelete
  127. Happy Bday GS
    Janak din ki bahut bahut shubhkamnayien
    Keep shining
    ๐Ÿ™๐Ÿผ๐Ÿ™๐Ÿผ

    ReplyDelete
  128. Pranam guruji
    Happy birthday sir....

    ReplyDelete
  129. Captain sir , Happy Birthday. Wish you good health and long life.

    Mohit Prajapati.

    ReplyDelete
  130. Captain ji, about 8 years ago I started reading your blog what an eye opener it was redefined my life and many others. Many many happy returns of the day sir.

    ReplyDelete
  131. Dear Captain,

    Wishing you - Many Happy Returns of the day.

    Best

    ReplyDelete
  132. Happy Birthday CaptainSir! rekha

    ReplyDelete
  133. Wishing you a very happy birthday to our one and only Captain!
    Pray to God for your and for your family good health and happiness!!



    Blessed to have discovered a gem like you and of course this blogsite!!
    You Rock ๐Ÿค˜๐Ÿค˜!!! Long live Captain

    With gratitude and love ๐Ÿ™

    Kapil Rawat

    ReplyDelete
  134. Happy birthday Capt. Ajit Vadakayil! You have converted an average 18 year old into a thinker! I'm so grateful to the higher forces in my life that I came across your blogs a few months back and not got trapped in the chakravyuh of doing useless things like the current generation teen youth. I have started posting your images of quotes and your blog links on my whatsapp status to share your wisdom among my contacts.

    ReplyDelete
  135. Dear Ajitji,

    Wish you a Very Happy Birthday Captain. Wish you a happy and healthy life ahead.

    Thanks and Regards,

    ReplyDelete
  136. Namasthe Captain!! Here's wishing you Happy Birthday!! Many Happy Returns of the Day!! May you be blessed with increased health, strength, grace, bliss and peace!!!

    ReplyDelete
  137. Wishing KARMA YOGI a very happy birthday.you are a blessing to this planet.May brahman shower his blessings on you and your blood line till sun goes supernova.

    ReplyDelete
  138. Happy birthday captain,
    Wish you a happy, healthy & enlightening long life.
    Sudhir

    ReplyDelete
  139. Hearty Wishes on your Birthday!
    Warm regards & gratitude
    Pranam,
    Himanshu

    ReplyDelete
  140. Happy birthday sir
    Everyday i wonder that such a man exists amidst us.
    May your efforts to awaken the sleeping population bear fruit

    ReplyDelete
  141. Happy Birthday Captain, may your genetics survive till the sun goes supernova.

    ReplyDelete
  142. Many happy returns of the day happy birthday Capt. Ajit Vadakayil, Stay blessed forever....

    ReplyDelete
  143. Happy Birthday captain sir
    Warm regards and gratitude_∆_

    ReplyDelete
  144. https://timesofindia.indiatimes.com/business/international-business/us-judge-blocks-donald-trumps-h-1b-visa-ban/articleshow/78439710.cms

    THIS JEWISH DEEP STATE PAYROLL JUDGE , COMMIE JEFFREY WHITE HAS NO SUCH POWERS..

    JEFFREY WHITE SHOULD HAVE BEEN SACKED AND JAILED LONG AGO..

    https://www.nytimes.com/2007/04/01/health/01iht-warm.1.5099290.html

    DONALD TRUMP, DO NOT ALLOW BERKELEY COMMIE US JUDGES TO PLAY GOD..

    https://ajitvadakayil.blogspot.com/2020/09/president-donald-trump-versus-joe-biden.html

    IN INDIA WE KNOW THE TRAITOR JUDGES IN DEEP STATE PAYROLL. THEY ARE ALL AFRAID TODAY..

    http://ajitvadakayil.blogspot.com/2020/06/nsa-must-form-military-courts-bypass.html

    capt ajit vadakayil
    ..

    ReplyDelete
    Replies
    1. PUT ABOVE COMMENT IN WEBSITES OF--
      TRUMP
      MELANIA
      IVANKA

      DEBDOOT / CHARISHMA/ MOHIT TAKE CARE OF THE 3 ABOVE


      US AMBASSADOR TO INDIA AND VICE VERSA
      MINISTER EXTERNAL AFFAIRS/ MINISTRY
      PMO
      PM MODI
      AJIT DOVAL
      RAW

      Delete
  145. Happy Birthday Captain, may your genetics survive till the sun goes supernova.

    ReplyDelete
  146. Wishing You a very Happy Birthday.Keep inspiring and motivating.

    ReplyDelete
  147. COMMENTS IN THIS POST IS NOW CLOSED
    MAKE FURTHER COMMENTS IN THE POST BELOW
    https://ajitvadakayil.blogspot.com/2020/09/coronavirus-saved-leeds-united-from.html

    ReplyDelete
  148. Happy Birthday Sir and Happy Lal Bahadur Shastri day to all readers. May the wisdom and blessings of our Sanatani Maharishis guide our country on the path of honour, peace and prosperity.

    ReplyDelete
  149. Happy Birthday Sir and Happy Lal Bahadur Shastri day to all readers. May the wisdom and blessings of our Sanatani Maharishis guide our country on the path of honour, peace and prosperity.

    ReplyDelete
  150. Happy birthday Guruji..God bless you with happiness & good health.

    Pranaam!

    ReplyDelete
  151. Happy Birthday Guruji ๐Ÿ™๐Ÿ™

    ReplyDelete
  152. Pranaam Gurudev. Wish You a very happy Birthday and many many returns of the day. Always at your feet. Thank you. Purbesh.

    ReplyDelete
  153. Wish you Happy Birthday Dear Captain Ajit

    ReplyDelete
  154. Readers,
    I request everyone to circulate the blog posts on Gandhi written by captain. Be it whatsapp status, facebook, twitter, instagram, anything.

    ReplyDelete
  155. Ajitji, Happy Birthday.
    What is your naalu and Malayalam birth month?

    ReplyDelete
  156. Captain Sir,

    Wish you very happy birthday !! Every year we are remembering Oct'2nd as your and Shastri's birthday. Gujju #1 is forgotten totally..

    ReplyDelete
  157. A very happy birthday to you dear Captain. Wishing you unlimited love :)

    ReplyDelete
  158. Dear Sir, happy birthday to you and wish you a healthy happy and long life. Happy to know that we have great human beings like you still around. This enhances our faith in goodness and truth. Please share if you wish to the secret of your fitness. Thank you Sir.

    ReplyDelete
  159. Dear Sir, happy birthday to you and wish you a healthy happy and long life. Happy to know that we have great human beings like you still around. This enhances our faith in goodness and truth. Please share if you wish to the secret of your fitness. Thank you Sir.

    ReplyDelete
  160. Dear Captain Sir,
    Wishing you a happy birthday. Praying for your healthy and prosperous life!
    With gratitude
    Deepthi

    ReplyDelete