Return to the full month

August 11, 2012
A Web Security Advantage

Melvin, the web administrator here.

I was not talking out of my hat when I made my threat against the O.S.I.R. hacker.

I have machine sympathy and have felt out the software on the server where this blog is now hosted. I asked and was given a tour of the server farm and directed to our precise server block. I made a connection with the hardware and any time I want or need I can access the software remotely and feel where any changes have been made, including what they are. When I am informed of a software update, or a refresh is to be undertaken, then I know to look at the code. I will also be monitoring the situation with some frequency for any changes outside of the reported upgrade and backup cycle.

As for the matter of getting at anyone trying to, or has hacked the system, tracing a hacker is a matter of starting with the usual software methods and then boosting it with my gift to feel out the wrong connections, false leads, and bounces or misdirects. This is possible when the remote location of the entry into the software is in places where no human hacker would be accessing the connections, like at a repeater. Or the location corresponds with farmland, or a cemetery, or an abandoned lot, etc. This can be further sussed out by video surveillance and accessing the system at the supposed point where the hack is occurring, because you never know when they have set up an operation in an out of the ordinary location just to throw off physical pursuers coming after them, or just to divert suspicion.

I won't get into what I would do to a hacker or their rig once I located it. I will tell you however that a lot of this is nothing like what you read in fiction. I have to know what I am doing with hardware and software to be of much use. A feeling of a change in the coding for something isn't much help if you don't understand it. It's like if you looked at the schematic for a complex machine. Yes, you know what all of the designed parts looks like, but what do they do? Coming at it from the other direction if you were an empath, then you have a basis to understand the feelings of other people because you have those feelings yourself. You still might not understand every feeling though, say if you'd never been betrayed before you might miss some of the nuance or mistake it for just anger or sadness. Likewise I just can't ask a computer to do something. I need to tell it what to do, instruct it step by tiny little step, just like a programmer. That requires giving it a language to understand before speaking to it in that language.

For those with a gift like mine there has never been a better time to be alive then now and that only becomes truer every step technology moves forward. One thing I would like to do, having been into contact with the people I've been in contact with over the last couple years, is to set up something where I could constantly monitor the situation on the site and be able to react to a hacking attempt as it happens. By that I don't just mean like a regular hacker sense, but also in terms of using my gift. It's never been my experience, or that of anyone I have talked to, that a psychic can just wish or will a specific gift to manifest. So, I can't just hope to develop one or more gifts to fulfill this goal. On the other hand, that yearning may just be the spark of something there that will flower sooner or later. It won't come because I want it, but I want it because it will come. Just a thought.


Tags: empathy (psychic), hackers, Melvin Klein, machine sympathy, O.S.I.R., protection, psychic, software, surveillance, web administrator.



Return to the full month