Futura economy

Advance: DNS resolving – Present (A DNS Beacon DEMO)

Be cautious, even if it’s simple to set up your head server with the Kali Linux (shown experiment) in fact most people that would use it, is ISP – you can also ask your provider, if they support it, freely or not. We are not reponsable of miuse over system that is not able to make adressing of DNS Root Support, always ask before that an ISP or a DNS provider is able to fill that kind of adresssing and help you resolve most of routine website that you have need privacy or latency (as games).

Failure to have a backbones or server that is misconfigurated could create damage and Kernel Panic most people won’t allow you to reverse IP and don’t forget that even if it’s DNS it will cost money, even, for your ISP that say ‘unlimited’ deal it is still monitored by your ISP.

Some country have limitation over the use of the demo shown. Such as Europe.

I read the warning let me see the demo

Read More

Software sophistication : Installation of software (Explanation)

ZOOM feature, is recommended.

This is a example how software sophistication could help people developping software, not having to patch or block or remove unwanted software.

This is how it work.

SIMPLE install.

CONCEPT (NOW):

Software executable opening
REMOVAL of ability of run without a warning box
Antivirus SCAN (recommended)
Auto-Extractable BIN
LICENSE (aggrement)
YES, NO/HELP

PROVEN SerialNUMBER of license.

CONCEPT (of the SOPHISTICATION) perspective:

Software without any security involve.
TIME Syncing and values
Correct setting to apply to that kind of base
Security check if the setup could succeed
Time Failure (STOP)
Illegitimate, badly distributed copy.

 

CONCEPT (Schema):
Succeding installation
Software without any security involve.
TIME Syncing and values SET*
Correct setting to apply to that kind of structure, reapply for re installation
Succeeding step TIME. (without syncing) * Verification it succeed in time (without sync)
Security check if the setup did do correctly the procedure
TIME is setup correctly for the kind of structure of Operating system
This is pass the test of quality for that computer/machine
The license is made that time verify if the time have the correct setup of the creation of the key
Succeed it didn’t get use more than the license is involving.
Proving the identity of the time structure*
LAST SYNCING *
TIME authenticated KEYS is lock for that software for the time it say on license.
USER : Installation succeed, you can now open your new software.
Optional : Please write your recovery code for re installation – settings recovery.

-JM