- Possible Infiltraitors -

Saturday, January 10, 2015

Security protocol refinement

Dear Reader,
                          As we have seen this past year, a multitude of new and advanced forms of cyber attacks have been implemented against government institutions across the globe. Equally under fire, are corporations dealing with very sensitive data and/or materials. Many of these infiltrations have been successful, some with regrettable and devastating outcomes. Others have been thwarted and the criminals put to justice. In all cases, the attackers method of invasion was, in the end, revealed and subsequently, with placement of proper levels of defense, that particular process of methodology, nullified. Indeed it is common knowledge that any security breach of any type enlists a new way of thinking in the would be protector. It hardens the will and desire to seek and find any such flaw the future has yet to reveal.
   With this in mind, please keep your spirt afire and know, with each dark attack, the light grows stronger.


This is a time to be involved.  This is a time to be a P.U.N.K.


Were not hiding~criminals are

Political Underground Network Kids
Boint
Cyber
Cats☆eye

~This is an online continuing saga involving genius kids fighting the good fight... online... worldwide.  Protecting common citizens snd world organizations alike. Behind the scenes...  /these are the main characters and I shall introduce them one by one with complete history and drawings. Tweet me @ dijjidog if you enjoy this blog idea.

No comments:

Post a Comment