Do you know why your laptop or desktop computer’s speed is so slow, like how a turtle walks, and makes frequent errors even though you have had it for only about three years? What’s wrong with your computer you ask? Or, worse, what’s wrong with you?

There is nothing wrong with your computer or with you. The computer that you purchased new out of a box is a good quality computer. And you already know like a pro how to operate an ordinary computer. You have been using computers for more than ten years at work, at home, or at school. But why does it take so long and so slow to switch from one website to another? Is there something else that you should know about computers?

Let me explain to you what occurred or who the root of your slow speed problems is. Hackers, hookers, and pimps who use any available Wi-Fi or Ethernet connection from a distance to perform their daily hacking ritual on your computer caused all your problems. They probe into your expensive computers each day or night and use them as their easy access laboratories to practice their deplorable hacking skills – at your expense. I placed them all together under one group, hackers, hookers, and pimps. They are one of the same – DECEIVERS. And they use pop-up windows to deceive you. I want you to remember the words “pop-up windows,” if you cannot remember anything else that I write here. Presenting pop-up windows to your face, and fake notification, such as this,




















































and this,









is their primary method of deceiving you. In Picture 1, they admit that they need my help in figuring out my password for them. They are not bright people. I don’t know why they are not fired from their job like what President Donald Trump did to his staff. In Picture 2, they want to install something but they won't tell me what it is. I know, I know, it is called "crap.exe." It installs in a flash, a fraction of a second. In Picture 3 you'll see the Three Stooges, Hacker, Hooker, and Pimp waiting in line wanting to get entry into my computer, but was blocked by the "Border Patrol" of my computer. Listen to what the officer has to say to the Three Stooges here. In Picture 4, they want to block me from opening and reading my e-mail, but they failed. I could still open and read my e-mail. And if you are not in the habit of IGNORING ALL pop-up windows, you should start it now. Yes, do it from now on. There should be no hesitation at all on your part to ignore all pop-up windows. Also, look on your browser setting how to block pop-ups. Sometimes they will not go away until you click on them. Don’t fall for hackers’ trap. Go somewhere else, or change to a different browser, such as Opera, or EPIC, or Comodo.

Hackers use every day hacking tools and their perverted brain to deceive you and give you problems. For instance, they send you a notice on your screen that says that your Firefox browser is automatically updating itself when what really happens is that they, hackers, hookers, and pimps automatically update and install their malwares in your PC – spies. Or, they show you a picture of a program that you frequently use and the picture tells you that it needs updating because a new version is available. You fell for it and you are almost ready to click on the “OK” button, right? No, do not click on the picture. Update nothing, unless you want your laptop to get infected with craps from hackers. Or, they show you at the top of your screen a small window that says, “Google wants to know your location.” It is none of Google’s business to know your or my location. Hackers use your browsers to spy on you and trick you into accepting their malwares into your computer when you click on the picture or the pop-up. And once they are inside and infect your computer, they breed and spread like termites or ants and you cannot get rid of them, even with an antivirus. Be extra careful with your choice of browsers, because hackers are known to run malwares into your computer through deception or trickery by means of your browsers, and many netters fell for their trap. If you must have the most current version of your favorite program, go to their website where you first got it from and download it from there. Click nothing on any pop-up windows that suddenly shows up, small or large. I used to think that I must respond to any pop-up window. I was dead wrong. I now ignore all of them, except when it is required during the installation of a legitimate program, such as Malwarebytes, or Windows. I use only ONE browser – the EPIC browser. I found it to be the most secure browser. They will not betray you or deceive you.

Having said what I need to say in the forgoing paragraphs, I hope that you now can understand why the longer hackers, pimps, and hookers stay and probe inside your computer, the more crap they’ll leave behind. And you can imagine what three years of crap will do to the speed of your computer. It will significantly slow down your computer. I will later explain in my book what you can do to get rid of the crap and garbage that hackers leave behind in your device. I will also show you how to remove the viruses from your computer that disabled your wired and wireless connection, a trade secret that repair shops won’t share with you, and much-much more.

But first, I want you to know how hackers work based on my experience with them and what other hackers from my home country have told me.

One of the earliest signs that tells you that a hacker is hacking your computer is when you see the tip of your cursor randomly jumps all over your monitor’s screen while your hand with the cursor remains still, not moving. Another common occurrence is when you frequently get temporarily disconnected from your wired or wireless Internet connection, and you don’t know why because you did nothing to interrupt your Internet connection.

What happens here is that a hacker is probing your computer (screen) with his or her mouse while you think nothing of it. You thought that what you see is “normal” computer behavior. No, they are not normal computer behavior. They are telling you that hackers, hookers, and pimps are trying to hook their hacking tools to your computer so that they can probe deeper and leave stealth “spies” and “shit” inside your computer. In other words, when hackers intrude into your computer and were successfully able to establish contact with your computer, either through pop-up windows or other means, they waste no time. They immediately insert their “spies” and “sleeper cells,” terrorist agents (codes) that may remain dormant in your computer until they are activated or acted upon by another code or set of codes, just like those terrorists in San Bernardino and Paris who killed many innocent people. In the meantime, while dormant, they leave long trails behind in your computer to make it easier for them to find their way back into your device the next time when they so desire.

Hackers are exploiters, intruders, and deceivers as one author wrote. As such, they should be crushed a long time ago – when they first see the day light. Our U.S. society cannot function well if we allow exploiters, intruders, and deceivers live freely among us. Why? The reason is clear and obvious because hackers are adverse and incompatible with our culture and the American way of peaceful co-existence. It is impossible to live peacefully in any society when the people around you are exploiters, intruders, thieves, and deceivers. You cannot co-exist peacefully with them when their goal is to harm you, rob you of what you have, and expose your private life to the world while they cleverly hide behind human shields – hackers from Russia, China, Ukraine, Iran, North Korea, and other hackers from all over the world, including local hackers from the U.S.A. For example, have our DOJ investigators personally met and talked with the dozen or so of “Russian” hackers whom they had indicted for interfering with our 2016 election? How do they know for sure that they were Russians, and not American hackers, hookers, and pimps who work in Moscow? American hackers will continue to meddle in American election. Is that too hard to understand? If indicting anonymous hackers is such an easy job, why can’t the DOJ indict more of the millions of American hackers that operate on American soil, and not indict only one or two every five decades, why?

Some months ago I received an e-mail from a friend, a wealthy friend, and he asked me to send him some money to an address in a foreign country. It sounds like he is in trouble. I called his home in Diamond Bar, and his wife answered the phone. I asked her where her husband is, and she gave the phone to him. He is there in Diamond Bar, California, and not in a foreign country. He told me that hackers had compromised his Microsoft e-mail, and changed his password so he cannot login to read his mail. Changing passwords, yours and mine, without telling us is one of their favorite deception techniques. There is a reason why they change people’s password. In my friend’s case, my friend would not know if I or anyone else has sent him money or how much because he cannot access his e-mail, so this dumb hacker thought.

The title of my book is “Ctrl + Alt + Del” and its subtitle is “Hackers + Hookers + Pimps” to describe what or who they are. You’ll find these keys on the last bottom row of your keyboard. These combination keys are used for additional security measures. Normally, by default, when you start your Windows there is not a requirement to push these three keys simultaneously before you can login. I have read, however, that your Window’s login page can be real or fake. And if your Windows password is captured by the fake login Window, hackers, hookers, and pimps can have easy access to your computer. And so, Bill Gates has invented the “Ctrl + Alt + Del” keys that you must push simultaneously for additional security to avoid the fake login Window. The next obvious question is how do you add “Ctrl + Alt + Del” to your Windows login screen. There are two ways I know that you can do this, Method 1 and Method 2. Method 1 is simpler and requires fewer steps, whereas Method 2 requires more steps but you have more options to choose from. I prefer method 2, but you are free to try either method. Using either method, you must start by pushing the Windows key + R. Please do it now. After you do this you will see a small rectangular screen that runs from left to right. Enter “netplwiz” and click “OK”.

Picture 3

The Deceivers

Ctrl + Alt + Del

Picture 1

Hackers + Hookers + Pimps

Double click “Local Policies” on the top picture, right pane. You will then see the second Window with the drop down menu to your right. Click “Interactive logon: Do not require CTRL + ALT + Del” and make sure that the selection is “disabled.” Click “OK” and exit. Restart or reboot your computer.

Picture 4

this,

Picture 2

or this,

Under Method 2 you would do the same, push the Windows key + R. But instead of entering “netplwiz” you would enter “secpol.msc” and click “OK”. The next Window that pops up looks like one of these below,

In the following Window that shows up click the Advanced tab, select “Require users to press Ctrl + Alt + Delete”, and click “OK”. You are done under Method 1.

 












From now on you should see the “Ctrl + Alt + Del” on the top of your screen when you attempt to log in to your Window, and you must push all three keys together, Hackers + Hookers + Pimps (“Ctrl + Alt + Del”) to login. Be aware, however, that so far you have created a local account. You should create a Microsoft Account with your Microsoft e-mail. With a Microsoft account you can add a second layer of security, called Microsoft 2-Step Authentication. Hackers may know your password, but they can do nothing unless they also have your phone, because the verification codes will be sent to your phone. Incidentally, while we are on the topic of “password,” do you know that hackers, hookers, and pimps are following you every day on your computer and your phone? They are watching (spying), and recording every move that you make on your devices, not on mine. It makes great sense, therefore, that you should never change your password using your home computer or phone. Go to the library and use their computer, or go to a friend’s house to change your password for your e-mail, etcetera. Many e-mail programs add another layer of security for their customers, called the 2-Step Authentication app, and so do some others, like Google. Get their app today. Your passwords don’t have to be 100 characters long. But they should be difficult to guess or hard to remember. The other reason why you should not change your password from your home computer is that some financial institution or businesses do not offer encryption services on their login or password reset page. Consequently, your “User ID” and “Password” submitted from your home computer travel UNENCRYPTED to their business server(s), and hackers, hookers, and pimps who have been watching you on your home computer since last night can easily capture them with the use of key loggers or other means, and may scream in excitement and say, “Jesus Christ,” although they have no clue who Christ was and what He did. Remember to use the EPIC browser. I am confident that they will not betray or deceive you.

 Also, remember to change your password often. Do not wait for hackers to change your password for you. In addition, go online, and find out how you can change your privacy or location setting of your cell phone so hackers, hookers, and pimps cannot know where you are and cannot trail you from behind, or from a distance based on your GPS phone location.

If you suspect that skunks are trailing you through your Internet network, you can download this small utility from NirSoft, called
Wireless Network Watcher, scroll all the way down almost to the bottom to find the download link. The utility will show you what devices are connected to your wireless network. If you detect a description of a device that you don’t recognize, use your router to block the IP or MAC address.

Let me now spend a little time with you explaining the essentials.


Safe computing begins with a plan – a logical step-by step defensive and offensive plan. As part of our defensive plan we must have the tools that are necessary to defend and protect our devices and computers in the event that hackers, hookers, and pimps should infect and attack our machines with their malware, such as viruses that can instantly stop or disable our wireless and wired connection from functioning. When that happens, we stop “breathing,” and can no longer communicate with the world. 


An example of an excellent defensive plan is never to pair your phone with your PC. Why? Because you don’t want to have an “open-border” between your phone and your computer where hackers can get in and out. Initially, Microsoft came up with a good idea of pairing your phone (a blue tooth device) with your computer, called Dynamic Lock. If you and your phone are at some distance away from your PC, say you are in a movie theater, your desktop at home will lock automatically to protect the security of your device. But what hackers, hookers, and pimps have done is to take advantage of this loophole, and with their deplorable and disgusting gang mentality have turned it around and use your phone, when paired with your computer, to mess up and weaken your computer’s privacy and security settings. With such an “open border” situation hackers can now cross into your computer from your phone, spy, and steal whatever data they want with no restriction. Bad things can happen if you match your cell phone with your computer. Do NOT pair your phone with your computer. Do not turn the Dynamic Lock on.

 

 











INDONESIAN  CUISINES  - Soytempeh