Wow David, thanks for the 'small' donation. It was much appreciated, and the size of it makes up for some of the other people who aren't donating. And I tried my hardest to 'call' on everyone to come take a look at the website and see if it's changed. I was hoping it would really work. The site received a lot of visits, over 500 unique IP addresses per day, but only 3 donations. Imagine if each person that visited donated just 2 dollars! That would be a quick grand!
I even did a money spell with green 'money oil' fragrance evaporating in an essential oil burner, with green food coloring to tint the water the right color, and a green anointed candle burning, prosperity incense burning, a bag of money herbs spread around the green pentagram on a green sheet of glass, with a money spell written around it, and drank some 'prosperity tea' made of special herbs to top the cake. This spell usually works very well, but not with this donation thing. Maybe I just haven't given it enough time, or maybe in my mind I'm so convinced people won't donate that I'm preventing it from working?
I guess its because when I put a donation button on this website, only one person donated, but he donated so much that I had to remove the button because his donation will keep this website up and running without ads and banners until 2012. But I guess now I can put a copy of the donate button from the bottom of my website on the front page of this forum since the money is for both sites and the fulfilment of all alchemy projects in general.
I have a feeling some people might not want to donate because they misread what I wrote above the donation button, and they think they will have to enter their full name, home address, and phone number. But actually what I was saying is that Paypal shows me all that information without you knowing it. I already have all that information from everyone who bought the book. I could show up at your door step and pay you a visit tomorrow if I wanted! Or send you an unexpected Christmas present!
And if you want to use a credit card with Paypal, to verify it, they make you enter your full real name and correct mailing address and phone number don't they? I remember it didn't use to be like that, but they've started changing things since people were abusing the system to use stolen credit cards.
Hackers can so easily get into to your computer (especially if it's Windows) through so many different routes, that it would scare the crap out of you if you knew all the ways. I read it in this 800 page hacker book I got for only 4 bucks at Amazon.com (and that includes shipping!) and it included a CD with a crap load of trojan hacker programs! When you see a trojan on your computer, its just a little file that doesn't seem to do anything, but on the other end, where the hacker is using the program, there is a whole graphical interactive program with buttons that say things like "download files" or "format hard disk" or "transfer virus" or even "take over target computer". The book pretends to be about network security, and the hacker programs are on there so you can test your system and see how well it stands up to brutal attacks. But it teaches you every little detail of hacking, and it has little notes throughout the book that say "HACKER ALERT!" and then explains wonderful tid-bits of info on how to hack the computer.
Basically there is absolutely nothing in the book that hasn't been covered. It literally lists all of the ports on a computer and every possible method of hacking each one,
and then includes the trojan programs that hack each port. And the programs are all written in
C programming language and you compile them yourself, but you get to make changes to them if you so desire to improve upon them, or customize them to your own liking and style, or even worse, to edit them so
virus programs don't recognize them as trojans because they are brand new and haven't been cataloged yet. So it's impossible for someone to even know they have your trojan on there computer, and there is
no program that can locate it.
Why do I have this book you ask? Because in today's modern alchemy world, you better learn how hackers can get into your computer, and learn how to
protect your system. Firewalls are completely useless and are unbelievably easy to bypass. They pretty much have no purpose, especially since they
can't recognize the programs that you've just created and complied yourself, since they haven't been found and sent in to the companies that catalog these trojan horses. There are many programs included on the CD to help you really
secure your system and monitor the ports to make sure hackers aren't accessing your computer.
I've been attacked by many hackers, and when I read the book and learned how to check the ports, I found
which ports were being used by a hacker. The book gives a complete break down of every popular trojan horse and lists what ports it uses. Since there are over
65,000 ports on your computer, its good to know which ones use what. And then the book also includes the programs for
every one of these trojans it explains to you, with a screenshot of the "cool" graphical interface each one uses to hack your computer.
So I found a few ports being used by hackers, and the specific trojan horse they were using that relates to that port, like port 6969 is a common one I found being used a lot, and I was able to run a more specific search for that trojan (after first closing the port so the hacker was
cut off) and I eventually found it.
But just because a port is opened by a trojan, that doesn't necessarily mean the hacker is on the other end actually attacking your computer at the moment. Your computer simply comes up on a list, and you wait in line
to be hacked but the hacker, once he's done checking out the computers of his other victims who are in line before you.
The reason I got the book is because in college I'm taking a Networking class, and the book they gave us is so ridiculously boring that its
impossible to absorb the information. But this hacker book has all the exact same information in it, plus lots more of course, and it makes learning this stuff actually
fun. Everyone else in the class looks like they want to
jump out the window from being in so much agony (its a
5 hour class). But I'm sitting there actually interested in everything the teacher is saying, because I know she's teaching us the basics of hacking, but nobody else knows that.
I'm so glad I thought of the idea of getting a hacker book to learn the fundamentals of networking, because there are so many more things to remember than you could ever think of. I can't believe there are so many ways to configure a network, and so much crap to learn about how simple information packets get sent from one place to another. And so many three letter acronyms for different network components, its a joke trying to remember them all if you don't have any interest in networking. But hacking makes it all fun. The only problem is, after you learn all this information, and you know how to hack, and you've even practiced on the virtual web server software that's included on the CD, and you've even learned how to cover your tracks, then you get really tempted to hack someone's computer or an entire website.
I found that a great deal of websites have pathetic security. Some don't even have firewalls because they're run on systems that are so old and apparently were never updated. And a lot use passwords that are standard for network security guys to use, and you can find a list of the user names and passwords that are kind of like 'defaults' that network security guys will use because they're easy to remember.
Anyway, that's enough about hacking. I just wanted to fill you guys in on the importance of learning how hackers get into to computers in case one targets your computer, looking for that secret recipe for the Philosopher's Stone. They still think its hidden somewhere on the computer of a master alchemist, when in reality, I've already written a book about it they could have if they just spent a few bucks. But God-forbid they pay for something they can hack their way to instead.