Sindoni Says

 
Sindoni Says


Trust But Verify...

Blog

Sindoni Says will be a place where I will share my observations. Looking forward to creating a place of truth where Kool-Aid isn't served.

view:  full / summary

Hackers Threaten to Wipe More Than 300 Million Apple Devises Remotely

Posted on June 2, 2017 at 3:25 PM Comments comments (0)

A group of hackers that call themselves the "Turkish Crime Family" claim that they have access to more than 300 Million accounts of Apple users, including @icloud and @me domains. The group is demanding a ransom of $75,000 in Bitcoin or Ethereum or $100,000 in iTunes gift cards.


The news was first reported by Motherboard. In an email exchange with Motherboard, the hacker said "I just want my money and thought this would be an interesting report that a lot of Apple customers would be interested in reading and hearing."


In a comment to Motherboard, an Apple spokesperson downplayed the attack, saying "There have not been any breaches in any of Apple's systems including iCloud and Apple ID. The alleged list of email addresses and passwords appears to have many bugs.


The spokseperson added that the company is actively monitoring to prevent unauthorized access to user accounts and is working with law enforcement to identify the criminals involved.


At first, the claims did not seem credible because the ransom was so low, the number of stolen passwords were too high,and the hackers kept escalating their numbers (from 300 to 559 to 627 million accounts.) Recent investigations with about 

70,000 purported iCloud accounts released by the hackers to journalists for verification, however, indicate that a number of the stolen accounts are valid.

 

The best way to avoid falling prey to such cybercriminals is to use strong passwords, and to quickly learn a Linux Operating System with a LIve DVD. Looking forward to your comments....


Windows Helping The Spread of loT Malware

Posted on May 30, 2017 at 1:40 PM Comments comments (0)

Dr. Web, a cyber firm, has found a Windows trojan that helps spread the infamous

Mirai botnet across LoT (Internet of Things) devises. The newly found trojan targets

Windows systems, and once installed, the trojan scans the network for connected LoT

devises. If it finds a vulnerable devise, it compromises the devise and uses it in later

attacks. Last year in October, Mirai brought down a huge chunk of the Internet by

launching a DDoS (Distributed Denial of Service attack on the DYN managed DNS

service.


The Windows trojan doesn’t stop at compromising the LoT devises; it continues to

spread itself to other Windows devises to further find and exploit more LoT devises.


Researchers noted that the malware could also identify and compromise database

services running on various ports, including MySQL and Microsoft SQL, to create

a new admin phpminds with the password phpgodwith, allowing attackers to steal

the database.


At this time, it is not known who created the trojan, but the attack design demonstrates

that LoT devises that are not directly accessible from the Internet can also get hacked

to join the Mirai botnet army.


LoT devises are already vulnerable to infection, so why are malware writers targeting

Windows? Primarily because Windows still dominate the market and it gives the

malware writer’s another platform to spread the botnet.


This is not the only security hole plaguing Microsoft’s products. Earlier, Google disclosed

flaws in Microsoft’s GDI library that affects every Window version all the way back to

Windows Vista. Another unpatched flaw that effects the SMB protocol, allowing attackers

to crash the system.


In a previous blog post, I have cited the preceding paragraph of information. Isn’t is time

you the reader switch to a Linux Operating System? Comments welcome.


Google Discloses Serious Security Flaws In Microsoft Products

Posted on May 29, 2017 at 2:15 PM Comments comments (0)

Google disclosed an unpatched vulnerability in Internet Explore and Microsoft Edge web browsers. After giving Microsoft 90 days to fix the problem, Google researchers have published the details of the vulnerability along with proof-of-concept code. The security hole affects all supported Windows versions, including Windows 7, 8, 8.1, and 10.


According to The Hackers News, “The vulnerability (CVE-2017-0037) discoveredand disclosed by Google Project Zero’s team’s researcher Ivan Fratric, is a so-called ‘type confusion flaw’ in a module in Microsoft Edge and Internet Explorer thatpotentially leads to arbitrary code execution.”


Google discovered the vulnerability in November 2016 and reported it to Microsofton November 25, but for unknown reasons, This is not the only hole plaguing Microsoft’s products. Earlier, Google discovered flaws in Microsoft’s GDI library that affects every Window version all the way back to Windows Vista. Another unpatched flaw affects the SMB protocol, allowing attackers to crash the system.


Isn’t it time you tried a Linux Operating System? Comments appreciated...


Microsoft Skype Voice Chat Revealed

Posted on March 19, 2017 at 11:10 AM Comments comments (3)

Microsoft’s Skype Voice Chat Revealed

 

In this blog, I will share little known information regarding the widely used Microsoft Skype voice chat software application. Information such as what I will be sharing today can be found in my new book entitled “Below The Radar.” The book is only available in the Web Store on this website. It is a must read for anyone who connects to the Internet.

I will give anyone who posts to this blog, a free copy.

 

At the present time, there are well over 60 million people who use Microsoft’s voice and video chat to communicate with one another across the entire globe. Many of these individuals trust the software application to send out and exchange files, documents, photos, and personal information; without giving it a second thought.

 

Here Now is The Problem

 

Government snitch whistle blower and double agent, “I’d like to add,” Edward Snowden

has alerted the American people and the world to outrageous spying programs under the code name “Prism” which are being used with the help of the Microsoft Corporation.

 

The National Security Agency (NSA) have been given the authority to access anyone’s personal computer and gather information on unsuspecting citizens without his or her permission.

 

Most all of the Microsoft Skype account users have installed the Skype software via their Administrative accounts. Then they launch the Microsoft Account and follow the instructions to create an account. Then the user launches the Skype software application in the administrator account to use the service. The Skype user is unaware that everything on his or her computer can be accessed and then used against them without ever suspected that they have just been hacked.

 

Public Reaction

 

A great number of Microsoft Skype users have experienced Identity Theft, have had their bank accounts wiped clean and all of their personal information stolen. The list of offenses from hackers is far too much for me to cover in this blog post. Everyone using Microsoft Skype is at risk world wide. So, what if anything can be done about it?

 

Solution

 

I have created a Step-By Step Microsoft Skype Security Process which I believe can put an end to prying eyes having access to our computers. The security steps are as follows:

Steps to Follow

 

1. Log in to your Administrator account on your personal computer.

2. Make sure that Blue Tooth is turned off.

3. Make sure that you are working off line.

4. Create a Standard User account with limited privileges, name it Skype.

5. Create a strong password

6. Do not store the password on the computer.

7. Make sure that you do not use the same password for the Microsoft account.

8. Now, sign out of the Administrator user account.

9. Now, log in to the newly created Skype limited privileges standard user account.

10. If you are able to log in to the Skype User account. Use it only to access Skype.

11. Do not store any personal files or any information. Keep it clean.

12. Sign out of the Skype User Limited privileges account.

13. Log back into the Administrator account on the computer.

14. Go to your applications folder if you have already installed Microsoft’s Skype.

15. Remove the Skype software.

16. Then using an Ethernet hard wired connection, reinstall the Microsoft Skype software.

17. Check to make sure that the software has been installed before logging off the Internet.

18. DO NOT LAUNCH THE SKYPE SOFTWARE FROM THE ADMINISTRATOR ACCOUNT.

19. Now Log out of the Administrator account.

20. Log back in as the limited privileges standard Skype User account.

21. Search the account and locate the Skype Software.

22. Plug in the Ethernet wire and connect to the Internet.

23. Now launch the Skype Software.

24. You be asked to create a new account if you don’t already have one.

25. If you have a Microsoft account already just sign in like normal.

26. For those who do not have an account, you will have to create one.

27. Make sure you create a strong password and do not store it on the computer.

28. Make sure that you do not use the same password that was created for the Skype user account on your computer. The passwords should be different.

29. Connect a external microphone into the computer.

30. If you plan to use video chat activate the Web camera.

31. Now go into the Skype account and make a test phone call.

32. Go through all of the preferences to customize the account.

33. Set up the voice mail and record your message. Then listen to it.

34. You are now ready to connect to the world!

35. Should you need to send out a file, document, or any other information, then I strongly recommend attaching a thumb drive with only the information that you plan to send out over the Skype network.

36. Because you are signed in as a limited privileges standard account Skype user, none of your personal information can be hacked or stolen.


For additional security, after creating the Standard User Skype account, you can purchase a Live DVD Operating System from http://osdisc.com. I recommend purchasing Linux Mint 18.0. The cost is around 6 dollars with free shipping. You can use the Live DVD to go on the internet securely and use it to sign into the skype.com account that you created. This will allow you to be operating in what I call a "Cyber Safe"space and untouchable by prying ears and eyes.

 

In closing, I hope you the reader have found this information to be useful. If anyone would like to comment on this topic, I will send you a free copy of “Below The Radar.” For those who want the book, it can be found on this website under the Web Store tab.

 

Till next time,

 

Stephen Sindoni

 

 

Stockton Record News Paper Article-Legend of J.C. Brown

Posted on March 18, 2017 at 6:05 AM Comments comments (0)

Stockton area link to lost city

By Michael Ftizgerald

Record Columnist

February 17, 2008 6:00 AM


An aspiring screenwriter from Brooklyn contacted this paper the other day, researching a baffling 1934 Stockton incident, a mysterious man and the lost civilization of Lemuria.



Stephen Sindoni said he is writing a screenplay about J.C. Brown. Brown was either a geologist (his claim) charlatan or wacko (my opinion) or hunted man hiding behind an alias (Sindoni's deduction).


Whoever Brown was, it is a fact that he turned up in Stockton in 1934, claiming he'd discovered Lemuria.


Legend holds Lemuria, the Atlantis of the Pacific, sank in ancient times. In some variations, Lemurians, higher beings, retreated to a hidden city deep within Mount Shasta.


Brown, 79, introduced himself in respectable circles. Then he announced he had discovered a hidden tunnel in the Cascades while prospecting for the Lord Cowdray Mining Company of England.


"Eleven miles inside the mountain, and approximately 2,300 feet from the surface, I struck what I called 'The Village,' " he told a reporter.



The Village, actually big chambers, contained streets, ornate altars, copper- and gold-inscribed tablets, copper spears with flexibility beyond modern metallurgy, and unbreakable glass.


He also described 27 skeletons of beings up to 10 feet in height; an embalmed king and queen; other pretty fabulous stuff; and a fortune in gold, radium and copper.


Brown began holding daily lectures in a Stockton house. Owing either to his oratory skill or folks' greed for Lemurian treasure, he appears to have gained Svengali-like sway over his audience.


He told people he was worth $40 million. Nobody doubted. He revealed that distant mystic yogis directed him. People believed. He vowed to take them to Lemuria. People eagerly signed on.


Brown instructed them to assemble at the channel head at 1 p.m. June 19. A craft from his fleet, tricked out with a Lemurian glass bottom, would arrive to transport them.


Some folks actually sold their houses in preparation. And at the appointed hour, 80 Stocktonians assembled at the rendezvous, only to get the Lemurian-bronze shaft.


The boat did not arrive. Many waited all night. Brown did not appear. Police sought him "for purposes of questioning," but he was never seen again.


Investigation found he'd been living at a homeless shelter before he talked his way into better digs. His file suggested he may have suffered mental health problems.


A cynical reporter, expecting Brown's gang had been fleeced, was stumped to find that Brown never took a dime from anybody. So what the heck was it all about?


Nobody figured it out.


Until Sindoni got on the case. Sindoni said he became intrigued by Lemuria and J.C. Brown while surfing the Internet for a fitting screenplay subject.


Extending Sindoni standard professional courtesy, I pulled the story off microfilm and plugged a couple holes in his research. In exchange, I asked to interview him.


This arrangement was based on my assumption that Sindoni was writing a humorous tale of a con/crackpot and the suckers he duped with his Lemuria spiel.


But when I got Sindoni on the phone, it emerged he actually believes that Brown actually discovered an actual lost city of actual Lemurians.


"Yes, I do," Sindoni said.


Mount Shasta does, in fact, boast a large literature and lore about Lemurians, much as Nevada boasts lore about UFOs. Sindoni believes the Lemurian tales.


"Guy Ballard - pen name, Godfrey King - talked about being up Mount Shasta in 1930," Sindoni said. "He met St. Germain, who told him the ascended masters lived in the hollows of the earth in Mount Shasta."


Sindoni went on to share his belief, based on his research, that J.C. Brown was really J.B. Body, a lieutenant in the Lord Cowdray Mining Company of England.


It was Body who discovered the tunnel and descended into the Lemurian city. He adopted the Brown alias to evade government agents. They wanted Lemuria kept secret. Lemuria's existence was too explosive, Sindoni reasoned.


Stockton got too hot for Brown. Hence his abrupt disappearance.


Contact columnist Michael Fitzgerald at (209) 546-8270 or michaelf@recordnet.com.

 

If anyone would like to leave a comment about this topic, I would be very interested in whatever you have to say.




Respectfully,



Stephen Sindoni

 

 

 

Stephen's Hole

Posted on March 8, 2017 at 11:05 PM Comments comments (1)

Stephen's Hole

 

Our blog topic for today is entitled “Stephen's Hole. In this blog, I will share a true story that happened to me while doing research on the “Legend of J.C. Brown” in Mt. Shasta, California in 2009.

 

Not long after arriving in Mt. Shasta, I raised some serious eyebrows from the locals when they learned that I was looking for artifacts or giant skeleton remains that might be connected to the “Legend of J.C. Brown.” For anyone who is not familiar with this legend, you need only go to the video tab and click on the “Legend of J.C. Brown category to watch the documentary movie.

 

It was also in this same time period in the summer and fall of 2009, that I was doing a local Internet and cable talk show at the local college in Weed, California. The program was entitled “Legend, Mystery and More.” The program was specifically about Mt. Shasta and all of the legends that surrounded it. When I wasn't filming an episode, I could be found hiking on Mt. Shasta.

 

Native American legends also share stories about an ancient race of people who they refer to as “The Tall Ones” who lived under the bowels of Mt Shasta and may still be living there today.

 

On July 1st, of 2009, I was interviewed by Charlie Unkerfer of the Mt. Shasta Herald.

The article was released in the Sunday edition of the newspaper. The legend instantly created a buzz around the city of Mt. Shasta. I was now under the spotlight. There was nowhere that I could go without a stranger coming up to me and asking about what if anything that I had found.

 

In September of 2009, I left Mt. Shasta and moved to Ashland, Oregon to begin production on a Internet radio program. For the next four to six weeks, the crew and I spent all of our time working on the program. Mt. Shasta was the furthest thing from my mind or so I thought.

 

In late October, I received a phone call from Arthur Aday. Arthur hosted his own Internet

talk show at the college. I had been a guest on his program several times. He even doubled as a cameraman of a few of my television programs. As a result, we became good friends. Arthur was my bud.

 

 

Arthur started out the conversation informing me a rather large hole had been dug on or around Mt. Shasta. He then went on to say, that the hole, was about 15 feet wide, and was estimated by some observers to be at least 60 feet deep. It was a massive hole.

I the asked if he knew who may have dug the hole?

 

Arthur then answered, “Well the United States Forest Service and the Federal Bureau of Investigation (F.B.I.) were at the television studio today looking for you to answer some questions. Apparently, they think you had something to do with digging the hole.

 

Immediately, the Art Bell Coast To Coast am broadcast with Art's guest Mel Waters popped into my mind. The “Mel's Hole” program was a hot topic in the Pacific Northwest. Mel's Hole” was claimed by Mel Waters to be over fifteen miles deep.

 

The FBI asked Audra Gibson, the Program Director, if you ever mentioned digging any holes in or around Mt. Shasta? Her and I quickly came to your defense. They then asked if they could see all of the programs that I had done with the college. Arthur went on to say, the Federal Bureau of Investigation, purchased every one of the Legend, Mystery and More episodes that were recorded and aired at the college. They also purchased (3) three of Arthur's “A Day in Telos” programs. Arthur ended the phone call by saying,”Dude you're famous!”

 

I hung up the phone and couldn't stop laughing. When I finally stopped laughing, my friend who was standing nearby, asked what was so funny?” I jokingly answered” You've heard of Mel's Hole, now there's a second hole, its being called Stephen's Hole.”

 

I will now include the Mt. Shasta Herald newspaper article for your perusal:

 

 

Friday

Oct 23, 2009 at 12:01 AM Jul 1, 2012 at 10:12 AM

Whatever their purpose was, the people who dug a deep and wide hole by hand on National Forest property on Mt. Shasta this summer put in a great deal of effort.


Steve Gerace


Whatever their purpose was, the people who dug a deep and wide hole by hand on National Forest property on Mt. Shasta this summer put in a great deal of effort.Then they abandoned it.


US Forest Service law enforcement officer Carmen Kinch says she knows who is responsible and she’s proceeding with filing charges. The hole, about 15 feet wide, was estimated by some observers to be 60 feet deep.It was refilled by the Forest Service last Friday because it presented a safety hazard, Kinch said. The hole was dug on the site of the Mountain Thin project. Many of the trees in the area had previously been marked with paint, but that paint had faded over time. In July of this year, Kinch said the trees were repainted with blue rings on the bark. That’s when the hole was discovered, but the diggers were not seen.


Kinch said she was out of the area working on assignment in July and into August, but has been investigating the hole since she returned. She says she now knows who is responsible but has yet to make contact with that person. She said he is not a local resident. She believes the goal of the illegal hole digging enterprise was to find “valuable minerals.”


Remnants from the operation, including a wire above the hole that was connected to two trees and had a pulley mechanism on it, were left behind. Also left behind was a ladder leaning up against a tree near the hole and numerous buckets. large pile of dirt and rocks surrounded the hole.


This was not an easy enterprise.One very large boulder was perched on a ledge just above the hole. It appeared that the diggers may have intentionally gone around it because it was too large to move.


One recent observer at the hole site noted with irony that one of the items that remained at the bottom of the hole was a bottle of “SmartWater.”Two of the charges that Kinch said she plans to bring against the person responsible for the hole are damage to a National Forest and removing natural resources without a permit – “and anything else I can come up with,”?she added.

 

In closing, if anyone would to comment about this topic, I look forward to reading what you have to say.

 

Respectfully,

 

Stephen Sindoni

Members Blog Post Instructions

Posted on February 27, 2017 at 4:30 PM Comments comments (0)

Our topic today is Webs Member Blog Posting Instructions. Here are the steps to guide you on how to complete a comment for the Blog, Forum, and Guest Book pages.

 

1. Access the live Blog Page of the Website.

2. Click on the Blog Post. Example; Sindoni Says.

3. In order to comment, please scroll to the bottom of that post.

4. Member are required to Sign In.

5. Once a member is signed in, that individual can post.

6. For those who are not yet members, these individuals are required to Register.

 

Note: I have provided two articles to give additional info on Members Application and the Blog.

 

Members

 

https://webs.zendesk.com/hc/en-us/articles/222135248-Introduction-to-the-Members-App

 

Blog

 

https://webs.zendesk.com/hc/en-us/articles/222219707-Blog

 

 

If anyone should have a problem with the active links above, then I strongly recommend  that you copy the link and paste it into the web browser to get access to the information.

 

In closing. I look forward to reading your comments.

 

Respectfully,

 

Stephen Sindoni

Giants In America

Posted on February 27, 2017 at 2:20 AM Comments comments (0)

Our topic for today is “Giants in America” In this blog, I will share with you the reader an excerpt from the PDF E Book “Stockton Record News Paper” that can be found in the web store on this web site. The book shares little know secrets about the discovery of giant skeletons 7- 12 feet tall, that were found in the Cascade mountain range of Northern California by a mysterious elderly gentleman who went by the name J.C. Brown. After spinning his amazing tale to the town’s people of Stockton California, J.C. Brown simply disappeared. The excerpt reads as follows:

 

Stockton Record 1934 News Article JC Brown

Here’s Brown’s Weird Tale of Lost “Village.”

 

Brown’s original story as told to a representative of the record a month and a half ago, probably for the first time in Stockton, minus details concerning his personal history, follows:

 

“I found this cave while working in the Cascade Mountains for The Lord Cowdray Mining Company of England. I noticed a section of the rock in the face of the cliff which did not jibe with the formation of the real of the mass.”

 

Entering the Tunnel:

“After removing the rock, I entered the tunnel which curved downward. Three miles from the mouth of the tunnel, which was seven feet wide and ten feet high, I struck a cross section containing gold bearing ore. Further on, I struck another cross section where this ancient race had apparently mined copper.

 

The air in one section was bad. I believe the other cross sections outcropped on some other part of the mountain. The decline continued and eleven miles inside the mountain and approximately 2300 feet from the surface, I struck what I called “The Village.”

 

Filled With Tablets:

Two rooms about 12 by twenty feet were filled with copper and gold tablets, about three by four inches and concave, so that one laid inside one other. The rooms were literally full of three plates, inscribed neatly. Another room contained many weapons. The tempered copper spears were so that one could bend the head of the weapon to the base of the shaft and it would spring back into place.

 

Streets Laid Out:

“Streets were laid out in the village. In one long room were laid out at angles to the wall 27 skeletons, the smallest of which was 6 feet 6 inches and the tallest more than 10 feet. In another room lay, apparently embalmed by some secret process, the bodies of a man and a woman, dressed in royal robes, which I believe were the king and queen of this race.”

 

Part II

 

“The worship room was beautiful to behold. There on the walls were three great crosses not of the conventional modern type, and a sun designed, worked in copper and gold. The streamers from the sun were worked in gold stringers. There were, I believe 13 statues made of copper and gold.”

 

Lost Race:

“I believe this race of people forms an important link in ancient American history. They were highly skilled craftsman, as their work shows. Because there was a glow to three of these statues, I believe they used radium, and I believe it was with use of radium that they tempered the copper.

 

My wish is to enlist a corps of trained people, whom I shall pay well for their services, to assist me in cataloging these specimens. I want the relics in this cave to remain intact. Those in two other caves which I have located may go to those who have aided me.”

 

Claimed Pictures:

“In a vault in a Texas bank I have pictures of this scene and papers. You see, my family planned to exploit the cave themselves. My wife’s father, my wife, my two daughters, and an old college chum. A series of tragedies struck me. First one died, then another; one was killed in an accident and the others died. I was hurt in an accident. I lost all heart in this ambition, but I’m getting back on my feet again, and if my health holds out, I’ll get started.

 

“Have you ever read or studied anything about the lost continent of Lemuria? Scientists claim it is the connecting link in the story of civilization. I believe here is the key to that lost civilization.”

 

Check out the web store, the PDF Stockton Record News Paper article is a great gift to give to a friend, a family member or anyone who enjoys an unsolved mystery.

 

 

In closing, if anyone would like to leave a comment or share any information regarding this topic, I look forward to reading your reply.

 

Respectfully,

 

Stephen Sindoni

 

Positive Thinking

Posted on February 26, 2017 at 5:20 PM Comments comments (0)

Our topic for today is “Positive Thinking.” In this blog, I will share with you the reader an excerpt from the PDF E Book “Know Thyself that can be found in the web store on this web site. The book shares little know secrets in how anyone can be the best they can possibly be, by following a step by step process. The excerpt reads as follows:

 

In the year 337 BC Philip II of Macedonia invited Aristotle, a renowned philosopher of his day to the Capital city of Pella to undertake the education of his son Alexander, then thirteen. Aristotle labored at the task for four years instructing the young lad forming his mind. Lysimicus taught him to write letters and Leonidus trained his body. Alexander admired Greek Literature and he envied Greek civilization.He was a lover of all kinds of reading and had a passionate thirst for learning.


Alexander was blessed with soft, blue, melting eyes and luxurious blond hair. He was sentimental and emotional. Physically he was strong and well proportioned. Though not tall, he was excellent in all sports and could have easily entered the Olympic Games because of his physical agility.


The Greeks viewed sport as a vital and important form of artistic expression. Only freeborn Greeks were allowed to compete in the games. The athletes were submitted to ten months of rigorous training under the tutelage of professional instructors to prepare for the events.


In Greece, there was no greater fame for a man. Victorious athletesreceived jubilant welcomes as they returned home from competition receiving triumphant processions and were treated as royalty. Statues were erected in their honor and they were held in highest esteem.


Alexander’s friends tried unsuccessfully to convince him to enter the games.Alexander’s response “Only if my opponents are Kings will I compete”. One quality in him dominated all the rest ---- ambition. Alexander was a hero worshiper and wanted desperately to please his father.


Philip spent most of his time away on campaign and upon his return to Pella, was fully occupied with diplomatic affairs and state banquets. He spent very little time with young Alexander. Alexander’s relationship with Philip was rather complex. There was a genuine admiration, but also an underlying competitiveness between the two. He wanted badly to follow in his father’s footsteps. Alexander’s fear was that Philip would leave nothing for him to conquer. The lad was extremely ambitious.



From an early age Alexander was accustomed to the company of politicians, artists, ambassador, and generals. He would imitate their phrases and conversational tone with accuracy. Alexander was destined to become a man of action. Alexander absorbed politics, science, and a love for Homer’s epic “The Iliad.” He lusted for Homeric glory. He saw himself as Achilles a great conqueror, one thousand years before him. He deemed it as the perfect treasure of all military virtue and knowledge.


Alexander would memorize each and every line and recite important passages to build his inner strength, morning, noon, and night. He began to condition his mind to make his vision a reality.

 

Alexander would see himself winning battle after battle. He could taste the victory in his mouth, as if it were red wine. He could smell the incense and myrrh brought back from his conquests. Alexander used the power of his own mind to believe strongly that his creative vision would come to pass. His Life’s purpose and direction were becoming clearer with each passing day.


Alexander conversed with the great scholars of his time until sometimes into the early morning hours. He kept his thoughts clearly focused on unifying the eastern Mediterranean world into one culture.


Once Alexander’s school days were over, he was formally appointed “Regent of Macedonia” and “Master of the Royal Seal.” He was given an experienced council as his advisor.

 

No sooner had Philip left on his Byzantine campaign, a rebellion broke out among the Maedi, a powerful warlike tribe. Alexander without hesitation took an expedition north and defeated the rebels, capturing the city, and renaming it Alexandropolis in imitation of his father’s similar outpost Philipolis.

 

Meanwhile Philip’s campaign was not going well, and he summoned his son Alexander for a decisive battle at Chaerona, northeast of Athens. Philip commanded on the right wing, while Alexander only eighteen, led a pre-dawn cavalry charge on the left, delivering the knockout blow that clinched Philip’s victory.

 

Alexander was a brave soldier whose perseverance marched onward. He led his troops by the brilliance of his boyish imagination. He believed that nothing was impossible and he inspired his generals on to victory.

 

After Philip’s death at the hands of an assassin, Alexander came to power. He was prepared to dominate the world and make his father’s vision a reality. Remembering his father’s words “Oh my son, seek out a kingdom worthy of yourself, for Macedonia is too little.”

 

On a bright sunny day in 334 BC, Alexander led thirty thousand foot soldiers and five thousand cavalry from the city of Macedonia. He also brought along botanists, geographers, and steppers to measure distance. Alexander went forth not only to conquer but survey the new world! Alexander taking the helm of a galley ship navigated south to Troy. His journey to Troy was to obtain a symbol of good luck. He received a sacred shield from the Trojan War nearly one thousand years earlier in exchange for his armor. Alexander believed that he was the hero in Homer’s classic “The Iliad” and that history would again repeat itself.

 

Alexander returned from Troy with the Trojan symbol of good luck and his most treasured possession “The Iliad” which he slept with under his pillow beside his dagger. Armed with the sacred shield he was ready to do battle. Alexander led his men to victory at Granicus River. In the next thirteen years, he mapped unknown territories, built cities,opened trade routes, and stimulated the exchange of ideas between three continents.

 

In the spring of 323 BC, Alexander returned to Babylon, for the last time. Worn out from wounds and hardships, he fell ill with a fever. He could neither move nor speak. He was propped up so that all of his officer’s and soldier’s could file past and pay their respects. Alexander acknowledged each and every man with his eyes. Two days later he died.

 

Alexander’s belief is what made him great. He believed so strongly that his vision came to pass. Alexander stood alone against half the world and because of his positive thinking he encouraged all that he came into contact with, to use the incredible power that lies within each of us. “Know Thyself”

 

Beyond the ancient story of Alexander lies truth. But real truth can only be found from within. Each individual must seek out their own fulfillment in life. The true wisdom of the ages is to “Know Thyself.” Just as Alexander marched through life with confidence and courage, you must do exactly the same if you want to be successful.

 

Alexander knew he had a choice between a long peaceful life or a career of spectacular fame. He chose fame. What will you choose? The decision is entirely up to you. In order to reach the end of your journey successfully like Alexander, you will need to navigate through some rough and unfamiliar waters to become the person that you want to be.

Do you have the confidence and courage it takes to succeed? Do you have the strength and perseverance needed to move forward in spite of the obstacles and despair? If you are having difficulty honestly answering these questions, then I suggest that you follow Alexander’s’ story more closely.

 

Check out the web store, the book is a great gift to give to a friend, a family member, or anyone who needs a way to become a more “Positive Thinker.”

 

In closing, if anyone would like to leave a comment or share any information regarding this topic, I look forward to reading your reply.

 

Respectfully,

 

Stephen Sindoni

 

Below The Radar-Free Download Limited Time Offer

Posted on February 26, 2017 at 5:35 AM Comments comments (0)

Our topic for today is Internet security. In this blog post, I will include the the introduction to my new book "Below The Radar." The PDF E book can be found in the web store on this web site. The "Below The Radar" introduction excerpt reads as follows:

 

Introduction

 

In the early 1990's, I was working as a Video Sales Counselor for a large well known electronics company. My area of expertise was television, VCR, and video camcorders. At that time, televisions were analog and using rabbit ears antennas for broadcast reception. This was at a point in time when we as a nation were still relying on analog technology to watch television programs from local affiliates such as CBS, NBC, and ABC. In total, we had a little over a dozen channels to choose from. All the channels were being broadcast to our living rooms from within a fifty-mile radius. For those individuals who were living further away from the city, these individuals needed to have a high-powered roof antenna to be able to receive television signals to watch television at home. There was no digital television. This was at a time when we didn't even have cable television. But that was all about to soon change.

 

Our store manager held a meeting with the men who worked in the Video, Audio and Computer Departments to inform all of the employees that we would soon be getting a visit from Sales Representatives who worked for electronics manufacturing companies such as Sony, Mitsubishi, RCA, Sharp, JV, Toshiba and many others. The purpose for this visit was to inform us that digital television would soon be replacing the analog television sets that we had all had so become accustomed to. The Sales Representatives would be spreading the gospel that digital television would soon be replacing analog television sets. The Sales Representatives would be coming to our stores throughout the country. As a recall, our company had well over a hundred stores. This in my mind was huge!

 

 

 

Within a matter of days, the first Sales Representatives from RCA arrived with their product lines of digital televisions and went over the features, functions and benefits of each specific model. We were informed that all of our stores within the next sixty days would be soon receiving digital televisions.

 

They would no longer be shipping the analog models. All of their television sets would now be obsolete. The Sales Representative went on to say that the US. government in agreement with the Federal Communications Commission was mandating this change to be in full effect by the year 2000.

 

Being curious by nature, I pondering the thought, “Why would the government get involved with the FCC in this matter?” After our store received the first shipment of digital television sets, I asked one of my friends who worked in the Electronics Return Department to open the back of one the digital televisions.

 

What my friend and I discovered revealed a hidden built-in microphone that could be used to eavesdrop on personal conversations and a web-cam that could be used to watch unsuspecting US. citizens in their own home. Once the television set was connected to the cable box these features could be turned on and used to spy on all of us. Big Brother now had the capability to spy on 67 million households. Does this sound like the book written by George Orwell 1984? It was then I became highly suspicious.

 

What I knew about a television set’s ability to use 525 scanning lines to transmit an image called an aspect ratio, triggered an alarming question. What if someone decided to reduce the 525 scanning lines to create a smaller image, for example, a letterbox smaller, and wider screen similar to what you would see when you went to the movie theater would appear and the unused portion of the television screen could be used to send a higher EMF signal to the set that was designed to send harmful EMF waves to the unsuspecting viewer? Has anyone ever fallen asleep and left the television set on only to find the television screen size has been reduced similar to the letterbox theater image and as a direct result of changing the aspect ratio on your set and using the television set as a weapon of destruction against you, woke up with an extreme headache? It does make you wonder, doesn't it?

 

Has anyone ever set the microwave for let's say two minutes and noticed that somehow while you were standing next to the microwave that the timer setting was changed mysteriously to 20 minutes?

 

How about having the toaster set to a low number and discovering that your toast has been burned to a crisp? And you were standing right next to it? Did you ever wonder where your missing sock went in the clothes dryer? Can anyone reading these words tell me where the missing sock went? I'll leave this riddle for the May-tag repair man television commercial pitch man to figure out.

 

And lastly, how about getting hacked on your Microsoft Windows or Apple Operating System? Then you pick up the phone and call tech support and you explain the problem to the technician who walks you through a couple of steps to fix the problem. But he or she never explains what caused the malfunction. So, if you're like me, you want to know how to troubleshoot the problem to find the solution without ever having to call technical support.

 

The problems that I have cited in this introduction are the main reasons for writing this book. How many of you honestly read the manual (RTM) when you purchase a computer or any other electronic device?

 

Therefore, it is my hope that everyone reading this book will find my tips quite useful in this turbulent times. The information that can be found in this book are the result of over twenty years of my own personal experiences with computer and electronic devices. Most of what I will be sharing with you are little known facts that computer manufacturers will not share with you. Their job is to sell equipment. The more equipment they sell, the more money they will make. It is more to their liking to sell you a new piece of equipment than to fix the computer that one of their customers purchased. Once the computer warranty has expired, you're on your own. The manufacturer, whether it be Apple, Microsoft, Toshiba, Hewlett Packard or any of the other manufacturer, is going to do their best to sell you a new computer.

 

In this book, you'll learn how to turn lemons into lemonade. Remember the wise adage, “The difference between knowledge and wisdom is knowing what to do next.”

 

In closing, it is my hope that the introduction to the book "Below The Radar" has motivated you the reader to purchase the book. You'll learn many things about computers and Internet security that you will not learn anywhere else.

 

If anyone would like to comment or want to share valuable information about this topic, I look forward to reading your reply.

 

Respectfully,

 

Stephen Sindoni

 


Rss_feed