Skip to content

Remote Viewing what happened to Flight 19 (Archive 2005)

Remote Viewing What Happened to Flight 19 Remote viewing targets can be divided in to two main types at a fundamental macro level – those that can be validated with tangible feedback, and those that cannot be validated. Scientifically speaking you are not remote viewing unless what you are remote viewing has verifiable feedback to analyze the accuracy of the… 

Remote Viewing the Elizabeth Smart Disappearance and the Dangers of Consensus Analysis (Archive 2002)

Remote Viewing the Elizabeth Smart Disappearance and the Dangers of Consensus Reporting On June 5, 2002, Elizabeth Smart was abducted from her bedroom in her family’s house in Salt Lake City, Utah. A few days later, I was given a tasking by one of my remote viewing teachers and advised it was time sensitive. At this juncture I had received… 

Remote Viewing the Jessica Lunsford Disappearance (Archive 2005)

Remote Viewing the Jessica Lunsford Disappearance – A heartbreaking breakthrough. By 2005 I had established a direct relationship with law enforcement after assisting in several investigations. I was contacted, if I recall correctly, on Friday the 25th with a request for remote viewing data. It was my birthday week so it still sticks in my head a bit as I… 

Remote Viewing Winning Lottery (Archive 2003)

Here’s an excellent example of remote viewing the winning lottery numbers by one of my students for a small “Cash 3” type of lottery from our archives. Alphanumerical information with remote viewing has always been considered by many as “impossible” or quite challenging at the very least. Several methods to work around this difficulty has been utilized over the years,… 

Dirty Sock Snapd Local Privilege Escalation Vulnerability

A local privilege escalation in snapd versions 2.28 through 2.37 that could allow the creation of root level accounts – may give you a Dirty Sock ! Chris Moberly discovered that snapd versions 2.28 through 2.37 incorrectly validated and parsed the remote socket address when performing access controls on its UNIX socket. A local attacker could use this to access… 

PhpMyAdmin Releases Security Update 4.8.5 Patches SQL Injection and Arbitrary File Read

PhpMyAdmin security fix v4.8.5 will patch an SQL Injection and arbitrary file read vulnerability. Security is a daily ongoing endeavor and discipline in today’s online world. In a security blog post the developers of phpMyAdmin announced version 4.8.5 of its software to address a few security related issues. The security fixes involve: Arbitrary file read vulnerability (https://www.phpmyadmin.net/security/PMASA-2019-1) SQL injection in… 

Linux APT Package Manager Remote Code Execution Bug Patched

Original Source: BleepingComputer Independent consultant and security contractor Max Justicz discovered a remote code execution issue in the APT high level package manager used by Debian, Ubuntu, and other related Linux distributions. As described by Justicz, the APT vulnerability present in the package manager starting with version 0.8.15 “allows a network man-in-the-middle (or a malicious package mirror) to execute arbitrary… 

KeePassXC the Secure, Offline, Open Source Password Manager

In a vulnerable web and cloud based world, KeePassXC offers excellent password management that’s secure, reliable, offline by default and open source. A password manager is a tool that creates and stores passwords for you, so you can use many different passwords on different sites and services without having to memorize them all, and/or more importantly avoid using the same… 

Examine Network Socket Connections with Linux ss Command Instead of Netstat

Examine Network Socket Connections with Linux ss Command Instead of Netstat The Linux ‘ss’ command replaces the older ‘netstat’ and makes a lot of information about network and socket connections available for you to easily examine or troubleshoot issues. The ss (socket statistics) command provides a lot of information by displaying details on socket activity. What is a Socket? A…