It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Major Leak Coming Out - Huma Abedin is the primary leak - Rumor/conspiracy until proven

page: 8
46
<< 5  6  7   >>

log in

join
share:

posted on Aug, 8 2016 @ 11:55 AM
link   

originally posted by: TramperoJuan

originally posted by: butcherguy

originally posted by: TramperoJuan

originally posted by: FlyingFox

originally posted by: nomoredemsorreps
But an assassin, on the other hand, wouldn't care. He's already got his escape planned.


Oh, the assassin has to be a male?


Oh, the assassin has to be a female?

What does it matter?
The assassin could be a hermaphrodite.


...and thank you for making my point for me.

Context clues--they're there for a reason.

I responded to your post because I didn't feel like going back to the original one. And yes, I did back your sentiment up.




posted on Aug, 8 2016 @ 12:08 PM
link   
a reply to: butcherguy

I duly apologize for not bestowing upon you the benefit of the doubt. Some here are capable of screwing up a two-car funeral.

Per the topic at hand, it now appears Assange has guaranteed that his next leak(s) will involve only email-related transmissions. If there exists any video evidence of Clinton treason/wrongdoing/shenanigans, you can bet it'll become the biggest bargaining chip at the table.



posted on Aug, 8 2016 @ 12:24 PM
link   
a reply to: TramperoJuan
Thanks, I understand.
I am patiently waiting for the other shoe to drop, whether it is Wiki Leaks or Snowden.



posted on Aug, 8 2016 @ 01:11 PM
link   

originally posted by: elouina

originally posted by: efabian
a reply to: elouina

Hmm, has anyone looked at what's in the files that you know of? Hope they are worth while. Some very good investigative work can be done with all these upcoming info that's about to arrive. The elections depend on it, lol.



OMG I have to leave for home. I have a treasure trove of files on tons of subjects! Its been done! Hillary is done! See me in PM.


I'm seeing possible money laundering by Correct the Record... Bonner Group. PM.
(I say possible since some Tax loopholes may hold up in court and may limit legal accountability.)



posted on Aug, 8 2016 @ 02:12 PM
link   

originally posted by: efabian

originally posted by: elouina

originally posted by: efabian
a reply to: elouina

Hmm, has anyone looked at what's in the files that you know of? Hope they are worth while. Some very good investigative work can be done with all these upcoming info that's about to arrive. The elections depend on it, lol.



OMG I have to leave for home. I have a treasure trove of files on tons of subjects! Its been done! Hillary is done! See me in PM.


I'm seeing possible money laundering by Correct the Record... Bonner Group. PM.
(I say possible since some Tax loopholes may hold up in court and may limit legal accountability.)


So was the second correct the record file any different from the first? Or were they the same file? If the same, it must be getting circulated.
edit on 8-8-2016 by elouina because: (no reason given)



posted on Aug, 8 2016 @ 02:20 PM
link   
a reply to: elouina

What I have is 1GB of data... not one document.



EDIT: (By source I mean new source.)
edit on 8/8/2016 by efabian because: additional comment



posted on Aug, 8 2016 @ 03:25 PM
link   
I don't get it. What was she allegedly being blackmailed for that was worse than having Hillary pissed at her and losing her job? Treason? Obviously the woman has no shame if she continued to stay with Anthony Wiener.



posted on Aug, 8 2016 @ 03:29 PM
link   
a reply to: kosmicjack


I don't think that Huma staying with Wiener had any more great significance than the screechy one staying with the slick one.

THEY ARE ALL BUSINESS ARRANGEMENTS . . . with the total bottom line purpose of furthering the oligarchy's aims . . . regardless of the stooges involved. The individuals are sold out to "THE CAUSE." . . . along with their egos, their bank accounts, their treason . . . etc.



posted on Aug, 8 2016 @ 04:10 PM
link   
a reply to: BO XIAN

In a sense, all marriages are business arrangements.



posted on Aug, 8 2016 @ 09:49 PM
link   

originally posted by: BlueAjah
a reply to: nomoredemsorreps

Nah, not off topic, since there were instructions in the thread specific to accessing the information of the topic...

Maybe you are just not aware that different virus protection has different settings.
This article might help you:

Understanding Full Antivirus Decompression Layer Limits


The decompression layer limit specifies how many layers of nested compressed files and files with internal extractable objects, such as archive files (tar), MS Word and PowerPoint files, the internal antivirus scanner can decompress before it executes the virus scan. For example, if a message contains a compressed .zip file that contains another compressed .zip file, there are two compression layers. Decompressing both files requires a decompress layer setting of 2.

It is worth noting that during the transfer of data, some protocols use content encoding. The antivirus scan engine must decode this layer, which is considered a decompression level, before it scans for viruses.



A decompression layer could be a layer of a zipped file or an embedded object in packaged data. The antivirus engine scans each layer before unpacking the next layer, until it either reaches the user-configured decompress limit, reaches the device decompress layer limit, finds a virus or other malware, or decompresses the data completely, whichever comes first.

As the virus signature database becomes larger and the scan algorithms become more sophisticated, the scan engine has the ability to look deeper into the data for embedded malware. As a result, it can uncover more layers of compressed data. The Juniper Networks device's level of security is limited by decompress limit, which is based on the memory allocated to the security service. If a virus is not found within the decompress limit, the user has an option to either pass or drop the data.


This is just one example. Most high-end virus security has limits in order to preserve resources. Of course if you have the protection on your hard drive, it should scan each level as you open it. But if you are counting on an on-line service like virustotal.com, as the user in this thread did, without knowing their scan algorithms, there is no way to know how many levels it scanned. Then if you downloaded the file and started decompressing the levels, and someone did not have their own good virus protection on the computer, they could get burned.



Look, your 'levels' has nothing to do with anti-virus not being able to detect viruses inside zip files! The 'levels' you speak of, (and I noticed you didn't respond to all the other proof I wrote) are only there FOR ADVANCED USERS to make the scans faster. You had claimed that buried viruses in zip files wouldn't be detected and that is a blatant falsehood.

Look, I'm about to release an app that searches the contents of files on hard disks because I dislike the windows search method so much. So I'VE BEEN WORKING ON EXACTLY THE THING YOU ARE TRYING TO DISCUSS HERE. And again, I will say it one more time, for people that read your statements and worry that their anti-virus won't be able to find viruses. That's an outright lie and is the kind of lie that makes people worry unnecessarily about their protection.

Any commercial anti-virus WILL search ALL ZIP FILES no matter how many zip files are inside zip files, or iso files, or tar files or gz files or rar files or ANY compressed files that has an algorithm in the public domain. So please ignore this poster, and don't worry about your anti-virus. And NO I do not work for an anti-virus company. Just have 30+ years of experience in this and many other applications and hate to people disseminating disinfo...



posted on Nov, 6 2016 @ 02:23 AM
link   
November 5, 2016

The FBI says that HUMA violated national security protocols, just like her boss. Can you believe that she forwarded (up to) TOP SECRET e-mails to her Yahoo.com account, just because they're easier to print from there?

Full Story: www.allenbwest.com...

I took my annual refresher certification last week for handling sensitive info. The government will fine me $50,000 and assign prison time, if I forwarded just one classified document to YAHOO...or Printed it and left it in a hotel room, like Hillary did overseas.



new topics

top topics



 
46
<< 5  6  7   >>

log in

join