The Deep Web – A Review of The First Three Issues

.

Access is FORBIDDEN The Deep Web

Access is FORBIDDEN The Deep Web

.

          Welcome back My Dear Readers to The Other Shoe. Today, Friday, I have decided to take the time to review the first three issues of ‘The Deep Web’ prior to continuing with this series. From what I am seeing in my traffic reports, a good many of my current readers are ‘new’ readers. New to The Other Shoe. Having said, I think it prudent that I review the very first three issues so that these ‘new’ readers can catch-up on this series.

.

First, as I wrote and published in the first issue of this series I take no responsibility for your adventures on/in The Deep Web. FYI there are millions of Americans that have very safe and entertaining adventures in/on The Deep Web every single year. Conversely, every year there are many Americans that loose money, their identity, and even access to their bank accounts after just one visit to The Deep Web.

.

As with many aspects of adult life, fore warned is fore armed, and the better you prepare yourself and your computer before you connect to The Deep Web? The better the chance you have of not becoming a statistic, and/or victim. I really want all of you, My Dear Readers, to enjoy reading about this other web, I want you to explore if that is your desire. I just… really want everyone to be safe. As well, I accept no responsibility for any knarlly… yuda, yuda, yuda. (I have a good friend that is always cautioning me to write disclaimers… You know who you are J)

.

Now, just as soon as I have published this review of the first three articles in this series, I am going to write and publish the remaining issues. I have, yet, to share even more information and I want to relay to you some of my experiences in this other web. (Other web… at the Other shoe… how neat!)

.

Now, without further adieu I bring you ‘The Deep Web’ the Review!

.

  • Introduction to The Deep Web – Part One : “Welcome back My Dear Readers, to The Other Shoe. For many months now I have fought an internal battle, with myself. A battle that was not easily lost, nor won. A battle that, unfortunately, I (in some small way) will now hand over to you, My Dear Readers. The battle was/is one of conscience, in that I had to choose a course of action. The ‘high road’ would have left you, My Dear Readers, without knowledge and insight (from me at least) regarding a growing danger. Conversely, the ‘low road’ is the one where I explain to you, My Dear Readers, about this growing danger. In so doing, though, I expose you directly to this danger… and place in your hands the very crisis of conscience I have fought now for many months.” This was the very first article in the series. As such I did my best to introduce you, My Dear Readers, to the LARGER part of the web. You see everyone knows about the World Wide Web (www.), yet it is estimated that less than 20% of Americans (at the time this article was first released) even know of the existence of ‘The Deep Web’. That statistic is changing, and rapidly. I have read that nearly 200,000 new Americans are connecting to this other web each and every month. This is good, and this is bad. Good because this other web is more than 100 times LARGER than the WWW. Bad because venturing into this other web is far more dangerous, and requires much more diligence and understanding of; computers, networking, secure socket layers, computer security, and network security. This is not easy work, and not all Americans are suited for absorbing this knowledge. Those that do venture into this other web without proper preparation and precautions? Run a huge and real risk of having financial information stolen and/or their computer damaged. My writing this series was my attempt to prepare you, My Dear Readers, just in case you were tempted to venture into this other world.
  • The Deep Web – Part Two : “Welcome back My Dear Readers to The Other Shoe. Welcome back to my ongoing series about ‘The Deep Web’, Part Two. First, a little review of some of the material we have already covered.What is Tor? – Tor is an anonymizing browser meant to take advantage of an anonymizing network. This is meant to protect you, the end user, from piracy and hackers by routing your connection to the ‘Deep Web’ through bridges and concealing your IP address.” In this issue, My Dear Readers, I introduce you to the browser best used when venturing or adventuring into The Deep Web. I show you where you can go to download Tor. I explain how to run Tor, how to configure Tor, and how to connect using ‘Bridge Relays’. Further I explain to you all, My Dear Readers, the ‘Rules of the Road’ when venturing into this other web. I give you a lot of the ‘new’ nomenclature for this other web, and some very good words of warning. You see, My Dear Readers, the single best thing I can hope to accomplish is to instill in you, My Dear Readers, the genuine level of… concern… awareness… security awareness…. Paranoia to survive a healthy adventure into the other web.
  • The Deep Web – Part Three : “Welcome back My Dear Readers to The Other Shoe and ‘Part Three’ of ‘The Deep Web’. My ongoing series about the other web, the darker side of the World Wide Web. Today I am going to talk to you, My Dear Readers about two new topics. First, I want to explain and discuss ‘Bridges’ to “The Deep Web’. Second, I want to explain and inform you, My Dear Readers, about creating a ‘virtual Machine’ on your computer as a means of protecting yourself and your computer.” In this issue I had two major objectives. First, I wanted to share with you, My Dear Readers, a scary tale of an old friend who ventures into this other web: A) Unprepared & B) WHILE ARE WORK! Talk about adding insult to injury. If he had been properly prepared, prior to connecting to the other web. Doing so at work would not have resulted in his termination of employment and he would have kept; his apartment, his wife, his car, and his ability to work in his chosen field. [I know this… because I was the one that caught him… and I was the one that ended up firing him… at my boss’s demand] I told a tale of how a young man with a bright future in IT lost that future, due in large part to hubris, because he connected to this other web at work on an unprotected computer placing the private personal information of hundreds of paying clients into the wrong hands. Second, I explained what bridge relays are, how to get a listing of them, and how to connect to this other web via a bridge relay. If your ISP (Internet Service Provider) has rules prohibiting you connecting to this other web, you can use bridge relays to bypass their software/hardware keeping you from connecting. Further, using private bridge relays can protect you for the prying eyes of; hackers, ‘Black Hats’, and all other kind of ‘Bad guys’ that lurk around this other web 24/7/365. As I have stated, repeatedly, My Dear Readers… IF you are going to adventure into this other web I want to do everything I can to help protect you from the (literally) millions of sharks swimming the waters of The Deep Web just waiting for ‘Newand unsuspectingsurfers. My Dear Readers, there is no reason that you should not be able to use and take advantage of, all that this other web has to offer. Just read my articles carefully, take all precautions and follow all directions and you should be safe.

.

Well now, My Dear Readers, which brings us to the very end of this review of the ‘The Deep Web’ @ The Other Shoe. I really hope that you have enjoyed this review, and that once you have read all three of the articles, you come back to read all the rest. Honestly, I never thought that I would ever be writing an article about this other web. Just five years ago, I wouldn’t even have mentioned (on line) that I knew about this other web. For fear that I might be investigated for; having terrorist ties, involved in identity theft, or suspect of trafficking in stolen or illegal goods.

.

Until recently that was pretty much the only reasons one would go to this other web, with any regularity. My Dear Readers, I can tell you truthfully that I have never been involved with any of the activities I just listed, above. Heck, I haven’t had so much as a speeding ticket in more than three decades! My best friend, of 27 years, calls me ‘The Last Boy Scout’… and with good reason.

.

Getting back on point, it is my desire to continue this article series next Friday. Next Friday you should see the fourth issue in this series, all about ‘Virtual Machines’. I will explain just what is a virtual machine, and how to set one up on your computer. I will have links to any needed software and I hope to have a step by step guide. AS well, I will explain just how a virtual machine will protect you as you venture or adventure in/on this other web. Finally, depending on the version of Windows, I will explain if it is really necessary for you to run a virtual machine for your protection. I look forward to bringing this information to you, one week from Friday.

.

It has been my pleasure, as always, to share this information and my time with you, My Dear Readers. Until you visit here, again…

.

Adieu!

.

Thank YOU!

 

.

The Other Shoe eBay Store

http://www.ebay.com/usr/enzomatrixlt

.

Danny Hanning of The Other Shoe - May 6th, 2014

Danny Hanning of The Other Shoe – May 6th, 2014

The Deep Web – Part Three

.

Forbidden Access _ The Deep Web

Forbidden Access _ The Deep Web

.

                Welcome back My Dear Readers to The Other Shoe and ‘Part Three’ of ‘The Deep Web’. My ongoing series about the other web, the darker side of the World Wide Web. Today I am going to talk to you, My Dear Readers about two new topics. First, I want to explain and discuss ‘Bridges’ to “The Deep Web’. Second, I want to explain and inform you, My Dear Readers, about creating a ‘virtual Machine’ on your computer as a means of protecting yourself and your computer.          

.

Remember, venturing into this darker and hacker-filled part of the web is a venture fraught with danger and exposure. Exposure to people and organizations that would just a soon as take your identity and all your money, as give you the time of day. If you recall these darker recesses of the web are populated by (either); Black Hats [hackers with deception and theft only in mind] and White Hats [hackers that have made a conscious choice to use their computer skills to protect or improve the life of their friends and clients]. Most of the time, My Dear Readers, you will not know which you are dealing with… until it is too late.

.

That is why I have decided to focus today’s edition on two methods of protecting your self, your computer and all the computers on your network. Now, I might not have mentioned this in the two previous editions of ‘The Deep Web’. Though, thinking about it… I do not think I could mention this fact ‘too many’ times. When (if) you go to surf “The Deep Web’ you must bear in mind that you are exposing all computers on your network to risk! Not just the computer that you install Tor on, and connect to ‘The Deep Web’, rather all of the computers on; your home network, your company’s network (if you surf from work… something I strongly discourage), or the public or private network you use to connect. As well, if you improperly connect (like directly connecting) to ‘The Deep Web’ the risk will continue long after you have disconnected and turned off your computer.

.

See, the highly skilled ‘Black Hats’ can use information (collected from an improperly connected device to “The Deep Web’) to infiltrate and entire network. They can create ‘Back Doors’ to your home or work network, making it very easy for them to not only gain access. Not only gain access but even commandeer or take control of you; hotspot, Wi-Fi network, LAN network, either home or work public or private. This can occur each and every time you connect to the deep web. Please, keep that in mind every time you connect and all the time you are connected. Vigilance = safety.

.

Once you have downloaded Tor, from a reputable source like the ones I have listed in ‘Part One’. You need to now read about, and understand how to use Bridges (or Bridge Relays) to connect to ‘The Deep Web’. You do not want to connect directly to ‘The Deep Web’ using Tor and no bridges. As well, many Internet Service Providers (Time Warner, Clear Wire, Earthlink, AOL, and others) may work to block you connecting. Many of these companies ‘see’ merely your use of Tor and any efforts to connect to ‘The Deep Web’ as a violation of your ‘Terms of Use’.

.

They can, and many do, use this perceived violation to terminate your internet connection and any contract you have signed. Now, honestly, I have not seen this happen many times at all. However, there is a way that you can greatly decrease the chance they can ‘see’ you use Tor and your connection outside the normal web.

.

Regardless of the reason, be it your access is blocked or you just want to make sure your activities are not ‘seen’ the use of a ‘bridge’ is your best bet. My Dear Readers, I would like to make something abundantly clear! It is my suggestion that you, My Dear Readers, always use a ‘Bridge’ or ‘Bridge Relay’ to make your connections to ‘The Deep Web’. It is my humble opinion that one simply cannot be ‘too careful’ when it comes to surfing and accessing ‘The Deep Web’. I have heard some really terrifying ‘horror stories’ from users. Stories of private networks (at their well paying jobs) being infiltrated, and commandeered, by ‘Black Hats’ with just one connection and/or one transaction.

.

One individual, exercising very poor judgment, did so at their job over the weekend. He was there working on a project on a Saturday, and became bored. He and I had been discussing ‘The Deep Web’ that week while playing WoW together. He had the wherewithal to not use his home computer, and thought that the network at work had enough; hardware firewalls, software firewalls, anti-virus software, Malware scanners, and adequate configuration to protect him and the corporate network. He, not only, connected directly to ‘The Deep Web’ he engaged in a transaction! Yeapers, he connected via one computer to a ‘Bitcoin’ vendor. With another computer he connected directly to ‘The Deep Web’ and went about making a purchase of… (let’s just say) ‘an illegal product’ for his personal enjoyment.

.

See, he did not want his wife to find out he was purchasing… this product. Nor did he want his wife to know that he was using their money to purchase bitcoins and, in turn, the illegal substance. The transaction went through (so he thought) without a hitch. He left his place of work that Saturday afternoon about 2PM, thinking he had ‘scored’ something he really wanted… without a hitch and without anyone being the wiser.

.

Stop THINK and PROTECT Your Family and Your Computer!

Stop THINK and PROTECT Your Family and Your Computer!

.

This is the lesson. He returned to work on Monday morning, bounce in his step because he had finished all the work on the assigned project ahead of time. Much to his dismay; he pulled into work to find unmarked law enforcement vehicles in the lot, a swarm of plain-clothes officers in the hallways, and an IT Director frazzled and sweating bullets. Shortly after getting to his desk he was called into the C.O.O.’s (Chief Operating Officer) office. He was informed that, sometime Sunday, their corporate network was infiltrated.

.

That, just in a matter of a couple of hours, these infiltrators had; managed to commandeer the entire network bypassing all firewalls and software/hardware protocols, hacking their encrypted client database, and stole the financial information of several dozen clients. They had managed to steal financial information of; clients, vendors, workers, contractors and even personal financial information of the Owner. It was a major ‘data breech’ and it looked like they had managed to transfer over ten thousand dollars of corporate assets. They were still contacting their vendors and clients, but it looked like several if each had experienced ‘data breeches’, too.

.

Once these hackers had finished they worked to cover their tracks. They had uploaded a worm, a ‘Logic Bomb’ that went about formatting all computers at the location. They had lost terabytes of information and were working to restore data from disc backups kept off property. However, they did have a time index for the infiltration. A time index that pointed a finger squarely at the weekend worker. Our cleaver ‘Deep Web’ surfer and purchaser of illegal goods. They also had some internal close circuit camera footage that showed he was the only person in the building and using a the computers shortly prior to the ‘data breech’.

.

Needless to say, this individual was immediately fired and escorted out of the building. Lucky for him they were never able to rebuild their servers adequately to directly connect him to the connection to ‘The Deep Web’ that lead to the horrific ‘data breech’. However, if they would have been able to connect this individual to the connection to “The Deep Web’ that lead to the data breech? That person would have been on the hook for; criminal charges and huge financial liabilities. We has so very lucky that those hackers had decided to use heavy handed techniques to cover their electronic tracks. This is the reason that you will want to make sure that you use Bridges or Bridge Relays to connect to ‘The Deep Web’ every single time, and never connect while you are at work!

.

Now, the very first thing you want to do is to download a version of Tor with the Vidalia Bridge Bundle. You can download it here:

.

Tor WITH Vidalia Bridge Bundle

.

For more information on how to use the Vidalia Bundle go here:

.

Further Information on Vidalia Bridge Bundle

.

For a video on how to configure the Vidalia Bundle and how to obtain Bridge Relays go here:

.

Video on Tor Vidalia Bridge Bundle

.

In the video is information on where to send an email (and how to address said email properly) to obtain ‘Tor Vidalia Bridge Relays’. In order to avoid problems with (both) of my blog(s) servers and administrators I am not publishing this information directly. If you follow the links above, you can read and watch videos that make this whole process very easy to follow and execute. If this blog was on my own server I would make my own (up to date) video with step by step directions. However, since I do not want to have my blog(s) blocked or removed for “violations of user agreements…” regarding the publication of “illicit or illegal information” this is the best I can do… at this time. Thank you for your understanding.

.

The bridges are simply a listing of URL(s) like this; https://555.1212. Once you have the listing(s) in the return email, or you know people in your area that are running ‘Tor Bridges’ input this information in the Vidalia ‘Network Settings’ after clicking the box “My ISP blocks Tor connections’. Clicking that box will open up a oblong dialog box. This is where you write/input the ‘Tor Bridges’ and press ‘return’. Once you press return the information you input will appear in the large box below the oblong input box. Once you have more than one bridge relay address’ just double click on the one you want to use and Vidalia will start Tor using the bridge relay of your choice.

.

YES! I know that this is a bit confusing, at first. However, if you feel it is too much effort… or you just do not think I need to? Read the story above, again. I am writing this separate article and stressing these steps and the use of ‘Tro Bridge Relays’ to protect YOU, My Dear Readers.

.

That brings us to the end of ‘The Deep Web – Part Three’. I was going to include the ‘creation of a virtul machine’ in this issue. However, considering the current length of this article and just how confusing this article will become if I continue? I have made the decision to move the process of creating ‘Virtual Machines’ until next week, and Part Four. I hope that I have presented this information in a manner that is understandable.

.

If you have any questions feel free to visit the links, above, and watch the videos and read more about it. I understand that it can be difficult, but we are talking about keeping your computer and your family’s network and computers SAFE! Come back next week for explinations on how to create a Virtual Machine’ on your computer to add a layer of protection to ANY machine or natwork.

.

As always I am deeply honored that you come here to read my work.

.

Thank YOU!

.

The Other Shoe eBay Store

The Other Shoe eBay Store

 

.

The Other Shoe's Daniel Hanning

The Other Shoe’s Daniel Hanning 2/2014

Coming This Week – March 30/31st, 2014

 

The Other Shoe's Daniel Hanning

The Other Shoe’s Daniel Hanning 2/2014

Welcome back My Dear Reader to The Other Shoe. Well now, I would usually write and publish this article on Monday. Yet, something just caught my eye, and I just had to share it with you, My Dear Readers. If you are reading this article on Sunday March 30th, 2014 (or have visited and read articles between Friday March 28th and Sunday March 30th), you are taking part in the single largest influx of visitors my blogs have ever seen. Yes, I have two locations for The Other Shoe. The primary blog located at blog.com and secondary located at wordpress.com. I saw secondary only because it was the second location of my blog launched. Remember, I do everything at both blog locations. Writing, editing, publishing, promotions… everything.

.

On Friday March 28th, the secondary location (at wordpress.com) reached an all time high at eighteen visitors in one day. The following day, March the 29th, my primary blog location (blog.com) had an all time high of twenty-two visitors in one day. Yes, I know… in the grand scheme of things… that is not a lot of visitors. Although, for a my blog… Well, I am proud to announce this news. See, I have Google Analytics monitoring my blog.com location and the sister location at WordPress provides their own analytics, that I check regularly. For those of you, My Dear Readers, that have been with me for awhile, two or more years out of the past four.

.

You will know that I used to publish a series of articles where I shared the results of the analytics. I did this for three years, then I just stopped. I am not too sure as to why. Honestly, it always felt a bit too much like… bragging. Showing off and… well, that is just not me. I am proud when my efforts merit. However, and you can ask anyone that I went to Middle, High School or college with… I do not like to brag, about myself.

.

I am very proud of the traffic I experienced this week, at both blogs. Now, I have worked extremely hard these past three weeks at writing and publishing quality content on a regular basis. Just over the past three weeks I have introduced FOUR new article series. I hope that it is these new articles series that are driving this increase in traffic, and not some factor that I cannot replicate.

.

Now, I would like to share with you, My Dear Readers, what I have planned for the coming week, here at The Other Shoe. Monday, would have… should have seen the publication of this article. However, since I wanted everyone to know (they are part of a historic weekend of traffic), I am not really sure exactly what I will write… tomorrow. I would not be surprised if you saw a new edition of ‘The Mars Report’ or ‘Lost in Space’. Let me tell you all that those two series are the most difficult for me to publish. Writing them is not very difficult. In fact, I greatly enjoy creating the narrative for the images I choose. It is the; downloading of, uploading of, embedding of, and choosing of these images that is quite difficult. I am not complaining, just explaining.

.

This week you, My Dear Readers, will be privy to; an all new episode of ‘The Horror in Smithville’. The boys have… fallen… yeah, right… ‘fallen’ to sleep… and we all know what happens when young boys fall asleepon a rainy night full of thunder and lightening. Next, you will be treated with a new edition of (both); ‘The Mars Report’ and ‘Lost in Space’. Well, that is what I have written right here in my day planner for writing. Yes, I have a writing schedule written out in my day planner.

.

Coming up next will be an all new issue of ‘The Deep Web’. This edition will get a bit more technical, and once done… you will be better prepared to venture into the dark and deep web than ever before. Finally, you will enjoy another episode of your regulars; ‘A Week in Review’ and ‘Sunday Funnies’. Now, I think that I have mentioned it before, I am looking for a political cartoonist. I simply cannot pay, but anyone that would like the practice and exposure for their work, I am looking for someone to add to my ‘Sunday Funnies’ with political cartoons.

.

That brings us to the end of the week of articles, and to the end of this preview of the coming week. FYI – Wednesday afternoon I do have a doctor’s appointment to look at a… ‘growth’ on my jawbone. If that goes poorly… it may negatively impact my writing schedule. However, if it goes well.. then I just might be of the temperament to write additional works not mentioned in this preview.

.

Well, My Dear Readers that brings us to the end of this week’s ‘Coming This Week’. I hope that you have all enjoyed the previews of what is to come… and I hope that you all enjoy the fact that (if you are here on Sunday) you, My Dear Readers, have been part of the single largest influx of visitor traffic in the history of my blogs.

.

As always I am deeply honored that you came here and read my work.

.

Thank YOU!

.

The Other Shoe eBay Store

The Other Shoe eBay Store

http://www.ebay.com/usr/enzomatrixlt

.

A Week in Review – March 29th, 2014

           Welcome back My Dear Readers to The Other Shoe. Well, if it is Saturday then it is time for… … … that’s right, ‘A Week in Review’! And what a week it’s been for you and for me right here at The Other Shoe. We started two all new articles series with; ‘Coming This Week!’ and ‘Lost in Space’. Not to think that we have thrown out all the old, just to make room for the new. We had; ‘The Deep Web – Part Two’ and ‘The Horror in Smithville – Part Three’. If I say so, myself, all in all a busy week indeed!

.

Now, for all of you, My Dear Readers, that are just too busy during the week to read? This is the place to be. Here at ‘A Week in Review’ I post links to all the articles of the week. AS well, I include a short excerpt from the article and a little insight into the origin of the article or some other personal notes. Really, that means that everyone that checks out this series, gets a little more information and insight than those that just read during the week. Making you, a very special My Dear Reader… indeed.

.

So, see as there is quite a bit of content to cover, in this issue, I will cut this introduction a little short and get right to the meat of things. Without further adieu, here is ‘A Week in Review’!

.

  • Sunday Funnies March 23rd, 2014 : “That means that Alex is down to the dregs of his food supply. Long gone are the crunchy corn meal squares he so enjoys. He is out of hazelnuts and down to peanuts and the little tiny bits of food left at the bottom of the bag. Unfortunately, for Alexander, Allen and I are quite bereft of funds to purchase a new bag of ‘Macaw Parrot Food – Kaytee’.” Thanks to the generosity of a very good friend, Alexander got his new bag of ‘Macaw Parrot Food by Kaytee earlier this week. Alexander is very grateful to you, you know who you are… J So, there is no more scrounging around in the bottom of a mostly empty bag of food, and this week Alexander had all of the tidbits and treats he so much enjoys. This Sunday… well, I managed to capture it… You will have to look very close… but I got some footage of Alexander… cleaning his paws on my sheets! Never had a rat do this quite like Alexander, before… it is unique and it make him quite unique, too. ENJOY!
  • Coming THIS Week at The Other Shoe – March 24th, 2014: “This series will be brief. In it I will preview what articles you can come to expect, in the following week. This way all of you, My Dear Readers, can make plans to drop by and read upcoming favorites like; ‘The Horror in Smithville’, ‘The Deep Web’, and ‘The Mars Report’. Knowing that a ‘new’ episode of your favorite article will peak interest, and (hopefully) improve traffic.” And that it seemed to do just fine, indeed. Traffic is up here at The Other Shoe, and that is always a welcome trend. Therefore, I will be continuing this series of previews of the articles to come, in the coming week. This is/was one of the all new articles that came this week. I really put on my ‘Thinking Cap’ and knocked one out of the park, I did. The articles just seem better, the writing… just a bit crisper… and the feeling, well much more jubilant, indeed. We are off to a great start, for the second four years… and the next 400 articles. On with the show!
  • The Mars Report – March 24th, 2013: “Welcome back My Dear Readers to The Other Shoe and ‘The Mars Report’ for March 24th, 2014. With the lost airliner in Asia, the turmoil brewing in the Ukraine, it is difficult to pull our eyes away from all this disaster and look to the skies. However, that is exactly what I did today, and what I am asking you MY Dear Readers to do for the next few moments. Actually, it is comforting to think that not all of our human condition is pain and suffering of other humans. Though it occupies little real estate in; newspapers, Television reporting, cable news networks and even blogs.” This was a smashingly great episode of ‘The Mars Report’. With looks back at where we have been, from overhead in orbit and the ‘MastCam’, too. With spring coming to the Martian surface, we are seeing many sights that only come, one time a year. From sand dunes that look like communicator badges from ‘Star Trek’, to striking pictures of thawing tops to more snad dunes. With the addition of ‘Lost in Space’ this blog has taken a marked turn towards the heavens. I always have looked to the starts, for inspiration and more. Seems my basic impulses have served me well, indeed.
  • The Deep Web – Part Two: “Welcome back My Dear Readers to The Other Shoe. Welcome back to my ongoing series about ‘The Deep Web’, Part Two. First, a little review of some of the material we have already covered.” That we did, review. Then moved on to the most important of all, the ‘Rules of the Raod’. The majorly improatant Do’s and Don’ts of surfing in unsafe territories. If you haven’t, then do you must, read! This issue is the most important to review and read. If I might suggest, this one would be good to print out and keep… by the computer, when ever you desire a venture into ‘The Deep Web’, you go. Serve you well, these rules will, if far from the trodden path your ventures take you.
  • March 25th Personal Update and Video: “Welcome back My Dear Readers to The Other Shoe. Late last week I made a video in celebration of the publication of my 400th article and FOUR YEARS of writing and publishing here at The Other Shoe. I am really happy and very proud of these two accomplishments. Writing was a skill that I picked up late in life, and have run with since day one. This first four years, and first four hundred articles, is just a beginning for me.” Not even noticed, did I that I misspelled ‘Update’ in the title, till now. Oui! I have been quite busy… ‘nose to the grindstone’ even. Well, every once in awhile I like to make a video and show. I am still kicking and that a drug addict, I have not become. So, take a vidie, and enjoy!
  • Lost in Space #1 – March 26th, 2014: “Welcome back MY Dear Readers to The Other Shoe. Today, and with this article, I am launching a brand-new series of articles for The Other Shoe. As you can see from the title of this article the name of this all-new series is ‘Lost in Space’. Yes, I lifted the name from a TV series I very much enjoyed as a boy. However, every month I find more and more articles, about space, that just do not fit into ‘The Mars Report’. Therefore, from this day forward every article about space exploration, space flight, experimentations and space flight, the potential commercial colonization of Mars, and/or any other article I find about space will be found here every week in ‘Lost in Space’.” Very well received, this article was, by you, My Dear Readers. I just had so much more material, from space, that I was dying to share. Create an all new article series, just for you (and the material I had laying about). It went over well, and was not that hard to complete. Therefore, there is a good chance it will be back, in weeks to come. I just love looking at images from space. Time, I seem to make, in every week to see something new. I look forward to sharing even more, in the weeks and months to come. I look forward to seeing you, My Dear Readers, here too!
  • The Horror in Smithville – Part Three: “Yes, I do give a lot of thought to what I am going to write during the day. No, I do not set out dialogue or paragraphs. I see it as it happens, in my mind. Take tonight’s dinner, I saw this dinner several times over the past two weeks, in my mind. However, things happened when I wrote it that I did not see until I sat down today and put voice to program. This story is just growing out of me and I am very much enjoying this process.” I am most happy to say, that this story just keeps growing out of me. I sit down to write a story, and out it comes all fun and ready. This week I have yet to come to gore, nor blood. However, this week we did get quite a little scare! I must say, from what my dreams, and day-dreams, show… this coming week… will likely scare you half to death. Be ready!
  • Words of WARNING!: “Welcome back My Dear Readers to The Other Shoe. Today is Friday, as such this (according to my all ‘new’ writing schedule) is a ‘free’ day. Meaning I leave the day open so that I can write what strikes me, or more on a story that has dominated the week’s news. Quite honestly? The missing airliner… while my thoughts and prayers go out to all those lost… I fear it might be months before we have any kind of closure… maybe even next year with the building winter season and winter weather rapidly closing in on the search teams.” Fridays are an ‘Open Day’ here at my blog. That means that on Fridays I can write what ever takes my whim. Most of the time I write politics, of the continuation of a popular articles from the week. This week, I opened up and shared, with you. Grave concerns I have, about just how sfae any and all of our financial information, is. You see, visiting ‘The Deep Web’ I am hearing… things. Things that worry me so. Worry me with concerns of safety. Safety of our banking and credit and financial everything, I am concerned. You see… there are lots… and lots… and LOTS of people that would like nothing more… than to just burn it all down. Make everybody’s money… GO AWAY! This worries me greatly, indeed. Therefore, I have taken a day, and an article, to share these concerns, and more. Shared, I did, how to make sure you stay safe. How to protect, how to keep safe. Read, and be informed.

.

Well, My Dear Readers, that brings us to the end. The end of another week’s articles, and this wonderful review. Oh, you know that I will be back, soon. I never can seem to stay away. FYI NINE articles, I did write and publish, this week! Weee!

.

Tomorrow, a couple of shorts… of Alexander cleaning his hands! He does it in such a cute way. I hope that you drop by and take a look… see.

.

ENJOY!

.

 

The Other Shoe eBay Store

The Other Shoe eBay Store

 

.

The Other Shoe's Daniel Hanning

The Other Shoe’s Daniel Hanning 2/2014

Words of WARNING!

.

Forbidden Access _ The Deep Web

Forbidden Access – Cyber Terrorsits NOT Allowed!

.        

             .Welcome back My Dear Readers to The Other Shoe. Today is Friday, as such this (according to my all ‘new’ writing schedule) is a ‘free’ day. Meaning I leave the day open so that I can write what strikes me, or more on a story that has dominated the week’s news. Quite honestly? The missing airliner… while my thoughts and prayers go out to all those lost… I fear it might be months before we have any kind of closure… maybe even next year with the building winter season and winter weather rapidly closing in on the search teams.

.

The next two stories; the Ukrainian crisis, and the pseudo-conclusion to ‘Bridgegate’ have cannot build an entire article on either. The Ukrainian crisis has broken, in the favor of the European Union, America, Freedom, self-determination and the real Ukrainian people. Russian President blinked, today. He called President Obama, earlier this week, capitulating to Secretary Kerry’s overtures in the Netherlands. Honestly, winning a stacked) referendum that gave Russia the illusion of control over a province landlocked away from the Russian nation.

.

Russian, and President Putin, were desperate to keep the Ukraine in Russian control, and they ended up with the little tiny Crimea. President Putin won the battle, to loose the war. Not really anything to crow about, and he has now come to President Obama, hat in hand, asking for forgiveness and an end to the crippling sanctions. Bottom line? President Obama won the day, internationally, diplomatically, and for the future of democracy.

.

“Bridgegate’ got a million dollar ‘White-Wash’ a la Governor Christie’s wallet, mayhaps the people of New Jersey will ultimately pay that price. NO interviews are given, no testimony was given, nothing was really investigated and (from what I have read, and heard so far) this was more of a vehicle for personal attacks against two of his favorite people. Don’t be fooled, the real investigation is still underway by; The Legislature of New Jersey, the District Attorney’s Office(s) of the two areas, and a Federal Attorney General’s Office. Those are the investigations that will give us facts and testimony. I can wait… this is not going anywhere, and not going away any time soon.

.

Now, for the topic of this article… My words of warning for all of you, My Dear Readers. Today I saw an article about another company getting hacked and thousands of customer’s card numbers, and other sensitive information, was stolen.

.

The Spec’s warehouse-size superstore… Credit card, debit card and private check information for an estimated half-million or so customers was exposed at 34 of 155 wine and liquor stores owned by Spec’s, including 21 in the greater Houston area, over the past year and a half, the company said Friday.

“The exposure may include customers’ bank routing numbers, card security codes and other payment card and check information.”[1]

.

This data breech affected nearly a half-million customers of this company. The complete scope will be revealed over the coming months. However, this is small potatoes when compared with the major data breech of last year, TARGET. During the holiday shopping season Target was hacked at a historic level.

.

At up to 40 million customers, the breach ranks among the biggest in U.S. corporate history. In 2007, the data of more than 45 million customers was stolen from stores including T.J. Maxx and Marshalls.”[2]

.

Dwarfed by the ‘Crime of the Century’;

.

And in 2011, a hack exposed the credit card information of 100 million user accounts on the Sony PlayStation video game network.”[3]

.

The Target Debacle resulted in every single piece of plastic, in my wallet, being replaced by the end of last year. I didn’t even have to make any requests, as I am a frequent shopper at Target and had used most of all my debit and credit cards at my local Target stores. MY Dear Readers, this is not something on the wane. On the contrary, you can reasonably expect to see this happen more, and more often in the months and years to come.

.

If you are a frequent readers, here at The Other Shoe, then you know that I have started an educational series named ‘The Deep Web’. I started this article series for you, My Dear Readers. You see I understand that most of you have never spent a single moment outside the World Wide Web. Most believe that this part of the internet, is all there is. Far from the truth, as a matter of fact? The Deep Web (aka as ‘The Dark Web’ & “The Spice Road’) is several times larger than the WWW you are familiar. As I explain in my very first edition, the common internet is about 1.5 terabytes is size. Whereas, ‘The Dark Web’ is 7,500 Terabytes in size.

.

Made up of, mostly, ‘White Hats’ and ‘Dark Hats’ this other web is everything you can imagine, and more. I am a “White Hat’ meaning I generally use my computer knowledge for the benefit of others and only engage in writing code for personal use. Conversely, ‘Black Hats’ are all those that seek to use computer knowledge for personal gain, and/or the destruction of virtual realty and wealth. I started learning about computers; learning binary, ‘C’, and other machine and programming languages, in the early 80’s. Actually, I first used a networked computer in 1978 when I played a ‘Star Trek’ based game in a teletype machine via a cradle modem. My father collected teletype machines, starting in 1972. We had two by the time he left the family.

.

Even with my father gone, I continued to work with the teletype machines and taught myself how to connect to early network servers and primitive Bulletin Boards. I just loved all things electronic, and electrical. Computers were a marriage between what I already knew and all new technologies. I continued my studies when I was hired as a answering service operator, in Beverly Hills, that was undergoing a huge upgrade. Upgrading from old cord boards to an electronic switching system and an Hybrid Computer driver Automatic Call Distribution System (ACD). The owner did not know of my pervious electronic and communication experiences until they started the upgrade.

.

Very quickly opportunities presented themselves for me to display my knowledge and understanding. I had already moved up from operator to Morning Shift Supervisor, which gave me ample opportunity to shine. Soon I was going to Answering Service Conventions, Educational Classes at the Manufacture’s Corporate Offices (Star-Tel made the ACD and electronic/Digital switches), and ultimately classes at A.T.&T. offices here in Los Angeles studying Unix.

.

You see, I knew way back in 1983 that the whole future of communications and information was the digital realm. Skills in this area (also known as Kung Foo) would be invaluable in the years and decades to come. Now, I will be the first to admit that my Kung Foo is not so good… kind of dated. However, I have skills enough to warn and to inform. Today I am here to signal a warning to all of you, My Dear Readers.

.

First, I would suggest that you take a look at my series ‘The Deep Web’ right here at The Other Shoe. Now I am not advocating that everyone should surf The Deep Web. On the contrary, unless you have a strong background in information technology I would advise that you stay away from The Deep Web. Many ISP (Internet Service Providers) block access to this part of the web, and some will even discontinue your internet access without warning just for connecting.

.

Blocked access can be circumvented by using bridges (I will be explaining this process and how to use bridges next week in Part Three of ‘The Deep Web’). Although… to be brutally honest? I would suggest that everyone learns as much as you can about this internet, and ‘The Deep Web’. ‘Knowledge is power’[4] (Francis Bacon) is more truthful today, than anytime in history. Many companies that ‘protect your identity’ already check The Deep Web for signs of your; credit card numbers, banking information, social security number and other digital identifiers in order to head off data attacks and identity theft. Yes, My Dear Readers, was are already… there…

.

In preparing readers for engaging with, and surfing, The Deep Web I have outlined practices that are great habits to form, even if you have no intention of ever surfing The Deep Web. They are outlined in Part Two, but I will be reiterating them in upcoming editions of this series, too. Good computing habits are beneficial to everyone and in all situations. I started teaching ‘Good Computing Habits’ back in 1981 to my answering service staff. In our capacity as answering service personnel, we were privy to great deal of; personal information, private data transfers, and sensitive information. Tel-Us, that was/is the name of the service, also provided Telex services, along with answering service, paging, and text transmission of telephone messages. That one was my favorite, and the one service that I sold exclusively.

.

Even in 1983 I could transmit a paper copy of a telephone message to a text printer I installed in your home of office. That way, without anyone calling you on the phone, or disturbing the client, I could forward important or time sensitive messages to a client silently and discreetly. I know, given today’s technology and messaging abilities, it doesn’t sound like much. However, Henry Mancini thought it was a great product and I installed one of our message printers into his home office, personally. The walls of his office were lined with awards, and on the shelves were Oscars and other Academy Awards for his work in soundtracks and the like. Yeah, I really loved that job!

.

My Dear Readers, I want you to keep your eyes on the headlines. Keep watching and mark my words, you will be seeing more and more ‘data breeches’ in the news as the months and years pass. You see, there are huge populations of ‘Black Hat’ hackers in; Russia, China, North Korea and old USSR satellite nations that spend all day every day working to break; firewalls, encryption technologies, data encryption and hardware firewalls in servers. They are raised on this stuff, from a very early age.

.

I was unfortunate enough to, while working as property manager in Westwood, have my identity stolen. I worked with an FBI agent, out of the Westwood office, that worked solely in identity theft and information technology theft-virtual theft. Not only had my identity been stolen, so had a lot of information off of the office computer. Since the company computer had been hacked, corporate executives demanded that I gain all the information I could from this FBI agent.

.

He was the one that enlightened me that there were/are teenage hackers in Russia that spend all night and day doing nothing more than working to steal; credit card numbers, debit card information, banking information, and other sensitive financial information via; phishing, direct computer hacking, and server attacks. These young people are trained, from a very young age, in; computer languages, firewall protocols, encryption technology, and firewall protocols and technology. They are told that the only way they will get out of poverty is if they steal their way out.

.

I want you all to understand the immensity of the problem. How frequent these attacks have become, and how often they are successful. That this problem is only going to get worse, long before it gets better. You see, corporations are insured against these losses to a certain point. However, as a consumer? Your threshold of liability is much higher. Your exposure is far greater. Your losses could be financially crippling, and some could never really recover.

.

Your only defense is; better computer habits, better financial habits, and always be aware when on line. After the Target data breech I received new; debit card (with entirely new information; number, expiration date, security number), credit cards and I was warned in writing to not use my cards inside Target. In the letter it was suggested that I go to a branch bank, withdraw needed funds, and shop with cash at Target “until further notice”. Target was very neglectful in their data practices. They were warned prior to the event, and that is in articles on the web for you to verify.

.

Every single time you swipe your debit card or credit card you take a huge risk. There are even devices that can read credit card information off your card while it is in your wallet. In restaurants there are handheld devices that your server can use to swipe your credit cardand steal all the information that is stored on the magnetic strip. Now, I never let my card out of my sight, when out dining. I try to always shop with cash and only take money out of my account in person in my bank.

.

That is a bit much… for most people. However, I have very limited resources My Dear Readers, and any loss could result in homelessness. Yeah… I live that close to the edge.

.

Today was my ‘Free Day’ here at The Other Shoe. I could take this opportunity to write about anything I wanted. Today, this week, I choose to take the time to sound a warning. A warning to all of you, My Dear Readers, to develop and/or engage in better data practices. Be cautious, as I have explained my current practices with limiting debit/credit card use, make more of a habit of withdrawing money at your bank branch and shop more often with cash. When engaging in purchases and/or financial exchanges on the internet, ALWAYS MAKE SURE you are using a SECURE version of the web site. Look for ‘HTTPS’ up in the URL box at the top of your browser and it should say (in the lower bar) ‘Secure Server’. If you are unsure? CALL their support number and ASK!

.

At home, RUN WEEKLY MALWARE AND ROOTKIT SCANS! Don’t just scan for ‘viruses’ and consider yourself ‘protected’. Here is a very good FREE ‘Malware Scanning Software’ Malwarebuytes[5] (click on that word or use the link below in footnotes). UPDATE this software WEEKLY (at least, I do it EVERY DAY). Also, RUN ‘ROOTKIT’ SCANS WEEKLY (at least). Here are TWO very good – great FREE programs; Malwarebytes-Antirootkit[6], and SOPHOS[7]. Run these scans religiously every week at least, along with your normal weekly Antivirus scans. Once a month, use your Anti-Virus software and run a ‘COMPLETE COMPUTER SCAN’! If your computer has been used by; a friend, a neighbor, a child or grandchild NEVER USE IT for financial transactions or purchasing UNTIL YOU RUN ALL THREE SCANS! (Anti-Virus, Malware and ROOTKIT).

.

I am so sorry if I have scared any of you, My Dear Readers, but these ‘Good Computing Habits’ can protect you, and could (possibly) prevent major financial losses. Check out my series ‘The Deep Web’[8], too. In it I am sharing a lot of ‘Good Computer Habits’ and teaching how to be aware when on line. Developing these good computing habits will benefit you!

.

In closing, My Dear Readers, if EVER I can; be of assistance, provide information, help with a potentially infect computer, provide resources for scanners or removal or ANY data and information references, software suggestions? PLEASE DO NOT HESTITATE TO CONTACT ME! You can leave a message as a comment here at the blogs, you can ‘Friend’ me on Facebook and we can communicate there, or I have left my email several times on this blog. I WILL ALWAYS HELP anyway I can, and it will be my pleasure to help you STAY SAFE!

.

As always I am deeply honored that you come here and read my work.

.

Thank YOU!

.

P.S. My Dear Readers, I have written and presented this article because I CARE! I have GRAVE concerns over the increase of cyber-terrorism… and have this… suspicion that… soon… it will become… much worse. Please exercise caution and read this article as many times as needed… to gain a FULL understanding of this gorwing and dire problem. Take Care! 🙂

.

The Other Shoe eBay Store

The Other Shoe eBay Store

http://www.ebay.com/usr/enzomatrixlt

.

The Other Shoe's Daniel Hanning

The Other Shoe’s Daniel Hanning 2/2014

 

Introduction to The Deep Web – Part One

Access is FORBIDDEN The Deep Web

Access is FORBIDDEN The Deep Web

.

.

                 Welcome back My Dear Readers, to The Other Shoe. For many months now I have fought an internal battle, with myself. A battle that was not easily lost, nor won. A battle that, unfortunately, I (in some small way) will now hand over to you, My Dear Readers. The battle was/is one of conscience, in that I had to choose a course of action. The ‘high road’ would have left you, My Dear Readers, without knowledge and insight (from me at least) regarding a growing danger. Conversely, the ‘low road’ is the one where I explain to you, My Dear Readers, about this growing danger. In so doing, though, I expose you directly to this danger… and place in your hands the very crisis of conscience I have fought now for many months.

.

But, first, a disclaimer for myself (Daniel Hanning) and The Other Shoe. Any, and all, information I am about to relay to you, My Dear Readers, I do so for proposes of entertainment and edification only. I, Daniel Hanning, as well as any parties associated with the; writing, editing, publication, transmission and distribution of this article (and of The Other Shoe) accept no responsibility either directly or implied for any actions or results of any actions you, My Dear Readers, may take upon reading this article and the information contained therein. We are all adults and our actions are those of a person exercising free will. I have not, nor will I ever, use any means of enticement or suggestion (subliminal or otherwise) to induce or illicit any actions or behavior on the part of any person or persons that read my blog or any material continued therein. This disclaimer starts on this day (March 12, 2014) and continues in perpetuity.

.

Now, with all the legal mumbo jumbo out of the way I will continue on with the show. Today I begin this series of articles on this Wednesday, and it will continue on Wednesdays until complete. This series of articles is/does, for the time being, replace the regularly scheduled for this day slot ‘The Adventures of Princess Nadia – The Healing Light’. I do not know if I will start sharing my progress of this novel… I really am riding the fence on that decision. I am getting advice from both sides of the decision. Many are telling me that I could greatly increase traffic with sharing this novel. Conversely, I am told that by releasing the progress, excerpts, and sharing plot developments and character changes and growth, I jeopardize the commercial viability of (what could… will likely be) my greatest written work to date. ‘The Adventures of Princess Nadia’ truly is the greatest thing I have ever written. I have spent, literally, years of thought on its; plot line(s), characters, character development, technology, and story.

.

Having said, to release too much of my work surely jeopardize the eventual success of any and all of the novels I intend to write for Princess Nadia. Therefore, I am seriously considering making Wednesday(s) into something different. For the time being, this something different is/will be… … … The Deep Web!

.

The Deep Web is the other part of the internet (world wide web) that most of you, My Dear Readers, have never (and will likely never need to) access The Deep Web. Now, you may well ask “How do you know if I have, or haven’t, used The Deep Web?” Good question answered quite easily. Have you installed ‘Tor’ on you computer? If you answered “No” then I am correct that you have never accessed The Deep Web. Conversely, if you answered either “Yes” or “Not Tor, but another Deep Web Browser” then I was incorrect in my statement.

.

Translation; My Dear Readers you cannot access The Deep Web via; Google or any search engine NOR can you access The Deep Web using; Internet Explorer, Firefox, Mozilla, Chrome or any normal browser. Tor is downloaded, roughly, 800,000 times DAILY! Once installed, Tor will give you access to 6,500 hidden web sites. The world wide, that you and I use daily… i.e. Facebook, Google, Skype, ect… is roughly 19 terabytes. Conversely, The Deep Web is 7,500 terabytes, or 7.5 petabytes. Nineteen compared to seven thousand five hundred! Everywhere you have ever been, on your computer or tablet or cell phone, has been limited to the mere nineteen terabytes of information and The Deep Web, where most of you have never ventured, is nearly 400 times larger.

.

Now, I imagine that the very first question most of you, My Dear Readers, are asking is;

.

        “If it is so much larger? Why have I never heard of this ‘other’ The Deep Web, before?”

.

This is where I have made one of the biggest mistakes in my career as a writer, especially a blog writer. Many of you, My Dear Readers, have heard about The Deep Web in just the past few weeks or months. It has appeared, front page, in Time magazine. They have done a piece on The Deep Web of ’60 Minutes’, recently. As well, if I am not very much mistaken? Even ‘Fox News’ has made mention of The Deep Web in just the past three months. MY hesitation in providing this information to you, My Dear Readers, may well have jeopardized the potential impact of my writing this article. On the other hand, today there is substantially more information available on The Deep Web for all of you to access. That means that if you, My Dear Readers, do decided to venture into this larger world? You will have the opportunity to be far better prepared for that adventure, than you could have been even last October.

.

Back to the question above; “Why have I not heard of The Deep Web, before?”

.

Reason; The Deep Web is an underground community of sites that can provide; illegal drugs shipped to your door, guns and ammunition banned by U.S. laws, Identity thieves and identities for sale, illegal pornographic materials and even… assassins for hire. The Deep Web is the place for all internet criminal activity. Having said, the majority of you, My Dear Readers, have nor will have any use for The Deep Web.

.

As you can well imagine, the laymen going into The Deep Web is a target for all manner of; thieves, charlatans, crooks and ‘Bad People’. If you do not properly prepare yourself, and your computer, for this adventure you will be taken advantage of and likely will have you identity (and other personal information) stolen. Like ‘the other side of the tracks’ in real life, The Deep Web s is not a place to go to just look around or window shop.

.

The Deep Web was, until very recently, the home of ‘The Silk Road’. Like the namesake on the Asian continent, The Silk Road on The Deep Web was a marketplace for all manner of illegal and illicit materials and services. The Silk Road was busted in the later part of 2013. There are those, that once were a part of or worked The Silk Road, that have every intention of “Rebuilding the Silk Road”.

.

In order to surf The Deep Web you will need to prepare. First, you will need a Deep Web Browser. As I mentioned above Tor is the most widely used and easily found and installed Deep Web Browser. There are others and they can be found by searching the normal internet for “Deep Web Browser”. Second, in order to purchase anything on The Deep Web you will need to exchange your money into Bitcoins. Bitcoins are the only currency that is accepted for illegal or illicit goods and services on The Deep Web. .

.

There is a huge downside to even this simple exchange. More than one ‘Bitcoin Bank’ has been bankrupt in just the last year.

.

        After the collapse of Mt. Gox, now Canada-based virtual currency exchange Flexcoin has been forced to close down.

Flexcoin said flaws in its software code enabled hackers to make off with bitcoins worth around 440,000 euros.

“As Flexcoin does not have the resources, assets, or otherwise to come back from this loss, we are closing our doors immediately,” it said in a statement.

A message posted on its website explained that the attack had exploited a flaw in its code on transfers between users and involved inundating the system with simultaneous requests to move coins between accounts.” [1]

.

Ironically hackers, and others engaged in illegal and illicit activities, solely use ‘Bitcoin’ and it was hackers that caused the failure of these Bitcoin Banks. As I was told when I was a young boy, by my paternal father (a manufacturer of bootleg booze during prohibition) “There is NO honor among thieves”. That statement is as true in the twenty-first century, as it was in the twentieth. Therefore, one should exercise extreme caution when exchanging dollars (or Euros) into Bitcoin. One should only exchange exactly the amount you will need for the single transaction you intend. Nothing more, period.

.

Access Forbidden Screen

Access Forbidden Screen

.

OK, My Dear Readers, I am experiencing a great deal of difficulty writing this article. When I started, over three hours ago, I was ‘ok’ and my hands were working satisfactory. Since then I have switched over to my program and am speaking, to write this article. However, now my pain and other neurological difficulties are making even that process… extremely difficult. Therefore, (hopefully) before these difficulties manifest in tone or structure I am going to bring this, Part One to an end. That is correct, this is only Part One of The Deep Web here at The Other Shoe.

.

For the next several weeks, every Wednesday I will continue to bring you more and more information on/about The Deep Web. I will do my level best to take you, My Dear Readers, through all the precautions that I would take prior to surfing The Deep Web. Further, I will do my best to give you an idea of; what to expect, how to act/speak and where to go. Again, I am in no way shape or form advising anyone to ever go to The Deep Web. However, I understand human nature and mankind’s insatiable curiosity for all things unknown and taboo. That is why I will do my best to prepare you for an adventure into The Deep Web.

.

Forbidden Access _ The Deep Web

Forbidden Access _ The Deep Web

.

In closing, I wish to be perfectly clear to everyone: just because I know… things… about The Deep Web? That does not mean, it does not stand, that I have ever or will ever visit The Deep Web. I have never engaged in any illegal or illicit activities, now or in the future, on or in or about The Deep Web. I have no criminal record of any kind from any time. I haven’t even had as much as a speeding ticket in more than THRITY YEARS! I beseech you, My Dear Readers, to not allow my writing this article to effect/change your opinion of me in any way shape or form. That would just crush me… honest. As Allen (who has lived with me, and knows me best in this world) my partner of twenty-six years often says of me ‘Danny is the ‘Last Boy Scout’”. I follow the rules regardless. More times than I can count I have played by the rules even though doing so has cost me opportunity, money, and even my health. In everything I do I ask myself “What would my father think of me, if he found out?”

.

As always I am deeply honored that you come here and read my work.

.

Thank YOU!

.

The Other Shoe eBay Store

The Other Shoe eBay Store

www.ebay.com/usr/enzomatrixlt

.

The Other Shoe's Daniel Hanning

The Other Shoe’s Daniel Hanning

 


James Radcliffe

Meditations on Philosophy, Strategy, and Life

Otrazhenie

Reflection

Allen's World

Personal Blog of Allen Hanning

J T Weaver

When you got nothing, you got nothing to lose. — Dylan.

Invisible Mikey

philosophic topics and the arts

tigerboose

a videolog about tigers

Hiking Photography

Beautiful photos of hiking and other outdoor adventures.

Movie Dr

Independent movie reviews and more...

palisadespete

10 Facts to Get You Started

The Other Shoe

Home to; 'Lost in Space', 'The Mars Report', 'News From Around the World', 'A Week In Review', and 'Sunday Funnies'

Ruijssantos's Blog

Na na na na naaaaa

%d bloggers like this: