Post A Pic Of Your Pc Here :)

I still have no idea what the hell the thing is. It just looks like a bunch of hard drives and a cheap PSU. Is that not what it is?
 
It is a portable place where all the UAC top secret classified data is being scanned,checked,verified,processed and stored to and it is the primary key element in using the data in to the useable technological resources which is encrypted using existing encryptions which is then encrypted using custom multiple different encryptions (made in C#) which are also protected by multiple different hash codes which are physically separated on 10 different small flash memories in order to prevent the hack breach and are valid only if they are all physically connected in the correct order and are only valid if the correct multiple hash codes entered in the UAC security software (made in C#) match the multiple hash codes in the UAC security software itself together with the multiple hash codes on the physically separated flash memories which are also encrypted using existing encryptions and which are then encrypted using custom multiple different encryptions.

If the above procedure is not done,all the data on the UAC data device is completely useless and all you will see are many random numbers in many different text files (approximately 500 MB per text file).
There are no programs or/and operating systems which you can use to make the data useful if the above procedure is not done using the UAC security software.
 
Last edited:
All 10 disks are Seagate 500 GB 7200 RPM.I am talking about those thin ones:
seagate_st500dm002.jpg


Once I get enough money I will buy 10 new Seagate drives of 6 TB.But Seagate will make 6 TB drives next year anyway (so they say) so it's too soon to think about that now. :P

As for RAID,I don't use RAID.I just hate RAID.And that is why I made my own software which does exactly what I want.Right now I am making some minor optimizations on it...


So for now I have 10 x 500 GB what is in total 5 TB.
And once Seagate starts selling 6 TB drives I will get 10 of those when I get enough money.And then I will have 10 x 6 TB what is in total going to be 60 TB. :P:D
But until I get 10 of those,it will pass some time lol.For now 10 drives of 500 GB is MORE THAN ENOUGH lol.


The good news about the UAC data device is that I have designed it on the way that ABSOLUTELY EVERYTHING can be easily changed. ;)


For now I am just thinking about the MASK which I would like to make for the UAC data device.By the "MASK" I mean on a new black box in which I would put it in so that it looks nicer. :D
Such as this:
lego-computer-1.jpg


Any ideas?
 
It is a portable place where all the UAC top secret classified data is being scanned,checked,verified,processed and stored to and it is the primary key element in using the data in to the useable technological resources which is encrypted using existing encryptions which is then encrypted using custom multiple different encryptions (made in C#) which are also protected by multiple different hash codes which are physically separated on 10 different small flash memories in order to prevent the hack breach and are valid only if they are all physically connected in the correct order and are only valid if the correct multiple hash codes entered in the UAC security software (made in C#) match the multiple hash codes in the UAC security software itself together with the multiple hash codes on the physically separated flash memories which are also encrypted using existing encryptions and which are then encrypted using custom multiple different encryptions.

If the above procedure is not done,all the data on the UAC data device is completely useless and all you will see are many random numbers in many different text files (approximately 500 MB per text file).
There are no programs or/and operating systems which you can use to make the data useful if the above procedure is not done using the UAC security software.
So the device itself is just a bunch of hard drives, but you have software that encrypts the data on the drives?
 
Each hard drive contains a little bit more than 500000 files.A program I made in C# converts every single file of ANY type (such as text,image,video and so on...) to a simple RTF text files which are then encrypted using many many many different encryption procedures including my own.And in order to even perform either ENCRYPTION or DECRYPTION of all the data (as I said in my previous post) you must have multiple encrypted hash codes which are physically separated on 10 different flash memories and in order to use even them,they must ALSO be decrypted first.

Here is an example of ENCRYPTED DATA on the UAC data device - disk 1 of 10.I will use just 10 files I just made up as an example:

UAC data number 1.rtf
UAC data number 2.rtf
UAC data number 3.rtf
UAC data number 4.rtf
UAC data number 5.rtf
UAC data number 6.rtf
UAC data number 7.rtf
UAC data number 8.rtf
UAC data number 9.rtf
UAC data number 10.rtf

Once the long procedure described above OR/AND in my previous post is performed using the UAC software I made in C# then all the encrypted data is decrypted and those 10 RTF text files will turn into the following 10 files.Once again I am using just 10 files I just made up as an example:

My house.jpg
Harry potter movie.avi
School presentation.doc
Inbox emails.eml
PayPal registration.htm
Malwarebytes.exe
Registry backup.reg
Relaxing music.mp3
Game files.torrent
Math.txt


So in the above example you can now see how ALL my data on the UAC data device is protected.

As I said before...each hard drive (all 10 of them) contain a little bit more than 500000 files which are located in many different folders.The UAC software I made in C# goes through all the folders and converts every single file (no matter what type of the file is) into RTF text file whos data is then encrypted using multiple different encryption procedures including my own.And of course as I also said before in order to perform either ENCRYPTION or DECRYPTION process of all the data you must have multiple encrypted hash codes which are physically separated on 10 different flash memories and in order to use even them,they must ALSO be decrypted first.And of course those hash codes are completely USELESS if you don't have all physical 10 different flash memories or if all 10 of them are not connected in the right order.
And ONCE all this has been done,you will also be asked to type in multiple passwords which are then compared to multiple encrypted hash codes which are later DECRYPTED if the first password is correct and then later passwords you type are compared to already decrypted hash codes.And if ALL typed passwords ARE correct then the ENCRYPTION or DECRYPTION process will start.And of course it will take some time to finish since we are talking about thousands and thousands and thousands and thousands and thousands and thousands and thousands of files.

So since all 10 disks contain SO MANY files (over 500000) and since they are ALL encrypted with the UAC software then that means exactly what you are thinking right now:

Over 500000 RTF text files and NOTHING ELSE. ;)
Of course ALL that text is actually something else,but nobody knows what it is. ;)





Cheers!
 
Last edited:
Crikey, 500,000 RTF files. I can't begin to imagine how much space that must take up. The school insisted that I did my IT coursework in RTF format and once I started adding pictures and stuff the file sizes went up to about 200MB just for one document with about 4 or 5 pages of text and a couple of pictures. I converted them all to docx just to make life easier for me, but man all of those RTFs must be taking up space.

So once you have decrypted these RTF files, you can turn them back into their original file format, or are they stuck as RTF forever? If they're stuck being RTF forever, aren't they useless?
 
So basically all it is a big backup machine with all your files on it?
Crikey, 500,000 RTF files. I can't begin to imagine how much space that must take up. The school insisted that I did my IT coursework in RTF format and once I started adding pictures and stuff the file sizes went up to about 200MB just for one document with about 4 or 5 pages of text and a couple of pictures. I converted them all to docx just to make life easier for me, but man all of those RTFs must be taking up space.

So once you have decrypted these RTF files, you can turn them back into their original file format, or are they stuck as RTF forever? If they're stuck being RTF forever, aren't they useless?
What happens when you lose one of the memory sticks or when one fails?
Very good question. Since the data is being split between 10 drives, what happens if a drive fails too? Is there any sort of redundancy?
He said he hated RAID, so I doubt it.

Uhhh...
You did not really understand what I was trying to say...
In my previous posts (including the latest ones) I said multiple times how things work...I guess nobody read those posts...

So I will try my BEST to explain you this again.If some of you AGAIN don't read the post then it's your fault lol.

RED LETTERS = What is the UAC data device...
BROWN LETTERS =
What is the UAC data device used for...
BLUE LETTERS = How is the data protected...
PURPLE LETTERS = How is the data organized...
GREY LETTERS = How the data looks when it is encrypted and how the data looks when it is decrypted...

The UAC data device is a unique portable place where all the UAC top secret classified data is being scanned,checked,verified,processed and stored to and it is the primary key element in using the UAC data in to the useable technological resources.

The UAC data device is used to contain all of the personnel sensitive data from many different people,companies,organizations and a lot more.What the actual data is I can't tell you.

Due to it's grand importance,all the UAC data on the UAC data device (every single file) are first converted to RTF text files whos information is then encrypted using multiple different existing encryptions which are then encrypted using custom multiple different encryptions (made in C#) which are also protected by multiple different hash codes which are physically separated on 10 different small flash memories and are valid only if they are all physically connected in the correct order and are only valid if the correct multiple hash codes entered in the UAC security software (made in C#) match the multiple hash codes in the UAC security software itself together with the multiple hash codes on the physically separated flash memories which are also encrypted using multiple different existing encryptions and which are then encrypted using custom multiple different encryptions (made in C#) and in order to even use the hash codes from those 10 physically separated flash memories they must be decrypted first.
And in order to perform any of this,you must type multiple different passwords.So in order to perform either ENCRYPTION or DECRYPTION process of all the data you must have multiple encrypted hash codes which are physically separated on 10 different flash memories and in order to use even them,they must ALSO be decrypted first.And of course those hash codes are completely USELESS if you don't have all physical 10 different flash memories or if all 10 of them are not connected in the right order.
And ONCE all this has been done,you will also be asked to type in multiple passwords which are then compared to multiple encrypted hash codes which are later DECRYPTED if the first password is correct and then later passwords you type are compared to already decrypted hash codes.And if ALL typed passwords ARE correct then the ENCRYPTION or DECRYPTION process will start.And of course it will take some time to finish since we are talking about thousands and thousands and thousands and thousands and thousands and thousands and thousands of files.
If the part of the UAC data is stolen by someone or if all the UAC data is stolen by someone,it is still virtually impossible for absolutely anyone to make the stolen UAC data even useable since in order to make it useable 10 physical flash memories are needed and must be connected together in the right order in order to create ONE PEACE OF INFORMATION CONTAINING ENCRYPTED HASH CODES which is used by the UAC security software (made also in C#) which makes all the UAC data useable if all typed passwords are correct.
So if the person who stole the UAC data does not have all those 10 physically different flash memories then it is virtually impossible for that person or/and absolutely anyone else to unlock the information.Not to mention that the person who stole the UAC data ALSO needs to have the UAC security software and know all the long passwords.
In short...if the person who stole the UAC data does NOT have all 10 physically different flash memories,UAC security software and all the needed passwords then it is VIRTUALLY IMPOSSIBLE FOR ABSOLUTELY ANYONE ON THIS PLANET TO MAKE ANY OF THE UAC DATA USEABLE.

All the data on the UAC data device is stored on 10 different hard disk drives.The data organization is actually pretty simple.All the UAC data is stored on the first 5 hard disk drives.Other 5 hard disk drives are just identical copies of the first 5 hard disk drives.The data is backed up using the UAC data backup software (made also in C#).
So if one of the hard disk drives die,no data will be lost.

When the UAC data (every single file of any type) is encrypted,they all turn into nothing more but a simple RTF text files.They can be opened in simple programs like WordPad,but all the user(s) will see in any of all those RTF text files is a lot of text which does not make absolutely any sense.
When the UAC data (every single RTF text file) is decrypted,they all turn back into their original state and the user(s) can use them normally just like they have never been encrypted in the first place.
Here is an example...let's say a video file called "The movie.avi" which is big...let's say 700 MB.
When the file is encrypted it looks like this:

UAC data number 1.rtf - approximately 690 MB to 710 MB

(The size of the encrypted file is never the same as it is when the file is decrypted.But the difference is just few MB.So in this case this 700 MB encrypted video file would approximately be 708 MB or 693 MB.But it really depends on the file's integrity itself)...

When the file is decrypted it looks like this:

The movie.avi - 700 MB

(The file is now back to it's original state and can be normally played in a video player such as Windows media player,VLC media player and so on)...

ABSOLUTELY SAME APPLIES FOR ALL OTHER FILES OF ANY TYPE!




Huh!
Well that would be it.I tryed my best to explain you this as best and as short as I could.





Cheers!
 
Last edited:
Bought this in the middle of september. This is a good mobile gaming laptop. I also have a few other prebuilt desktops right now but do not have a custom desktop as of right now need to save up for one.



Uploaded with ImageShack.us
 
...So once you have decrypted these RTF files, you can turn them back into their original file format, or are they stuck as RTF forever? If they're stuck being RTF forever, aren't they useless?

Short answer:
As I said in my previous post...once RTF files are decrypted,they ARE turned back into their original file format. ;)
There would be no point in keeping them all as RTF text files lol.Since that would be useless lol.





Cheers!
 
Uhhh...
You did not really understand what I was trying to say...
In my previous posts (including the latest ones) I said multiple times how things work...I guess nobody read those posts...

So I will try my BEST to explain you this again.If some of you AGAIN don't read the post then it's your fault lol.

RED LETTERS = What is the UAC data device...
BROWN LETTERS =
What is the UAC data device used for...
BLUE LETTERS = How is the data protected...
PURPLE LETTERS = How is the data organized...
GREY LETTERS = How the data looks when it is encrypted and how the data looks when it is decrypted...

The UAC data device is a unique portable place where all the UAC top secret classified data is being scanned,checked,verified,processed and stored to and it is the primary key element in using the UAC data in to the useable technological resources.

The UAC data device is used to contain all of the personnel sensitive data from many different people,companies,organizations and a lot more.What the actual data is I can't tell you.

Due to it's grand importance,all the UAC data on the UAC data device (every single file) are first converted to RTF text files whos information is then encrypted using multiple different existing encryptions which are then encrypted using custom multiple different encryptions (made in C#) which are also protected by multiple different hash codes which are physically separated on 10 different small flash memories and are valid only if they are all physically connected in the correct order and are only valid if the correct multiple hash codes entered in the UAC security software (made in C#) match the multiple hash codes in the UAC security software itself together with the multiple hash codes on the physically separated flash memories which are also encrypted using multiple different existing encryptions and which are then encrypted using custom multiple different encryptions (made in C#) and in order to even use the hash codes from those 10 physically separated flash memories they must be decrypted first.
And in order to perform any of this,you must type multiple different passwords.So in order to perform either ENCRYPTION or DECRYPTION process of all the data you must have multiple encrypted hash codes which are physically separated on 10 different flash memories and in order to use even them,they must ALSO be decrypted first.And of course those hash codes are completely USELESS if you don't have all physical 10 different flash memories or if all 10 of them are not connected in the right order.
And ONCE all this has been done,you will also be asked to type in multiple passwords which are then compared to multiple encrypted hash codes which are later DECRYPTED if the first password is correct and then later passwords you type are compared to already decrypted hash codes.And if ALL typed passwords ARE correct then the ENCRYPTION or DECRYPTION process will start.And of course it will take some time to finish since we are talking about thousands and thousands and thousands and thousands and thousands and thousands and thousands of files.
If the part of the UAC data is stolen by someone or if all the UAC data is stolen by someone,it is still virtually impossible for absolutely anyone to make the stolen UAC data even useable since in order to make it useable 10 physical flash memories are needed and must be connected together in the right order in order to create ONE PEACE OF INFORMATION CONTAINING ENCRYPTED HASH CODES which is used by the UAC security software (made also in C#) which makes all the UAC data useable if all typed passwords are correct.
So if the person who stole the UAC data does not have all those 10 physically different flash memories then it is virtually impossible for that person or/and absolutely anyone else to unlock the information.Not to mention that the person who stole the UAC data ALSO needs to have the UAC security software and know all the long passwords.
In short...if the person who stole the UAC data does NOT have all 10 physically different flash memories,UAC security software and all the needed passwords then it is VIRTUALLY IMPOSSIBLE FOR ABSOLUTELY ANYONE ON THIS PLANET TO MAKE ANY OF THE UAC DATA USEABLE.

All the data on the UAC data device is stored on 10 different hard disk drives.The data organization is actually pretty simple.All the UAC data is stored on the first 5 hard disk drives.Other 5 hard disk drives are just identical copies of the first 5 hard disk drives.The data is backed up using the UAC data backup software (made also in C#).
So if one of the hard disk drives die,no data will be lost.

When the UAC data (every single file of any type) is encrypted,they all turn into nothing more but a simple RTF text files.They can be opened in simple programs like WordPad,but all the user(s) will see in any of all those RTF text files is a lot of text which does not make absolutely any sense.
When the UAC data (every single RTF text file) is decrypted,they all turn back into their original state and the user(s) can use them normally just like they have never been encrypted in the first place.
Here is an example...let's say a video file called "The movie.avi" which is big...let's say 700 MB.
When the file is encrypted it looks like this:

UAC data number 1.rtf - approximately 690 MB to 710 MB

(The size of the encrypted file is never the same as it is when the file is decrypted.But the difference is just few MB.So in this case this 700 MB encrypted video file would approximately be 708 MB or 693 MB.But it really depends on the file's integrity itself)...

When the file is decrypted it looks like this:

The movie.avi - 700 MB

(The file is now back to it's original state and can be normally played in a video player such as Windows media player,VLC media player and so on)...

ABSOLUTELY SAME APPLIES FOR ALL OTHER FILES OF ANY TYPE!




Huh!
Well that would be it.I tryed my best to explain you this as best and as short as I could.





Cheers!
So there are still two issues.

1.) What happens if a flash drive gets stolen, lost, corrupt, or otherwise unusable? Can you re-create the hash file on that flash drive?

2.) What if someone breaks into your house and steals the entire device? What kind of physical protection do you have in place?
 
I must say this is pretty damn cool, good job S.T.A.R.S. :good:

I hope the data itself is important enough to be secured like that, I really do lol.
 
Back
Top