26. not llamas



Ninja Llamas poster. May be repeating. XD Next round maybe we'll have this less chaotic. Maybe there won't be a next round with this set of accounts. Who knows. Upside, we'll have until june to prepare for the next round. Downside: We have a crap ton of other things to focus on so the likelihood we'll hit this well is low. Who knows. NINJA LLLAMAAA

-------------------

Thoughts on ways around the heavy amounts of interference on our computers to be able to get a job again

You consistently miss details and leave messy bits.

    1. This makes you look like not a bot or a professional, but it doesn’t look like you particularly care about what you are doing so if you are trying to sell to anyone serious it would be off putting.
    2. It suggests they’d give you money and get a semi-finished product, with obvious easy mistakes left in like you don’t care.
    3. If it’s because of hacking that you get tired of trying to fix small details cause the hackers make them worse when you try to fix them, that’s different, but it’ll look that way. (They’ve been d oing it to you for years now, so you expect it, so if you want to apply to anything serious, figure out a way around it if you can.)
      1. Possible ways: Completely off line computer, if you can find one that doesn’t have wifi or has to be directly plugged in or can take out the chip. Do your work on it, get a large pack of disposable usbs, don’t put them back into your computer just transfer once. They are cheap enough now that it is sort of possible. 
      2. This will apply for online or computer made resumes as well.
      3. Submitting, your best bet would be a library or school bank of computers where there are a lot of them, and you can quick submit them, likely to have paid for security systems if you can’t afford to pay for them.and your personal computers or phones come under consistent attack, even with security companies.
        1. If you are in a big city, vary what library you use, before you start submitting anything get library cards and use them, check and see if they attack and or how much time before they hit. The temporary passes are good probably, if the attacks seem to be linked to use of your name. 
        2. Be aware that once they start attacking you, advertised security companies that show up in your recommendations will probably be from them, so don’t bite. Heh. 
        3. Most phones are probably corrupt, verizon ones seem to be very suscept by workers at the company, registering in someone else’s name might work, but if they know you do it, might not.
        4. They have enough time, resources and money to target you anywhere any time, so meh.  Pretty much still on meh.
        5. Our current plan is to do the best we can, figure out how we’d do this quickly if we ‘get away’ and that’s it.
        6. Getting away defined as 'out of the reach of hackers, radio shows, people who followed us to tell us they hated us' and so on.

Comments

Popular posts from this blog

Crossbone Pirate, Slink

Crossbone Pirate