Do you have an account?


Make sure you have an account on the remote system. It might be the same as the username you use on your local system, or it could be something different.

On the popular Raspbian distribution, the default account username is pi. But other Linux distributions may require you to set up a unique new user when you install it. If you don’t know your username, you can use your distribution’s control panel to create one. On my Raspberry Pi, I set up a jhall account that matches the username on my everyday Linux desktop machine. More Information Here!!

Set up #SSHD on the remote system

Your Linux system probably has the SSH daemon (sshd) installed. It may even be running by default. If not, you can easily set up SSH through whatever control panel you prefer on your Linux distribution. I run Fedora ARM on my Raspberry Pi, and I can access the control panel remotely by pointing my Pi’s web browser to port 9090. (On my home network, the Raspberry Pi’s IP address is, so I connect to If the SSH daemon isn’t running by default, you can set it to start automatically in Services in the control panel. More Information Here!!

In America alone, there are over 120 Deep Underground #Military Bases situated under most major cities, #US #AFBs, US #Navy Bases, and US #Army Bases, as well as underneath #FEMA Military Training #Camps and #DHS control centers.

There are also many Deep Underground Military Bases under Canada.

Almost all of these bases are over 2 miles underground and have diameters ranging from 10 miles up to 30 miles across!

They have been building these bases day and night, unceasingly, since the 1940s. These bases are basically large cities underground connected by high-speed magneto-levity trains that have sped up to 1500 MPH.

The Black Projects sidestep the authority of Congress, which as we know is illegal. There is much hard evidence out there. Many will react with fear, terror, and paranoia, but you must snap out of it and wake up from the brainwashing your media pumps into your heads all day long.
Are you going to be a rabbit in the headlights, or are you going to stand up and say enough is enough?

The US Government through the NSA, DOD, CIA, DIA, ATF, ONI, US Army, US Marine Corps, FEMA, and the DHS has spent in excess of 12 trillion dollars building the massive, covert infrastructure for the coming One World Government and New World Religion over the past 40 years.

There is the Deep Underground Military Base underneath Denver International Airport, which is over 22 miles in diameter and goes down over 8 levels. It’s no coincidence that the CIA relocated the headquarters of its domestic division, which is responsible for operations in the United States, from the CIA’s Langley headquarters to Denver.

Constructed in 1995, the government and politicians were hell-bent on building this airport in spite of it ending up vastly overbudget. Charges of corruption, constant construction company changes, and mass firings of teams once they had built a section of their work were reported so that no “one” group had any idea what the blueprint of the airport was.

Not only did locals not want this airport built nor was it needed, but everything was done to make sure it was built despite that. Masonic symbols and bizarre artwork of dead babies, burning cities, and women in coffins comprise an extensive mural as well as a time capsule – none of which is featured in the airport’s website section detailing the unique artwork throughout the building.

DIA serves as a cover for the vast underground facilities that were built there. There are reports of electronic/magnetic vibrations which make some people sick and cause headaches in others. There are acres of fenced-in areas which have barbed wire pointing into the area as if to keep things in, and small concrete stacks that resemble mini-cooling towers rise out of the acres of nowhere to apparently vent underground levels.

The underground facility is 88.3 square miles deep. Basically, this Underground Base is 8 cities on top of each other! The holding capacity of such leviathans bases is huge. These city-sized bases can hold millions and millions of people, whether they are mind-controlled, enslaved NWO World Army Soldiers or innocent and enslaved surface dwellers from the towns and cities of America and Canada.

There is Dulce Base, in New Mexico. Dulce is a small town in northern New Mexico, located above 7,000 feet on the Jicarilla Apache Indian Reservation.

There are only one major motel and a few stores. It’s not a resort town and it is not bustling with activity. But Dulce has a deep, dark secret. The secret is harbored deep below the brush of Archuleta Mesa.

Function: Research of mind-related functions, genetic experiments, mind control training, and reprogramming. There are over 3000 real-time video cameras throughout the complex at high-security locations (entrances and exits). There are over 100 secret exits near and around Dulce. Many around Archuleta Mesa, others to the south around Dulce Lake, and even as far east as Lindrith. Deep sections of the complex connect into natural cavern systems.

Level 1 – garage for street maintenance.

Level 2 – garage for trains, shuttles, tunnel-boring machines, and disc maintenance.

Level 3 – everyone is weighed, in the nude, then given a jumpsuit uniform. The weight of the person is put on a computer I.D. card each day. Change in over three dollars requires a physical exam and X-ray.

Level 4 – Human research in ‘paranormal’ areas – mental telepathy, mind control, hypnosis, remote viewing, astral traveling – etc. The technology is apparently here to allow them to know how to manipulate the ‘Bioplasmic Body’ Development of a laser weapon that can remotely cause burns and discomfort on its target. They can lower your heartbeat with Deep Sleep ‘Delta Waves,’ induce a static shock, then reprogram, Via a Brain-Computer link.

Level 5 -security is severe. Armed guards patrol constantly and in addition to weight-sensitive areas there (are) hand print and eye print stations. Here, is the device that powers the transfer of atoms.

Level 6 – Level 6 is privately called ‘Nightmare Hall’. It holds the genetic labs. Click Here To Read More!!

The abandoned computer laptop that this video and other photographic evidence was discovered on include material that featured Biden in the throes of a major drug binge and having an affair with his dead brother’s wife.

Of course, liberal media did their best to bury the story so it wouldn’t see the light of day and end up going viral.

But apparently, the sleazy Hunter was not only sleeping with his dead brother’s wife, but was having a sexual relationship with her married sister at the same time.

This man has no moral compass whatsoever.

Above: Beau Biden, Elizabeth Secundy; image credit: Facebook

“Hunter Biden had a controversial affair with his brother Beau’s grieving widow Hallie, while exchanging raunchy texts, ‘partying’, and even renting a house with her sister, can exclusively reveal,” The Daily Mail said.

“Hallie Biden’s older sister, Elizabeth Secundy, who was recently separated from her husband of 15 years, referred to Hunter as her ‘prince’ and told him she loved him, in a series of text messages dating back to 2016,” the report continued.

“The pair’s relationship was revealed in files and emails recovered from Hunter’s laptop – the contents of which became public last year after it was abandoned at a Delaware computer shop,” it added.

Yes, you read that correctly. Hunter was having sex with his dead brother’s widow and sending dirty text messages and FaceTiming with her married sister from the shower. How sick and twisted is this guy? Click Here To Read More!!


AUGUST 07, 2020 11:14 AM
Click Here To Read More!!

To limit physical exposure, virtual dating has provided a new outlet to meet new people while staying safe. Where before there might have been reservations about meeting people virtually and over the internet, dates over FaceTime and conversations over text is now the socially-acceptable, socially-distanced thing to do.

Face-to-face video chats can provide some level of connection by establishing a sense of presence, even in the virtual.

“It’s kind of brought what was already happening out of the closet,” Kelly-Jones said.

Before fostering intimacy on an online platform, Kelly Jones said there are precautions to take first:

Use secure platforms.

Ask yourself if you trust the person. When creating a space of vulnerability over the internet, know that there is the possibility of screenshots and screen-recording.

Biometrics continue to make headways into mainstream personal computers and device-based online environments, with Google bringing Face ID biometrics to the iOS version of its Chrome browser, and Microsoft releasing a new multi-factor authentication password manager with support for biometrics, dubbed Autofill, as an extension for the Edge and Google Chrome browsers.

Feb 20, 2021
Chris Burt
Click Here To Read More!!

Governments are facing decisions on their digital ID systems, with a new single sign-on (SSO) system planned for all government services in the UK, governance questions in Australia and the a call for the Netherlands to act on a legal footing and foundational digital ID. Canada’s DIACC has released its annual checkup on public perceptions of digital ID in the country.

The Draft ID Management Bill could help propel South Africa towards a digitally evolved economy, but work remains to line up the country’s ID system with the ten principles the government has laid out for identity management, Law for All Managing Director Jackie Nagtegaal writes for Maverick Citizen. Operationalizing the Protection of Personal Information (POPI) Act would help, but the Department of Home Affairs needs more funding to carry out the other steps needed, Nagtegaal argues.

The forced innovation of digital identities could lead to passports for those currently blocked from them by financial barriers or a lack of foundational ID, Adil Khan of GSMA’s Mobile for Development Team writes for Turkish state broadcaster TRT World. Khan refers to the rapid changes that have enabled the registration of births with mobile phones in Pakistan and the introduction of authentication via voice biometrics in Kenya as signs of the opportunity for social transformation through joint public and private sector engagement on digital ID.

Enterprise blockchain could be the key to finding a balance between digital identity and user privacy, R3 Head of Venture Development Ivar Wiersma writes in a guest post. By confirming the validity of credentials without actually storing personal information, Wiersma writes, decentralized identity solutions based on blockchain could meet data privacy requirements and protect user control in a sustainable way.

Optimism abounds for publicly traded biometrics companies, as Idex Biometrics’ latest fundraising effort is a private placement worth $27.5 million. Earnings reports from Fingerprint Cards and Nuance show strong positioning, and InterBio was valuated at $52 million in its recent acquisition. Ipsidy wants all its shareholders to vote during its March 22 meeting to carry out the structural changes it needs to make for a planned uplisting.

An Apple patent filing adds dozens of new claims to its original invention of a system to implement its face and fingerprint biometrics in the same i-device, perhaps responding to the challenges of Face ID while masked. Startup GBT Technologies, meanwhile, has filed a patent application for a system for smartphone-based facial recognition that works with or without masks, with a single enrollment.