O C U L A R U M
                   

   INDUSTRIAL:// . DataWar. TECH


T
echnology
archives are a depot for white papers, corperate protocols, court documents, cybersecurity reports. The purpose of which is to outline and mitigate vulnerabilities in technology or vulnerbilities in society stemming from its growing reliance in technology. QNX and Cylance are conerstones in secure computing, but so is basic digital hygiene.




TECHNOLOGY ARCHIVES:
...data parsed


   
7750 ETA -
10.5MB 2016 ARK://ETA
technical communication for the swiss made 7750 automatic chronograph. this manual provides complete disassembly and maintaince instructions for the eta 7750


Apollo 11 Owners' Manual -
66.8MB 1969 ARK://NASA
a reccomended read before flying a vintage spacecraft bought at government auction


AT&T Hancock manual -
420kB 2002 ARK://AT&T
Hancock is a C based programming language for processing and auditing large data sets.


AT&T reply memorandum
130kB 2006 ARK://AT&T
in response to court's may 17, 2006 minute order over the collecting of metatdata from our nations internet communications. This document espouses the importance of maintaining secrecy of confidential government matters while failing to properly redact all references to such matters.

Blackberry guard
159kB 2020 ARK://QNX
- datasheet for Cylance security software. Servers running Guard were not affected by the SoloarWinds hack, a 2020 cyber security incident involving 18,000 corporate and government systems.

Cryptol Programming Guide -
1.09MB 2008 ARK://NSA
an NSA programming langauge used for advanced cryptography.


Microsoft Android patents -
267kB 2014 ARK://MSDX
a portfolio of android patents held by microsoft that were aggressively licensed. Microsoft sought to have companies license the confidetial portfolio without first seeing it, and requiring a NDA be signed to do so. Microsoft was believed to take in more revenue from android patents than patents of its own OS.


Microsoft Legal Compliance -
1.65MB 2008 ARK://MSDX
Microsoft Online Services Global Criminal Compliance Handbook conveys what pratical vigilance can be expected of a major corporate data firm.


UFED Physical pro -
6.98.MB 2009 ARK://NSA
technhnical document for cell phone pentration hardware made by Cellebrite Ltd.


RuggedComROSHack.txt -
445kB 2012 ARK://HAX
this simple perl script would act as a password generator for RuggedCom devices. Early computer automated industrial control systems like bridges, traffic lights, and rail systems.















Occultatum est in Mercurio Lumen æqualiter ubique Universi


contact
ocularum

"Concealed within Mercury is a light which pervades all parts of the Universe equally."
     - - Master Therion, Liber LXXVIII, Arcana IX

✸ OCULARUM.INDUSTRIES v3 (Opal interface) ©2021 ✸