4anewway2go.org 23rd Sept. 2025 BTC:- bc1qex3ewcq07480vmf3mrl45ewy6meu9g2m2qpr9h
BTC is accepted for the following surplus items and the account is bc1qex3ewcq07480vmf3mrl45ewy6meu9g2m2qpr9h.

If purchasing use the contact data to notify that payment has been paid.

  • 1. Item For Sale
  • 2. Item For sale
  • 3. Item For Sale
  • 4. Item For Sale
  • 5. Item For Sale
  • 6. Item For Sale
  • Brave Search

This website is being hardened against the always online AI as really it just plagiarizes other peoples content for its own use. Also I do see AI being used as an attack vector against people in coming years.

That is why this webpage has a portal login for approved people to obtain content. This will be expanded and revised as it changes.

Also note that all connections to this website are controlled except for web logins as the firewall is written to prevent all access.

If you are using Linux UFW firewall I would suggest putting the web server access at the top of the user rules then applying a DENY all rule for what follows. Follow this up with another list of rules to connect mail or all other protocols.

Now using systemd timers use start and stop blocking scripts overwriting etc/ufw/user.rules. You will also need to reload the UFW firewall once the file has changed.

Note:- these timers will need to be set on run at boot time.

Make it so the hacker / AI has to connect at a non-specified time to access your system unless it is through the provided web portal login.

You can try and fight hackers all day long it is just not worth the time and effort. So I stop the Dovecot service and put the Postfix MTA to hold messages then release those messages 2-3 times a day.
postsuper -H ALL releases the held emails then systemctl start dovecot now open your email client. Then just systemctl stop dovecot while still working in the email client. All Dovecot probing ends. Now on Postfix if you get persistent probing on your server use ufw deny from may as well as it is not like they will not try other ports to block. But on ufw they still prove Postfix you must move the ***tuple*** rule to be before the ports then they cannot even run command. Ufw puts rules at the end of the list so a hacker can still access open ports? Really!

At the bottom of the ufw user.rules file put these 2 lines

### tuple ### deny any any 0.0.0.0/0 any 0.0.0.0/0 in
-A ufw-user-input -s 0.0.0.0/16 -j DROP

If you run ufw status you will see "Anywhere DENY Anywhere" terminate every connection if it reaches this.
The imap and pop3 ports are not connected once dovecot is stopped so it goes nowhere.
This concept can be worked along with disconnecting services as required. If you block an IP CIDR in another country how many people do you know who you have just blocked - likely not many. So for those that annoy wasting my time I really do enjoy doing this

ufw deny from xxx.xxx.xxx.xxx/16 and like I am going to know anybody else in the 65K ip's that just got blocked?

If people do not like this then maybe they should complain to those who abuse the system. Contacting the abuse@email on the ip is rather pointless and ignored by most anyhow.

Very annoying is the big tech companies who through direct allocation of IP's support all this 3rd party hacking / probing behavior.


E-mail:

Passwd:






e8a62c38-b0b5-4847-b001-d3b592241e9a ff4ed3fe-4af5-4971-bd8c-bcb73f91f084 1bfad385-522d-4e0c-9ee5-b9978f8d5125