HACKER DUDE, THIS VIDEO IS FOR YOU. THE NET IS CLOSING.
Even though there are those trying to stop me. That would be the http://timetravelinstitute.com through their associated friends and connections through out the internet which I have labeled and call "THE CONSPIRACY AGAINST TIME TRAVEL."
Also, I am still moving this blog but after I noticed they are now doing a 24 hour a day 7 day a week hacking on me which every bit is being logged and reported to the FBI on a daily bases. I decided to open my blog back up since it is the reason I am getting hacked in the first place.
The conspiracy against time travel:
HTTP://TIMETRAVELINSTITUTE.COM RAINMAN AKA RAY AND DARBY AND AARON AND GRAYSON AT CONSPIRACYCAFE (A STUPID FORUM) AND SOME MORE OF THEIR FRIENDS AT WIKI AND ABOVETOPSECRET.COM AND THE LIST GOES ON. THEY DO NOT WANT ME TALKING ABOUT TIME TRAVEL THEY WANT ME OFF THE INTERNET.
HAY ASSHOLES!!!! (ITS NOT WORKING!!!!!!!!!! BAAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAHAHA!!!!!!!!!!!!)
YOU PUSSIES AINT GOT NOTHING!!!! LIKE I SAID PAM FROM THE TITOR STORY COULD KICK ALL YOUR ASSES WITH BOTH HANDS AND ONE LEG TIED BEHIND HER BACK.
BY THE WAY. I STILL WANT TO KNOW IF YOU GUYS ARE RESPONSIBLE FOR TITOR LEAVING THE INTERNET? DID YOU GUYS DO TO HIM WHAT YOU ARE DOING TO ME?
The FBI may want to look at this blog too. I also will be visiting A LOT MORE FORUMS. I installed a another firewall today. It is not on everything yet but it will be. It wont stop Aaron from living in my router but it should stop him from owning my computers. Also, My old linux is gone. Sorry Aaron I know you loved that system since you viewed my screen and got my passwords and looked at my project files. At least you did not get all my code. Thank god I was not using it for anything and had stopped using time travel one station.
I will be eventually changing all my passwords and getting rid of my old encryption and re-encrypting everything again brand new. Yeah, the kid was capturing my keys on my keyboard I think since he got my credit card info and emailed me what I was seeing on my computer screen. THINK YOU FOR TELLING ON YOURSELF AARON.
Aaron was kind enough to put in the emails what the conspiracy against time travel wants from me. Here are their demands.
1. Stop using Reactor1967 as a user name.
Not going to happen. Hell, I am looking at setting something up so
The only problem is these guys have been distracting me from my real work. TIME TRAVEL WITH INFORMATION. I work a lot and have a problem falling a sleep when I get home but I will get back to a regular bed time schedule and try to do heather things and buy some energy drinks and get back to work.
Now, normally any sane person would not do this but since the security of my router is already toast things to MY GOOD FRIEND AND PAL Aaron and because I promised a while back to publish my logs here is my router log for today. This is what my router log looks like most days thinks to my good friend and pal Aaron. Hey, Aaron, is this how you treat your mentors? He said I was his mentor. This is what I get for trying to help someone learn my skill. Anyway here is the router log.
Well coming to some new conclusions. That Aaron has a interest in the fake timetravelinstitute.com.
That a lot of the very stupid shit I accused Darby and Rainman of may have been the spooled brat antics of a boy in a grown man's body that plays on the computer 24/7.
Living at home with mommy and daddy that refuses or wont get a job to support himself and live his own life.
When I Google-ed him I saw his college stuff and that he was in a frat. I saw what looked like one or more failed business in his attempt not to get a job.
But, one thing is certain Arron is not working along in this. Him and his friends are working together to try to keep me from talking about time travel on the internet which is where the conspiracy comes in that I talk about. This blog is a log of their attempts to stop me. It is the proof they do not want the world to see.
They do not want people knowing what they do.
Which now has turned into cyber stalking, cyber bulling, harassment, fraud, theft, copy right violations and is quickly turning into a legal case. They are the reason Titor's family had to sue them.
Again, I wonder what is their full interest in time travel. I think it may be money. In titor's case they were trying to use his name. In my case they want my technology and want me gone. Not going to happen.
So, Aaron lives at home and computers is his life. Darby is a ex-cia wanna be time traveler and wanna be scientist.
I do not really know what Rainmans problem is besides being a bully. He is probably a wanna be too.
Here is the problem here. These guys are not the professionals they want to be. They have fields they come from but in the field of time travel THEY DO NOT KNOW JACK SHIT. BUT THEY THINK THEY DO. AND THEIR OWN WEB-SIGHTS SAY THEY ARE NOT REAL. THEY THEMSELVES HAVE SAID THEY DO NOT BELIEVE IN TIME TRAVEL. SO, WHAT IS THEIR BUSINESS WITH ME???
Now, I started off calling these guys thugs, rodents, and bullies. Now I can add criminals to their list of personality’s flaws. I have a bad feeling that Aaron who does not want to work will most likely get his wish for being taken care of. But, it will be in jail or prison where he cant play his video games and use his laptop with internet 24 hours a day. Sleeping and playing as he wishes will be the old days and bubba will be his new frat brother.
God forbid they give him a shovel or a trash can. I do not think Aaron could handle it. I don't think that kid can handle real life. Now, he is a young guy. He is probably being hanging around Darby and Rainman for years. Those guys are thugs. If they have been Aarons teachers. His mentor's. No wonder Aaron is so fucked up!!! Hell, they are just one great big happy dysfunctional family of thugs, rodents, trolls, bullies, and now criminals.
He once told me to get my shit together. For him I have these words and they are constructive. "GROW UP". Before its too late. I will continue to fill out my legal complaints on these guys and hopefully in time the law will deal with them.
I have learned one thing about the FBI. They take their dam time but when they roll it is too late and their suspect is usually shit out of luck. In time that may be Aarons fate. If he continues to steal for income it most certainly will be. Aaron told me "I am not scared of the FBI." Dude, you should be. You really really should be.
All in all the truth about the conspiracy against time travel is coming out slowly but surely. Aaron is up early today. At 7am he started attacking my forum with account spam and has 5 hits on it. Already for today he is done a dos attack on my home router.
Yeah, I have a big FBI report to fill out tonight. I am beginning to think Aaron was behind a lot of shit that happened on the forums. It seems like Rainman and Darby would leash their dog up but I guess they prefer to let it run free. Im hopping the dog kennel/FBI will catch it.
I want to leave everyone with the attempted harassment Aaron sent me this morning. He has sent me this type of message 3 times now.
So, when using my sensitive software I will usually disconnect the internet from it first. If I do allow it to be connected I will be monitoring the network. Most of the time it will not be connected at all. Probably only when I need a package upgrade even then I will offload my sensitive shit first.
So, I will be getting my internet life back. Thanks to Aaron who pushed me to write my first book. Now when I really get my bad ass software running again and my new stuff too my internet network will be more secure.
Have you built a time machine or discovered a way to time travel? We're looking for time travelers interested in being in a documentary on the subject. If interested, shoot an email with a bit about yourself and your time traveling endeavors to firstname.lastname@example.org
[DoS Attack: RST Scan] from source: 184.108.40.206, port 443, Tuesday, January 07, 2014 17:47:16
[DoS Attack: SYN/ACK Scan] from source: 220.127.116.11, port 20201, Tuesday, January 07, 2014 17:44:52
[DoS Attack: RST Scan] from source: 18.104.22.168, port 443, Tuesday, January 07, 2014 17:33:10
[DoS Attack: RST Scan] from source: 22.214.171.124, port 443, Tuesday, January 07, 2014 17:18:01
[DoS Attack: RST Scan] from source: 126.96.36.199, port 443, Tuesday, January 07, 2014 17:17:51
[DoS Attack: ACK Scan] from source: 188.8.131.52, port 80, Tuesday, January 07, 2014 17:11:12
[DoS Attack: RST Scan] from source: 184.108.40.206, port 80, Tuesday, January 07, 2014 16:50:45
[DoS Attack: RST Scan] from source: 220.127.116.11, port 443, Tuesday, January 07, 2014 16:49:04
[DoS Attack: RST Scan] from source: 18.104.22.168, port 443, Tuesday, January 07, 2014 16:48:45
[DoS Attack: RST Scan] from source: 22.214.171.124, port 44405, Tuesday, January 07, 2014 16:46:47
[DoS Attack: SYN/ACK Scan] from source: 126.96.36.199, port 44405, Tuesday, January 07, 2014 16:46:28
[DHCP IP: 192.168.1.3] to MAC address 1c:4b:d6:79:89:5e, Tuesday, January 07, 2014 16:28:02
[DoS Attack: RST Scan] from source: 188.8.131.52, port 443, Tuesday, January 07, 2014 16:26:10
[DoS Attack: RST Scan] from source: 184.108.40.206, port 443, Tuesday, January 07, 2014 16:26:10
[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Tuesday, January 07, 2014 16:18:33
[DoS Attack: RST Scan] from source: 220.127.116.11, port 443, Tuesday, January 07, 2014 16:12:39
[DoS Attack: RST Scan] from source: 18.104.22.168, port 443, Tuesday, January 07, 2014 16:12:36
[DoS Attack: RST Scan] from source: 22.214.171.124, port 443, Tuesday, January 07, 2014 16:12:35
[DoS Attack: RST Scan] from source: 126.96.36.199, port 443, Tuesday, January 07, 2014 16:12:24
[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Tuesday, January 07, 2014 16:11:37
[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Tuesday, January 07, 2014 16:06:07
[DoS Attack: SYN/ACK Scan] from source: 188.8.131.52, port 80, Tuesday, January 07, 2014 14:57:47
[DoS Attack: SYN/ACK Scan] from source: 184.108.40.206, port 6005, Tuesday, January 07, 2014 14:23:24
[DoS Attack: SYN/ACK Scan] from source: 220.127.116.11, port 4500, Tuesday, January 07, 2014 14:09:04
[DoS Attack: TCP/UDP Chargen] from source: 18.104.22.168, port 43760, Tuesday, January 07, 2014 14:01:36
[DoS Attack: SYN/ACK Scan] from source: 22.214.171.124, port 80, Tuesday, January 07, 2014 13:43:45
[DoS Attack: RST Scan] from source: 126.96.36.199, port 443, Tuesday, January 07, 2014 13:43:31
[DoS Attack: RST Scan] from source: 188.8.131.52, port 9001, Tuesday, January 07, 2014 13:43:30
[DoS Attack: SYN/ACK Scan] from source: 184.108.40.206, port 6688, Tuesday, January 07, 2014 13:38:33
[DoS Attack: SYN/ACK Scan] from source: 220.127.116.11, port 80, Tuesday, January 07, 2014 13:33:08
[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Tuesday, January 07, 2014 13:22:21
[DoS Attack: SYN/ACK Scan] from source: 18.104.22.168, port 6688, Tuesday, January 07, 2014 11:31:41
[DoS Attack: SYN/ACK Scan] from source: 22.214.171.124, port 80, Tuesday, January 07, 2014 08:35:23
[DoS Attack: TCP/UDP Chargen] from source: 126.96.36.199, port 55536, Tuesday, January 07, 2014 08:18:54
[DoS Attack: SYN/ACK Scan] from source: 188.8.131.52, port 80, Tuesday, January 07, 2014 07:08:03
[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Tuesday, January 07, 2014 04:03:15
[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Tuesday, January 07, 2014 04:03:15
[DoS Attack: TCP/UDP Chargen] from source: 184.108.40.206, port 59929, Tuesday, January 07, 2014 02:14:23
[DoS Attack: TCP/UDP Chargen] from source: 220.127.116.11, port 60349, Tuesday, January 07, 2014 01:00:14
[DoS Attack: SYN/ACK Scan] from source: 18.104.22.168, port 80, Tuesday, January 07, 2014 00:49:03
[DoS Attack: SYN/ACK Scan] from source: 22.214.171.124, port 80,
Well I got my code for speeding my programs. I dropped using the threads for now because I like my stuff to run on different compilers on different operating systems. So, I am just increasing my buffer size and paging to memory.
Well early this morning I posted again at a forum on Craigslist in Boston in the science & math. Now, usually the conspiracy against time travel Cyber Stalks me on the internet and when they see me post something they try to get it deleted or at least raise such a fuss in the thread no one remembers to the op (original poster).
What I posted was a brief explanation about myself and my method of time travel and pointed them to my links. But, Craigslist makes a new person wait seven days before they can post links so posted what they should search for on bing to find my sites.
Well as luck would have it (no it was not luck it was stalking) Aaron posted to. He once told me the conspiracy was finding me by my user name. What he should of said was he was finding me by my user name. What Aaron has to say to me was not very nice. First of All Aaron did not go by his real name. But, what he said to me and how he said it is how I new it was him.
First of All. Here is a sample of one of Aarons emails to me.
"Wow fuck me I just overwrote my entire project. Well fuck it I'll redo it another time."
Now, here is the message from Craigslist. I am leaving out the user name so as not to offend Craigslist for now.
Aarons message on craigslist
"Wow! Congratulations! 2014-01-11 05:52:43
I used my version of your system to determine your future success and fame by reading some MS Word files I'll be writing about you in 2017 and storing on my laptop for retrieval today. Sorry to will-hear about your accident, and, if it is on your hard drive, please don't mention what will happen to my family in 2016. It's only one eye, and it will be replaced by an artificial one in 2023. I don't want the insurance companies or The Division of Children and Family Services to learn about it for obvious reasons."
So, Aaron and this user both started off with Wow. Now, what got my attention was the personal information contained within the post that normal people would not know. You see Aaron and I exchanged over a thousand emails. He was wanting me to teach him about my method of time travel and wanted my code and my programs.
Aaron had said me might write about me in the future in his emails to me. Here he said he is writing about me. Though I thought it would only be me apparently he stole a lot of my information from my files and plans to use it for his own financial gain. Now he said my version. Aaron has used our emails probably to commit copyright infringement on my books, programs, and code. He talked about a laptop. Aaron has a laptop. A black one if I am not mistaken.
Here Aaron mentions a Accident for me. HE IS THREATING ME!!!!! FBI YOU SEEING THIS SHIT!!!!! What is this exchange one eye for another. Sounds like me may be threating my family.
He said something about mentioning about what will happen to his family. Apparently he had to give me his ID before I would talk to him and I found out who he was and who is family was. So, he is expressing concern about his family. (Yeah Aaron you should be concerned. You exposed your family to a stranger on the internet.
That will be helpful for me later as I am considering contacting Gary and Suzanne. I will send Gary a letter and all our emails and pictures and ask him to secure his internet and his son. I am sure your sister Ashley will be glad to hear you are exposing her to strangers on the internet too. Yeah boy, you are dragging your family into a world of shit if this goes south for you.
How will Gary and Suzanne and Ashley deal with visiting you in jail. What if I was a crazy freaking nut. How would they deal with that? Boy, you have a lot of shit to think about. They soon will have to think about this too because I am not going to let your hacking me just go. You need to go tell them what you have done because I assure you I will make sure they know sooner or later. As I said I may be contacting your family.
Oh yeah, they live up by Boston, MA is that correct? Your dad and mom runs a computer business? You sis is a facility manager right? So, it is their home that you are attacking me over the internet from. YEP, IM GETTING A HOLD YOUR DAD LITTLE BOY!!!
Your dad needs to secure his shit. But, you also mentioned web bots in your emails to me so the FBI might look for where you planted your web bots. If your dads internet shut off tonight I doubt your internet attacks would stop. I also know you have your computer science friends to.
Also one night when I caught Aaron in my computer (my firewall told me) I pulled up my gedit and starting writing smack about his family. The file was not saved nor was it sent over the internet. When I got done I simple deleted what I wrote and closed the windows unsaved/unsent.
I wanted to see if Aaron would throw that back at me later on either by email or when I visited the forums. I wanted to see if Aaron was running a key logger on my computer. Here he was concerned about his family and has verified that he read the smack I thought I was typing in private on my home computer keyboard. So, Aaron was committing a crime when he read the smack I was writing.
So FBI - KEYLOGGING CONFIRMED BY MY HACKING OF MY COMPUTERS. So, I have confirmed Aaron connected to my VCN service now I have confirmed Aaron was recording what was being typed on my computer keyboard. You guys can arrest him now.
The insurance companies. I am assuming he is talking about his theft of my credit card from BARCLAY CARD. I guess he is assuming they are insured for his credit fraud. Maybe he thinks I am filing a complaint with my home owners insurance because of his hacking my home computers. Having to buy a new router and install Linux bricks. (My Linux bricks I had some problems so Aaron is still living in my home network.)
My hard drive he is referring to my computer files.
Now here Aaron mentions something.
"The Division of Children and Family Services to learn about it for obvious reasons."
He appears to be making some sort of threat against myself and my family.
YEAH AARON YOU CALL THE DIVISIOIN OF CHILDREN AND FAMILY SERVICES.
TELL THEM YOU ARE HACKING MY 15 YEAR OLD DAUGHTER THROUGH PORT 443 (ITS IN MY LOGS I HAVE POSTED IN THIS BLOG).
TELL THEM YOU ARE CONNECTING TO MY UNDERAGE PRETEEN DAUGHTERS WEBCAM YOU FUCKING SICK FREAK CHILD PORN PERVERT. I HAVE TWO DAUGHTERS. ONE IS FIFTEEN ONE IS AROUND 7. BOTH HAVE TABLETS WITH WEBCAMS.
YOU TELL THEM THAT!!! I HOPE THEY HAUL YOUR ASS OFF TO JAIL!!!
FBI YOU SEEING THIS SHIT. GET OFF YOUR ASSES AND STOP THIS MONSTER!!!!
FBI I AM ZIPPING UP ALL OF AARONS EMAILS AND FILING ANOTHER REPORT TO NIGHT. IN THE REPORT WILL BE A LINK WHERE YOU CAN DOWNLOAD THE EMAILS. I WILL ALSO GIVE YOU THE LATEST ROUTER LOGS AND WEBSIGHT LOGS. FBI - IN THE EMAILS AARON SAYS THE http://timetravelinstitute.com WAS AND IS TRACKING ME ON THE INTERNET. HE SAYS THEY ARE TRACKING ME THROUGH MY USER NAME!!!
FBI IN THAT REPORT I MADE LOOK AT AARONS EMAIL WHERE HE SAID HIS CREDIT CARD DISAPPEARED FROM HIS ACCOUNT. THAT IS WHEN MY CREDIT CARD WAS USED FOR FRAUD.
LOOK AT THE EMAIL ARRON GAVE WHEN HE MENTIONED SOME VIDEO AND I WROTE I JUST SAW THAT VIDEO.
What a lot of this is about is a person's right to his freedom of speech to have a blog. I have followed blog procedures in maintaining my blog. There should not be any last names here except my own.
Darby in a interview which is publically posted on the internet which was the subject of my CIA experiment post. Since Darby gave the interview and his information was in that interview it was ok for me to run with it.
Ray I know he does not like me blogging about him but he has publically giving his last name the company he works for and even a picture of himself all on a public forum. And he talks publically about other people.
The time travel institute the fake one is a forum. Their terms of service say they are a pretend service. Which was my mistake because I posted there about time travel by way of data mining binary counters to find computer media of the past or the future even alternate time-lines.
I used only their User names from a forum and I called Rainman Ray because Darby did that in public on the forum and so that is consent to use that name because Ray gave the permission for it to be used in public that way.
DARBY AND RAINMAN BOTH OF THEM WRITE ABOUT OTHER PEOPLE ALL THE TIME. DARBY HAS WRITTEN THOUSANDS OF MESSAGES ABOUT TITOR. NOT ALL OF IT WAS GOOD EITHER. SOME OF IT WAS PERSONAL.
NOW DARBY AND RAY AKA RAINMAN OVER THE YEARS HAVE TALKED ABOUT 1000'S OF PEOPLE. TALKING ABOUT PEOPLE IS ALL THEY DO. IT IS WHAT THEY DO. SO IT IS OK FOR ME TO TALK ABOUT THEM.
(Hey Darby, I am using all caps again. If my account still exist at the http://timetravelinstitute.com you can send me warning. BAAAAAHAHAHAHAHAH.)
They use a public forum to talk about other people even troll and harass other people. So, there is nothing wrong with me blogging about them here. More so since I am using User names only from a forum that is largly dieing and half dead anyway.
They gave that consent when they went on a public forum and started their churn and burn on other people. So, it is ok for me to talk about the http://timetravelinstitute and their admins here on my blog.
Now, These guys started their shit with me first. Ray, stopped me from posting and talking about my time travel. They delete my messages. When they banned me and I posted else where about time travel they got me banned there too and got my messages deleted. They called me names like troll so they called me names first they can not bitch when I call them names. They used my first and last name publically even when I told them to stop and not to do that.
So what people read in this blog that I have written is legal. I have the right to my freedom of speech. I have the right to have my blog here. I am not giving up that right.
I have the right to go by Reactor1967 on the internet. I am not going to stop using that user name. That was a demand of Aaron who is hacking me. Among other demands. I have the right to use it and I will use it.
I will never stop working on time travel with information.
I will never writing programs that find time travel media.
I will never stop developing my theories.
I will never stop writing about my theories and if I want to write about Ray and Darby I will.
Now, when they got me thrown out of Abovetopsecret.com for talking about them. THEY FAILED TO TELL OTHERS THEY TALK ABOUT PEOPLE TOO. THEY TALK ABOUT PEOPLE BUT YET I CAN NOT TALK ABOUT THEM ON ABOVETOPSECRET.COM (THEY ARE VIOLATING MY RIGHTS UNDER THE AMERICAN CONSTITUATION AND IN MY OPION SHOULD BE ARRESTED FOR IT. They talk about people so it is ok for me to talk about them. And I do and I will continue.
RAY TALKS ABOUT OTHER PEOPLE ALL THE TIME.
SO, I CAN TALK ABOUT THEM ALL I WANT TOO. YOU GOT THAT ARRON BOY.
I will never stop. And that goes for you guys over at the fake http://timetravelinstitute.com
What Aarons beef is with me has to do with the http://timetravelinstitute.com but he still has not told me what his problem with me is.
Im hoping when the FBI arrest Aaron for Child porn, stalking me, hacking me, copyright infringement, assault (for the threats), fraud, theft, wire tapping, and other things that the FBI will tell me what was Aarons problem with me.
You see, when Ray banned me he sent me a private message telling me "We are watching you.". HOW TRUE THAT WAS. In Aarons emails he told me they were tracking me on the internet. Now, Aaron has attacked me personally at home through the internet.
I WILL NEVER STOP BLOGGING ABOUT MY TIME TRAVEL YOU. I HAVE THE RIGHT TO MY BLOG HERE!!!
I HAVE THE RIGHT TO POST IN FORUMS ABOUT TIME TRAVEL AS REACTOR1967 AND WITH MY METHOD OF TIME TRAVEL.
THAT DOES NOT GIVE THE http://timetravelinstitute.com to do what they have done. They want me gone and are trying to find ways to make that happen. Guys, its not going to happen.
FBI - Since your investigation is still on going here is a message posted at the REAL http://thetimetravelinstitute.com I believe is from Aaron. I locked the board and will free the account later. You guys can log in if you want I gave you guys a login. Here is the message from the cyber stalkers/hacker
During perpendicular steady central relationships, Show Bromide has the know-how to come by media at beneath hawk value rates which supplies our clients with incomparably bountiful media opportunities. Our procurement master diagram includes; extended duration media commitments, later banking, traffic deals and critical partnerships. We've got assets and leverage unmatched in the marketplace. Our strategic partnerships encompass; networks, train depot groups, syndicators and constituents providers. We deliver locality transmit, peculiar mooring, style radio, cohort and syndicated media opportunities
rob sigg -
rob sigg -
Recognizing recently created takings opportunities prior to bringing video to consumers 'over-the-top', Performance The same Media launched an dynamic CDN (Delight Distribution Network) and an advertising childbirth monetization motor in the next half of 2012. Since its engender, Display Under any circumstances handcuff Media has recognized well-heeled consumer launches with the aid state-of-theart applications on Sony, LG and Samsung connected devices, Roku streaming video players, iOS and Android revealing devices, with a handful other launches impending.
In advance starting display Person Media, Looting dead beat down 8 years with Turner Media Gather, which he helped skiff from its origin. As President of Turner Media Brigade, Ransack's natural execution-oriented spirit made repayment after tremendous broaden when he took them from a 3-man media instrumentality to a 100 employees member power businesswoman within the media landscape. He pioneered and was conducive in the unfolding of Turner Media Organize as the classy rep-business custom-made all media sales throughout DISH Network. At its shinny up, after bringing them to a sales growth of 250MILLIMETERS, Cheat made his retire in 2004.
rob sigg -
rob sigg -
In the years
performance one media
performance one mediauntil to Turner Media Departmentalize, Burgle utilized his outspoken entrepreneurial force and his accord to conceive of how 'all-the-pieces-fittogether' to own and control over and above numerous businesses within the natural property, erection, spa and salon disciplines.
The conspiracy against time travel has taken to attempting to call me at home. I got a call from this number but it is a voip. The number is actually from the ip carrier trying to bring the the call.
Here it is
202-455-8888 7:47 pm 01/16/2014
767-275-9071 12:07 pm 01/11/2014
They do not want to talk to me. I can give as good as I get.
Anyone reading Aarons and I emails and reading his messages to me through the forums and online services can easily put two plus together. Here is Aarons message today for me. I put the full code in it so it is long and cryptic. Here it is.
Received: by 10.68.110.195 with SMTP id ic3csp56734pbb;
Fri, 17 Jan 2014 16:58:42 -0800 (PST)
X-Received: by 10.50.62.102 with SMTP id x6mr1115139igr.35.1390006722464;
Fri, 17 Jan 2014 16:58:42 -0800 (PST)
Received: from s036.panelboxmanager.com (s036.panelboxmanager.com. [126.96.36.199])
by mx.google.com with ESMTPS id n10si5541568igk.61.2014.01.17.16.58.42
(version=TLSv1 cipher=RC4-SHA bits=128/128);
Fri, 17 Jan 2014 16:58:42 -0800 (PST)
Received-SPF: pass (google.com: best guess record for domain of email@example.com designates 188.8.131.52 as permitted sender) client-ip=184.108.40.206;
spf=pass (google.com: best guess record for domain of firstname.lastname@example.org designates 220.127.116.11 as permitted sender) email@example.com
Received: from mailnull by s036.panelboxmanager.com with sa-checked (Exim 4.80.1)
for deleted; Fri, 17 Jan 2014 19:58:41 -0500
Received: from paranor by s036.panelboxmanager.com with local (Exim 4.80.1)
for deleted; Fri, 17 Jan 2014 19:58:41 -0500
Subject: Time-Hacking with computers and algorithms - New reply to watched thread
X-PHP-Script: paranormalis.com/deferred.php for 18.104.22.168
Message-Id: <44f366e56d7170243fd29a99f40cf70099c1831d paranormalis.com="">
Date: Sat, 18 Jan 2014 00:58:41 +0000
X-Spam-Checker-Version: spamc_ctasd client on
X-Spam-Status: No, score=0.0 required=50.0 tests=SpamClass_Unknown,
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - s036.panelboxmanager.com
X-AntiAbuse: Original Domain - gmail.com
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - s036.panelboxmanager.com
X-Get-Message-Sender-Via: s036.panelboxmanager.com: mailgid no entry from get_relayhosts_entry
Content-Type: text/plain; charset=utf-8
Reactor1967,=0A=0Avp8671 replied to a thread you are watching at Paranor=
malis.=0A=0A=09"Time-Hacking with computers and algorithms"=0A=0AThis is=
the message they posted:=0A--------------------------------------------=
--------------------------=0AHello Reactor, i just wanted to ask you , i=
f you agree, a couple of questions.=0A1: You use the word text counter,=
can you describe exactly what is a text counter ? you scan for text in=
a file full of words and count words ???=0A2: You scan for emails, but=
emails are stoed on the server, how do you perform exactly your scan ?=
=0A3: You use checksum ,to find files , but again, emails are not files=
normally stoed on the computer, they are stored on the server and then=
sent to your inbox, do you scan that directory ??=0AIts been a while i=
follow you and your blog, but still i cannot wrap hmy haed around your=
method.=0AYou say you are writing a second book, where you explain your=
code, can you give some hints using a meta-code '?=0Ai have 20+ years o=
f pc programming, i can implement any kind of software pretty quickly.=
=0AThanks for your time=0A----------------------------------------------=
------------------------=0A=0ATo view this thread, click here:=0Ahttp://=
/#post-78878=0A=0AYou will not receive any further emails about this thr=
ead until you have read the new messages.=0A=0A-------------------------=
---------------------------------------------=0A=0AThis message was sent=
to you because you opted to watch the thread "Time-Hacking with compute=
rs and algorithms" at Paranormalis with email notification of new replie=
s.=0A=0ATo disable emails from this thread:=0Ahttp://paranormalis.com/wa=
il&t=3Dthread&id=3D6314=0A=0ATo disable all emails:=0Ahttp://paranormali=
Content-Type: text/html; charset=utf-8
king with computers and algorithms - New reply to watched thread
=0A=0A=3D"#176093" alink=3D"#176093" vlink=3D"#176093" style=3D"padding: 10px"=
|=09=09=09padding: 5px 10px;=0A=09=09=09border-bottom: 1px solid #A5CAE4;==0A=09|
ius: 4px;=0A=09=09=09font-family: 'Trebuchet MS', Helvetica, Arial, sans=
-serif;=0A=09=09=09font-size: 11px;=0A=09=09=09line-height: 1.231;">=0A=
|padding: 1em;=0A=09=09=09color: #141414;=0A=09=09=09font-family: 'Trebuc=|
het MS', Helvetica, Arial, sans-serif;=0A=09=09=09font-size: 13px;=0A=09=
r1967, "color: #176093; text-decoration: none">vp8671 replied to a thread y=
ou are watching at #176093; text-decoration: none">Paranormalis.
"font-size: 18pt; font-weight: normal; margin: 10px 0">/paranormalis.com/threads/time-hacking-with-computers-and-algorithms.631==0A=0A
| style=3D"font-size: 13px; line-height: 1.231; padding-right: 20px">=0A=|
rder: 1px solid #D7EDFC;=0A=09=09=09border-radius: 5px">=0A=09=09=09
|=09=09=09=09=09padding: 5px;=0A=09=09=09=09=09border-radius: 4px">=0A=09==0A=09=09=09=09|
=09=09=09=09le=3D"vp8671"=0A=09=09=09=09=09=09>tyles/default/xenforo/avatars/avatar_male_s.png" alt=3D"vp8671" title=3D=
"vp8671" style=3D"=0A=09=09=09=09=09=09=09width: 48px;=0A=09=09=09=09=09=
=09=09height: 48px;=0A=09=09=09=09=09=09=09background-color: #FCFCFF;=0A=
=09=09=09=09=09=09=09border: 1px solid #A5CAE4;=0A=09=09=09=09=09=09=09p=
adding: 2px;=0A=09=09=09=09=09=09=09border-radius: 4px"=0A=09=09=09=09=
an', Times, serif; font-size: 11pt; line-height: 1.4">=0A=09=09Hello Rea=
ctor, i just wanted to ask you , if you agree, a couple of questions.
/>=0A1: You use the word text counter, can you describe exactly what is=
a text counter ? you scan for text in a file full of words and count wo=
=0A2: You scan for emails, but emails are stoed on the serv=
er, how do you perform exactly your scan ?
=0A3: You use checksum ,=
to find files , but again, emails are not files normally stoed on the co=
mputer, they are stored on the server and then sent to your inbox, do yo=
u scan that directory ??
=0AIts been a while i follow you and your=
blog, but still i cannot wrap hmy haed around your method.
say you are writing a second book, where you explain your code, can you=
give some hints using a meta-code '?
=0Ai have 20+ years of p=
c programming, i can implement any kind of software pretty quickly.
>=0AThanks for your time=0A=09
llpadding=3D"10" cellspacing=3D"0" border=3D"0" width=3D"100%" style=3D"=
margin: 20px 0; background-color: #f0f7fc; border-top: 1px solid #d7edfc=
as sent to you because you opted to watch the thread aranormalis.com/threads/time-hacking-with-computers-and-algorithms.6314/=
" style=3D"color: #969696">Time-Hacking with computers and algorithms> at Paran=
ormalis with email notification of new replies. You will not receive=
any further emails about this thread until you have read the new messag=
er wish to receive these emails, you may com/watched/via-email?u=3D4543&c=3Defc901e2c6a0df152abe1c731294f8fd&=
amp;a=3Dno_email&t=3Dthread&id=3D6314" style=3D"color: #969696">=
disable emails from this thread or om/watched/via-email?u=3D4543&c=3Defc901e2c6a0df152abe1c731294f8fd&a=
mp;a=3Dno_email" style=3D"color: #969696">disable all emails.
ound-color: #F0F7FC;=0A=09=09=09padding: 5px 10px;=0A=09=09=09border-top=
: 1px solid #D7EDFC;=0A=09=09=09border-bottom-left-radius: 4px;=0A=09=09=
=09border-bottom-right-radius: 4px;=0A=09=09=09text-align: right;=0A=09=
=09=09font-family: 'Trebuchet MS', Helvetica, Arial, sans-serif;=0A=09=
=09=09font-size: 11px;=0A=09=09=09line-height: 1.231;">=0A=09=09=09ef=3D"http://paranormalis.com/" style=3D"color: #176093; text-decoration=