Tuesday, January 14, 2014

WAITING FOR FOR MY HACKER TO GET ARRESTED AND HAULED OFF TO JAIL!!!

























This blog copyrighted (c) 2008 - 2015 timetravelinstitute.biz




HACKER DUDE, THIS VIDEO IS FOR YOU. THE NET IS CLOSING.

MY HACKER IS GOING TO JAIL.

https://www.youtube.com/watch?v=qq9CX0kIv3w




update 12/31/2013


Even though there are those trying to stop me. That would be the http://timetravelinstitute.com through their associated friends and connections through out the internet which I have labeled and call "THE CONSPIRACY AGAINST TIME TRAVEL."

Update 12-04-2014

I am going to use my hackers first name now since I am now 99% sure he had a hand in the hacking. His name is Aaron. I want to use his last name but he has to use it first in public before I can use it.


Also, I am still moving this blog but after I noticed they are now doing a 24 hour a day 7 day a week hacking on me which every bit is being logged and reported to the FBI on a daily bases. I decided to open my blog back up since it is the reason I am  getting hacked in the first place.


The conspiracy against time travel:


HTTP://TIMETRAVELINSTITUTE.COM RAINMAN AKA RAY AND DARBY AND AARON AND GRAYSON AT CONSPIRACYCAFE (A STUPID FORUM) AND SOME MORE OF THEIR FRIENDS AT WIKI AND ABOVETOPSECRET.COM AND THE LIST GOES ON. THEY DO NOT WANT ME TALKING ABOUT TIME TRAVEL THEY WANT ME OFF THE INTERNET.


HAY ASSHOLES!!!! (ITS NOT WORKING!!!!!!!!!! BAAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAHAHA!!!!!!!!!!!!)


YOU PUSSIES AINT GOT NOTHING!!!! LIKE I SAID PAM FROM THE TITOR STORY COULD KICK ALL YOUR ASSES WITH BOTH HANDS AND ONE LEG TIED BEHIND HER BACK.


BY THE WAY. I STILL WANT TO KNOW IF YOU GUYS ARE RESPONSIBLE FOR TITOR LEAVING THE INTERNET? DID YOU GUYS DO TO HIM WHAT YOU ARE DOING TO ME?


The FBI may want to look at  this blog too. I also will be visiting A LOT MORE FORUMS. 
I installed a another firewall today. It is not on everything yet but it will be. It wont stop Aaron from living in my router but it should stop him from owning my computers. Also, My old linux is gone. Sorry Aaron I know you loved that system since you viewed my screen and got my passwords and looked at my project files. At least you did not get all my code. Thank god I was not using it for anything and had stopped using time travel one station.


I will be eventually changing all my passwords and getting rid of my old encryption and re-encrypting everything again brand new. Yeah, the kid was capturing my keys on my keyboard I think since he got my credit card info and emailed me what I was seeing on my computer screen. THINK YOU FOR TELLING ON YOURSELF AARON.


Aaron was kind enough to put in the emails what the conspiracy against time travel wants from me. Here are their demands.


1. Stop using Reactor1967 as a user name.

2. Delete all post on the internet forums.

3. Take down the blog.

4. Take down my web sights.

    A. http://timetravelinstitute.biz

    B. http://thetimetravelinstitute.com


Not going to happen. Hell, I am looking at setting something up so

WHEN I EVENTUALLY GO TO THE AFTER LIFE MY WEB-SIGHTS AND BLOG WILL LIVE ON. You guys will never shut me down.


The only problem is these guys have been distracting me from my real work. TIME TRAVEL WITH INFORMATION. I work a lot and have a problem falling a sleep when I get home but I will get back to a regular bed time schedule and try to do heather things and buy some energy drinks and get back to work.


Now, normally any sane person would not do this but since the security of my router is already toast things to MY GOOD FRIEND AND PAL Aaron and because I promised a while back to publish my logs here is my router log for today. This is what my router log looks like most days thinks to my good friend and pal Aaron. Hey, Aaron, is this how you treat your mentors? He said I was his mentor. This is what I get for trying to help someone learn my skill. Anyway here is the router log.


 [DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Saturday, January 04, 2014 21:28:02

[DoS Attack: RST Scan] from source: 96.17.111.73, port 80, Saturday, January 04, 2014 21:25:09

[DoS Attack: RST Scan] from source: 23.67.252.240, port 80, Saturday, January 04, 2014 20:47:13

[DoS Attack: RST Scan] from source: 208.117.232.116, port 80, Saturday, January 04, 2014 20:44:50

[DoS Attack: RST Scan] from source: 31.13.66.64, port 443, Saturday, January 04, 2014 20:44:48

[DoS Attack: RST Scan] from source: 208.117.252.25, port 80, Saturday, January 04, 2014 20:40:22

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Saturday, January 04, 2014 20:39:50

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Saturday, January 04, 2014 20:16:28

[DoS Attack: RST Scan] from source: 17.151.236.50, port 443, Saturday, January 04, 2014 20:15:11

[DHCP IP: 192.168.1.6] to MAC address 78:e4:00:f0:de:a0, Saturday, January 04, 2014 20:07:02

[DHCP IP: 192.168.1.6] to MAC address 78:e4:00:f0:de:a0, Saturday, January 04, 2014 20:04:29

[DHCP IP: 192.168.1.6] to MAC address 78:e4:00:f0:de:a0, Saturday, January 04, 2014 19:46:39

[DHCP IP: 192.168.1.6] to MAC address 78:e4:00:f0:de:a0, Saturday, January 04, 2014 19:46:19

[DoS Attack: SYN/ACK Scan] from source: 5.135.140.140, port 80, Saturday, January 04, 2014 19:35:12

[DoS Attack: RST Scan] from source: 17.173.66.134, port 443, Saturday, January 04, 2014 19:31:56

[UPnP set event: add_nat_rule] from source 192.168.1.3, Saturday, January 04, 2014 19:04:53

[DHCP IP: 192.168.1.3] to MAC address 1c:4b:d6:79:89:5e, Saturday, January 04, 2014 19:04:50

[DHCP IP: 192.168.1.3] to MAC address 1c:4b:d6:79:89:5e, Saturday, January 04, 2014 19:04:49

[UPnP set event: add_nat_rule] from source 192.168.1.3, Saturday, January 04, 2014 18:37:33

[DHCP IP: 192.168.1.3] to MAC address 1c:4b:d6:79:89:5e, Saturday, January 04, 2014 18:34:32

[DoS Attack: RST Scan] from source: 46.4.242.137, port 9001, Saturday, January 04, 2014 18:28:17

[DoS Attack: RST Scan] from source: 23.59.188.65, port 80, Saturday, January 04, 2014 18:25:55

[DoS Attack: RST Scan] from source: 17.154.66.44, port 443, Saturday, January 04, 2014 18:18:08

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Saturday, January 04, 2014 18:17:27

[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Saturday, January 04, 2014 18:15:10

[DoS Attack: SYN/ACK Scan] from source: 213.163.71.136, port 11002, Saturday, January 04, 2014 16:09:54

[DoS Attack: SYN/ACK Scan] from source: 67.228.245.10, port 27015, Saturday, January 04, 2014 15:27:15

[DoS Attack: SYN/ACK Scan] from source: 176.31.18.19, port 7652, Saturday, January 04, 2014 14:40:08

[DoS Attack: SYN/ACK Scan] from source: 198.50.236.67, port 6010, Saturday, January 04, 2014 14:39:30

[DoS Attack: SYN/ACK Scan] from source: 5.135.126.44, port 7777, Saturday, January 04, 2014 12:46:02

[DoS Attack: SYN/ACK Scan] from source: 178.18.31.49, port 1935, Saturday, January 04, 2014 12:14:52

[DoS Attack: SYN/ACK Scan] from source: 192.99.1.184, port 9000, Saturday, January 04, 2014 10:45:23

[DoS Attack: SYN/ACK Scan] from source: 5.135.28.30, port 13001, Saturday, January 04, 2014 10:06:54

[DoS Attack: SYN/ACK Scan] from source: 84.244.186.31, port 80, Saturday, January 04, 2014 08:36:06

[DoS Attack: SYN/ACK Scan] from source: 46.4.62.75, port 80, Saturday, January 04, 2014 07:52:01

[DoS Attack: TCP/UDP Chargen] from source: 81.17.130.54, port 47811, Saturday, January 04, 2014 07:30:48

[DoS Attack: RST Scan] from source: 66.114.54.8, port 80, Saturday, January 04, 2014 07:27:44

[DoS Attack: RST Scan] from source: 17.151.236.22, port 443, Saturday, January 04, 2014 07:25:53

[DoS Attack: SYN/ACK Scan] from source: 198.50.161.10, port 80, Saturday, January 04, 2014 07:25:27

[DoS Attack: RST Scan] from source: 17.151.236.19, port 443, Saturday, January 04, 2014 07:22:22

[DoS Attack: SYN/ACK Scan] from source: 37.187.56.134, port 25655, Saturday, January 04, 2014 06:56:15

[Time synchronized with NTP server] Saturday, January 04, 2014 04:02:12

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Saturday, January 04, 2014 03:37:56

[DoS Attack: SYN/ACK Scan] from source: 37.187.26.152, port 80, Saturday, January 04, 2014 02:50:24

[DoS Attack: SYN/ACK Scan] from source: 178.32.74.20, port 6005, Saturday, January 04, 2014 00:20:02

[DoS Attack: SYN/ACK Scan] from source: 37.187.26.152, port 80, Saturday, January 04, 2014 00:09:27

[email failed] ssmtp: Cannot open :25, Saturday, January 04, 2014 00:00:02

[email sent to:  Saturday, January 04, 2014 00:00:02

[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Friday, January 03, 2014 23:58:50

[Internet connected] IP address: 174.53.9.137, Friday, January 03, 2014 23:47:56

[DoS Attack: SYN/ACK Scan] from source: 37.187.26.152, port 80, Friday, January 03, 2014 23:10:06

[DoS Attack: RST Scan] from source: 17.151.236.37, port 443, Friday, January 03, 2014 22:48:19

[DoS Attack: SYN/ACK Scan] from source: 37.59.31.61, port 21412, Friday, January 03, 2014 21:58:15

[DoS Attack: RST Scan] from source: 17.154.66.108, port 443, Friday, January 03, 2014 19:37:15

[DoS Attack: RST Scan] from source: 17.154.66.106, port 443, Friday, January 03, 2014 19:22:57

[DoS Attack: RST Scan] from source: 17.154.66.154, port 443, Friday, January 03, 2014 19:17:35

[DoS Attack: SYN/ACK Scan] from source: 37.59.31.144, port 80, Friday, January 03, 2014 18:59:24

[DoS Attack: SYN/ACK Scan] from source: 198.50.228.9, port 80, Friday, January 03, 2014 18:45:06

[DoS Attack: RST Scan] from source: 96.17.235.164, port 443, Friday, January 03, 2014 18:41:55

[DoS Attack: RST Scan] from source: 173.194.36.126, port 443, Friday, January 03, 2014 18:39:53

[DoS Attack: RST Scan] from source: 72.21.91.19, port 80, Friday, January 03, 2014 18:34:33

[DoS Attack: ACK Scan] from source: 72.21.91.19, port 80, Friday, January 03, 2014 18:28:46

[DoS Attack: RST Scan] from source: 31.13.66.64, port 80, Friday, January 03, 2014 18:22:12

[DoS Attack: RST Scan] from source: 17.151.236.38, port 443, Friday, January 03, 2014 18:22:05

[DoS Attack: RST Scan] from source: 208.117.252.246, port 80, Friday, January 03, 2014 18:20:03

[DoS Attack: RST Scan] from source: 17.151.236.37, port 443, Friday, January 03, 2014 18:02:07

[DoS Attack: RST Scan] from source: 96.17.237.199, port 443, Friday, January 03, 2014 17:53:53

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Friday, January 03, 2014 17:52:37

[DoS Attack: RST Scan] from source: 17.154.66.45, port 443, Friday, January 03, 2014 17:20:21

[DoS Attack: SYN/ACK Scan] from source: 176.31.253.45, port 80, Friday, January 03, 2014 17:18:33

[DoS Attack: ACK Scan] from source: 72.21.91.19, port 80, Friday, January 03, 2014 17:12:14

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Friday, January 03, 2014 17:03:27

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Friday, January 03, 2014 16:57:02

[DoS Attack: ACK Scan] from source: 72.21.91.19, port 80, Friday, January 03, 2014 16:55:34

[DoS Attack: SYN/ACK Scan] from source: 37.187.17.165, port 3306, Friday, January 03, 2014 16:35:41

[DHCP IP: 192.168.1.3] to MAC address 1c:4b:d6:79:89:5e, Friday, January 03, 2014 16:27:27

[DoS Attack: RST Scan] from source: 199.59.148.10, port 443, Friday, January 03, 2014 15:18:40

[DoS Attack: RST Scan] from source: 31.13.66.112, port 443, Friday, January 03, 2014 15:14:08

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Friday, January 03, 2014 14:59:28

[DoS Attack: SYN/ACK Scan] from source: 5.39.65.146, port 1321, Friday, January 03, 2014 14:51:10

[DoS Attack: SYN/ACK Scan] from source: 37.59.31.144, port 80, Friday, January 03, 2014 13:41:16

[DoS Attack: SYN/ACK Scan] from source: 176.9.28.7, port 80, Friday, January 03, 2014 13:23:44

[DoS Attack: SYN/ACK Scan] from source: 5.39.65.146, port 1321, Friday, January 03, 2014 12:43:11

[DoS Attack: RST Scan] from source: 17.151.236.50, port 443, Friday, January 03, 2014 12:00:57

[DoS Attack: RST Scan] from source: 17.154.66.156, port 443, Friday, January 03, 2014 12:00:57

[DoS Attack: RST Scan] from source: 17.151.236.38, port 443, Friday, January 03, 2014 12:00:57

[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Friday, January 03, 2014 11:58:44

[DoS Attack: SYN/ACK Scan] from source: 198.50.161.10, port 80, Friday, January 03, 2014 10:47:46

[DoS Attack: SYN/ACK Scan] from source: 213.232.200.92, port 80, Friday, January 03, 2014 08:42:50

[DoS Attack: SYN/ACK Scan] from source: 37.187.56.98, port 22, Friday, January 03, 2014 08:10:49

[DoS Attack: SYN/ACK Scan] from source: 37.221.169.114, port 80, Friday, January 03, 2014 07:39:18

[DoS Attack: SYN/ACK Scan] from source: 185.4.75.35, port 80, Friday, January 03, 2014 07:17:30

[Time synchronized with NTP server] Friday, January 03, 2014 04:02:11

[DoS Attack: SYN/ACK Scan] from source: 8.27.226.126, port 80, Friday, January 03, 2014 03:41:44

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Friday, January 03, 2014 03:34:57

[DoS Attack: SYN/ACK Scan] from source: 193.203.198.151, port 80, Friday, January 03, 2014 02:54:13

[DoS Attack: SYN/ACK Scan] from source: 95.211.218.82, port 80, Friday, January 03, 2014 02:43:15

[DoS Attack: SYN/ACK Scan] from source: 95.211.182.168, port 80, Friday, January 03, 2014 02:30:53

[DoS Attack: SYN/ACK Scan] from source: 178.33.33.44, port 80, Friday, January 03, 2014 00:58:40

[email failed] ssmtp: Cannot open :25, Friday, January 03, 2014 00:00:02

[email sent to:  Friday, January 03, 2014 00:00:02

[DoS Attack: RST Scan] from source: 17.151.236.22, port 443, Thursday, January 02, 2014 22:49:25

[DoS Attack: RST Scan] from source: 17.151.236.16, port 443, Thursday, January 02, 2014 22:49:25

[DoS Attack: RST Scan] from source: 23.7.70.108, port 443, Thursday, January 02, 2014 21:19:52

[DoS Attack: RST Scan] from source: 23.2.17.234, port 80, Thursday, January 02, 2014 21:17:46

[DoS Attack: RST Scan] from source: 23.3.12.161, port 80, Thursday, January 02, 2014 21:15:01

[DoS Attack: RST Scan] from source: 74.125.193.141, port 443, Thursday, January 02, 2014 21:09:39

[DoS Attack: RST Scan] from source: 74.125.142.141, port 443, Thursday, January 02, 2014 21:05:41

[DoS Attack: RST Scan] from source: 17.154.66.154, port 443, Thursday, January 02, 2014 20:56:31

[DoS Attack: RST Scan] from source: 199.59.148.82, port 443, Thursday, January 02, 2014 20:43:35

[DoS Attack: RST Scan] from source: 31.13.66.112, port 443, Thursday, January 02, 2014 20:28:33

[DoS Attack: RST Scan] from source: 31.13.66.33, port 443, Thursday, January 02, 2014 20:28:32

[DoS Attack: RST Scan] from source: 74.125.193.141, port 443, Thursday, January 02, 2014 20:27:43

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Thursday, January 02, 2014 20:24:45

[DoS Attack: RST Scan] from source: 17.154.66.106, port 443, Thursday, January 02, 2014 20:21:24

[DoS Attack: RST Scan] from source: 54.236.114.164, port 443, Thursday, January 02, 2014 20:03:58

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Thursday, January 02, 2014 19:56:56

[DoS Attack: RST Scan] from source: 91.189.91.14, port 80, Thursday, January 02, 2014 19:30:53

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Thursday, January 02, 2014 19:25:02

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Thursday, January 02, 2014 19:22:00

[Internet connected] IP address: 174.53.9.137, Thursday, January 02, 2014 19:06:59

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Thursday, January 02, 2014 19:00:29

[DoS Attack: SYN/ACK Scan] from source: 95.211.218.82, port 80, Thursday, January 02, 2014 18:57:20

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Thursday, January 02, 2014 18:49:26

[DoS Attack: SYN/ACK Scan] from source: 91.121.223.7, port 25565, Thursday, January 02, 2014 18:43:00

[DoS Attack: SYN/ACK Scan] from source: 37.59.75.232, port 80, Thursday, January 02, 2014 18:40:01

[DoS Attack: SYN/ACK Scan] from source: 91.121.223.7, port 25565, Thursday, January 02, 2014 18:27:28

[DoS Attack: RST Scan] from source: 17.154.66.156, port 443, Thursday, January 02, 2014 18:08:00

[DoS Attack: RST Scan] from source: 173.194.131.7, port 80, Thursday, January 02, 2014 18:07:46

[DoS Attack: RST Scan] from source: 17.173.66.130, port 443, Thursday, January 02, 2014 17:20:12

[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Thursday, January 02, 2014 17:19:28

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Thursday, January 02, 2014 16:47:56

[DoS Attack: RST Scan] from source: 17.173.66.136, port 443, Thursday, January 02, 2014 15:51:58

[DoS Attack: RST Scan] from source: 17.173.66.135, port 443, Thursday, January 02, 2014 15:51:58

[DHCP IP: 192.168.1.3] to MAC address 1c:4b:d6:79:89:5e, Thursday, January 02, 2014 15:35:09

[DoS Attack: SYN/ACK Scan] from source: 5.39.65.146, port 1321, Thursday, January 02, 2014 15:29:18

[DoS Attack: SYN/ACK Scan] from source: 178.32.74.19, port 65464, Thursday, January 02, 2014 15:15:02

[DoS Attack: RST Scan] from source: 31.13.66.96, port 443, Thursday, January 02, 2014 15:08:31

[DoS Attack: SYN/ACK Scan] from source: 5.10.68.59, port 80, Thursday, January 02, 2014 15:03:59

[DoS Attack: SYN/ACK Scan] from source: 5.39.65.146, port 1321, Thursday, January 02, 2014 15:03:24

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Thursday, January 02, 2014 14:52:47

[DoS Attack: SYN/ACK Scan] from source: 87.98.142.52, port 27015, Thursday, January 02, 2014 14:49:03

[DoS Attack: ACK Scan] from source: 72.21.91.19, port 80, Thursday, January 02, 2014 13:40:51

[UPnP set event: add_nat_rule] from source 192.168.1.3, Thursday, January 02, 2014 13:17:22

[DHCP IP: 192.168.1.3] to MAC address 1c:4b:d6:79:89:5e, Thursday, January 02, 2014 13:16:45

[DoS Attack: ACK Scan] from source: 72.21.91.19, port 80, Thursday, January 02, 2014 13:13:33

[DoS Attack: TCP/UDP Chargen] from source: 89.248.172.128, port 39304, Thursday, January 02, 2014 13:01:50

[DoS Attack: SYN/ACK Scan] from source: 199.187.120.2, port 80, Thursday, January 02, 2014 10:51:23

[DoS Attack: SYN/ACK Scan] from source: 63.240.92.167, port 80, Thursday, January 02, 2014 10:31:52

[DoS Attack: SYN/ACK Scan] from source: 198.50.228.9, port 80, Thursday, January 02, 2014 10:20:35

[DoS Attack: SYN/ACK Scan] from source: 198.50.161.10, port 80, Thursday, January 02, 2014 10:17:17

[DoS Attack: RST Scan] from source: 17.173.66.130, port 443, Thursday, January 02, 2014 09:07:37

[DoS Attack: RST Scan] from source: 17.173.66.136, port 443, Thursday, January 02, 2014 08:16:04

[DoS Attack: RST Scan] from source: 17.154.66.109, port 443, Thursday, January 02, 2014 08:06:29

[DoS Attack: SYN/ACK Scan] from source: 178.33.233.75, port 80, Thursday, January 02, 2014 07:48:02

[DoS Attack: RST Scan] from source: 31.13.66.1, port 80, Thursday, January 02, 2014 07:23:24

[DoS Attack: SYN/ACK Scan] from source: 178.33.233.75, port 80, Thursday, January 02, 2014 06:26:13

[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Thursday, January 02, 2014 05:19:31

[DoS Attack: SYN/ACK Scan] from source: 37.59.41.227, port 80, Thursday, January 02, 2014 05:06:42

[DoS Attack: SYN/ACK Scan] from source: 178.33.233.75, port 80, Thursday, January 02, 2014 04:18:19

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Thursday, January 02, 2014 04:10:50

[Time synchronized with NTP server] Thursday, January 02, 2014 04:02:09

[DoS Attack: SYN/ACK Scan] from source: 199.96.156.82, port 80, Thursday, January 02, 2014 03:35:28

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Thursday, January 02, 2014 03:33:55

[DoS Attack: SYN/ACK Scan] from source: 178.33.233.75, port 80, Thursday, January 02, 2014 02:15:58

[DHCP IP: 192.168.1.6] to MAC address 78:e4:00:f0:de:a0, Thursday, January 02, 2014 01:48:03

[DoS Attack: SYN/ACK Scan] from source: 37.187.17.165, port 80, Thursday, January 02, 2014 01:10:27

[email failed] ssmtp: Cannot open :25, Thursday, January 02, 2014 00:00:04

[email sent to: ] Thursday, January 02, 2014 00:00:04

[DHCP IP: 192.168.1.6] to MAC address 78:e4:00:f0:de:a0, Wednesday, January 01, 2014 22:32:55

[DoS Attack: RST Scan] from source: 17.154.66.111, port 443, Wednesday, January 01, 2014 20:58:27

[DoS Attack: TCP/UDP Chargen] from source: 80.82.65.9, port 52343, Wednesday, January 01, 2014 20:32:04

[DoS Attack: SYN/ACK Scan] from source: 178.33.233.75, port 80, Wednesday, January 01, 2014 20:18:30

[UPnP set event: del_nat_rule] from source 192.168.1.6, Wednesday, January 01, 2014 20:13:05

[DoS Attack: RST Scan] from source: 184.84.180.104, port 443, Wednesday, January 01, 2014 19:58:42

[DoS Attack: RST Scan] from source: 74.125.225.177, port 443, Wednesday, January 01, 2014 19:57:11

[DoS Attack: RST Scan] from source: 208.117.232.117, port 443, Wednesday, January 01, 2014 19:57:11

[DoS Attack: RST Scan] from source: 208.117.232.122, port 443, Wednesday, January 01, 2014 19:57:11

[DoS Attack: RST Scan] from source: 74.125.213.247, port 80, Wednesday, January 01, 2014 19:42:08

[DoS Attack: RST Scan] from source: 23.205.120.115, port 80, Wednesday, January 01, 2014 19:31:44

[DoS Attack: RST Scan] from source: 174.35.35.30, port 80, Wednesday, January 01, 2014 19:26:21

[DoS Attack: RST Scan] from source: 17.151.236.24, port 443, Wednesday, January 01, 2014 19:24:12

[DoS Attack: RST Scan] from source: 17.151.236.37, port 443, Wednesday, January 01, 2014 19:22:48

[DoS Attack: SYN/ACK Scan] from source: 192.99.1.184, port 80, Wednesday, January 01, 2014 18:59:04

[UPnP set event: add_nat_rule] from source 192.168.1.6, Wednesday, January 01, 2014 18:57:37

[DHCP IP: 192.168.1.6] to MAC address 78:e4:00:f0:de:a0, Wednesday, January 01, 2014 18:57:18

[DoS Attack: RST Scan] from source: 8.12.46.167, port 443, Wednesday, January 01, 2014 18:52:07

[DoS Attack: RST Scan] from source: 17.173.66.132, port 443, Wednesday, January 01, 2014 18:50:36

[DoS Attack: SYN/ACK Scan] from source: 198.27.86.23, port 80, Wednesday, January 01, 2014 18:40:13

[DoS Attack: RST Scan] from source: 17.151.236.22, port 443, Wednesday, January 01, 2014 18:11:28

[DoS Attack: RST Scan] from source: 17.151.236.16, port 443, Wednesday, January 01, 2014 18:11:27

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Wednesday, January 01, 2014 18:02:46

[DoS Attack: RST Scan] from source: 17.151.236.38, port 443, Wednesday, January 01, 2014 18:02:45

[DoS Attack: RST Scan] from source: 205.251.243.158, port 443, Wednesday, January 01, 2014 18:01:50

[DoS Attack: SYN/ACK Scan] from source: 178.33.233.75, port 80, Wednesday, January 01, 2014 17:59:13

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Wednesday, January 01, 2014 17:39:10

[DoS Attack: RST Scan] from source: 17.151.236.38, port 443, Wednesday, January 01, 2014 17:31:59

[DoS Attack: RST Scan] from source: 17.154.66.111, port 443, Wednesday, January 01, 2014 17:20:16

[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Wednesday, January 01, 2014 17:19:32

[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Wednesday, January 01, 2014 17:19:32

[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Wednesday, January 01, 2014 17:19:31

[Internet connected] IP address: 174.53.9.137, Wednesday, January 01, 2014 17:17:11

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Wednesday, January 01, 2014 17:14:02

[DoS Attack: RST Scan] from source: 74.125.225.187, port 80, Wednesday, January 01, 2014 17:07:28

[DoS Attack: RST Scan] from source: 199.16.156.70, port 443, Wednesday, January 01, 2014 16:47:42

[DHCP IP: 192.168.1.3] to MAC address 1c:4b:d6:79:89:5e, Wednesday, January 01, 2014 16:43:09

[DoS Attack: RST Scan] from source: 17.173.66.134, port 443, Wednesday, January 01, 2014 16:22:22

[DoS Attack: RST Scan] from source: 17.173.66.133, port 443, Wednesday, January 01, 2014 16:22:22

[UPnP set event: add_nat_rule] from source 192.168.1.3, Wednesday, January 01, 2014 16:09:09

[DHCP IP: 192.168.1.3] to MAC address 1c:4b:d6:79:89:5e, Wednesday, January 01, 2014 16:08:31

[DoS Attack: RST Scan] from source: 72.21.91.168, port 443, Wednesday, January 01, 2014 15:33:53

[DoS Attack: SYN/ACK Scan] from source: 37.187.87.144, port 9987, Wednesday, January 01, 2014 15:19:58

[DoS Attack: RST Scan] from source: 31.13.66.176, port 443, Wednesday, January 01, 2014 14:58:45

[DoS Attack: RST Scan] from source: 199.16.156.73, port 443, Wednesday, January 01, 2014 14:52:30

[DoS Attack: RST Scan] from source: 199.16.156.70, port 443, Wednesday, January 01, 2014 14:49:26

[DoS Attack: RST Scan] from source: 199.16.156.198, port 443, Wednesday, January 01, 2014 14:37:42

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Wednesday, January 01, 2014 14:33:46

[DHCP IP: 192.168.1.3] to MAC address 1c:4b:d6:79:89:5e, Wednesday, January 01, 2014 13:18:56

[DoS Attack: RST Scan] from source: 17.173.66.136, port 443, Wednesday, January 01, 2014 13:07:54

[DoS Attack: RST Scan] from source: 17.154.66.105, port 443, Wednesday, January 01, 2014 12:58:23

[UPnP set event: del_nat_rule] from source 192.168.1.3, Wednesday, January 01, 2014 12:56:24

[DoS Attack: RST Scan] from source: 17.154.66.75, port 443, Wednesday, January 01, 2014 12:53:21

[DoS Attack: RST Scan] from source: 23.205.120.146, port 80, Wednesday, January 01, 2014 12:46:32

[DoS Attack: RST Scan] from source: 54.243.115.193, port 443, Wednesday, January 01, 2014 12:46:30

[DoS Attack: RST Scan] from source: 72.21.91.168, port 443, Wednesday, January 01, 2014 12:46:30

[DoS Attack: RST Scan] from source: 72.21.92.54, port 443, Wednesday, January 01, 2014 12:46:30

[DoS Attack: RST Scan] from source: 199.16.156.102, port 443, Wednesday, January 01, 2014 12:46:04

[DoS Attack: RST Scan] from source: 199.59.148.82, port 443, Wednesday, January 01, 2014 12:25:37

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Wednesday, January 01, 2014 11:50:06

[UPnP set event: add_nat_rule] from source 192.168.1.3, Wednesday, January 01, 2014 11:49:45

[DHCP IP: 192.168.1.3] to MAC address 1c:4b:d6:79:89:5e, Wednesday, January 01, 2014 11:49:15

[DoS Attack: SYN/ACK Scan] from source: 91.123.194.110, port 80, Wednesday, January 01, 2014 11:21:53

[DoS Attack: SYN/ACK Scan] from source: 178.248.232.55, port 80, Wednesday, January 01, 2014 10:25:15

[DoS Attack: RST Scan] from source: 17.151.236.38, port 443, Wednesday, January 01, 2014 10:01:56

[DHCP IP: 192.168.1.2] to MAC address 24:0a:64:9d:a0:87, Wednesday, January 01, 2014 09:56:51

[DoS Attack: RST Scan] from source: 207.171.162.148, port 443, Wednesday, January 01, 2014 09:22:35

[DoS Attack: RST Scan] from source: 23.7.70.108, port 443, Wednesday, January 01, 2014 09:20:22

[DoS Attack: RST Scan] from source: 74.125.6.174, port 80, Wednesday, January 01, 2014 08:50:24

[DoS Attack: RST Scan] from source: 17.154.66.111, port 443, Wednesday, January 01, 2014 08:39:35

[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Wednesday, January 01, 2014 08:35:37

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Wednesday, January 01, 2014 08:15:20

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Wednesday, January 01, 2014 08:01:59

[DoS Attack: SYN/ACK Scan] from source: 192.99.1.184, port 80, Wednesday, January 01, 2014 06:16:43

[DoS Attack: SYN/ACK Scan] from source: 80.241.209.156, port 80, Wednesday, January 01, 2014 05:56:43

[DoS Attack: SYN/ACK Scan] from source: 86.7.60.192, port 54312, Wednesday, January 01, 2014 05:14:47

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Wednesday, January 01, 2014 05:12:14

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Wednesday, January 01, 2014 05:08:49

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Wednesday, January 01, 2014 05:03:35

[DoS Attack: SYN/ACK Scan] from source: 80.241.209.156, port 80, Wednesday, January 01, 2014 04:55:04

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Wednesday, January 01, 2014 04:49:48

[DoS Attack: SYN/ACK Scan] from source: 192.99.1.184, port 80, Wednesday, January 01, 2014 04:37:04

[Internet connected] IP address: 174.53.9.137, Wednesday, January 01, 2014 04:28:56

[DoS Attack: SYN/ACK Scan] from source: 54.238.110.92, port 80, Wednesday, January 01, 2014 04:19:12

[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Wednesday, January 01, 2014 04:04:09

[Time synchronized with NTP server] Wednesday, January 01, 2014 04:02:08

[Internet connected] IP address: 174.53.9.137, Wednesday, January 01, 2014 03:58:56

Update for 1/5/2014


Well coming to some new conclusions. That Aaron has a interest in the fake timetravelinstitute.com.


That a lot of the very stupid shit I accused Darby and Rainman of may have been the spooled brat antics of a boy in a grown man's body that plays on the computer 24/7.


Living at home with mommy and daddy that refuses or wont get a job to support himself and live his own life.


When I Google-ed him I saw his college stuff and that he was in a frat. I saw what looked like one or more failed business in his attempt not to get a job.


But, one thing is certain Arron is not working along in this. Him and his friends are working together to try to keep me from talking about time travel on the internet which is where the conspiracy comes in that I talk about. This blog is a log of their attempts to stop me. It is the proof they do not want the world to see.


They do not want people knowing what they do.


Which now has turned into cyber stalking, cyber bulling, harassment, fraud, theft, copy right violations and is quickly turning into a legal case. They are the reason Titor's family had to sue them.


Again, I wonder what is their full interest in time travel. I think it may be money. In titor's case they were trying to use his name. In my case they want my technology and want me gone. Not going to happen.


So, Aaron lives at home and computers is his life. Darby is a ex-cia wanna be time traveler and wanna be scientist.


I do not really know what Rainmans problem is besides being a bully. He is probably a wanna be too.


Here is the problem here. These guys are not the professionals they want to be. They have fields they come from but in the field of time travel THEY DO NOT KNOW JACK SHIT. BUT THEY THINK THEY  DO. AND THEIR OWN WEB-SIGHTS SAY THEY ARE NOT REAL. THEY THEMSELVES HAVE SAID THEY DO NOT BELIEVE IN TIME TRAVEL. SO, WHAT IS THEIR BUSINESS WITH ME???


Now, I started off calling these guys thugs, rodents, and bullies. Now I can add criminals to their list of personality’s flaws. I have a bad feeling that Aaron who does not want to work will most likely get his wish for being taken care of. But, it will be in jail or prison where he cant play his video games and use his laptop with internet 24 hours a day. Sleeping and playing as he wishes will be the old days and bubba will be his new frat brother.


God forbid they give him a shovel or a trash can. I do not think Aaron could handle it. I don't think that kid can handle real life. Now, he is a young guy. He is probably being hanging around Darby and Rainman for years. Those guys are thugs. If they have been Aarons teachers. His mentor's. No wonder Aaron is so fucked up!!! Hell, they are just one great big happy dysfunctional family of thugs, rodents, trolls, bullies, and now criminals.


He once told me to get my shit together. For him I have these words and they are constructive. "GROW UP". Before its too late. I will continue to fill out my legal complaints on these guys and hopefully in time the law will deal with them.


I have learned one thing about the FBI. They take their dam time but when they roll it is too late and their suspect is usually shit out of luck. In time that may be Aarons fate. If he continues to steal for income it most certainly will be. Aaron told me "I am not scared of the FBI." Dude, you should be. You really really should be.


All in all the truth about the conspiracy against time travel is coming out slowly but surely. Aaron is up early today. At 7am he started attacking my forum with account spam and has 5 hits on it. Already for today he is done a dos attack on my home router.


Yeah, I have a big FBI report to fill out tonight. I am beginning to think Aaron was behind a lot of shit that happened on the forums. It seems like Rainman and Darby would leash their dog up but I guess they prefer to let it run free. Im hopping the dog kennel/FBI will catch it. 


I want to leave everyone with the attempted harassment Aaron sent me this morning. He has sent me this type of message 3 times now.

1. At my book trailer.

2. Posted on my forum the real http://thetimetravelinstitute.com

Proof of this is in the last video in a previous blog where I recorded it.

3. Now to my gmail account.

FBI (I hope your watching this shit. I put it in my complaints.)


Delivered-To: Deleted

Received: by 10.68.110.195 with SMTP id ic3csp56047pbb;

        Sun, 5 Jan 2014 02:27:12 -0800 (PST)

X-Received: by 10.50.72.36 with SMTP id a4mr10274637igv.40.1388917632311;

        Sun, 05 Jan 2014 02:27:12 -0800 (PST)

Return-Path:

Received: from nm42.bullet.mail.ne1.yahoo.com (nm42.bullet.mail.ne1.yahoo.com. [98.138.120.49])

        by mx.google.com with SMTP id 9si88191949icd.80.2014.01.05.02.27.11

        for Deleted;

        Sun, 05 Jan 2014 02:27:12 -0800 (PST)

Received-SPF: pass (google.com: best guess record for domain of middletoncarlyn@yahoo.com designates 98.138.120.49 as permitted sender) client-ip=98.138.120.49;

Authentication-Results: mx.google.com;

       spf=pass (google.com: best guess record for domain of middletoncarlyn@yahoo.com designates 98.138.120.49 as permitted sender) smtp.mail=middletoncarlyn@yahoo.com;

       dkim=pass header.i=@yahoo.com

Received: from [127.0.0.1] by nm42.bullet.mail.ne1.yahoo.com with NNFMP; 05 Jan 2014 10:27:11 -0000

Received: from [98.138.100.113] by nm42.bullet.mail.ne1.yahoo.com with NNFMP; 05 Jan 2014 10:24:18 -0000

Received: from [98.137.12.55] by tm104.bullet.mail.ne1.yahoo.com with NNFMP; 05 Jan 2014 10:24:18 -0000

Received: from [216.39.60.197] by tm15.bullet.mail.gq1.yahoo.com with NNFMP; 05 Jan 2014 10:24:18 -0000

Received: from [127.0.0.1] by omp1084.mail.gq1.yahoo.com with NNFMP; 05 Jan 2014 10:24:18 -0000

X-Yahoo-Newman-Property: ymail-4

X-Yahoo-Newman-Id: 245138.63813.bm@omp1084.mail.gq1.yahoo.com

Received: (qmail 92881 invoked by uid 60001); 5 Jan 2014 10:24:18 -0000

DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1388917458; bh=9RlykI5TEFN11vF8izLq5dWRV0D8KdC8WWcw8mJVjnQ=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:Message-ID:Date:From:Reply-To:Subject:To:MIME-Version:Content-Type; b=jA8dynXeO62Y0LFcKfKL2mNPB2e/jBPTY+54mPUYWR4t0xMuzLlpbMU4U7Rl394KJkawYVizwh0Nj2yDeEdNYLOsobJhx/wRwzkTDyYRXS/CloZOh+W3VhrxZ2HKeNa/bSMCnSaftiSNELM3N7Vj7F0N8Xt1Ifyz+zXQc4Jfjiw=

DomainKey-Signature:a=rsa-sha1; q=dns; c=nofws;

  s=s1024; d=yahoo.com;

  h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:Message-ID:Date:From:Reply-To:Subject:To:MIME-Version:Content-Type;

  b=XUAfwLz5RHSdm6eNA/PXpdxyW5rZkUW0DnzsFV1f644qYdjAAPuk+Ar0lMRchPoCqKIeSVak+52lZQO0vRUPBY6z8VBv0R+BQ/CULP4dfKkqncrGmxvPuN9OdGpiyrzQYIkG+5YhwcZVSSVgsT4s2YehmIiDOQb2krmZFSavJog=;

X-YMail-OSG: pOCEWNUVM1nkjtebK7C4fwVvkwiSTBxKWRRBBRxigjpdNTh

 .z_TVw6Vssn.WSRwInTGGiX8_HiTMyaa.pmb7KVVsISPCqVZZvvp.Hf47ij8

 dzrjeIli3kUWUDjQJy5dEdmFwOpbjLJj69KA06L9Jba6F.G4yoLAxqd9taeB

 eniF1L2WujlxvyKbixHu2vt5NyvPZ6q4Lr3n_PVn_gSE5XZ7JJXLZzD7Uiri

 FnN.aaGGMXRkL3sLvdOHi._5nxhS.OM.fhS5Gy1J5Ln6CR6xsxbInnvaUbnQ

 L5akbaWiikOQdnbzb4D1_ghEq8bq0vbQvsYLjxw5Nqmo6uKJeFikFueXRm2u

 6pmfv8nHD31yBH73vYE4Qk8VPJU7fcboTkXBlCJIONzmplXOe5W_KfYS2xgH

 5SGBWIGDYuaOQQXM7Z_v1Ds_nORxszc48gKqzLBFzMIm.m_WUMhj26BWYnNM

 WxtD4trcgU0um5PbUiDol2pSPAdwfhSiCEf7jjDEVIY_et33kyeaL98dlquQ

 8yiYB1_vRvI4wvJvHtjrbueWAT1AqphHdcZS0uQrjP1Y-

Received: from [78.173.141.46] by web163405.mail.gq1.yahoo.com via HTTP; Sun, 05 Jan 2014 02:24:18 PST

X-Rocket-MIMEInfo: 002.001,SG93IGFyZSB5b3UgZ2V0dGluZyBvbj8NCkhvcGUgeW91IHRoaW5rIG9mIG1lIG5vdyBhbmQgYWdhaW4uCgpJJ20gc28gZ2xhZCB0byBtZWV0IHlvdSAKSSB3b3VsZCBsaWtlIHRvIHNoYXJlIG15IHBpY3R1cmVzIHdpdGggeW91CgpJIGJlbGlldmUgeW91IHdpbGwgZ2l2ZSBtZSBhIHJlc3BvbnNlLi4uCmJ5ZSAuLi4BMAEBAQE-

X-Mailer: YahooMailWebService/0.8.172.614

Message-ID: <1388917458 .56925.yahoomailneo="" web163405.mail.gq1.yahoo.com="">

Date: Sun, 5 Jan 2014 02:24:18 -0800 (PST)

From: Little Darling

Reply-To: Little Darling

Subject: greeting!

To: "rakarma19@gmail.com"

MIME-Version: 1.0

Content-Type: multipart/mixed; boundary="1091002116-1049814332-1388917458=:56925"


--1091002116-1049814332-1388917458=:56925

Content-Type: text/plain; charset=us-ascii


How are you getting on?

Hope you think of me now and again.


I'm so glad to meet you

I would like to share my pictures with you


I believe you will give me a response...

bye ...


Last thing - I am having one or more linux brick routers  put in my home in the next week or two. I am already using a brick for my private connection. But, I am making it permanent.

There will be no ports or services running for Aaron to get thru to. Well Aaron, I guess you wont be watching videos with me an more. BAAAAAAAAAAAHAHAHAHAHAHHAHA!!!! Nor looking at what I am typing. Nor seeing my project files. 

Before I was depressed because I could not bring time travel one station back up on the internet. Well I can now. 

Granted it may take them longer for Aaron to get thru but as I have been told nothing is full proof.


So, when using my sensitive software I will usually disconnect the internet from it first. If I do allow it to be connected I will be monitoring the network. Most of the time it will not be connected at all. Probably only when I need a package upgrade even then I will offload my sensitive shit first.


So, I will be getting my internet life back. Thanks to Aaron who pushed me to write my first book. Now when I really get my bad ass software running again and my new stuff too my internet network will be more secure. 


Yeah, that boy was a pain in the ass but in the long run that little spooled hacker brat helped me a little.


update 01/06/2013

Well Aaron did a good job on my home router today. I had reset the IP to show the FBI he is acquiring my IP somehow. 

I sent them the log.

He of course attacked my forum today and I forwarded that to the FBI. And he did this email message to me today from 


Paranormalis webmaster@paranormalis.com via s036.panelboxmanager.com  


Have you built a time machine or discovered a way to time travel? We're looking for time travelers interested in being in a documentary on the subject. If interested, shoot an email with a bit about yourself and your time traveling endeavors to brecasting@gmail.com


Which I also forwared to the FBI:

I had previously told him I was doing a Documentary which I am. He used that as the subject to send me his email message today. 

He had done things like this before but only when I wrote about him. Which I did yesterday and today. So tomorrow he should send me another one or not. We shall see.


I am betting this documentary is false. There is probably no such project from this communication. Oh well the FBI will check that out. 

Very last for today. Here is the registered accounts and IP's Aaron used to attack my forum today.



(All these accounts have been sent to the FBI.)

User              IP
Snobre            134.249.84.158
AElogrewellags    31.184.241.12
Allatetl179       212.92.245.51
Andrewgota        89.22.255.140
Alesokaqeh        91.200.13.86
SuperVedroor      178.123.133.194
Infill            46.118.194.245
qtuizzws          195.190.13.118
Dancyplalty       178.19.99.105
cesyspocailla     176.31.60.123
Miguelst          193.105.210.216
12Betinifez       37.57.179.22
licecips          46.118.194.245
ArinochkA         188.93.27.130
ulkaBetinitle     178.95.56.30


The war against time travel from the Conspiracy Against Time Travel with the Generals of the Army Rainman aka Ray and Darby from the fake http://timetravelinstitute.com is alive and well.

Ray and Darby your boy is a chip off the old Troll Block. 

I have to laugh at how hard you guys try to keep me from talking about time travel with information  on the internet. You guys can not win. Im here to stay. Im not Titor. I will not put my tail between my legs and run away like titor did. Your not getting rid of me.


No matter where you stamp me out I will always pop up some place else. 


Here is my home router log for today showing the attack THE CONSPIRACY AGAINST TIME TRAVEL did on my home network.


[DoS Attack: RST Scan] from source: 31.13.66.33, port 443, Tuesday, January 07, 2014 17:49:26
[DoS Attack: RST Scan] from source: 31.13.66.144, port 443, Tuesday, January 07, 2014 17:47:16
[DoS Attack: SYN/ACK Scan] from source: 37.187.56.24, port 20201, Tuesday, January 07, 2014 17:44:52
[DoS Attack: RST Scan] from source: 17.154.66.106, port 443, Tuesday, January 07, 2014 17:33:10
[DoS Attack: RST Scan] from source: 17.151.236.24, port 443, Tuesday, January 07, 2014 17:18:01
[DoS Attack: RST Scan] from source: 17.151.236.50, port 443, Tuesday, January 07, 2014 17:17:51
[DoS Attack: ACK Scan] from source: 72.21.91.19, port 80, Tuesday, January 07, 2014 17:11:12
[DoS Attack: RST Scan] from source: 173.195.56.8, port 80, Tuesday, January 07, 2014 16:50:45
[DoS Attack: RST Scan] from source: 17.151.236.24, port 443, Tuesday, January 07, 2014 16:49:04
[DoS Attack: RST Scan] from source: 17.173.66.133, port 443, Tuesday, January 07, 2014 16:48:45
[DoS Attack: RST Scan] from source: 46.8.37.8, port 44405, Tuesday, January 07, 2014 16:46:47
[DoS Attack: SYN/ACK Scan] from source: 46.8.37.8, port 44405, Tuesday, January 07, 2014 16:46:28
[DHCP IP: 192.168.1.3] to MAC address 1c:4b:d6:79:89:5e, Tuesday, January 07, 2014 16:28:02
[DoS Attack: RST Scan] from source: 17.151.236.24, port 443, Tuesday, January 07, 2014 16:26:10
[DoS Attack: RST Scan] from source: 138.91.96.142, port 443, Tuesday, January 07, 2014 16:26:10
[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Tuesday, January 07, 2014 16:18:33
[DoS Attack: RST Scan] from source: 17.151.236.47, port 443, Tuesday, January 07, 2014 16:12:39
[DoS Attack: RST Scan] from source: 17.151.236.22, port 443, Tuesday, January 07, 2014 16:12:36
[DoS Attack: RST Scan] from source: 17.151.236.16, port 443, Tuesday, January 07, 2014 16:12:35
[DoS Attack: RST Scan] from source: 17.151.236.31, port 443, Tuesday, January 07, 2014 16:12:24
[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Tuesday, January 07, 2014 16:11:37
[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Tuesday, January 07, 2014 16:06:07
[DoS Attack: SYN/ACK Scan] from source: 203.211.130.242, port 80, Tuesday, January 07, 2014 14:57:47
[DoS Attack: SYN/ACK Scan] from source: 198.27.85.102, port 6005, Tuesday, January 07, 2014 14:23:24
[DoS Attack: SYN/ACK Scan] from source: 220.77.228.24, port 4500, Tuesday, January 07, 2014 14:09:04
[DoS Attack: TCP/UDP Chargen] from source: 31.207.2.106, port 43760, Tuesday, January 07, 2014 14:01:36
[DoS Attack: SYN/ACK Scan] from source: 109.99.149.74, port 80, Tuesday, January 07, 2014 13:43:45
[DoS Attack: RST Scan] from source: 46.38.237.116, port 443, Tuesday, January 07, 2014 13:43:31
[DoS Attack: RST Scan] from source: 161.53.74.122, port 9001, Tuesday, January 07, 2014 13:43:30
[DoS Attack: SYN/ACK Scan] from source: 112.187.202.32, port 6688, Tuesday, January 07, 2014 13:38:33
[DoS Attack: SYN/ACK Scan] from source: 207.58.162.195, port 80, Tuesday, January 07, 2014 13:33:08
[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Tuesday, January 07, 2014 13:22:21
[DoS Attack: SYN/ACK Scan] from source: 112.187.202.32, port 6688, Tuesday, January 07, 2014 11:31:41
[DoS Attack: SYN/ACK Scan] from source: 192.169.81.106, port 80, Tuesday, January 07, 2014 08:35:23
[DoS Attack: TCP/UDP Chargen] from source: 199.19.108.50, port 55536, Tuesday, January 07, 2014 08:18:54
[DoS Attack: SYN/ACK Scan] from source: 192.99.1.184, port 80, Tuesday, January 07, 2014 07:08:03
[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Tuesday, January 07, 2014 04:03:15
[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Tuesday, January 07, 2014 04:03:15
[DoS Attack: TCP/UDP Chargen] from source: 80.82.78.29, port 59929, Tuesday, January 07, 2014 02:14:23
[DoS Attack: TCP/UDP Chargen] from source: 80.82.78.29, port 60349, Tuesday, January 07, 2014 01:00:14
[DoS Attack: SYN/ACK Scan] from source: 144.76.72.76, port 80, Tuesday, January 07, 2014 00:49:03
[DoS Attack: SYN/ACK Scan] from source: 222.216.188.88, port 80,




Update 01/08/2014


Well I got my code for speeding my programs. I dropped using the threads for now because I like my stuff to run on different compilers on different operating systems. So, I am just increasing my buffer size and paging to memory.

So, re-hitting the BNS program that Aaron wanted but sorry Charlie you screwed up your deal. Then will goto the 2nd book program. Then starting the documentary and 2nd book.

Im zipping up all of Aarons emails today for the FBI and if all goes well I will have a something put in between my router and the internet.




The conspiracy against time travel hit a new low. I have a 15 year old daughter that uses the internet and my router log shows her getting hacked now. Hopefully that will get the FBI off their asses. She has a camera on her computer and they are trying port 443 which has services for that camera.  I discovered that last night. Damn, those guys stop at nothing. Kids too? and girls? You guys are fucked up. Some of that is in the logs above.

Well not checked on Aarons progress for hacking me and attacking my forum yet today. I will look at all that tonight.




01/09/2014

Well, I pulled a Aaron and stayed up night then all day (BAAAAAAAAAAAAAAHAHAHAHAHAHAHA!!!). Yeah, I saw your stupid Ass Aaron popping into my router last night. Yep, logs headed to the authorities.
Update - This past weekend


Well early this morning I posted again at a forum on Craigslist in Boston in the science & math. Now, usually the conspiracy against time travel Cyber Stalks me on the internet and when they see me post something they try to get it deleted or at least raise such a fuss in the thread no one remembers to the op (original poster).

What I posted was a brief explanation about myself and my method of time travel and pointed them to my links. But, Craigslist makes a new person wait seven days before they can post links so posted what they should search for on bing to find my sites.

Well as luck would have it (no it was not luck it was stalking) Aaron posted to. He once told me the conspiracy was finding me by my user name. What he should of said was he was finding me by my user name. What Aaron has to say to me was not very nice. First of All Aaron did not go by his real name. But, what he said to me and how he said it is how I new it was him.

First of All. Here is a sample of one of Aarons emails to me.

----------------------------------------------

Aarons email:

"Wow fuck me I just overwrote my entire project. Well fuck it I'll redo it another time."

-----------------------------------------------

Now, here is the message from Craigslist. I am leaving out the user name so as not to offend Craigslist for now.

-----------------------------------------------------

Aarons message on craigslist

"Wow! Congratulations! 2014-01-11 05:52:43

I used my version of your system to determine your future success and fame by reading some MS Word files I'll be writing about you in 2017 and storing on my laptop for retrieval today. Sorry to will-hear about your accident, and, if it is on your hard drive, please don't mention what will happen to my family in 2016. It's only one eye, and it will be replaced by an artificial one in 2023. I don't want the insurance companies or The Division of Children and Family Services to learn about it for obvious reasons."


----------------------------------------------------------------

So, Aaron and this user both started off with Wow. Now, what got my attention was the personal information contained within the post that normal people would not know. You see Aaron and I exchanged over a thousand emails. He was wanting me to teach him about my method of time travel and wanted my code and my programs.

Aaron had said me might write about me in the future in his emails to me. Here he said he is writing about me. Though I thought it would only be me apparently he stole a lot of my information from my files and plans to use it for his own financial gain. Now he said my version. Aaron has used our emails probably to commit copyright infringement on my books, programs, and code. He talked about a laptop. Aaron has a laptop. A black one if I am not mistaken. 

Here Aaron mentions a Accident for me. HE IS THREATING ME!!!!! FBI YOU SEEING THIS SHIT!!!!! What is this exchange one eye for another. Sounds like me may be threating my family.

He said something about mentioning about what will happen to his family. Apparently he had to give me his ID before I would talk to him and I found out who he was and who is family was. So, he is expressing concern about his family. (Yeah Aaron you should be concerned. You exposed your family to a stranger on the internet.

That will be helpful for me later as I am considering contacting Gary and Suzanne. I will send Gary a letter and all our emails and pictures and ask him to secure his internet and his son. I am sure your sister Ashley will be glad to hear you are exposing her to strangers on the internet too. Yeah boy, you are dragging your family into a world of shit if this goes south for you.

How will Gary and Suzanne and Ashley deal with visiting you in jail. What if I was a crazy freaking nut. How would they deal with that? Boy, you have a lot of shit to think about. They soon will have to think about this too because I am not going to let your hacking me just go. You need to go tell them what you have done because I assure you I will make sure they know sooner or later. As I said I may be contacting your family.

Oh yeah, they live up by Boston, MA is that correct? Your dad and mom runs a computer business? You sis is a facility manager right? So, it is their home that you are attacking me over the internet from. YEP, IM GETTING A HOLD YOUR DAD LITTLE BOY!!!

Your dad needs to secure his shit. But, you also mentioned web bots in your emails to me so the FBI might look for where you planted your web bots. If your dads internet shut off tonight I doubt your internet attacks would stop. I also know you have your computer science friends to.

Also one night when I caught Aaron in my computer (my firewall told me) I pulled up my gedit and starting writing smack about his family. The file was not saved nor was it sent over the internet. When I got done I simple deleted what I wrote and closed the windows unsaved/unsent.

I wanted to see if Aaron would throw that back at me later on either by email or when I visited the forums. I wanted to see if Aaron was running a key logger on my computer. Here he was concerned about his family and has verified that he read the smack I thought I was typing in private on my home computer keyboard. So, Aaron was committing a crime when he read the smack I was writing.

So FBI - KEYLOGGING CONFIRMED BY MY HACKING OF MY COMPUTERS. So, I have confirmed Aaron connected to my VCN service now I have confirmed Aaron was recording what was being typed on my computer keyboard. You guys can arrest him now.

The insurance companies. I am assuming he is talking about his theft of my credit card from BARCLAY CARD. I guess he is assuming they are insured for his credit fraud. Maybe he thinks I am filing a complaint with my home owners insurance because of his hacking my home computers. Having to buy a new router and install Linux bricks. (My Linux bricks I had some problems so Aaron is still living in my home network.)

My hard drive he is referring to my computer files.

Now here Aaron mentions something.

"The Division of Children and Family Services to learn about it for obvious reasons."

He appears to be making some sort of threat against myself and my family.

YEAH AARON YOU CALL THE DIVISIOIN OF CHILDREN AND FAMILY SERVICES.

TELL THEM YOU ARE HACKING MY 15 YEAR OLD DAUGHTER THROUGH PORT 443 (ITS IN MY LOGS I HAVE POSTED IN THIS BLOG).

TELL THEM YOU ARE CONNECTING TO MY UNDERAGE PRETEEN DAUGHTERS WEBCAM YOU FUCKING SICK FREAK CHILD PORN PERVERT. I HAVE TWO DAUGHTERS. ONE IS FIFTEEN ONE IS AROUND 7. BOTH HAVE TABLETS WITH WEBCAMS.

YOU TELL THEM THAT!!! I HOPE THEY HAUL YOUR ASS OFF TO JAIL!!!

FBI YOU SEEING THIS SHIT. GET OFF YOUR ASSES AND STOP THIS MONSTER!!!!

FBI I AM ZIPPING UP ALL OF AARONS EMAILS AND FILING ANOTHER REPORT TO NIGHT. IN THE REPORT WILL BE A LINK WHERE YOU CAN DOWNLOAD THE EMAILS. I WILL ALSO GIVE YOU THE LATEST ROUTER LOGS AND WEBSIGHT LOGS. FBI - IN THE EMAILS AARON SAYS THE http://timetravelinstitute.com  WAS AND IS TRACKING ME ON THE INTERNET. HE SAYS THEY ARE TRACKING ME THROUGH MY USER NAME!!!

FBI IN THAT REPORT I MADE LOOK AT AARONS EMAIL WHERE HE SAID HIS CREDIT CARD DISAPPEARED FROM HIS ACCOUNT. THAT IS WHEN MY CREDIT CARD WAS USED FOR FRAUD.

LOOK AT THE EMAIL ARRON GAVE WHEN HE MENTIONED SOME VIDEO AND I WROTE I JUST SAW THAT VIDEO.

What a lot of this is about is a person's right to his freedom of speech to have a blog. I have followed blog procedures in maintaining my blog. There should not be any last names here except my own. 

Darby in a interview which is publically posted on the internet which was the subject of my CIA experiment post. Since Darby gave the interview and his information was in that interview it was ok for me to run with it. 

Ray I know he does not like me blogging about him but he has publically giving his last name  the company he works for and even a picture of himself all on a public forum. And he talks publically about other people.

The time travel institute the fake one is a forum. Their terms of service say they are a pretend service. Which was my mistake because I posted there about time travel by way of data mining binary counters to find computer media of the past or the future even alternate time-lines.

I used only their User names from a forum and I called Rainman Ray because Darby did that in public on the forum and so that is consent to use that name because Ray gave the permission for it to be used in public that way.

DARBY AND RAINMAN BOTH OF THEM WRITE ABOUT OTHER PEOPLE ALL THE TIME. DARBY HAS WRITTEN THOUSANDS OF MESSAGES ABOUT TITOR. NOT ALL OF IT WAS GOOD EITHER. SOME OF IT WAS PERSONAL.

NOW DARBY AND RAY AKA RAINMAN OVER THE YEARS HAVE TALKED ABOUT 1000'S OF PEOPLE. TALKING ABOUT PEOPLE IS ALL THEY DO. IT IS WHAT THEY DO. SO IT IS OK FOR ME TO TALK ABOUT THEM.

(Hey Darby, I am using all caps again. If my account still exist at the http://timetravelinstitute.com you can send me warning. BAAAAAHAHAHAHAHAH.)

They use a public forum to talk about other people even troll and harass other people. So, there is nothing wrong with me blogging about them here. More so since I am using User names only from a forum that is largly dieing and half dead anyway.

They gave that consent when they went on a public forum and started their churn and burn on other people. So, it is ok for me to talk about the http://timetravelinstitute and their admins here on my blog.

Now, These guys started their shit with me first. Ray, stopped me from posting and talking about my time travel. They delete my messages. When they banned me and I posted else where about time travel they got me banned there too and got my messages deleted. They called me names like troll so they called me names first they can not bitch when I call them names. They used my first and last name publically even when I told them to stop and not to do that.

So what people read in this blog that I have written is legal. I have the right to my freedom of speech. I have the right to have my blog here. I am not giving up that right.

I have the right to go by Reactor1967 on the internet. I am not going to stop using that user name. That was a demand of Aaron who is hacking me. Among other demands. I have the right to use it and I will use it.

I will never stop working on time travel with information.

I will never writing programs that find time travel media.

I will never stop developing my theories.

I will never stop writing about my theories and if I want to write about Ray and Darby I will.

Now, when they got me thrown out of Abovetopsecret.com for talking about them. THEY FAILED TO TELL OTHERS THEY TALK ABOUT PEOPLE TOO. THEY TALK ABOUT PEOPLE BUT YET I CAN NOT TALK ABOUT THEM ON ABOVETOPSECRET.COM (THEY ARE VIOLATING MY RIGHTS UNDER THE AMERICAN CONSTITUATION AND IN MY OPION SHOULD BE ARRESTED FOR IT. They talk about people so it is ok for me to talk about them. And I do and I will continue.

RAY TALKS ABOUT OTHER PEOPLE ALL THE TIME.

SO, I CAN TALK ABOUT THEM ALL I WANT TOO. YOU GOT THAT ARRON BOY.

I will never stop. And that goes for you guys over at the fake http://timetravelinstitute.com

What Aarons beef is with me has to do with the http://timetravelinstitute.com but he still has not told me what his problem with me is.

Im hoping when the FBI arrest Aaron for Child porn, stalking me, hacking me, copyright infringement, assault (for the threats), fraud, theft, wire tapping, and other things that the FBI will tell me what was Aarons problem with me.

You see, when Ray banned me he sent me a private message telling me "We are watching you.". HOW TRUE THAT WAS.  In Aarons emails he told me they were tracking me on the internet. Now, Aaron has attacked me personally at home through the internet.

I WILL NEVER STOP BLOGGING ABOUT MY TIME TRAVEL YOU. I HAVE THE RIGHT TO MY BLOG HERE!!!

I HAVE THE RIGHT TO POST IN FORUMS ABOUT TIME TRAVEL AS REACTOR1967 AND WITH MY METHOD OF TIME TRAVEL.

THAT DOES NOT GIVE THE http://timetravelinstitute.com to do what they have done. They want me gone and are trying to find ways to make that happen. Guys, its not going to happen.

 FBI - Since your investigation is still on going here is a message posted at the REAL http://thetimetravelinstitute.com I believe is from Aaron. I locked the board and will free the account later. You guys can log in if you want I gave you guys a login. Here is the message from the cyber stalkers/hacker


Victimize Sigg

Postby Amelloste » Mon Jan 13, 2014 11:45 pm
nick yatesPrey upon Sigg has all more than 25 years of advertisements, aiding and tube media expertise. Currently the President of Appearance Single Media, he leads his team of media experts to day by day affirm virgin and advanced systems of driving mod conclusion while maintaining unprecedented standards to fortify answers someone is distressed existing customers.
During perpendicular steady central relationships, Show Bromide has the know-how to come by media at beneath hawk value rates which supplies our clients with incomparably bountiful media opportunities. Our procurement master diagram includes; extended duration media commitments, later banking, traffic deals and critical partnerships. We've got assets and leverage unmatched in the marketplace. Our strategic partnerships encompass; networks, train depot groups, syndicators and constituents providers. We deliver locality transmit, peculiar mooring, style radio, cohort and syndicated media opportunities

rob sigg -
rob sigg -
rob sigg
Recognizing recently created takings opportunities prior to bringing video to consumers 'over-the-top', Performance The same Media launched an dynamic CDN (Delight Distribution Network) and an advertising childbirth monetization motor in the next half of 2012. Since its engender, Display Under any circumstances handcuff Media has recognized well-heeled consumer launches with the aid state-of-theart applications on Sony, LG and Samsung connected devices, Roku streaming video players, iOS and Android revealing devices, with a handful other launches impending.

In advance starting display Person Media, Looting dead beat down 8 years with Turner Media Gather, which he helped skiff from its origin. As President of Turner Media Brigade, Ransack's natural execution-oriented spirit made repayment after tremendous broaden when he took them from a 3-man media instrumentality to a 100 employees member power businesswoman within the media landscape. He pioneered and was conducive in the unfolding of Turner Media Organize as the classy rep-business custom-made all media sales throughout DISH Network. At its shinny up, after bringing them to a sales growth of 250MILLIMETERS, Cheat made his retire in 2004.

rob sigg -
rob sigg -
rob sigg
In the years
performance one media
performance one mediauntil to Turner Media Departmentalize, Burgle utilized his outspoken entrepreneurial force and his accord to conceive of how 'all-the-pieces-fittogether' to own and control over and above numerous businesses within the natural property, erection, spa and salon disciplines.


The conspiracy against time travel has taken to attempting to call me at home. I got a call from this number but it is a voip. The number is actually from the ip  carrier trying to bring the the call.

Here it is

202-455-8888 7:47 pm 01/16/2014
767-275-9071 12:07 pm 01/11/2014

 They do not want to talk to me. I can give as good as I  get.

update 01/18/2014

Anyone reading Aarons and I emails and reading his messages to me through the forums and online services can easily put two plus together. Here is Aarons message today for me. I put the full code in it so it is long and cryptic. Here it is.

Delivered-To: deleted
Received: by 10.68.110.195 with SMTP id ic3csp56734pbb;
        Fri, 17 Jan 2014 16:58:42 -0800 (PST)
X-Received: by 10.50.62.102 with SMTP id x6mr1115139igr.35.1390006722464;
        Fri, 17 Jan 2014 16:58:42 -0800 (PST)
Return-Path:
Received: from s036.panelboxmanager.com (s036.panelboxmanager.com. [72.55.186.56])
        by mx.google.com with ESMTPS id n10si5541568igk.61.2014.01.17.16.58.42
        for
        (version=TLSv1 cipher=RC4-SHA bits=128/128);
        Fri, 17 Jan 2014 16:58:42 -0800 (PST)
Received-SPF: pass (google.com: best guess record for domain of paranor@s036.panelboxmanager.com designates 72.55.186.56 as permitted sender) client-ip=72.55.186.56;
Authentication-Results: mx.google.com;
       spf=pass (google.com: best guess record for domain of paranor@s036.panelboxmanager.com designates 72.55.186.56 as permitted sender) smtp.mail=paranor@s036.panelboxmanager.com
Received: from mailnull by s036.panelboxmanager.com with sa-checked (Exim 4.80.1)
(envelope-from )
id 1W4KFF-000lz4-JV
for deleted; Fri, 17 Jan 2014 19:58:41 -0500
Received: from paranor by s036.panelboxmanager.com with local (Exim 4.80.1)
(envelope-from )
id 1W4KFF-000lyi-GV
for deleted; Fri, 17 Jan 2014 19:58:41 -0500
To: Reactor1967
Subject: Time-Hacking with computers and algorithms - New reply to watched thread
X-PHP-Script: paranormalis.com/deferred.php for 151.74.83.81
From: Paranormalis
Message-Id: <44f366e56d7170243fd29a99f40cf70099c1831d paranormalis.com="">
Date: Sat, 18 Jan 2014 00:58:41 +0000
Content-Type: multipart/alternative;
boundary="=_2bca471bf49b0297165472e98132cf5e"
MIME-Version: 1.0
Sender: 
X-Spam-Checker-Version: spamc_ctasd client on
localost
X-Spam-Level:
X-Spam-Status: No, score=0.0 required=50.0 tests=SpamClass_Unknown,
VirusClass_Unknown autolearn=disabled
version=1.0.0
X-CTCH-PVer: 0000001
X-CTCH-Spam: Unknown
X-CTCH-VOD: Unknown
X-CTCH-Flags: 0
X-CTCH-RefID: str=0001.0A020204.52D9D1C1.00E5,ss=1,re=0.000,recu=0.000,reip=0.000,cl=1,cld=1,fgs=0
X-CTCH-Score: 0.000
X-CTCH-ScoreCust: 0.000
X-CTCH-Rules:
X-CTCH-SenderID: webmaster@paranormalis.com
X-CTCH-SenderID-Flags: 0
X-CTCH-SenderID-TotalMessages: 2
X-CTCH-SenderID-TotalSpam: 0
X-CTCH-SenderID-TotalSuspected: 0
X-CTCH-SenderID-TotalConfirmed: 0
X-CTCH-SenderID-TotalBulk: 0
X-CTCH-SenderID-TotalVirus: 0
X-CTCH-SenderID-TotalRecipients: 0
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - s036.panelboxmanager.com
X-AntiAbuse: Original Domain - gmail.com
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - s036.panelboxmanager.com
X-Get-Message-Sender-Via: s036.panelboxmanager.com: mailgid no entry from get_relayhosts_entry
X-Source:
X-Source-Args:
X-Source-Dir:

--=_2bca471bf49b0297165472e98132cf5e
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Reactor1967,=0A=0Avp8671 replied to a thread you are watching at Paranor=
malis.=0A=0A=09"Time-Hacking with computers and algorithms"=0A=0AThis is=
the message they posted:=0A--------------------------------------------=
--------------------------=0AHello Reactor, i just wanted to ask you , i=
f you agree, a couple of questions.=0A1: You use the word text counter,=
can you describe exactly what is a text counter ? you scan for text in=
a file full of words and count words ???=0A2: You scan for emails, but=
emails are stoed on the server, how do you perform exactly your scan ?=
=0A3: You use checksum ,to find files , but again, emails are not files=
normally stoed on the computer, they are stored on the server and then=
sent to your inbox, do you scan that directory ??=0AIts been a while i=
follow you and your blog, but still i cannot wrap hmy haed around your=
method.=0AYou say you are writing a second book, where you explain your=
code, can you give some hints using a meta-code '?=0Ai have 20+ years o=
f pc programming, i can implement any kind of software pretty quickly.=
=0AThanks for your time=0A----------------------------------------------=
------------------------=0A=0ATo view this thread, click here:=0Ahttp://=
paranormalis.com/threads/time-hacking-with-computers-and-algorithms.6314=
/#post-78878=0A=0AYou will not receive any further emails about this thr=
ead until you have read the new messages.=0A=0A-------------------------=
---------------------------------------------=0A=0AThis message was sent=
to you because you opted to watch the thread "Time-Hacking with compute=
rs and algorithms" at Paranormalis with email notification of new replie=
s.=0A=0ATo disable emails from this thread:=0Ahttp://paranormalis.com/wa=
tched/via-email?u=3D4543&c=3Defc901e2c6a0df152abe1c731294f8fd&a=3Dno_ema=
il&t=3Dthread&id=3D6314=0A=0ATo disable all emails:=0Ahttp://paranormali=
s.com/watched/via-email?u=3D4543&c=3Defc901e2c6a0df152abe1c731294f8fd&a=
=3Dno_email=0A=0Ahttp://paranormalis.com/

--=_2bca471bf49b0297165472e98132cf5e
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

=0A=0A=09 />=0A=09=0A=09Time-Hac=<br />king with computers and algorithms - New reply to watched thread=
=0A=0A=3D"#176093" alink=3D"#176093" vlink=3D"#176093" style=3D"padding: 10px"=
>=0A=0A=09"LTR" style=3D"=0A=09=09background-color: #F0F7FC;=0A=09=09border: 1px s=
olid #A5CAE4;=0A=09=09border-radius: 5px;=0A=09=09direction: LTR;">=0A=
=09 =0A=09=09=0A=09=0A=09 =
=0A=09=09
=09=09=09padding: 5px 10px;=0A=09=09=09border-bottom: 1px solid #A5CAE4;=
=0A=09=09=09border-top-left-radius: 4px;=0A=09=09=09border-top-right-rad=
ius: 4px;=0A=09=09=09font-family: 'Trebuchet MS', Helvetica, Arial, sans=
-serif;=0A=09=09=09font-size: 11px;=0A=09=09=09line-height: 1.231;">=0A=
=09=09=09ext-decoration:none">Paranormalis=0A=09=09
padding: 1em;=0A=09=09=09color: #141414;=0A=09=09=09font-family: 'Trebuc=
het MS', Helvetica, Arial, sans-serif;=0A=09=09=09font-size: 13px;=0A=09=
=09=09line-height: 1.231;">=0A=09=09=09=0A=0A

"font-size: 18pt; font-weight: normal; margin: 10px 0">/paranormalis.com/threads/time-hacking-with-computers-and-algorithms.631=
4/#post-78878" style=3D"color: #176093; text-decoration: none">Time-Hack=
ing with computers and algorithms

=0A=0A
; margin: 10px 0; border: 0; color: #D7EDFC; background-color: #D7EDFC"=
/>=0A=0A=3D"100%" style=3D"margin: 10px 0 20px">=0A =0A=09=0A=
=09=09=09=09=0A=09=09=09=09=0A=09=09=09le>=0A=09=09=09=09=09display: block"><!--vp8671
style=3D"font-size: 13px; line-height: 1.231; padding-right: 20px">=0A=
=09=09
rder: 1px solid #D7EDFC;=0A=09=09=09border-radius: 5px">=0A=09=09=09le cellpadding=3D"0" cellspacing=3D"0" border=3D"0">=0A=09=09=09
=09=09=09=09=09padding: 5px;=0A=09=09=09=09=09border-radius: 4px">=0A=09=
=09=09=09=09le=3D"vp8671"=0A=09=09=09=09=09=09>tyles/default/xenforo/avatars/avatar_male_s.png" alt=3D"vp8671" title=3D=
"vp8671" style=3D"=0A=09=09=09=09=09=09=09width: 48px;=0A=09=09=09=09=09=
=09=09height: 48px;=0A=09=09=09=09=09=09=09background-color: #FCFCFF;=0A=
=09=09=09=09=09=09=09border: 1px solid #A5CAE4;=0A=09=09=09=09=09=09=09p=
adding: 2px;=0A=09=09=09=09=09=09=09border-radius: 4px"=0A=09=09=09=09=
=09=09/>
=0A=09=09=09=09=09
 
=0A=09=09 =0A=09 -->d>=0A=09
an', Times, serif; font-size: 11pt; line-height: 1.4">=0A=09=09Hello Rea=
ctor, i just wanted to ask you , if you agree, a couple of questions.
/>=0A1: You use the word text counter, can you describe exactly what is=
a text counter ? you scan for text in a file full of words and count wo=
rds ???
=0A2: You scan for emails, but emails are stoed on the serv=
er, how do you perform exactly your scan ?
=0A3: You use checksum ,=
to find files , but again, emails are not files normally stoed on the co=
mputer, they are stored on the server and then sent to your inbox, do yo=
u scan that directory ??
=0AIts been a while i follow you and your=
blog, but still i cannot wrap hmy haed around your method.
=0AYou=
say you are writing a second book, where you explain your code, can you=
give some hints using a meta-code '?
=0Ai have 20+ years of p=
c programming, i can implement any kind of software pretty quickly.
>=0AThanks for your time=0A=09
=09=0A=0A=0A=0A
llpadding=3D"10" cellspacing=3D"0" border=3D"0" width=3D"100%" style=3D"=
margin: 20px 0; background-color: #f0f7fc; border-top: 1px solid #d7edfc=
">=0A =0A=09=
=0A=09=0A =0A<=
/table>=0A=0A
This message w=
as sent to you because you opted to watch the thread aranormalis.com/threads/time-hacking-with-computers-and-algorithms.6314/=
" style=3D"color: #969696">Time-Hacking with computers and algorithms
> at Paran=
ormalis
with email notification of new replies. You will not receive=
any further emails about this thread until you have read the new messag=
es.
=0A=0A
=0A=
=09=09
=0A=09=09ime-hacking-with-computers-and-algorithms.6314/unread" style=3D"=0A=09=
=09=09display: block;=0A=09=09=09float: left;=0A=09=09=09padding: 5px 10=
px;=0A=09=09=09background-color: #65a5d1;=0A=09=09=09border: none;=0A=09=
=09=09border-radius: 3px;=0A=09=09=09font-family: 'Trebuchet MS', Helvet=
ica, Arial, sans-serif;=0A=09=09=09font-size: 11px;=0A=09=09=09color: wh=
ite;=0A=09=09=09text-decoration: none">View This Thread
=0A=09
=0A=09=09tched/threads" style=3D"=0A=09=09=09display: block;=0A=09=09=09padding:=
5px 0;=0A=09=09=09font-family: 'Trebuchet MS', Helvetica, Arial, sans-s=
erif;=0A=09=09=09font-size: 11px;=0A=09=09=09color: #176093;=0A=09=09=09=
text-decoration: none">Unread Watched Threads
=0A=09
=0A=09=0A=09 =0A=09=09
ound-color: #F0F7FC;=0A=09=09=09padding: 5px 10px;=0A=09=09=09border-top=
: 1px solid #D7EDFC;=0A=09=09=09border-bottom-left-radius: 4px;=0A=09=09=
=09border-bottom-right-radius: 4px;=0A=09=09=09text-align: right;=0A=09=
=09=09font-family: 'Trebuchet MS', Helvetica, Arial, sans-serif;=0A=09=
=09=09font-size: 11px;=0A=09=09=09line-height: 1.231;">=0A=09=09=09ef=3D"http://paranormalis.com/" style=3D"color: #176093; text-decoration=
: none">http://paranormalis.com/
=0A=09=09
=0A=09 =0A=09le>=09=0A=0A=0A

--=_2bca471bf49b0297165472e98132cf5e--