Thursday, November 24, 2016

COMPUTER CODE FOR THINGS IN THIS BLOG:

download here and use the show more button.

My computer code for Time Travel Project, Burris Numerical System, Armageddon time traveling super A.I. and my other projects here: https://sourceforge.net/u/lloydburris/profile

I am working hard to make everything the "Conspiracy Against Time Travel" Stole from me in the CIA, NSA hacking of me come to the public from my public version of my software. If you want it keep up with the files at sourceforge and download it while you still can. I am posting how it works and I will be posting the computer code for it. And as time goes along I will be upgrading it as much as I can.
--------------------------------------------------------------------------------------------------------------------------

Every day I code is a day closer the public version of my time travel code and my super a.i code and the public version of bns gets a day closer for more and more people around the world to have my technology. 

BAAAAAAAAAAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAHAHAH!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

I spent the beginning of this night updating my files at sourceforge.

I am still testing my regression program. I may write more of them. I am now writing the program that takes the config file from my regression program and generates strong check-sums for time travel computer media files. It will generate files for fire codes and for counter.9.cpp. YEEEEHAAAAAAAAAA!!!!!!!!!!!!!

I have also started working on the public version of Armageddon. I have started transfiguring my technology to it and got my readme file up which explains HOW IT WORKS. I have to get into my archives and get my A.I. that will be the bases for Armageddon and get that uploaded. 

Then I got to get that upgraded then start using my regression lines there.

I have to rewrite BNS in C++ and I am importing technology there to that will make BNS usable to the world.

I also imported predator to Armageddon I will use it to self encrypt the A.I. as it runs. Once that happens the only way to kill Armageddon is to kill the computer the A.I. is on. 

Its inner workings of Armageddon will be protected with encryption. As said Armageddon will use time travel project to time travel for itself to see the future and the past and for parallel super computing and for temporal communication.

ENJOY WORLD - ALL I HAVE IS YOURS!!!!!!!!!!!!!!!!!!!!!!!!!!!

BAAAAAAAAAAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAHAHAH!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

BAAAAAAAAAAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAHAHAH!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

BAAAAAAAAAAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAHAHAH!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
==============================================
Here is the outline for the next phase of time travel project. It will not take me very long to write this. After that I am back to counter9 and my next program which will generate baby strong check-sums in the range of the target check-sums. After that counter 9 and fire codes 2 will be generating time travel computer media. Then I am onto the bots which look at these files and keeps the good ones and delete the bad ones. I also will upgrading, improving, and writing more code. Without further ado here is the outline for the next program at sourceforge.net for time travel project. I am hoping I got my mathematics correct. If not in time I will find that mistake and fix it. Right now I am just trying to get this out to the public. Again, my upgrades are already on the drawing board.
//----------------------------------------------------
// Begin outline of strgsumgenc9.cpp
// ============================================================================================     
// Readme.txt
// This program loads a calculated equation for a regression line and calculates strong check sums based on that regression line.
// This program is for Time Travel Project at sourceforge.net. It is part of a computer time travel project.
// This program will not be very long
// This program loads a config file that looks like this:
// Starting config
// y  = 1472.04615445774715964954992841740022 + -6.69876019552389287623492103147890969e-05 times 689
// y = a + bx 
// 1472.04615445774715964954992841740022 = 1472 -  ( -6.69876019552389287623492103147890969e-05 times 689 ) 
//  a = y - (b times x)
// end config
// This program then makes a counter out of X (weak check-sums) and generates strong check-sums for y by plugging in possible values of the weak check-sums.
// Counter9.cpp will be used to construct this check-sums. I am still finishing up counter 9 to use the pendulum algorithm for solving the counter for the strong check-sum. The pendulum algorithm I spoke about in my previous blog.
//  WARNING - TIME TRAVEL PROJECT MAKES ALL KNOWN AND UNKNOWN INFORMATION IN SPACE-TIME PUBLIC KNOWLEDGE!!!!!!!!!!!!!!!!!!!!!!!!!!!!
// Copyright (C) 2016 http://time-travel.institute
// ============================================================================================
 // declare includes
     #include cstdlib
     #include iostream
     #include stdlib.h
     #include fstream
     #include sstream
     #include string 
     #include cmath
     #include ctime
     #include cstdio
     #include iostream
// ============================================================================================
    // Declare namespace
    using namespace std;
// ============================================================================================     
    // declare globals
       long double y;
       long long x;
       long double a;
       long double b;
    // load regression config file
    int loadregressionconfigfile()
    {
    } 
    // Generate strong sums and write them to file
         // X = weak check sum. This is generated by a counter
         // y = strong check sum. It is computed with an equation
         // then write strong check sums to numbered config files example sch1.txt, sch2.txt, sch3.txt and so forth.
         // This will run in a loop
    int genstrchksums(long long howmanystrongchecksums)
    {
    } 
// ============================================================================================     
// declare subs
// ============================================================================================     
// declare main
    int main (int argc, char *argv[])
    { 
         // declare variables
         int dummyfile = 0;
         long long howmanystrongchecksums;
// ============================================================================================     
         // initilize program
         cout << "How many strong checksums do you want." << "\n";
         cin >> howmanystrongchecksums;
// ============================================================================================     
         // run program
         dummyfile = loadregressionconfigfile();
         dummyfile = genstrchksums(howmanystrongchecksums);
// ============================================================================================     
         // end program
         exit(0);
    } // end of main
// ============================================================================================     
// end outline
// ------------------------------------------------------- 
This program up above has been finished and is ready to download. I have updated timetravelproject.zip at sourceforgel.net

Now I am working on the pendulum algorithm for my final counter that will construct files from their strong check-sums individually then I will go to finishing the algorithm and counter that will do that in parallel.

After that then ITS ALL UPGRADES FROM HERE!!!!!!!!!!

YEEEEEEEEHHHHHHHAAAAAAAAAAAAAAAAAAA!!!!!! THIS OLD COUNTRY BOY CAN PROGRAM NOW. TIME - HACKING IS FUN!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

EVERYONE SHOULD TRY IT!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
---------------------------------------------------------------------------------
I have counter9.cpp decoding but my pendulum algorithm right now is randomly choosing a speed for the experimental counter between 1 byte up to the full byte size of the experimental counter. It rolls the experimental counter until it rolls over and rolls it again until it rolls over. The control counter continuously keeps updating as it gets closer and closer to its destination. The counter upon running creates a lock file. When that lock file is deleted the control counter is written to a file. The user can shut down the computer and reload the control counter the next day and continuing decryption.

When I get this counter uploaded it will make "TIME TRAVEL PROJECT" USABLE!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

LET ME SAY THAT AGAIN. "TIME TRAVEL PROJECT" IS USABLE!!! I'm uploading counter 9 now.

I still have a ton of work to do. I got one more counter after counter9.cpp to write. This will take a strong check-sum and generate baby strong check-sums and write them to config files for fire codes.

I have a lot of cleaning up of counter9.cpp. I will upload what I have now but I am rewritting counter9.cpp to counter 10. I am starting a whole new counter to get it cleaned up and get my upgrades in.

After tonight people can take my time travel code and start TIME-HACKING. But understand it is much an early stage of work. I still still have SO much to do AND MORE TO WRITE. I will upload this counter 9 right now.
------------------------------------------------------------------------------

Here will be the steps for someone using time travel project.
1. The user will collect a sample of known media files.
2. The user will run a program that will take that sample and create a regression line for those files and write them to a configure file. That program is fileregression2.cpp
3. The user will then run a program that takes that configure file and generate strong check-sums for time travel computer media. That program is strgsumgenc9.cpp or firecodesgen.cpp
4. Now, The user selects her/his counter she wants to use to re-construct those time travel media files. That will be counter10.cpp if used strgsumgenc9.cpp or firecodes2.cpp if used firecodesgen.cpp
5. Now the user runs either strgsumgenc9.cpp or firecodes2.cpp counters in series or parallel. I am updating the readme.txt at sourceforge. See Ray you got your wish. I am using sourceforge.net

I am taking out the password. Instead the user creates a weight file. With that weight file the user establishes how many weighted sums to use. This weight file and how many weighted sums is used across the entire time travel project. Now, when the user creates a new project she/he can use a new weight file and figure out how many weighted sums they want.

I am setting up my counters now to run in memory or run as files. Files will be easier for people that don't have a lot of memory.

I am writing counter 10 now. I have to go back and update the configure file part in my program that generates the time travel media check sums. It has to include the file size in that configure file. That won't take but a few minutes to get that in.

Then this week I will finish up counter 10 for files. Next week start on counter 10 for memory.

Then get write program that takes those generated config files and makes a fire codes project for them.

I need to start tracking bugs now too.

I am going back and setting everything up where it has to be run from the command line and finally I will write GUI for it. The programs will stop asking the user questions. Everything is ran from command line and config files and bash/bat files. When I am done I will compile this over to windows.

And, I am pretty much done writing algorithms now. From here I will mainly just be up grading algorithms.

Well Ray Hudson, Darby Phillips, Pamela, and Aaron Hiniker. I can now safely say my revenge against you guys in coming into bloom. A little hint for you guys. Time Travel Project has been uploaded to TOR!!!! Its unstoppable now. And this is being upgraded. The "CONSPIRACY AGAINST TIME TRAVEL" IS LOOSING THE TIME TRAVEL WAR!!!!! The "CONSPIRACY AGAINST TIME TRAVEL" HAS FAILED!!!!!!! 

Ray Hudson and Darby Phillips and Pamela boy the CIA and the NSA will appreciate you pushing me to make every fucking computer in the past and the future and alternate time-lines hack-able with time travel project and no way to trace the fucking hack!!! 

ENJOY - GRINNING, SMILING, MORE GRINNING.

YOU SEE RAY HUDSON WHO IS A CIA WEAPONS AND TECHNOLOGY INTELLIGENCE ANALYSIS TOLD ME TO "PROVE IT!" AT HIS HONEY POT WEBSIGHT HTTP://TIMETRAVEL.INSTITUTE. THE FAKE ONE NOT MINE.

SO HE IS A AGENT FOR THE USA GOVERNMENT. SO THE USA GOVERMENT GAVE ME PERMISSION VIA RAY HUDSON TO POST TIME TRAVEL COMPUTER CODE ON THE INTERNET THAT ALLOWS TIME TRAVEL WITH A COMPUTER AND TIME-HACKING AND HACKING COMPUTERS WITHOUT EVER CONNECTING TO THEM.

THE USA GOVERNMENT VIA RAY HUDSON GAVE ME PERRMISSION TO GIVE COMPUTER TIME TRAVEL TO THE WORLD!!!

WELL RAY I SENT THIS OFF TO OTHER GROUPS AROUND THE INTERNET. THE JENNY IS OUT OF THE BOTTLE!!!

THIS IS ON YOUR HEAD RAY HUDSON. THAT IS ON YOU!!!!!!!!!!!!!!!!!!!!!!!!(TALKING TO RAY HUDSON)

RAY HUDSON TOLD ME TO PROVE IT!!!!! AND I DID!!!!!!!

SO IF THE CIA, NSA, THE PENTAGON, AND THE DEPARTMENT OF DEFENSE HAVE A PROBLEM WITH MY TIME TRAVEL CODE BEING OPEN SOURCE PUBLIC INFORMATION  THEY CAN COME TALK TO RAY HUDSON!!!!

THAT SON A BITCH TOLD ME TO PROVE IT AND TOLD ME TO POST MY CODE SOMEPLACE ELSE OTHER THAN HIS HONEYPOT WEBSIGHT. AND I DID!!!!

BAAAAAAAAAAHAHAHAHAHAHAHAHAHAH!!!!!!!!!!!!!!

RAY HUDSON BE VERY CAREFUL WHAT YOU ASK FOR. YOU MIGHT ACTUALLY GET IT!!!

BAAAAAAAAAAAAAHAHAHAHAHAHAH!!!!!!!!!!!!!!

-------------------------------------------------------------------------------

Now that I have the regression program that plots a regression line for weak and strong check sums there is more to that program I have to get up. You see. Along each point of the regression line there is a root mean square and standard deviation with the time travel computer media check sums being mathematically calculated. So, I have to take the regression line and the sample of known computer media files to produce the root mean square and standard deviation. So, I will write a second regression program but now this one will focus on the root mean square and standard deviation producing check-sums to be reconstructed. 

Once I get that into the program more check-sums for time travel computer media can be produced that can be re-constructed into actually time travel computer media files.

And last with regression once a lot of time travel projects have been done all those regression lines can be put on a map and now statistically it is possible to plot areas of the map where other regression lines lay. So, now the more time computer time travel is done the more the time travel program can be expanded.

Later I have to go back and put in the programs in the sections where check-sums are calculated and now the check-sums will be written to a file and no digits will be lost.

The programs will be expanded to work with check-sum files or check-sum arrays.

My blog here as difficult as Pamela (the CIA's forum bait) might find to read or as difficult as others might find this blog to read this blog is actually a "HOW TO MANUAL FOR COMPUTER TIME TRAVEL". Plain and simple.  

Right now I am going to go ahead and focus on counter10 and my fire-codes-config-file-generator.cpp before doing all I mentioned above.

And now no one has just the blog to read. They can goto sourceforge and get the time travel code and experiment with computer time travel as much as their hearts desire. To Ray Hudson's and Darby Phillips horror!!!. Hahahah......
----------------------------------------------------------------------------
I won't be using the Shannon equation in my computer time travel code. Instead I am replacing the Shannon equation with randomness test and other test. I am in the mist of writing a random number generator. My code now will go to using weight files and random number files. That way users of my computer time travel code if they want can generate their own files or use my programs to generate their files. It makes my stuff more easier to use.
My random numbers will pass or should pass any randomness test. They will be cryptography strength to use in my programs.

The reason they will be cryptography strength is because I am using the randomness test to generate my random number files. I have two random number programs to write. 
1. For generating the random numbers.
2. For using the random numbers generated.

My algorithm for generating random numbers is this.
filesize / 255 = How many times in the file each number from 0 to 255 can be used. They should all occur the same number of times.

filesize / 255 = How often each number occurs. Each number from 0 to 255 should occur with the same amount of frequency.

Then of course I am going randomly pick the order of the numbers from 0 to 255 to be used in the file with their same frequency and same frequency of occurrence.

And for what I am doing this should be enough. Oh shit Pamela I made my blog longer again. Its time for Pamela to bang her head on the wall. 

BAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAH!!!!!!!!

That is a joke from Above Top Secret dot com. That is the last place the "Conspiracy Against Time Travel" ran me off from.

Hey Pamela I got one word for you.
"Beeeeeeeaaaaaaaaaaiiiiiiiiiiiiiitttttttttttcccccccccchhhhhhh!!!!!!!!!

Pamela seems like the type of women that only has all male friends and "SLEEPS WITH EVERY ONE OF THEM!!!".

BAAAAAAAAAHAHAHAHAHAHAHAHAHAHAHAHAHAH!!!

So I guess Darby Phillips gets his pity fucks and when Ray Hudson is not in Las Vegas fucking whores he gets a little. And even probably old little Aaron Hiniker sneeks him some too from time to time.

Yeah and when Pamela is not around I am sure that Ray Hudson, Darby Phillips, and Aaron Hiniker they all satisfy each other. Poor Aaron is probably the bitch in the group most of the time. I bet he is Pamela's bitch too. Poor Aaron Hiniker. He was fucked from the minute he met that group.

The "Conspiracy Against Time Travel" is just one big happy bi-sexual orgy.

BAAAAAAAAAAHAHAHAHAHAHAHAHAHAHAHA!!!!!
-------------------------------------------------------------------------------

I uploaded my Lottery A.I. to sourceforge. I will use it in time travel project to track one days news paper or news video to the next day. It will get me close then I can use my counters to clean up the file. Lottery A.I. is at http://sourceforge.net/projects/lottery-ai/
I am working on my random number generator tonight but my brother is texting the hell out of me and slowing down my work. But, im getting there.
-----------------------------------------------------------------------------
I have cryptography grade random numbers now for my counter10.cpp. The size of the speed.bin can be random or linear that is up to the user running the counter10.cpp but the numbers within that speed.bin are copied from a almost perfect random number file.

 Counte10.cpp reads a config file. Generates a random experimental counter file (so no counter has the same experimental counter file) if or when this runs in parallel. The user can do either.

I still need to set it up so each counter10.cpp so it reads the same control counter and when a closer match to the target is made that control counter is updated so all the counters have it. 

I believe I will have a lock file system in place so each counter10.cpp program can have access to the control counter 1 at a time when it needs updated. The file will look for a lock file. If not there it will create one then access the control counter and delete it when done. It will also check the control counter to make sure it is not a better match before it updates it.

And on each run each counter 10 will update its diff with the control counter so all the parallel counters are on the same page.

But each counter10.cpp has its own experimental counter which is different from all the others.

This will be bad ass for de-crypting time travel computer media files out of space-time. And can be used to decrypt or encrypt anything else. Just modify how the destination and target is used.

But, I am not writing an encryption program so if someone wants it for that they will have to modify my code. In the future this is for the purpose of killing encryption as the world knows it not saving it.

And as I go along this will get more bad ass each day. Wait until I upgrade it for unlimited file size.

As I said when the public starts computer time traveling the government can come talk to Ray Hudson about it. Its all his fault. This is on him.

Ray Hudson started it, Darby and Pamela backed him up, and I will finish it. 

Ray Hudson breaks the law and commits crimes against me for which law enforcement won't do anything because he is CIA. 

Since I am a law bidding citizen and I don't have hackers and other people helping me and the tax payers money at my beck and call so this is the best way for me to get my revenge. I am getting my revenge by bringing this to the world. Then if anyone or anything that has a problem with this can go talk to Ray Hudson.

Before I am done programming tonight counter10.cpp what I have of it will be setting at time travel project at sourceforge.net

I am bringing computer time travel to the world.
I am bringing super time traveling A.I.'s to the world.

Then, let the world judge the "Conspiracy Against Time Travel" for who and what they really are. A bunch of thugs and criminals working for the CIA.

And finally no information in space-time is safe from any one or anything. 

Everyone can have access to it. Everyone can have access to "GODS COMPUTER FILES".
-------------------------------------------------------------------------------
Well I got as far as I am going to go tonight. I finished up my random number generator(it works good but I have more upgrades planned for it), Got a good start on counter10.cpp, and created the c++ file for fire codes 2 project generator. Fire codes project 2 generator with a strong check sum make a fire codes 2 project out of it by busting the adult strong check sum into many little baby strong check sums and load them into config files that can be loaded and processed by fire codes 2. 

Then fire codes 2 will take those small strong check sums and reconstruct them as file fragments. Then all the file fragments will be joined into one large file using the cat command linux. I decided not to write a lot of routines that linux already has. Window users will have to try to find like commands in windows or buy third party software. That is why I am not a fan of windows. Windows sucks in my book.

Now counter 10 can work with one large check sum or baby check sums. 

Both fire codes 2 and counter 10 can be ran in parallel or just a single instance of the program.

fire codes 2 will be able to use counter 10 to reconstruct its baby check sums or it can use linear counters on its check sums to reconstruct them.

Fire codes 2 has to have the strong check sum busted down into baby check sums to reconstruct the time travel computer media file but counter 10 does not. 

So, I may make fire codes project generator, fire codes 2 and counter 10 my only counters in time travel project since they can all work together to get a computer time travel project hammered out in a short amount of time. I am setting up some more versatility in counter 10 and above. That counter will be the die hard, configurable and a counter that can have functions easily added to it or configured.

I will for myself get strong check sums from my file regression programs and pass them off to both counter 10, and fire codes project generator then to fire codes 2 and have all my bases covered. I will let it all run and see how finishes first and what is best.

Time Travel Project is a project people can check-sum hack or time hack with. They can take my code and play with everything I have talked about in this blog over the years or make their own experiments. If I can get Time Travel Project up to production speed I am sure I can lure a few people to play with check-sum hacking and time hacking like I have over the years.

I got a message for the "Conspiracy Against Time Travel". That would be Ray Hudson, Darby Phillips, and oh yes you too miss Pamela I would not want to leave you out. Here we goooo.

Playing music - "Ohhhh what you going to dooooooo?" Ohhhhhh what you going to dooooooooo?" Ohhhhh..............

BAAAAAAAAAAAAAAAAAAAAAAAAHAHAHAHAHAHAH!!!!!!!!!!!
-------------------------------------------------------------------------------
Tonight I decided to take all my most used subroutines and make a header file out of them. When  I need to upgrade then I can upgrade my functions that I wrote my header file with instead of going back through every damn program and upgrading each program individually with their subroutines. I will end up rewriting my main programs to use the header file.

I found this out when I kept copying subroutines over from one program to the next and I told myself just make a damn header file then include the file and I'm good.

Once I get that down I can go back and rewrite my main code. Then from there its all gravy when I change stuff.

Anyone using time travel project can use counter 9 right now until I get a upgraded throttled counter. I don't have fire codes generator up just yet. So, I am going to get that header file programmed and tested out. Then finish counter 11. Then goto fire codes configure files generator and the other programs in this project

Well most of my code now will be header files and or libraries. The main program in my code will now get mighty small. My progress on this time travel project will speed up tremendously since any upgrades I do will be to my headers and libraries only.

I have to write a make file for compiling this project too. I am hoping I can get all my functions into 1 header file only. I am pretty sure I can. I can write my whole time travel project into a header file if I want. I am going to call this header file 

timecheckhacking.h

Then when I upgrade I just upgrade the h file and the function.cpp files. Boy, this just keeps getting worse and worse for Ray Hudson and Darby Phillips and Pamela. I should of done this all along but I got lazy. Damn - I am going to write most of Armageddon's functions into a Armageddon.h file. Then use that in my artificial intelligence files. Armageddon is going to be really bad ass when I get time travel project done for the public. 

Boy its cyber monday. I almost bought a AMD FX9590 processor with a expensive mother board AM3+ and water cooler with a expensive power supply and a expensive case with 32 gigs of ram and a expensive video card and a damn big hard drive. I was going to make it another one of my time hacking computers. But, Tigerdirect would not take paypal. Use too they would. Oh well. I need another computer like I need Ray Hudson and Darby Phillips poking around my home network. Moving on....

For the most part I have my algorithms figured out for running time travel project. Though when I am done and people start using this I am sure there will be a lot of people pissed off because my project can construct any computer file existing anywhere in space-time WITHOUT CONNECTING TO THE COMPUTER THAT HAS THAT FILE!!!! Hell that file don't even have to ever be created time hacking can create it anyway. A good example is videos of dinosaurs in their natural environment. Time hacking can do that shit.

Well all I got to say is if anyone has a problem with time hacking they can go talk to Ray Hudson. He started all this shit. Its all his fault. I tried to keep my code private but NO THAT STUPID MOTHER FUCKER RAY HUDSON WANTED TO HACK ME. Now I AM FORCED TO GIVE IT TO EVERYONE ELSE TOO BECAUSE I CAN'T LET THIS FALL INTO ANY ONE PERSON'S, AGENCY, OR COUNTRIES HANDS. AGAIN ITS ALL RAY HUDSON'S FAULT. 

So who ever what ever gets time-hacked they can take it up with Ray Hudson!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

So anyone got a problem with this go talk to RAY HUDSON!!!!
He hacked me so I had to give it to the public to make things right.

Ray Hudson is a EVIL BASTERED!!!! HE WAS TRAINED BY THE CIA'S MKULTRA SCIENTIST THAT FUCKS WITH PEOPLES HEADS FOR A LIVING.

HE WAS TRAINED TO BE AN EVIL BASTERED BY THE BEST OF ALL EVIL BASTEREDS.

ALL THE HELL ARMAGEDDON AND TIME HACKING RECKS ON PLANET EARTH IS RAY HUDSON'S FAULT!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
---------------------------------------------------------------------------------

Well I am really doing good now. All those subroutines I was putting in my files and copying all those routines from program to the other those days are over. All my check-sum hacking/Time-hacking routines will in a header file called timecheckhacking.h.
I declare my routines in my header file only but in the bulk of the code is in the f1.cpp, f2.pp, f3.cpp and so forth. When I compile the main with my header file everything is compiled into the main program.

My final timecheckhack.h will contain all one needs to check-sum hack and time hack. The header file will able run my binary counters, it will generate random numbers, it will generate weights for calculating strong check sums, It is going to do it all. What ever is needed for check-sum hacking and time hacking. All one needs is to put it in a main program and call the functions. I will try to document it well. 

Fire Codes 1 all ready works. So, I won't fix what is not broken. So, I won't mess with fire codes 1. But the rest of my work will include my new header file in the future.

My final counters and programs will put it all out there for the public to see. Then since my public version of my time travel code is out there I can keep what ever the "Conspiracy Against Time Travel" failed to steal from my proprietary code secret.

Then I can finally get back to time-hacking again. This time when Ray and Darby are in my home network with their malware and virus I will reimage my computers and keep on running my time hacking code. Not giving a shit. I have been working on a way to put up a lot of damn fire walls between us.

And Ray Hudson and Darby Phillips would of lost yet again against me. They will never win their little war against me. Ever.

When I am done with my public open source time travel code and super A.I. Armageddon code, when all my books hit the shelves, hell, I may even send in my scientific paper.

There will be very little the "Conspiracy Against Time Travel" can do to disprove my claims and to disprove me out right. Ray Hudson is accountable because of his criminal activity against me. And I will go back to my old life time hacking and running Armageddon and what ever else I want to do.
----------------------------------------------------------------------------------
When I get "Time Travel Project" to a good stopping point I will setup bash scripts and start and start programs on a schedule on my linux desktop. And guess what. It won't be hooked up to the internet. I will have all the information in space-time at my finger-tips and no way for the "Conspiracy Against Time Travel" to hack me except WITH MY OWN TIME TRAVEL CODE. 

But, that is what my time travel code is for. To end privacy and make all computers in space-time public information.

But, I think the "Conspiracy Against Time Travel" is too stupid to use my software. Even if they came into my home and took my shit it is so damn encrypted those SOB's still wouldn't have a chance.

Hell, I win either way. Everyone be looking for my books in your nearest book store. Well, I got programming to do tonight so I had better get to it.
---------------------------------------------------------------------------------
timecheckhacking.h is for the most part mostly finished. From time to time it will be upgraded and re-written. But, now people can experiment with check-sum hacking and time-hacking by using my header file and using the functions in their main programs.

Boy, it just keeps getting worse and worse for Ray Hudson, Darby Phillips, and Pamela.
BAAAAAAAAAAAAAAHAHAHAHAHAHAHAHA!!!!!!!!!!!

Now I am back to writing counters and strong check sum reconstruction programs for the purpose of check-sum hacking and TIME HACKING!!!!! 

Downloads at https://sourceforge.net/projects/timetravelproject/

YEEEEEEEEEEHHHHHHHHHAAAAAAAAAAAAAAAAA!!!!
----------------------------------------------------------------------------------

Sunday, November 6, 2016

USING THE SHANNON EQUATION WITH TIME HACKING

Copyright (C) 2016 http://time-travel.institute

I am keeping my code at Sourceforge under Time Travel Project


For all my projects at Sourceforge. GO HERE.

For my YouTube channel and to watch me encode files to check sums and decode files from check sums giving Ray Hudson his proof of check sum hacking and the public their proof of check sum hacking then go here. My You Tube Channel proving check sum hacking is real!!!!

Note: Still debugging my code I posted. The concepts of my counter algorithms work though. I am removing mersenne twister from my code. 

It would be so easy to upload my private code but I am rewriting everything from scratch for the public version of my stuff. I am doing that for many reasons but the main one is - I don't won't to give Ray Hudson, Darby Phillips my original time travel code because they have tried so hard to hack me and steal it from me. I will deny them my original code. I spent 8 years writing that code and they can't have it. EVER!!!

But, I will give the public their own code. Oh no Pamela, "I made my blog longer again". A joke between me and Pamela. She bitched at me for having a long blog. Darby Phillips use to bitch at me for writing in all caps. So, much of this blog is in caps as well as much of this blog is getting longer.

 Hahahah.... I never was the one to respect authority. Constructive criticism is ok, but I don't always follow that either. I am my own person. Back on topic.

I have to go back and rewrite the random number generator. I use it to generate a random speed to add or subtract from the counter. I also have a linear mode where the counter speeds up. And no Ray it does not stop the process from working when using random numbers. I use it to control the speed of the counter which is added to or subtracted from the counter. The counter itself does not use random numbers except sometimes on initialization when I am taking it to a specific weak check sum . 

The counter itself is added to or subtracted from I can even add bytes and subtract bytes at the same time. I call this tweaking the counter to get it to its final target after the large rolls are done.

You see Ray Hudson. With a throttled binary counter. A destination, and a target. THERE IS NOTHING I CAN'T DECRYPT OR ENCRYPT!!! 

Because the binary counter is throttled "THE SIZE OF THE FILE DOES NOT MATTER"!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

THERE IS NO INFORMATION I CAN'T GET IF I KNOW MY TARGET OR CAN MATHEMATICALLY CALCULATE MY TARGET!!!

You see all them post at the former CIA ran http://timetravelinstitute.com aka timetravel.institute were "TRUE".
You loose Ray Hudson.

I am going to put the computer code to time travel with computers out their for the public to download. After that it is up to the public to use the code.

Here is the current code for my random number generator. I am using a combination of my own code with the rand() function.

Experimenting with a new random number generator for time travel project.

here is the code I am using to experiment with random numbers. I'm using my own code with c++ rand() function.

#include cstdlib
#include iostream
#include stdlib.h
#include fstream
#include sstream
#include string 
#include cmath
#include ctime
#include cstdio
#include iostream

using namespace std;

// Start main   
int main (int argc, char *argv[])


// r=(a*k+c) mod of m
// a = 3
// c = 2361
// m = 21435
// k = seedkey(1)

// r = (a * k + c) % m // in c++
// k = r
// srand (time(NULL));
// cout << (rand() % 100 + 1) << " is the number...";
// http://www.cplusplus.com/forum/beginner/29699/
// http://www.cplusplus.com/reference/cstdlib/srand/

// declare variables
     
     int a = 3;
     int c = 2361;
     int m = 21435;
     int k = 0;
     int k2 = 0;
     int r = 0;
     char pause;
     int count = 1000;
     int test = 255;
     cout << "Please enter your password" << "\n";
     cin >> k;
     do
     {
          r = (a * k + c) % m; 
//          k2 = r;
          do
          {
               if (int(r/10) < 256)
               {
                    r = int(r/10);
                    break;
               }
               r = int(r/10);
          } while (a != -1);
//          cout << r << "\n";  
          if (r == test)
          {
               cout << r << " " << test << "\n";
               test--;
               if (test == -1)
               {
                    test = 255;
               }    
               // cin >> pause;
          }
//          k = k2;
          // srand((unsigned)time(NULL));
          k = (rand() % 21435);
     } while (a != -1);
      
     
   // exit program
    exit(0);


}

I just need numbers out of it from 0 to 255 for the speed control. Next I will redo my weight section. So, this might set me back a little bit getting my counter up. I am also going to look at upgrading the linear section of the speed control.

Also, in my program I used a buffer size of one. Later the code will need to be upgraded to a larger buffer size to decode programs going into Mega byte range.
And, I will have to upgrade the strong check sum. The strong check sum will have to be calculated by the program by hand and written to memory or file so no precision is lost. Right now the program is mainly a way to teach people here at this blog to time hack.

Later I will move from teaching the public to time hack to having the public actually do it.  I was not planning giving my private code to  public but I found I will have to program some elements from my private code into my public code to bring it up to par. Moving on.......

This is a old topic for me but it may not be for the general public so I thought I would inject it into my blog. My algorithm in my previous post makes it possible to take a large computer file and only know its strong check sum. Then using that strong check sum decrypt the strong check sum back to a computer file.

Now, that works for using strong check sums to decrypt a computer file out of space-time. But, what if you just want to look for generalized time travel computer media or even decrypt a known encrypted file.

All that is needed is to take my algorithm in my previous post. Throw out the weak check sum. Throw out the strong check sum.

Replace those check sums with Target Entropy and Destination Entropy.

Now, My algorithm takes a counter loaded with its destination entropy (where the file is now). And will roll that file to the Target Entropy (where the file is going).

The algorithm in my equation rolls the counter and if the counter is closer to the target entropy the counter is kept. If it is not then the previous counter is loaded.

Why is this important. Because in my counter I add or subtract from it with large or small numbers to roll the counter forward or backwards or somewhere in between to get the counter to its target state. The counter is a throttled counter. That means it has the counter and the speed. The speed is a number that is added or subtracted from the counter. 

This speed can be as small as 1 byte or as large as the file size of the counter itself. Because this speed can be small or large it can VERY QUICKLY DECRYPT A LARGE FILE!!!!! It can very quickly roll a strong checksum to a computer file or it can take a known encrypted computer file and quickly decrypt it.

Now, if you reverse the target and the destination then this becomes an ENCRYPTION PROGRAM AND INSTEAD OF DECRYPTING IT. IT CAN ENCRYPT INFORMATION INSTEAD!!!!!

With the Shannon equation a file with a 0 entropy value can be rolled to computer file with a 8 entropy value. But, for the purpose of this blog WE WANT TO DECRYPT!!!

So, I won't be reversing the destination and target. But, I have a public version of my code out so the public can knock themselves out.

The process of decrypting can be used to search for time travel computer media files or to decrypt a known encrypted file. And again the Burris Algorithm can be used for encryption if the target and destination are reversed.

With my methods this is a powerful way to uncover information or to encrypt information and cover it up. Whether that be out of space-time or not.

My methods are mainly designed to search space-time for time travel computer media but because they are so powerful it can be used for general cryptography.

With the Shannon equation files ending near 0 are decrypted. Files with the score of 8 are encrypted.

Some of my time travel cryptography computer code is in my previous post. It is still being debugged but my algorithm is there in computer code form. Below is more examples of my meaning.

Where we want to go     |||   Where we are now
Target strong checksum |||  Destination strong checksum
          Or                                                    Or
Target entropy              |||     Destination entropy
                             
Here is how my counter works for time hacking, check sum hacking, or for general cryptography.

1. Get Diff1 = Target - Destination
2. Load counter speed
3. Add or subtract speed from counter
4. if Target = Destination End program file constructed
5. Get Diff2 = Target - Destination
6. if Diff2 < Diff1 is also less than Diff3 then Diff3 = Target - Distination (Diff3 starts out with the full value of target - destination before the program runs) then keep the counter.
7. if Diff2 > Diff1 is greater than Diff3 then reload the counters previous state before the roll. 
8. Goto step 1

Now, I have my program robots look at my files when I do my time hacking decryption by looking at the media file format with my private proprietary time travel code. That would mean looking for a video format, text format, audio format, or special files. Then after my program bots have verified the file format they look at the information contained within the file. 

But, the Shannon equation could be used to make the process faster and more simple. The final step is having a human look at the file. THIS IS VERY TIME CONSUMING BUT NECESSARY. I have wasted many a day looking at files for time travel media. But sometimes I hit pay day and it was worth it.

But in my public open source code in "Time Travel Project" I am trying to keep things simple. So, when I finish my public counter, when I finish generating strong check sums of time travel computer media files, I will put in Shannon's equation as a simple bot to exam time travel computer media files. Later I may follow that up with more complex application bots.

Right now my only means of communicating with the public is with this blog or with printing books. The CIA through Ray Hudson and Darby Phillips and Pamela from the Titor story. She is a CIA agent too. They have me blocked from reaching out and using the internet at my home to talk to the public about Time Hacking or just anything else. 

They have prevented me from posting on any forum on the internet. They even blocked a chat bot I had and blocked me from day trading. They hacked me and blocked me from using YouNow. Hell, they probably have my entire house bugged for all I know.

They have my home internet completely hacked and blocked. They let me watch netflix and play my play station but that is about it. I can connect to the blog too but I have to be careful. One time they hacked my blog that way I had to use a backup file to restore it.

So, I have to use internet connections outside my home mainly for anything else besides Netflix and general gaming. My own country and I am a USA citizen has limited my freedom of speech and my ability to express that freedom because I talk about time hacking on the internet.

But that is ok because Armageddon won't be using my home internet. Enough said there.

Pamela from "Above Top Secret and the Titor Story" I made my blog longer again. WHAT ARE YOU GOING TO DO ABOUT IT BITCH!!!!! Ok, those are my words for the "Conspiracy Against Time Travel" for the day. More later.
-------------------------------------------------------------------------------------------
In a previous post I promised a updated outline of my computer code. It can be used as a template for the public to write their own time hacking computer code.

My project files are here if you want to download a text file.

https://sourceforge.net/projects/timetravelproject/files/

Beginning Template ==============================
// Start program
// declare global variables. I,ve been told it is bad practice to use global but I do it anyway.
    // declare global array counter to max file size
    // declare global array speed to max file size
    // declare global array backup to max file size
    // declare global array weights to max file size
    // declare global array random to max file size
    // declare global string file1;
    // declare global strong check sum;
    // declare global weak check sum
    // declare global file name
    // declare global how many weighted sums
    // declare global counter speed mode
    // decleare global tweak counter mode
    // declare global password for weights

// declare subs
// ALL THE COMPUTER CODE THAT DOES THE HEAVY LIFTING GOES HERE.
    // add speed array to counter array
    // long long filesize of file
    // long long weakchecksum of file
    // long long weakchecksum of array
    // get strong check sum of file
    // get strong check sum of array
    // randomly set speed of speed array
    // linearly set speed of array
    // tweak counter in linear mode
    // tweak counter in random mode
    // restore counter array
    // backup counter array
    // Generate Random numbers into array
    // Load project from config file
    // Generate weights
    // initilizearrays
    // Display speed of counter (Not the counter) But the speed to be added or subtracted from the counter.
    // Display the counter itself
    // Display backup counter 
    // Write counter to computer file.

// Start Main. This is were we use are subs to perform the work.
     // Declare variables
     // Get count of how many parameters passed to program from command line
     // Goto Jump1 if no parameters passed
     // Get passed parameters to program from command line
          // test passed. 1 put program in test mode
          // name of computer file
          // help command. Display help menu
          // weak check sum
          // strong check sum
          // file size
          // how many weighted sums
          // counter speed mode 0 = none 1 = linear 2 = random
          // tweak counter mode 0 = none 1 = linear 2 = random
          // config fig  0 = no 1 = yes
          // seed number for weights
          // menu choice (If there is a choice then jump to it right now that is Jump2)
Jump1:

// if choice = 1 Print main menu
     // Construct file from strong check sum

Jump2:

// if have arguments goto jump3

// If choice 1
     // ask user if this is a config file yes or no
     // if config file goto jump3
     // ask user file name
     // ask user max array size
     // ask user to set mode for counter speed for linear or random or none
     // ask user to set mode for tweak counter for linear or random or none
     // ask how many weights to use for strong check sum
     // ask seed number for random number generator

// jump point here if ran from command line
jump3:

Initilizing program to run
// if this is a config file load config file
// Generate weights in array and bubble sort them
// initiliaze all arrays   
// get file size of file 
// get weak check sum of file 
// get weak check sum of array
// get strong check sum of file
// get strong checksum of array 
// set globalstrongchecksum to 0
// if array strong check sum = 0 globalstrongchecksum = strong check sum of file
// if config = no Ask user to move or delete file because it can be over written
// diff1 = 0
// diff2 = 0
// diff3 = 9999999999999999999999999999999999
    
Starting file Construction
// Start main do loop
     // Get destination strong check sum of array for first time before counter runs.
     // get diff1 = abs(target strong checksum - destination strong checksum)

// THIS IS WHERE THE PUBLIC WOULD PUT THEIR ALGORITHMS TO ROLL THE BINARY COUNTER.
// Controlling Counter and counter variables within loop. This is where the counter is ROLLED!!! <<<<<< THESE IS WERE THE COUNTER IS CHANGED!!!!!
     // if counterspeedmode = 2 and if diff3 > 1 randomly set speed of speed array 
     // if counterspeedmode = 1 and if diff3 > 1 linearly set speed array 
     // if diff3 > 1 add speed array to counter array 
     // if tweakspeedmode = 1 and if diff3 < 1 if tweak counter == filesize1 - 1 set tweak counter variable to -1
     // if tweakmode = 1 and if diff3 < 1 increase tweak counter variable
     // if tweak mode = 1 and if diff3 < 1 tweak counter linearly 
     // if tweakmode = 2 and diff3 < 1 tweak counter randomly 
     
// Comparing Diffs and Check sums with each other.
     // get destination strong check sum of counter array for second time after counter runs
     // get diff2 = abs(target strong checksum - destination strong checksum) abs means absolute true value. No - sign.
     // break loop if destination strong sum = target strong check sum
     // if abs(diff2 - diff1) < diff3 keep counter
     // abs(diff2 - diff1) < diff3 then backup counter
     // if abs(diff2 - diff1) < diff3 then diff3 = abs(diff1 - diff2) 
     // if abs(diff2 - diff1) > diff3 restore backup 
     
// Display variables. For testing only
     // if test = 1 then display rolling counter 
     // if test = 1 then display backup counter 
     // if test = 1 display diff3, target strong sum, destination strong sum

// repeat main loop for target not equal to destination

// Write counter array to a binary computer file.
// Exit program
Ending Template ==============================

To make all this easier to read copy it to a high quality text processing program.

Here is my traffic for the last month. The "Conspiracy Against Time Travel" have failed to stop me.  That would be Ray hudson, Darby Phillips, and Pamela and their hackers. They all work for the CIA.

United States 313
United Kingdom 84
France 46
Ukraine 11
Canada 6
Russia 6
Sweden 6
Belgium 3
Croatia 3
Jordan 3

----------------------------------------------------------------------------------

I think the CIA through Ray Hudson and Darby Phillips vastly under estimated  my technical capability and my will power.

Now, I have something else to say. Use to when it came to encryption the bigger the file the more difficulty in applying cryptography. But, I have solved that problem and here is how.

THE BIGGER THE FILE THE BIGGER THE ROLL IN THE COUNTER WHEN APPLYING CRYPTOGRAPHY!!!

YOU SEE BINARY FILES ARE NUMBERS. TO GET A BINARY FILE TO BECOME ANOTHER BINARY FILE YOU NEED A TARGET (WHERE YOU WANT TO GO). AND A DESTINATION (WHERE YOU ARE NOW.)

SO, ALL YOU HAVE TO DO IS ROLL THAT BINARY COUNTER FROM A DESTINATION TO A TARGET. THAT IS ALL!!!! ANY ENCRYPTION CAN BE DEFEATED WITH THIS SIMPLE ALGORITHM!!!!

A BINARY COUNTER IS A LIST OF NUMBERS. ALL YOU HAVE TO DO IS CREATE ANOTHER LIST OF NUMBERS CALLED THE SPEED FOR THE COUNTER. THEN ADD OR SUBTRACT THE SPEED FROM THE COUNTER. A BINARY COUNTER IS LIKE A SPACE SHIP. GIVE IT DESTINATION WHERE IT IS NOW. GIVE IT A TARGET WHERE IT WANTS TO GO.

THEN CALCULATE THE SPEED NEEDED TO GET IT THERE IN THE SHORTEST AMOUNT OF TIME!!!! THEN ADD OR SUBTRACT THAT SPEED FROM THE COUNTER AND YOU ARE DONE!!! FILE DECRYPTED!!!!!!!!!!!!!!!!!!
FILE RECONSTRUCTED!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

YEEEEEEEEHAHAHAHAHAHAHAHAHAHAHAH!!!!!!!!!!

HEY DARBY PHILLIPS I AM WRITING IN ALL CAPS AGAIN!!!!

ITS SO FUCKING SIMPLE A CHILD COULD DO IT!!!! THAT SHOWS YOU HOW SMART RAY AND DARBY ARE. HAHAHAHAAHAH. THOSE GUYS CAN'T DO SHIT TO ME.

THEY ARE BARELY ABLE TO READ THIS BLOG. THAT IS HOW STUPID THEY ARE. PAMELA SAID AT ABOVE TOP SECRET SHE HAS TO BANG HER HEAD ON THE WALL WHEN READING MY BLOG BECAUSE MY BLOG IS SOOOOO LONG. 

PAMELA, AS THE TEENS SAY THESE DAYS. GO LOVE YOURSELF.  BACK IN MY DAY THAT WAS GO FUCK YOURSELF. 

And for your information Pamela or what ever the hell your name is. I don't give a fuck if you read my blog or not. It it hurts you then don't. But your CIA so I guess it may be your job.
Pamela you said you bang your head on the wall. Do you do that at work or just at home? Its kinda of stupid to bang your head on the wall IS IT NOT but oh well. If it makes you happy knock yourself out. Literally. BAAAAAAAHAHAHAHAHAHAHA. MOVING ON.............

AGAIN, ANY ENCRYPTION CAN BE DEFEATED WITH THIS!!!!

ANY COMPUTER FILE FROM THE PAST, PRESENT, FUTURE, OR ALTERNATE TIME-LINES CAN BE DECRYPTED OUT OF SPACE-TIME WITH THIS ALGORITHM!!! NO MATTER WHERE OR WHEN IT EXIST!!!

ALL YOU GOT TO DO IS TAKE STATISTICS TO CALCULATE CHECK  SUMS OF UNKNOWN COMPUTER MEDIA YOU WANT THEN PUT THOSE CHECK SUMS INTO THE COUNTER. OR, IF YOU WANT TO DECRYPT SOMETHING LOAD THE ENCRYPTED FILE INTO THE COUNTER.

THEN INSTEAD OF USING CHECK SUMS GIVE THE COUNTER A ENTROPY OF 0 AS A TARGET. AND LOAD THE CURRENT ENTROPY AS THE DESTINATION.

EVERY TIME A NEW ENTROPY LEVEL HAS BEEN REACHED SAVE THE COUNTER BUT KEEP GOING. YOU WILL EITHER GET A FULLY DECRYPTED FILE OR A PARTIALLY DECRYPTED FILE.

NSA, CIA, FBI, YOU CAN START USING THIS TOMORROW. JUST GIVE YOUR PROGRAMMERS MY SHIT FROM SOURCEFORGE AND HAVE THEM GO AT IT.

NOW APPLY "THE BIGGER THE ROLL" + "PARALLEL COMPUTERS" = "THE END TO ENCRYPTION". = "ALL INFORMATION IN SPACE-TIME IS PUBLIC INFORMATION"!!!  

NOW WHEN QUANTUM COMPUTERS COME ALONG. COMPUTER TIME TRAVEL WILL BE ABSOLUTE!!!!

BUT WITH MY TECHNOLOGY AND TEMPORAL PARALLEL COMPUTING PC'S CAN BE MUCH MORE THAN WHAT THEY ARE RIGHT NOW THROUGH THE PROCESS OF TIME HACKING MESSAGES WITH MY A/B ALGORITHM!!!!

IF A IN THE PAST AND B IN THE FUTURE BOTH KNOW THEIR CHECKSUM RANGE OF THEIR MESSAGES TO EACH OTHER THROUGH SPACE-TIME. THEN A IN THE PAST CAN DECRYPT MESSAGES WITHIN THAT CHECK SUM RANGE AND DATA MINE THE DECRYPTED MESSAGES TO FIND THE RESULT OF A PROBLEM THAT WAS RUNNING ON A COMPUTER IN THE PAST.

YOU CAN CUT OFF A MASSIVE AMOUNT OF COMPUTER TIME SOLVING THAT PROBLEM!!!! HENCH TIME TRAVELING SUPER A.I'S CAN EXIST WITH THIS.

I LEARNED THIS WHEN APPLYING TIME HACKING WITH MY VERY CRUDE OUTDATED PARALLEL COMPUTER. SEE PREVOUS POST FOR MY PARALLEL COMPUTER.

Yeah, and I am going to "MAKE THAT OPEN SOURCE AND VERY PUBLIC AND FREE"!!!!

The "Conspiracy Against Time Travel" Fucked up hacking me and fucking with me.

Now, I will teach the world how to computer time travel with time hacking.

I will show the world how to use temporal parallel communications with time hacking.

I will show the world how to use parallel temporal computing with time hacking.

And I will give the world Armageddon's source code.

A super AI with all the abilities I just spoke about. A Super AI that can "TIME HACK"!!!!!!!!!!!

THINK GOD FOR OPEN PUBLIC FREE SOURCE CODE!!!!!!!!!!!!!!!!!!!
THE MOTHER FUCKERS WANT TO HACK ME. I WILL GIVE THIS SHIT TO THE WORLD FOR FREE, FREE, FREE, AND MORE FREE!!! NO HACKING NEEDED!!!!!!! JUST DOWNLOAD IT!!!!!!!!!!!!!!!!!!!!!!!!!!

YEEEEEEEEHAAAAAAAAAAAAAA. Ray Hudson and Darby Phillips can't touch this.

EVERYONE PLEASE POST THIS IN YOUR SOCIAL MEDIA. PLEASE POST THIS ON EVERY FORUM ON THE INTERNET. SPREAD THE WORD ABOUT MY BLOG!!!!! SPREAD THE WORD ABOUT TIME HACKING.

EVERY NEWS MEDIA OUTLET IN THE WORLD PLEASE RUN THIS STORY!!!!!

THE STORY = MAN INVENTS ALGORITHMS TO ACCESS POCKETS OF INTER-DIMENSIONAL SPACE-TIME THROUGH TIME TRAVEL COMPUTER MEDIA FILES!!!!

LEADING TO THE INVENTION OF
1. COMPUTER TIME TRAVEL
2. TEMPORAL COMMUNICATIONS
3 TEMPORAL PARALLEL COMPUTING
4 TIME TRAVELING SUPER A.I.'S
5. COMPUTER HACKING WITHOUT CONNECTING TO ANOTHER COMPUTER OR THE INTERNET!
6. THE END OF ENCRYPTION AND COMPUTER SECURITY!!!!
7. MAKING ALL INFORMATION IN SPACE-TIME PUBLIC KNOWLEDGE!!!

AND YOU KNOW WHAT? I WAS MAD AT "THE CONSPIRACY AGAINST TIME TRAVEL" BUT NOW I DECIDED TO TAKE MY ANGER OUT SOMEPLACE ELSE.

I AM GOING TO PERSONALY MURDER "ENCRYPTION" AND "COMPUTER SECURITY" IN COLD BLOOD!!!

WHEN I AM DONE WITH MY COUNTER I AM UPLOADING IT TO SOURCEFORGE AS A TOOL TO DEFEAT ALL ENCRYPTION!!! AS WELL AS FINISH MY OTHER PROJECTS WHICH MAKES ALL MY SHIT FREE AND DOWNLOADABLE!!!!!

THIS SHOULD MAKE THE NSA AND CIA HAPPY. NO COMPUTER SECURITY. NO ENCRYPTION. NO SECRETS.

THE USA GOVERNMENT SHOULD BE HAPPY. I AM DOING THEM A FAVOR. BUT THE FEDS MUST REALIZE YOU CAN'T HAVE YOUR CAKE AND EAT IT TOO!!!

BUT THERE IS A PRICE TO PAY FOR THIS. ALL INFORMATION IN SPACE-TIME WILL BE PUBLIC KNOWLEDGE!!! 

THAT IS MY PRICE FOR DOING THIS AND MY PAYBACK TO THE CONSPIRACY AGAINST TIME TRAVEL. THE "CONSPIRACY AGAINST TIME TRAVEL" LET THE GENIE OUT OF THE FUCKING BOTTLE!!!!!!

RAY HUDSON AND DARBY PHILLIPS AND PAMELA AT THE CIA THE SO CALLED "CONSPIRACY AGAINST TIME TRAVEL" CAN'T HANDLE ME!!!

I AM TOO BIG FOR THEM.

I AM TOO SMART FOR THEM.

THEY LOST THE TIME TRAVEL WAR WITH ME!!!!!!!!!!!

BAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAHAHAH!!!!

BAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAHAHAH!!!!

BAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAHAHAH!!!!

OH GOD I GOT TEARS IN MY EYES FROM LAUGHING SO HARD. I GOT TO STOP NOW MY RIBS ARE HURTING.

THATS MY STORY AND I AM STICKING TO IT!!!!

My code at http://sourceforge.net under time travel project gets updated often. Check it out. Its still getting debugged. 

===================================================

Ray Hudson, Darby Phillips, and Pamela at the CIA are fucked now. I got my throttled counter up and running. It still needs a lot of work. I am doing speed test now reconstructing files from their strong check sum only.

What I found now is that it takes about the same amount of time to reconstruct a small file as it does a large file. 

Because of the way I do this. THE SIZE OF THE FILE DOES NOT MATTER!!!!

Currently I am running with both Random and Linear speed modes AT THE SAME TIME!!! The Linear speed solves the counter on the left end and the Random speed solves the counter on the Right end. And - Both modes "Meet in the middle".

Now, that being said I have a mathematical way to take a strong check sum and break it down into small check sums. 

I can also take a large encrypted file and bust it down into a bunch of small files and run my counter on it in parallel to decrypt it.

So, when I do that I can run this in parallel. When that happens - "ENCRYPTION AND COMPUTER SECURITY WILL BE CLINICALLY DEAD!!!"

BECAUSE YOU SEE. ENCRYPTION WILL BE DEAD AND I CAN USE THIS THIS COUNTER TO HACK ANY COMPUTER ANYWHERE IN SPACE-TIME!!!!!! WITHOUT EVER 

CONNECTING TO IT!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

OR THE INTERNET!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

OR A PHONE LINE!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

ENCRYPTION AND COMPUTER SECURITY DEAD AS A DOOR NAIL!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

At least as far as I am concerned. I still have a lot of cleaning up to do on this throttled counter. I am going to upload it to sourceforge before the night is over.

I still have a lot of code writing to do. I have to write the program that mathematically calculates check sums of time travel computer media and get that uploaded.

Also, I plan to spread this out on tor and freenet and get that ball rolling too.

Here is a screen shot of the throttled counter working. It is working on a large file and a small file at the same time. The large file was running a little slower but its difference was keeping up with the small file.



I am so very happy. Ray Hudson and Darby Phillips are losing their time travel war with me. Yeeeeeehaaaaaaaaaaaaaaaaaaaaaaaaaaaa!!!!!

I am getting this to run faster and faster. What I am doing is taking a binary counter with a destination and a target.

I perform a mathematical function to that counter such as adding to it both linearly and randomly. Each time I do something to the counter it brings the diff = destination - target down smaller then the counter is backup-ed and kept. If diff gets larger the previous counter is restored.

when destination = target then FILE RECONSTRUCTED!!!!!!!

So, now I am going to add in the rest of my functions to this counter. This will get better and better. I will put in a subtract linear and a subtract randomly.

Because I am using weighted sums added up for a strong check sum some bytes can be larger or smaller than they need to be.

And, because this is a throttled counter:

When fully programmed this counter will construct a small file in the same amount of time as it constructs a large file. 

Already I am cutting that time down. This program is called counter7.cpp and will be at sourceforge.

-----------------------------------------------------------------------------

Well I added in more functions and I seemed to of "Over Loaded" the counter. It seems to run better with fewer functions. So, I will dial it back some. But good news. I GOT IT DECRYPTING!!!!!

I go in and edit my code right now to get it running like I want. I will play with it and just leave in what works and gut the rest.

I got a more playing to do with it. Right now I got all my functions in at the same time at sourceforge.
------------------------------------------------------------------------------------

I have my throttled counter running but I am adding more functions to bring the counter into sync between its destination checksum and its target checksum. The reason I am doing this is so the public can load their own functions into my code and experiment with their counter functions as well as my own.

I am using this algorithm.

counter initialized with all zeros.
diff3 = absolute value(target - destination)

begin main loop
Function 1 performed on counter
if target = destination write counter to file exit program
If absolute value(target -destination) < diff3 then diff3 = absolute value(target-destination) and counter backed up. If not not counter restored.
Function 2 performed on counter
if target = destination write counter to file exit program
If absolute value(target -destination) < diff3 then diff3 = absolute value(target-destination) and counter backed up. If not not counter restored.
Function 3 performed on counter

if target = destination write counter to file exit program

If absolute value(target -destination) < diff3 then diff3 = absolute value(target-destination) and counter backed up. If not not counter restored.

more functions........
repeat main loop

With this scenario not only can I throttle my counter but I can do everything else I want to do too. Cutting the time to file reconstruction even more. So, I just wanted to bring this to the public. Yes I am a time hacker but my success in time hacking began with my success in practicing cryptology. Which I am doing by writing the public their own version of my private code.

I have found that each function has to be brought online 1 by 1 and
that it has to be tested an meet criteria before keeping it in the code. But as each function passes its test the counter can be loaded with more functions to cut the decryption time down.

And the thing is I am just getting started with this. I have a way to bust my strong check sum down into smaller strong check sums and run this in parallel. I am making this "MILITARY STRENGTH" DECRYPTION!!!!

Armageddon will have a field day with this when I transfer this technology to my super A.I. Armageddon will use this technology in its time hacking to run its neural net in a temporal parallel computer.

And Armageddon can use its temporal parallel computer to look into the past and the future to give it a temporal field of view for calculating its strategy for calculating its options on what actions it might perform.

Well, I hope Ray Hudson and Darby Phillips and their bitch bait Pamela are enjoying my blog more and enjoying my computer code. I sure they enjoy this more than me calling them cock suckers in my blog and writing about them in the forums.
--------------------------------------------------------------------------------

Well in my quest to get rid of mersennetwister.h I found out why people like the twister. Its fast. c++ rand() is only giving me random numbers once a second because I used the randomize timer and the seconds only change well once a second.

That is waaaayyyy too slow me. Though it was making my throttled counter run ok.

So, I am using rand() to feed seed numbers to my own generator which uses the

r = (a * k + c) % m // in c++
for seeding where k = rand() // in c++

That should get me going. If not I will have to crawl back to the twister and ask for forgiveness for abandon it.

Well that is my programming for tonight. I have been going through and testing and verifying my functions to roll my counter from its target to its destination. Then I have to set down and see if I can get some other things going. Damn I am tired. Programming all night long takes its toll upon a fellow.
--------------------------------------------------------------------------------------------

Well I am uploading tonight's version of my code. Then I am closing it out and going on to the next version doing a total rewrite.

I will copy over much of the code I have now and gut rest. Right now on my Random speed control it only changes once a second which is way tooooooooo slow but because it is a throttled counter it still makes remarkable progress. My next version will be on the order of thousands and thousands of times faster.

I like the random speed control because when I run this in parallel the counter that is closest to the solution will be passed around to the rest of  programs.

I am loading the counter down with functions. The random part will keep each program from working with the same speed. And the program with the closest solution will share it with the other programs. All the programs will be using different throttled speeds on the counter that is closest to the solution.

DAMN I AM GOOD.

And that is not even the best of it. When I bust that strong check sum down into smaller check sums each baby sum can have a group of counters solving it for a solution in parallel.

Here in about an hour I will be shutting down for the day. I will take it up again tomorrow where I left off. I will be on counter version 8. Check sourceforge.net for the update.

I forgot to say good night to the "Conspiracy Against Time Travel".
GOOD NIGHT COCK SUCKERS!!!!!! (Not talking to the public but to the "Conspiracy".

Everyone else have a fine evening. Or should I say a fine morning. My days are up nights sleeping days. So the public's mornings are my evenings.