Showing posts with label Albert Einstein. Show all posts
Showing posts with label Albert Einstein. Show all posts

Saturday, March 11, 2017

THE UNIVERSE IS A BURRIS NUMERICAL SYSTEM

COPYRIGHT(C) 2017 http://time-travel.institute

03/11/2017 07:01PM

I have thought about it for a long time. The universe itself is just one incredibly long computer file but it's a Burris Numerical System computer  file. It's a long number that is information and it has a reference point per Einsteins theory of relativity. This number and it's point of reference moves through time and changes as its information changes and as it changes it's point of reference changes. The universe is a Burris Numerical System.
My BNS system mathematicaly describes the universe as a informational universe moving through time and space with it's point of reference.

The point of reference is what creates time. The information is what creates space. With my BNS system is the beginning of a physical time machine for with my mathematics and some engineering and physics now a real time machine can be built. For information is space and points of reference is time.

On a computer I code computer files as information existing at a point in time with a point of reference. On encode the arrow of time goes forward as the information changes. On decode the arrow of time goes backwards as the information is decode out.

So if one goes to the past in a physical time machine information is being decoded. If one goes forward in time in a physical time machine information is being encoded.

Now, here is where it gets real. The system for finding the points of reference is the guidance system. For in real time travel in a real time machine it is mathematically possible to time travel to a different past and to time travel to a different future depending on the system used to plot the points of reference.

What BNS mathematics proves is space-time is multidimensional. In real time travel you can time travel to any past or any future.
BNS mathematicaly proves that time travel paradoxes do not mathematicaly exist. In real time travel if you did not exist twice in your past then if you time travel to that past where you do exist twice then you are in another time line. There will be no paradox because time lines are infinite. Every time a time traveler time travels a new time is created to protect the previous time line. In theory it is not physically possible to change the future or past of a specific time line. So in theory time travel as most people believe exist does not exist. Different time lines exist but it is not possible to modify a time line it is only possible to create a new one. So time travel like quantum mechanics is an enigma. Given infinite choices there are infinite solutions to those choices.

I know in my blog I have mentioned paradoxes but paradoxes don't exist. I have provided true time travel with mathematics to study true time travel. That system is the Burris Numerical System.
The arrow of time is an illusion. Space and time is a continuum. It has no beginning and it has no end. Because of points of reference one can have any past or any future. As Einstein said space time is relative. With time travel​ it takes a mathematical equation to define a time line. Without the equations to plot the points of reference you can go to any past or any future. In BNS one set of equations define space. The other set of equations define the time line for that space. Both sets of equations define true time travel.

For give me but I'm fixing to scare the hell out of the CIA and the NSA. These points of reference equations I can use to authenticate message​s and computer files on my computer time travel software. Its called a quantum code. Quantum codes is what you need to verify your time travel destination. It is why I have invented temporal cryptography parallel computing and a super AI that can exist in a BNS number.  Quantum codes are a way to map time lines and information from that time line. To do that you have to have a full blown Burris Numerical System. Back on topic.......

My Burris Numerical System further proves Einstein right. And it is because of Einstein my Burris Numerical System exist for I built my BNS system mathematically based on Einsteins theory and work.

In conclusion it has taking time travel mathematically to invent time travel physically. And yes time travel has been invented both mathematically and physically. I don't plan to leave my time line any time soon though.
-------------------------------------------------------------------------------------------------
03/12/2017 11:23 PM

I have a lot of work to do on my temporal mathematics cryptography tonight but I needed to clean up my blog a little bit so I thought I would drop in and say hi to everyone that stops by to read my blog. Which is mostly the intelligence agencies. Normal people at least most people are not interested in this sort of thing.

I am currently doing some experiments and poking around my code and changing a little bit here and there. So that is what I have been up to. 

Here is a regression line I did of a BNS encoding. I had to adapt a program I was using for my strong and weak check-sums. I have not verified the mathematics as of yet but I am confident I got it mostly if not entirely correct. But, if I have any bugs I know I will find them later. I always do.

 y = a + bx 
 y  = -848066.823429559855867410078644752502 + 1.05684241216300384852162103088701883 times 14915473.4139678192395876976661384106

 a = y - (b times x)
-848066.823429559855867410078644752502 = 14915238.0779413442887744167819619179 -  ( 1.05684241216300384852162103088701883 times 14915473.4139678192395876976661384106 ) 

So, this is what a regression line of V and R look like in a BNS coding. By the way I am a self taught in a lot of mathematics I use. I did make it to Calculus II in college but that is as high as I got. 

Also I had to do both business math and engineering math. Yes, college there are two maths. Growing up I always thought math was math I did not know there was a difference. Actually it is the same math but it is taught toward a business perspective or a engineering perspective. So basically I repeated the same math twice. I now have about 7 years of college at 5 different universities now. No degree. But that is ok. I'm good. Very very few people continue doing what they did in college when they don't finish. So I am a rarity on that end. But, I started out with a interest in this in my teens. Before that I hated math. Getting me to do math was like getting me to eat my vegetables, take a bath, or clean my room as a youngster. Temporal Cryptography and Temporal Encoding and Decoding systems is my thing on the side. Its my hobby.  

This file is a png picture of 43.8K bytes. I coded it with my BNS and wrote all the V's and R's out to a text file then I did a regression line of my R. Then I played around using regression lines to predict R for BNS as I coded and I used regression lines to predict my R of BNS on decode. R only has to be exactly right if I am doing a predictable number sequence. But, if I am just trying to keep R within a specific range of V as I code and decode I can fudge it a little. But, on decode R has to be the same as it was on encode or I get a alternate reality file. This is how I mathematically proved time paradoxes don't exist. Nature just creates a new time-line to protect the old time line.

It is experiments like this that I have been doing for over 30 years that has lead to the development of my work. I started playing around with "Temporal Cryptography Mathematics" and "Temporal Coding and Decoding Systems" in my early 20's. Actually I began some of my work when I was just 16 years old. In my early 20's my worked picked up to a fever pitch.

I was working 8 and 10 hour days in my free time trying to develop mathematical systems for my thought experiments. In my early work I used hieroglyphics in mathematical systems. I even replaced the numbers people currently used and worked with numerical bases in ways never thought of. 

I am ready to start giving out some more of my secrets to the public. Here is one of the methods I use to control BNS so that I can use it to code an unlimited amount of information into a fixed size BNS number.

Here is a BNS number coding a predictable number sequence and a unpredictable sequence. On the unpredictable I am just using random numbers to show my point.

V = V + ((V - R) * base - 1) + N Coding up
V = V - ((R - V)  * base - 1) + N Coding down
R = V + (V - R) FLIPPING R WHEN FLIPPING EQUATIONS 
R = V -  (V - R) FLIPPING R WHEN FLIPPING EQUATIONS
Going up R is below V.
Going down R is above V.

I am sorry in my previous post I just did base it is actually base - 1.

This is the clock.              This is the information
THIS IS TIME                 THIS IS SPACE
Predictable sequence     Un-predictable sequence
1087583 1087581 0 2    9237423  7238477
1087586 1087581 1 5    9387973  7439987
1087587 1087585 0 2   .
1087590 1087585 1 5   .
1087591 1087589 0 2   .
1087594 1087589 1 5   .
1087595 1087593 0 2   .
1087598 1087593 1 5
1087599 1087597 0 2
1087602 1087597 1 5
1087603 1087601 0 2
1087606 1087601 1 5
1087607 1087605 0 2
1087610 1087605 1 5
1087611 1087609 0 2
1087614 1087609 1 5
1087615 1087613 0 2
1087618 1087613 1 5
1087619 1087617 0 2
1087622 1087617 1 5
1087623 1087621 0 2
1087626 1087621 1 5
1087627 1087625 0 2
---------------------------
Reverse sequence  0  Make change on Right.
                               1
                               0

On decode every time my system sees a 0 in it then decrements R by 4. AND KEEPS ON CHUGGING ALONG. Now when the predictable number sequence changes my method of decode changes but I still always know when to change R as needed. Because it is completely predictable.

I can switch up predictable number sequences to control the coding and decoding on the right. Then this whole system becomes predictable!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Notes:
I can combine this into one system. If the predictable number system repeats 50 times before it changes then I write 49 for that byte because 0 is the first count. On the next change I start counting again. If the system only repeats 1 once I write 0 for that byte. 
But, two systems are faster. But the predictable system only codes N in a very predictable way so that it can be un-coded. It only codes and un-codes at least two predictable number sequences. If I use only one predictable number sequence I can have it flip if a extra bit is inserted then use the flips to control the right side or to count a byte out for decoding later. On this system I would watch the flips from coding up to coding down. From coding down to coding up.

I can use more than one predictable system to code a un-predictable system too. There are many ways to use BNS. I am just giving examples here in my blog. 

Well I guess I just murdered zip and tar. Oh well.

BAAAAAAHAHAHAHAHAHAHAHAHAHAHAHAH!!!!!!!

IT JUST KEEP GETTING WORSE AND WORSE FOR RAY HUDSON, DARBY PHILLIPS, AND PAMELA.

HEY "CONSPIRACY AGAINST TIME TRAVEL" THE WHOLE WORLD APPRECIATES YOUR SERVICE TO THEIR PERSPECTIVE COUNTRIES!!!!!!!!!!!!!!

BAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAHA!!!!!!!!!!

Now the left side is completely predictable and de-codable. The right side is not. But, what I can do is have the left side switch to a different predictable de-codable number sequence every time I want to make a change in the right side. So, by using predictable CHANGING predictable number sequences in the left side of my BNS coding I can make my RIGHT SIDE BNS PREDICTABLE!!!!!

NOW WHEN I GET DONE I ONLY HAVE TWO V'S AND TWO R'S. I DO NOT NEED THE REST OF THIS TO DECODE IT BACK OUT TO A BINARY FILE!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

I HAVE IT CODE UP AND I HAVE IT CODE DOWN. THE NUMBERS ARE FIXED AND NEVER INCREASE IN DIGIT SIZE!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

NO MATTER HOW MUCH DATA IS CODED OR DECODED.

THE ONLY LIMIT IS TIME. HOW MUCH TIME DO I HAVE TO CODE AND UN-CODE AN UNLIMITED AMOUNT OF DATA TO A FIXED SIZE NUMBER!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

THIS IS HOW THE UNIVERSE WORKS FOLKS TO CREATE TIME AND SPACE MATHEMATICALLY!!!!!!!!!!!!!!!!!!!!!!

IN A PHYSICAL TIME MACHINE THE LEFT SIDE OF THE QUANTUM COORDINATES DEFINES THE TIME-LINE IN PHYSICAL SPACE. THE RIGHT SIDE OF THE QUANTUM COORDINATES DEFINES THE INFORMATION IN THAT PHYSICAL SPACE. TOGETHER THEY DEFINE SPACE-TIME!!!!!!!!!!

THIS MATHEMATICALLY IS HOW A PHYSICAL REAL LIFE TIME MACHINE WOULD CARRY A FLESH AND BLOOD TIME TRAVELER TO DIFFERENT TIME-LINES ACROSS SPACE-TIME!!!!!!!!!!!!!

WITHOUT THE QUANTUM COORDINATES THE TIME MACHINE WOULD GET LOST IN SPACE-TIME!!!!!!!!!!!!!

I CAN NEVER RUN OUT OF STORAGE SPACE EVER!!!!!!!!!!
I CAN STORE ALL THE DATA I WANT.
I CAN USE THIS TO DOWNLOAD ALL THE DATA I WANT FROM SPACE-TIME FROM THE INFORMATIONAL UNIVERSE!!!!!!!

I USE THIS IN MY A/B ALGORITHM TO SEND MY SELF NEWS AND ENTERTAINMENT FROM THE FUTURE!!!!!!!

IN MY A/B ALGORITHM IF A IN THE PAST AND B IN THE FUTURE BOTH KNOW THE CHECK-SUM RANGE OF THEIR MESSAGES TO EACH OTHER THROUGH SPACE-TIME THEN A IN THE PAST AND B IN THE FUTURE CAN USE TEMPORAL CRYPTOGRAPHY TO DATA MINE THE CHECK-SUM RANGE AND READ THEIR MESSAGES TO EACH OTHER FROM ACROSS SPACE-TIME!!!!!!!!!!!!!!!!!!!!!!!

THEY CAN USE TEMPORAL ALGORITHMS LIKE MY BNS TO VERIFY THEIR MESSAGES TO EACH OTHER FROM ACROSS SPACE-TIME!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

THIS IS HOW I CODE TERABYTES OF DATA INTO A SMALL BNS NUMBER LESS THAN 1K SIZE!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

I STORE MY DATA MATHEMATICALLY IN SPACE-TIME USING A MATHEMATICAL NUMBER SYSTEM BASED ON EINSTEIN'S WORK!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

I CAN USE THIS TO DECODE DATA OUT OF SPACE-TIME TOO OF COMPUTER FILES FROM ALL ACROSS SPACE-TIME!!!!!!!!!!!!!!!!!!!!

THIS IS HOW I BEGAN MY TIME TRAVEL WITH COMPUTERS!!!!!!!!!!!!!!!!!!!!!!!!!!

I AM BRINGING COMPUTER TIME TRAVEL TO THE WORLD!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

LET THE TIME-TRAVEL BEGIN!!!!!!!!!!!!!!

YEEEEEEEEHHHHHHHAAAAAAAAAA!!!!!!


HERE IS THE VIDEO PROVING IT!!!!


BAAAAAAAAAAAHAHAHAHAHAHAHAHAH!!!!

BAAAAAAAAAAAHAHAHAHAHAHAHAHAH!!!!

BAAAAAAAAAAAHAHAHAHAHAHAHAHAH!!!!

BAAAAAAAAAAAHAHAHAHAHAHAHAHAH!!!!


-------------------------------------------------------------------------------------------------
03/15/2017 08:23 AM

It is not even to the weekend yet and my traffic to this blog has increased. Probably do to me showing everyone how to code and decode a BNS number with predictable number sequences.






If the public and or governments of the world could read my mind and see what I have seen and know what I know society would forever be changed. Most of what I know will go with me to the afterlife. But before I go in time (I am not in no HURRY!!!) I will get as much as my opensource out to the public as I can.

I am going to be getting that software out to the public this week if I can. BNS programming can be difficult as Aaron Hiniker found out in 2013 when he tried to copy my work. He was writing me every day asking for help and advice. So, I will start getting it out. Its about time.

So, I will work on it for the public. I will have to upload it outside of my home as everyone knows my network and my computers has become government property by way of hacking and denial of service attacks. 

People would be surprised what you can get use to. For now its just another day. I almost don't even care anymore. At least know the world will have it and not just some classified government project. 

If I am going to be stalked, harassed, crimes committed against me, then finally threatened over and over well now I go public. I will give what I can to the world. I will give it to Russia, I will give it to China, I will give it to the UK, I will give it to India, I will give it to Brazil, I will give it to Mexico, I will give it to Canada, I will give it to Saudi Araba, I will give it to everyone I can possibly give it to that will listen to me and accept my software as a gift for humanity.

And I have been. There are many ways to use BNS. What I have showed in this post is just the very tip of the ice burg.  In the data stream which is the bytes that are counted out can be instructions for coding decoding another BNS system.

I have learned to use BNS to put instructions for running my Armageddon program for my super A.I. And having the A.I. control its own programming. Its complicated but can be done. BNS can be used to hide a Virus, Trojan, or malware.

Since BNS can code an unlimited amount of data to a small fixed size number all kinds of bad thing can live and hide inside a BNS number. ITS 100 THOUSAND TIMES FOLD WORSE THAN RUNNING A EXECUTABLE WITHOUT CHECKING IT.

For BNS can hide computer programs from all across space-time. Long dead and gone military attack programs of forgotten or unknown civilizations from the past or far future can live inside a BNS number. So I would advise decoding randomly and executing programs not without taking a hex editor to it first and reverse engineering it. For you never know what kind of evil can be unleashed upon the world from the ancient past, far future, or alternate reality with a BNS number.

The BNS software I am doing now is just for coding or decoding a binary file. The decoding program can be fed random numbers for randomly computer time traveling. But check the files carefully. Also, BNS can use a destination BNS number and be added to or subtracted from to find the target BNS numbers that may contain important time travel media. Then the BNS destination number can be added to or subtracted from to move the BNS number along a regression line for finding time travel computer media files just like in my other software.

And don't get me started on performing math with BNS numbers. Things can get a little wild from there.
-------------------------------------------------------------------------------------------------
03/15/2017 11:27 PM

I got a few things to  do tonight then I am back to work on my open source computer time travel programs. Mainly my BNS for now.
I have shown how to code predictable number sequences. The sequences counts out a byte to be written to a binary file. When the byte is counted out the predictable number sequence reverses. It becomes predictable in the reverse direction. So a double 00 or a double 11 shows where the sequences reversed. Thus, that is the beginning and end of another byte.

On decode there is no problem knowing R because the sequence was predictable R increments and decrements predictably. And its slow as fuck for coding and decoding large files. So again doing it in parallel is an option. 

Another option and the one that I use is to use two BNS systems where I can use a numerical base and I am writing and reading. I am not counting out bytes. Because I don't have too. The predictable system tells me when to increase or decrease my R for coding and decoding.

Russia and China and India can find all manner of uses for my Burris Numerical system as well as the rest of the world. Its the intelligence community mainly the C.I.A. and the N.S.A. that want it the most. My own country hacked the shit out of me for BNS and then on top of that threaten me with a accident. Later Ray Hudson told me in a public forum at above top secret my end was near.

So, If my end is near I had better get to work on my open source and get it out to the world. But yeah with a BNS number a agent in a foreign country can take all his stolen materials and scan them and store them in a BNS number and then memorize it and burn all his stolen documents. He CAN MEMORIZE THAT NUMBER THAT CAN DECODE TERABYTES OF DATA. YOU SEE A BNS NUMBER LOOKS LIKE THIS.

832743289 9834579 (THIS NUMBER CAN STORE AN UNLIMITED AMOUNT OF DATA!!!!) ALL A AGENT HAS TO DO IS MEMORIZE IT.

Now that agent can destroy his stolen materials and get on a plane back home with nothing but his clothes own. When he or she get back home they turn that BNS number over from memory to their handlers and the number is decoded out and another countries stolen materials decoded.

RUSSIA YOU LISTENING TO THIS SHIT!!!!
CHINA YOU LISTENING TO THIS SHIT!!!!!!
WORLD YOU LISTENING TO THIS SHIT!!!!!!!

RAY HUDSON I BET YOUR REGRETTING THAT HACKING ABOUT NOW. REGRETTING THOSE THREATS YOU AND YOUR FRIENDS MADE TO ME. FBI AND HOMELAND SECURITY REFUSED TO DO ANYTHING ABOUT IT. LOCAL LAW ENFORCEMENT REFUSED TO DO ANYTHING ABOUT IT. SO IF I AM GOING TO DIE FOR THIS I WILL GIVE IT TO THE WORLD!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

DON'T WORRY RAY. RUSSIA AND CHINA APPRECIATE YOUR SERVICE TO THEIR COUNTRIES. 

BAAAAAAAAHAHAHAHAHAHAHAHAHAH

NASA YOU CAN SEND A COLONY TO A PLANET NOW WITH A DATA BASE FROM HELL AND BACK!!!!

Well I am going to go work on my open source. I will leave everyone with another video from my YouTube.



Before I go I want to remind everyone that with time travel project when looking for files you can search for BNS numbers too. I used them in my A/B algorithm when searching for messages to myself from the future. I used them for file attachments of computer media from the future. My BNS numbers the way that I used them had a very small foot print in my files. BNS used correctly and Time-Hacking walk hand in hand together. It has worked well for me over the years. Ok, Talk to everyone later.
----------------------------------------------------------------------------------------------------

03/17/2017 14:09 PM

I have not been around in a couple of days. So, I have not blogged. I wrote a new BNS code and decode program that reads a binary file and puts the numbers in a text file. It can use the text file to decode the binary file. It was basically practice for me but I will let the public have it.

I have a really special program I am working on. It codes in a predictable sequence but each number in that sequence will decode a byte. 

So the user readers the last v and r. Now this V and R does two things. It decodes a byte out. Then on the last V and R that decodes to the next V and R that decodes a byte out. Then on that last V and R it against decodes to another V and R that decodes a byte out. So, each position or digit in the BNS number decodes a byte out then decodes to the previous BNS number. This is multidimensional BNS numbers. Yes its very advanced and it is extremely complex.

It is basically a mathematical model of how multidimensional universes co-exist together.

You see BNS numbers can be used as multidimensional code and decode too. Again, that is my more advanced BNS numbers. 

Its Friday so here is my traffic for the last 7 days.




-------------------------------------------------------------------------------------------------
03/22/2019 11:41 PM

I have not been around this week posting and programming because I have been in the hospital. My traffic here has seriously dropped because of it. I was in the hospital most of the week. But, I'm still alive and I pulled through despite the threats against me from "The Conspiracy Against Time Travel". The doctors and nurses fixed me right back up and now I am good to go. That first day in the ER was pretty ruff though. It took them like 12 hours to get me stabilized. Then they gave me a hospital room and monitored me for a few days.

Luckily for me those guys (Talking to the "Conspiracy Against Time Travel" are too stupid to do a proper hit. Seriously my dogs are smarter than these fuckers are (Talking about the Conspiracy). The fact that they fucked up their first attempt to kill me was completely predictable by me for years. I saw this coming a long time ago.

They fucked their hacking up of me and now they fucked up their first hit against me that they have so long promised me would happen to me. That hit has been a long time coming. Whether it was a warning shot across my bow or a true fuck up I don't really for sure know. What I do know is these morons are too stupid to do anything really serious to me. But, As always I will never stop ever. I will keep going as long as I can.

So tonight and into the morning I will finish my first BNS program then move onto the second one. Talk to everyone later.

---------------------------------------------------------------------------------------------
03/23/2017 03:21 AM

I want to show everyone what my first BNS program will look like.

I have a png picture file. Here is a partial BNS coding log of a png picture. 

This is completely de-code-able. 

For coding up and down
v = v +- ((absolute value(v-r)) * (base - 1)) + N

To decode (This is for base 2)
if (V - R) - int (v - r) > 0 then 
pbnum = (v - r)
pbnum = pbnum - 1
pbnum = pbnum  / 2
pbnum = pbnum + 1
v = v - pbnum
if v is odd then r = r - 8

if (v - r) - int(v - r) == 0
pbnum = (v - r)
pbnum = pbnum  / 2
pbnum = pbnum + 1
v = v - pbnum
R = R

when v and r = 1087627 1087627 decoding is completed.

// BEGIN CODING LOG
1087627 1087627 0 0 0 0.5
1087628 1087627 1 1 1 0
1087630 1087627 2 3 1 0
1087634 1087627 3 7 1 0
1087635 1087635 4 0 2 0.5 R = R + 8
1087636 1087635 5 1 1 0
1087638 1087635 6 3 1 0
1087642 1087635 7 7 1 0
1087643 1087643 8 0 2 0.5 R = R + 8
1087644 1087643 9 1 1 0
1087646 1087643 10 3 1 0
1087650 1087643 11 7 1 0
1087651 1087651 12 0 2 0.5 R = R + 8
1087652 1087651 13 1 1 0
1087654 1087651 14 3 1 0
1087658 1087651 15 7 1 0
1087659 1087659 16 0 2 0.5 R = R + 8
1087660 1087659 17 1 1 0
1087662 1087659 18 3 1 0
1087666 1087659 19 7 1 0
1087667 1087667 20 0 2 0.5 .....E
1087668 1087667 21 1 1 0
1087670 1087667 22 3 1 0
1087674 1087667 23 7 1 0
1087675 1087675 24 0 2 0.5
1087676 1087675 25 1 1 0
1087678 1087675 26 3 1 0
1087682 1087675 27 7 1 0
1087683 1087683 28 0 2 0.5
1087684 1087683 29 1 1 0
1087686 1087683 30 3 1 0
1087690 1087683 31 7 1 0
1087691 1087691 32 0 2 0.5
1087692 1087691 33 1 1 0
1087694 1087691 34 3 1 0
1087698 1087691 35 7 1 0
1087699 1087699 36 0 2 0.5
1087700 1087699 37 1 1 0
1087702 1087699 38 3 1 0
1087706 1087699 39 7 1 0
1087707 1087707 40 0 2 0.5
1087708 1087707 41 1 1 0
1087710 1087707 42 3 1 0
1087714 1087707 43 7 1 0
1087715 1087715 44 0 2 0.5
1087716 1087715 45 1 1 0
1087718 1087715 46 3 1 0
1087722 1087715 47 7 1 0
1087723 1087723 48 0 2 0.5
1087724 1087723 49 1 1 0
1087726 1087723 50 3 1 0
1087730 1087723 51 7 1 0
1087731 1087731 52 0 2 0.5
1087732 1087731 53 1 1 0
1087734 1087731 54 3 1 0
1087738 1087731 55 7 1 0
1087739 1087739 56 0 2 0.5
1087740 1087739 57 1 1 0
1087742 1087739 58 3 1 0
1087746 1087739 59 7 1 0
1087747 1087747 60 0 2 0.5
1087748 1087747 61 1 1 0
1087750 1087747 62 3 1 0
1087754 1087747 63 7 1 0
1087755 1087755 64 0 2 0.5
1087756 1087755 65 1 1 0
1087758 1087755 66 3 1 0
1087762 1087755 67 7 1 0
1087763 1087763 68 0 2 0.5
1087764 1087763 69 1 1 0
1087766 1087763 70 3 1 0
1087770 1087763 71 7 1 0
1087771 1087771 72 0 2 0.5
1087772 1087771 73 1 1 0
1087774 1087771 74 3 1 0
1087778 1087771 75 7 1 0
1087779 1087779 76 0 2 0.5
1087780 1087779 77 1 1 0
1087782 1087779 78 3 1 0
1087786 1087779 79 7 1 0
1087787 1087787 80 0 2 0.5
1087788 1087787 81 1 1 0
1087790 1087787 82 3 1 0
1087794 1087787 83 7 1 0
1087795 1087795 84 0 2 0.5
1087796 1087795 85 1 1 0
1087798 1087795 86 3 1 0
1087802 1087795 87 7 1 0
1087803 1087803 88 0 2 0.5
1087804 1087803 89 1 1 0
1087806 1087803 90 3 1 0
1087810 1087803 91 7 1 0
1087811 1087811 92 0 2 0.5
1087812 1087811 93 1 1 0
1087814 1087811 94 3 1 0
1087818 1087811 95 7 1 0
1087819 1087819 96 0 2 0.5
1087820 1087819 97 1 1 0
1087822 1087819 98 3 1 0
1087826 1087819 99 7 1 0
1087827 1087827 100 0 2 0.5
1087828 1087827 101 1 1 0
1087830 1087827 102 3 1 0
1087834 1087827 103 7 1 0
1087835 1087835 104 0 2 0.5
1087836 1087835 105 1 1 0
1087838 1087835 106 3 1 0
1087842 1087835 107 7 1 0
1087843 1087843 108 0 2 0.5
1087844 1087843 109 1 1 0
1087846 1087843 110 3 1 0
1087850 1087843 111 7 1 0
1087851 1087851 112 0 2 0.5
1087852 1087851 113 1 1 0
1087854 1087851 114 3 1 0
1087858 1087851 115 7 1 0
1087859 1087859 116 0 2 0.5
1087860 1087859 117 1 1 0
1087862 1087859 118 3 1 0
1087866 1087859 119 7 1 0
1087867 1087867 120 0 2 0.5
1087868 1087867 121 1 1 0
1087870 1087867 122 3 1 0
1087874 1087867 123 7 1 0
1087875 1087875 124 0 2 0.5
1087876 1087875 125 1 1 0
1087878 1087875 126 3 1 0
1087882 1087875 127 7 1 0
1087883 1087883 128 0 2 0.5
1087884 1087883 129 1 1 0
1087886 1087883 130 3 1 0
1087890 1087883 131 7 1 0
1087891 1087891 132 0 2 0.5
1087892 1087891 133 1 1 0
1087894 1087891 134 3 1 0
1087898 1087891 135 7 1 0
1087899 1087899 136 0 2 0.5
1087900 1087899 137 1 1 0 <<<<<<<<<<<<<<<<<<<<<<<<<< First byte coded and written to code file. Byte is 137 because that is what we counted to.

1087628 1087627 0 1 1 0
1087630 1087627 1 3 1 0
1087634 1087627 2 7 1 0
1087635 1087635 3 0 2 0.5
1087636 1087635 4 1 1 0
1087638 1087635 5 3 1 0
1087642 1087635 6 7 1 0
1087643 1087643 7 0 2 0.5
1087644 1087643 8 1 1 0
1087646 1087643 9 3 1 0
1087650 1087643 10 7 1 0
1087651 1087651 11 0 2 0.5
1087652 1087651 12 1 1 0
1087654 1087651 13 3 1 0
1087658 1087651 14 7 1 0
1087659 1087659 15 0 2 0.5
1087660 1087659 16 1 1 0
1087662 1087659 17 3 1 0
1087666 1087659 18 7 1 0
1087667 1087667 19 0 2 0.5
1087668 1087667 20 1 1 0
1087670 1087667 21 3 1 0
1087674 1087667 22 7 1 0
1087675 1087675 23 0 2 0.5
1087676 1087675 24 1 1 0
1087678 1087675 25 3 1 0
1087682 1087675 26 7 1 0
1087683 1087683 27 0 2 0.5
1087684 1087683 28 1 1 0
1087686 1087683 29 3 1 0
1087690 1087683 30 7 1 0
1087691 1087691 31 0 2 0.5
1087692 1087691 32 1 1 0
1087694 1087691 33 3 1 0
1087698 1087691 34 7 1 0
1087699 1087699 35 0 2 0.5
1087700 1087699 36 1 1 0
1087702 1087699 37 3 1 0
1087706 1087699 38 7 1 0
1087707 1087707 39 0 2 0.5
1087708 1087707 40 1 1 0
1087710 1087707 41 3 1 0
1087714 1087707 42 7 1 0
1087715 1087715 43 0 2 0.5
1087716 1087715 44 1 1 0
1087718 1087715 45 3 1 0
1087722 1087715 46 7 1 0
1087723 1087723 47 0 2 0.5
1087724 1087723 48 1 1 0
1087726 1087723 49 3 1 0
1087730 1087723 50 7 1 0
1087731 1087731 51 0 2 0.5
1087732 1087731 52 1 1 0
1087734 1087731 53 3 1 0
1087738 1087731 54 7 1 0
1087739 1087739 55 0 2 0.5
1087740 1087739 56 1 1 0
1087742 1087739 57 3 1 0
1087746 1087739 58 7 1 0
1087747 1087747 59 0 2 0.5
1087748 1087747 60 1 1 0
1087750 1087747 61 3 1 0
1087754 1087747 62 7 1 0
1087755 1087755 63 0 2 0.5
1087756 1087755 64 1 1 0
1087758 1087755 65 3 1 0
1087762 1087755 66 7 1 0
1087763 1087763 67 0 2 0.5
1087764 1087763 68 1 1 0
1087766 1087763 69 3 1 0
1087770 1087763 70 7 1 0
1087771 1087771 71 0 2 0.5
1087772 1087771 72 1 1 0
1087774 1087771 73 3 1 0
1087778 1087771 74 7 1 0
1087779 1087779 75 0 2 0.5
1087780 1087779 76 1 1 0
1087782 1087779 77 3 1 0
1087786 1087779 78 7 1 0
1087787 1087787 79 0 2 0.5
1087788 1087787 80 1 1 0 <<<<<<<<<<<<<<<<<<<<<< Second Byte coded and written to code file

1087628 1087627 0 1 1 0
1087630 1087627 1 3 1 0
1087634 1087627 2 7 1 0
1087635 1087635 3 0 2 0.5
1087636 1087635 4 1 1 0
1087638 1087635 5 3 1 0
1087642 1087635 6 7 1 0
1087643 1087643 7 0 2 0.5
1087644 1087643 8 1 1 0
1087646 1087643 9 3 1 0
1087650 1087643 10 7 1 0
1087651 1087651 11 0 2 0.5
1087652 1087651 12 1 1 0
1087654 1087651 13 3 1 0
1087658 1087651 14 7 1 0
1087659 1087659 15 0 2 0.5
1087660 1087659 16 1 1 0
1087662 1087659 17 3 1 0
1087666 1087659 18 7 1 0
1087667 1087667 19 0 2 0.5
1087668 1087667 20 1 1 0
1087670 1087667 21 3 1 0
1087674 1087667 22 7 1 0
1087675 1087675 23 0 2 0.5
1087676 1087675 24 1 1 0
1087678 1087675 25 3 1 0
1087682 1087675 26 7 1 0
1087683 1087683 27 0 2 0.5
1087684 1087683 28 1 1 0
1087686 1087683 29 3 1 0
1087690 1087683 30 7 1 0
1087691 1087691 31 0 2 0.5
1087692 1087691 32 1 1 0
1087694 1087691 33 3 1 0
1087698 1087691 34 7 1 0
1087699 1087699 35 0 2 0.5
1087700 1087699 36 1 1 0
1087702 1087699 37 3 1 0
1087706 1087699 38 7 1 0
1087707 1087707 39 0 2 0.5
1087708 1087707 40 1 1 0
1087710 1087707 41 3 1 0
1087714 1087707 42 7 1 0
1087715 1087715 43 0 2 0.5
1087716 1087715 44 1 1 0
1087718 1087715 45 3 1 0
1087722 1087715 46 7 1 0
1087723 1087723 47 0 2 0.5
1087724 1087723 48 1 1 0
1087726 1087723 49 3 1 0
1087730 1087723 50 7 1 0
1087731 1087731 51 0 2 0.5
1087732 1087731 52 1 1 0
1087734 1087731 53 3 1 0
1087738 1087731 54 7 1 0
1087739 1087739 55 0 2 0.5
1087740 1087739 56 1 1 0
1087742 1087739 57 3 1 0
1087746 1087739 58 7 1 0
1087747 1087747 59 0 2 0.5
1087748 1087747 60 1 1 0
1087750 1087747 61 3 1 0
1087754 1087747 62 7 1 0
1087755 1087755 63 0 2 0.5
1087756 1087755 64 1 1 0
1087758 1087755 65 3 1 0
1087762 1087755 66 7 1 0
1087763 1087763 67 0 2 0.5
1087764 1087763 68 1 1 0
1087766 1087763 69 3 1 0
1087770 1087763 70 7 1 0
1087771 1087771 71 0 2 0.5
1087772 1087771 72 1 1 0
1087774 1087771 73 3 1 0
1087778 1087771 74 7 1 0
1087779 1087779 75 0 2 0.5
1087780 1087779 76 1 1 0
1087782 1087779 77 3 1 0

1087786 1087779 78 7 1 0 <<<<<<<<<<
// END CODING LOG

Now, after I code a picture to BNS here is what the decode file will look like. Each number in the file is a BNS number to decode a byte back to a file.
// Begin decode file 
1087900 1087899 << This is a bns number to decode a byte.
1087788 1087787 << This is a bns number to decode a byte.
1087786 1087779 << This is a bns number to decode a byte.
1087771 1087771 << This is a bns number to decode a byte.
1087654 1087651 ...........E
1087650 1087643
1087682 1087675
1087650 1087643
1087628 1087627
1087628 1087627
1087628 1087627
1087654 1087651
1087774 1087771
1087772 1087771
1087764 1087763
1087794 1087787
1087628 1087627
1087628 1087627
1087635 1087635
1087692 1087691
1087628 1087627
// End picture decode file.

Now in my next program using predictable number sequences.
I can do this.

// Begin program outline algorithm.
Predictable number sequence
BNS number to decode a byte
Predictable number sequence
BNS number to decode a byte
Predictable number sequence
BNS number to decode a byte
Predictable number sequence
BNS number to decode a byte
Predictable number sequence
BNS number to decode a byte
Predictable number sequence
BNS number to decode a byte
Predictable number sequence
BNS number to decode a byte
Predictable number sequence
BNS number to decode a byte
// End of program outline algorithm.

At the end of the program I would have only one V and one R. This BNS number could contain the entire library of congress. It could contain all of mankind's information and knowledge and still be no bigger than two ten digit numbers.

As I said in a recent post this is the perfect system for a spy to get stolen information out of a foreign country undetected for all he or she would have to do is code their files to a BNS number like this then memorize the number and destroy the evidence. 

My guess the recent attempted hit on me was an attempt to keep me from finishing my work and bring it to the public. Their first hit against me was a fuck up. ONE THAT THEY WILL REGRET BECAUSE NOW I WON'T STOP AT GIVING AWAY MY TIME TRAVEL SECRETS. THEY FUCKED UP!!! AGAIN!!!!!!

As long as I can type and breath and move I will continue to bring my time travel temporal mathematics work to the public. Well I need to get back to work. Talk to everyone later.

---------------------------------------------------------------------------------------------------

March 25th, 2017

After the recent attempted hit on myself I am forced to make some some life changes. For now my late night early morning programming has stopped which temporarily slows my work. When I can get back into a normal routine I will resume the work where I left off. This blog and my website will stay open and my programs should still be at sourceforge. Untill later .......
-----------------------------------------------------------------------------------
-----------------
 
April 6, 2017 11:57 PM
 
After my hit I took a couple of weeks off. I have documented where I left off in my work so if or when I get ready I can continue where I left off. My downloads at sourceforge have slowed way down. Which I can't blame anyone for that my software is hard as hell to use even for a professional hacker such as Aaron Hiniker (if that is his real name) of Bedford, MA (If that is his real residence). With these government agent shit you never really know who these mother fuckers really are.
 
So, I am doing some new things and taking my life in a new direction. Even though I am no longer programming on a daily bases from time to time I intend to work here and there on my public open source code and make a new post once in a while.
---------------------------------------------------------------------

Friday, February 24, 2017

GOING THROUGH MY CODE WITH A FINE COMB.

Copyright (C) 2017 HTTP://time-travel.institute (COSMO DOES NOT LIVE HERE!!! BAAAAAHAHAHAHAA!!!)

02/24/2017 01:25 PM

Early this morning I spent hours testing out and going through my base conversion time scanner. I started upgrading it's code. I'm am testing each C++ instruction by hand thus improving it and making it better. The base conversion time scanner works with numbers in a numerical base where the base = (256^buffersize) + 1
filesize=(buffersize×howmanynumbers) in the text file. 

A base conversion number has to be decoded to a binary file from a text file but the bcscanner generates theses text files to be decoded. And the good news is theses text files can be busted up and decoded in parallel then rejoined using Linux split and cat commands and bash scripts. I love my Linux dearly.

Computer time travel gets easier every day. To me computer time travel is like breathing air. I've been doing it for so long that it has become automatic.  When I was told by Ray Hudson at Above Top Secret I could not time travel with binary files I fell out of my chair onto the floor rolling in historical laughter. Ray Hudson is comody relief for me. But I will stop here or I will start having a laughing fit. Then I will spend the rest of my post talking about him and laughing at him.

Any way I got to get my base conversion time scanner finely tuned then write a C++ program to automate it for computer time travel. Then get that uploaded to my open source time travel project.
For base conversion you need a destination file and a list of difference files to generate target  files to decode. I am going to put a add and subtract program for increasing or decreasing the destination file but right now the bcscanner can do that so Im in no hurry.

The difference files can be generated from /dev/random or random.org. I have some third party software to help out /dev/random in time travel project under tools random numbers. /dev/random can be used with pipe commands to convert it's output to a numerical base in a text file. For those who can't do that use my base conversion code program to convert the binary to text with numbers. Just make sure to use the same buffer size in the BC scanner.

I am always working on different parts of my time  code. My private code that is locked away now I chipped away at it for year till it was the best there ever was. It is a prize Ray Hudson, Darby Phillips, and Pamela will never see.

But I will keep chipping away at the public version of my code.

You can make check-sums out of base conversion numbers and create files and run gnuplot to create regression lines to map out where known files are as numbers. The files will slowly change as you go up and down the regression line. As the regression line is changed and moved up and down you can see the changes in the files and even in their file formats.

I have programs to code to known files to base conversion numbers. I also have a decode program. Those programs work just fine I am completely done with them.

If people could watch me computer time travel in private I would seem like a powerful magician performing my magic. When I go there that is my private place. That is personal for me.

Give a man a fish he eats for a day. Teach him to fish he eats for a life time. I will teach but my fish belong to me. I'm not giving my fish away. Metaphorically speaking this is how I feel about it. You got to get your own fish. I'm just offering the fishing pole.

I have to tell Ray Hudson, Darby Phillips, and Pamela my game is on like donkey Kong. I am the master of my game. And I intend to keep running the score board up in my favor. I will never stop.
The time travel war may be over but I have only just begun. I am throwing slam dunks and running up the score board. I can't be stopped. I won't be stopped. The score board will climb in my favor.
------------------------------------------------------------------------------------------------------
02/24/2017 10:22 PM




On using regression lines in my private code I used entire computer files as numbers in a numerical base to represent my regression lines and my programs worked with entire computer files mathematically adding, subtracting, multiplying, and dividing and what ever else I needed to do with computer files as a number in a numerical base. Even squaring the files as numbers in a numerical base and getting square roots of the files as numbers in a numerical base. 

Which is a lot of work I might add. It took me years to write and build up my private proprietary computer time travel code. Now I write a public open source version of my time travel computer code for the public so that the "Conspiracy Against Time Travel" more commonly known as the N.S.A. and the C.I.A. don't have to hack me any more. 

They can download what I give to the world. And if they are going to steal it from me like they tried to do then I am going to make sure that everyone else in the entire fucking world has it too not just them. So, that was their fault this went open source. The government has no body else to blame but themselves. They got caught putting their hand in the cookie jar so I slapped it by making it open source. Now everyone can eat out of the cookie jar not just them.

Now back on topic....

But, it is possible to use a naming scheme. I did that too in my older code. Using check-sums to represent the files it is possible to do the math with the check-sums of the files then use GNUPLOT to find what you need to know. 

Then go back and apply a naming scheme to the files you have. 

Files above the regression line would use 1A, 2A, 3A or use coordinate names 03872.92374A. This would be like a X(name).Y(name)A(for above the regression line). Something like this.

Computer files below the regression line use B prefix or extension instead of A. 

The files that represent the regression line itself known as the destination files name them with a R prefix or extension.

Using regression lines with my software helps pinpoint how to build your destination files and how much to add or subtract from the destination files to move the files up and down the regression line commonly known as the RISE/RUN OR RISE OVER RUN.

Doing this will help others pinpoint computer time travel media files that you want out of space-time. Any computer in the world in the past, present, future, or alternate realities can be hacked this way without a connection to the internet, phone, or another computer. In the privacy and security of your own home. Your ISP can't track you. The government can't track you. There is no security to go through. No body knows what you have except you. I would still recommend encrypting the shit out of it. You can roll your files as a counter to encrypt them then roll them back as a counter to decrypt them. With this method there is no back door into your encryption for the N.S.A. or the C.I.A. to exploit.

For wiping your hard drive use the DD Linux command with /dev/random. You can set the bytes per second and control how fast the operation works. Before using random use all 0,s first. Then use all FF. Then use random. You also can set a script up and leave it running when your not using the computer. When you come back your drive will be clean. You can wipe your drive even as you work.

For those just getting here I use a destination file then I add and subtract files called the difference files from the destination file to find the target files around my destination files to make a long story short. The target files are the prizes to be won from this operation. 

Computer files are recordings of space-time. It is possible to create a computer file with a recording of the Jurassic or create a computer file from the far far future. This is why I call this computer time travel. It is also a method of hacking other computers. And can be used for very advanced things like temporal parallel processing and temporal communication.

If A in the past and B in the future know the check-sum range of their messages to each other through space time then A and B can create all the messages between the checks-sum range and read them. Even though A is in the past and B is in the future they can use my methods of computer time travel to read their messages to each other through space-time. Even including file attachments such as videos or what ever they like. A and B can actually use this as a method of temporal communication to talk to each other and share files through space-time.

Einstein said all space-time exist at the same time. So all computer files exist at the same time. All one has to do is map all the computer files in space-time as numbers then convert those numbers to binary and write them to the hard drive thus DOWNLOADING FROM SPACE-TIME!!!!!!!!!!!!!!!!!!!!!!!!!!
-------------------------------------------------------------------------------------
02/25/2017 03:20 AM

Well I am pretty happy with what I have on my time travel computer code at http://sourceforge.net/projects/timetravelproject/

Anyone is welcome to make what ever improvements they want. Please scan the files you reconstruct from space-time before opening them up. In the folders marked old code a lot of that code is still good though its buffer may not work faster than 1 byte.

N.S.A. and C.I.A. your welcome to make what ever improvements you want in the code too for your classified time travel work. I hope you got what you wanted from me. But your still not getting my private code. You can have my open source code all you want though. And I am not going to apologize for giving your agents hell. They deserved everything I said to them and about them.

My video card on my development machine is starting to go out. It is the only Linux laptop that I have. So, when that video card finally goes it will stop my development dead in its tracks until I buy another Linux laptop. I am going to back it up as soon as I can hopefully before that video card goes. So for now I am going to stop using it at least until I get it backed up. The machine is at least 10 years old so my laptop has already lasted longer than expected.

Everyone take care and HAPPY TIME-HACKING.

--------------------------------------------------------------------------------------------------------------------------

02/25/2017 08:50 PM

I have the conspiracy against time travel blocking my internet tonight. As usual I switched to my backup hotspot. As usual I really don't give a s***. Tonight if I can keep my laptop up because my video card is going bad I'm going to try to write a main program to run the rest of my programs. This will make it easier for people to use my software. My programs I have now have to be run from the command line with parameters but this program will be a menu-driven program. It will question the user about what they want to do and it will run the programs. When it's done if all went well the user will have time travel computer media sitting on their hard drive. Well I need to get around I'll talk to everyone later goodbye.

02/25/2017 10:18 PM

I'm back. I have had several request from real people not C.I.A. or N.S.A. agents (They are like cock-roaches on the internet. They are everywhere.) for a easy way to run my time travel software. So, I am going to make it as easy as calling Ray Hudson(Does not go by RainMan anymore), Darby Phillips (OLD TROLL), and Pamela (my web hoochie. She changed her name again that she uses on the internet AGAIN!) STUPID. I am going to make it easier than calling those guys STUPID!!!

BAAAAAAAAAHAHAHAHAHAHAH.

Its the same thing I promised in my blog many many post back. I did a outline and posted it. This will be much different than my previous outline. I am going to make a bin directory and write a bash script that will make all the targets. The program will be in the very top directory. The rest of the directories I plan for now to leave as is. I have played with my code enough so it is about time to make it easier. 

This will also help me find any new bugs I have may not caught. But mainly it will be so much easier to run my open source time travel code.

I am going to put in this code. (That will run my programs.)

1. Random computer travel.
2. Base Conversion computer time travel.
3. Plain binary computer time travel.
? May add other stuff here later.
4. AI robot train
5. AI robot run
6. File Format robot (You have to edit the file format reject list. Default will be set to data files.)

I will have to put in a way for the user to create a destination file or provide his own. And I will have to put in a way for the user to add or subtract from his destination file.

In my very first time travel computer program I had a menu driving c++ program. That program is long buried deep into my heavily encrypted private code that the C.I.A. and the N.S.A. attempted to steal from me. But I have posted screen shots of it in my blog for years. 

At the government run 
http://timetravelinstitute.com 

now 

http://timetravel.institute 
(government cock-roach federal agent infested forum who hack their users and look at their kids on their web-cams) 

Between 2008 and 2010 when I first got my newer time travel programs up and running I posted screen shots at that govenment agent infested forum showing all the thousands and thousands of computer time travel media files I had on my hard drive and I talked about my success. Boy I was happy that day. At that time I did not know it was a C.I.A. & N.S.A. honey trap web-sight.

I have long lost those photos and Ray Hudson deleted my thread so that is long gone. I wished I had those photos because that was a date in computer time travel history that should of not being forgotten about. 

But, thanks to the "Conspiracy Against Time Travel" it was. I think at that point is when Ray Hudson and Darby Phillips decided to start double down tag teaming on me so I would shut up and go away and stop talking about computer time travel. 

That was when they tried to force me to go away like they forced John Titor to go away. But I never went away. I think it is possible that someday John Titor may show back up. Maybe. If they didn't kill him like the "Conspiracy Against Time Travel" have threaten to do to me at Craig's list and at Above Top Secret. Ray Hudson at Above Top Secret has told me "My end is Nigh". At Craig's list Aaron Hiniker told me I would have a "Accident". They can take their threats and shove them up their ASSHOLES for all I care.

Anyway after that experience in 2008-2010 I got my own forum and web-sight and blog. Nothing changed except the IP address and the domain.

To Ray Hudson, Darby Phillips, and Pamela's horror.

BAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHA!!!!!!!!!

And then they started attacking my web-sight and forum on a daily bases. They prevented me from getting users to my forum. No matter. 

Its less work for me and my admin. AND I HAVE MORE TIME TO BLOG AND PROGRAM!!!! 

SEE HOW STUPID THEY ARE!!! 

BAAAAAAAAAAAAHAHAHAHAHAHA!!!!

GOD THEM MOTHER FUCKERS( talking to the "Conspiracy Against Time Travel") 

ARE PURELY FUCKING STUPID!!!!!

BAAAAAAAAAAHAHAHAHAHAHAHAHAHAHA!!!!!!!!!!!

Yeah they let me do the one thing they are trying to stop me from doing rather than let me run my forum. 

Yeah don't let me spend all my time running a forum instead have me write open source computer time travel code and post it on the internet for the world then brag about it on my blog.

You see I could be running my forum right now but instead I am open source programming time travel software the C.I.A. and the N.S.A. DON'T WANT THE WORLD TO HAVE AND BRAGGING ABOUT IT ON MY BLOG. AND HERE IS A UPDATE ON THE LAST 7 DAYS OF MY TRAFFIC.



HERE IS HOW THE WORLD'S COMPUTER TIME MACHINE IS COMING ALONG!!!!!!



DO THESE GUYS EVER THINK BEFORE THEY DO ANYTHING? 

I HAVE NOT SEEN ANY INDICATION THEY CAN THINK!!!!! THIS IS YOUR USA GOVERNMENT AND YOUR TAX DOLLARS AT WORK!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

BAAAAAAAAAAAAAAAAAAAAAAAHAHAHAHAHAHA!!!!

So my web-sight being up that is all that matters. And if they take it down I will just put it back up again. NO BIG DEAL.

So this new program I am writing will be is a c++ program that will run my other programs there won't be a whole lot to it. It will ask the user a bunch of questions then make a bash script. The user will then run the script. Then the user can go back into the program and run the robots or train the robots. That is it. 

I have some of my laptop (Its going bad) backed up but not the rest. So, I am going to get that backed up right quick, then get a cup or two of coffee, then start on that program. I am on a internet connection the "Conspiracy Against Time Travel" can't get to this late evening early morning.

When my video card starts acting up I shut my laptop down and let it cool down then reboot it. I think it might be getting over heated. That seems to temporally fix the problem. I think this thing might hold out a little longer. Hopefully long enough to get this next program written. Ok, off to write that program.
------------------------------------------------------------------------------------------------

02/26/2017 03:43 AM

(TimeTravel.cpp still needs some more debugging before it is ran. I am working on it.)

I only have about 45 minutes left. I got most of that program written but I still have to test it out and finish it up. It will allow someone stupid Like Ray Hudson, Darby Phillips, or Pamela to run my computer time travel code.

BAAAAAAAAAHAHAHAHAHAHAHAHAHAH!!!!!!!!!!!!!!

All that have to do is ./install.sh and ./TimeTravel AND THEY ARE IN FUCKING COMPUTER TIME TRAVEL HEAVEN!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

download at http://sourceforge.net/projects/timetravelproject 

I AM STILL FINISHING IT UP!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
BUT IT IS GOING TO BE GOOD!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Man it just keeps getting worse and worse for Ray Hudson, Darby Phillips, and Pamela.

SLAM DUNK FOR REACTOR1967. 

AGAIN!!!!!!!!!!!!!!!!!!!!!!!

BAAAAAAAAAAAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAH!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!


BAAAAAAAAAAAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAH!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

BAAAAAAAAAAAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAH!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Oh god my ribs are hurting now. I got tears in my eyes. I think I will go home and computer time travel and have an adult beverage and laugh some more at the "Conspiracy Against Time Travel".

---------------------------------------------------------------------------------------------
02/27/2017 03:14 AM

The "Ray Hudson" version of my time travel computer code is ready. It is meant for people who are not computer illiterate putting it nicely. 

Its at http://sourceforge.net/projects/timetravelproject

As usual I am running my own code and working to find any bugs out I can find and fix them. And I found some more while writing the "Easy Application" as someone asked me to do. 

I have to improve how I add or subtract from the destination file that will be next. Though right now I use the time scanners to add or subtract from the destination file I will have to take the time scanners and alter them for that purpose and save it as a second program. From there I will keep looking for ways to improve this and again fix stuff as I find it.

My Easy Application is a good way to get a novice off the ground time hacking and acts as a tutorial too if they read the code.

Just run ./install.sh then run ./TimeTravel and follow the menu and your good to go.

I got about an hour left. I am going to go play with my code and get it uploaded to github and drink some more coffee.

Everyone enjoy. Happy Time-Hacking!!!!!!

---------------------------------------------------------------------------------------------------
02/28/2017 01:06 AM 

I got two time scanners now in the binary and base conversion programs. The first time scanner stops at the end of the difference file. The second one stops at the end of the destination file. The second one is the one that increases or decreases the destination file. The first one is the one for processing the difference files. If no one understands don't worry about it.

The Easy Application called timetravel.cpp with a install script install.sh runs just fine. On my computer I got entropy constantly going into my /dev/random so I can process my time travel media files. 

My next step is to continue running everything and finding any more bugs. When I feel I got them out I will update some of my older code and bring it into the project.

Right now TimeTravel.cpp creates way too many files. So, until I get that looked at I advise people to start small and experiment with it then work your way up to bigger files and bigger files.

On setting the buffer size the buffer size should divide into the file size being used evenly.  As things come along I plan more YouTuBe videos on computer time travel.