Showing posts with label check sum hacking. Show all posts
Showing posts with label check sum hacking. Show all posts

Thursday, July 13, 2017

C.I.A. KILLED MARILYN MONROE AND JFK TO COVER UP UFO'S.

Copyright(C) 2017 Time-Travel.Institute

07/13/2017 6:06PM
From time to time I keep up with UFO news. One day I was searching for articles and I came across a article where a UFO researcher had uncovered documented evidence that the C.I.A. killed Marilyn Monroe on August 5th, 1962 and killed J.F.K. on November 22, 1963 because both were planning to meet with the media to release UFO classified secrets.

When J.F.K. was sleeping with Marilyn Monroe he disclosed to Marilyn what he knew about Roswell and UFO's. Because the C.I.A. was monitoring Marilyn because she was fucking the president for potential classified information breaches. To the C.I.A's horror when J.F.K. and his family broke off relations with Marilyn she was pissed. She planned her revenge against J.F.K. by planning to release the UFO secrets J.F.K. had disclosed to her in pillow talk after fucking.

So, the C.I.A. similar to how they invaded my home except I lived they sent in a covert operation into Marilyn's home to drug her then giving her a drug overdose. So, Marilyn Monroe died August 5th, 1962 OF A CIA ASSASSINATION.

Several months later J.F.K. himself made plans to disclose the U.S.A. UFO secrets to the mass public. So, the C.I.A. made elaborate plans to assassinate POTUS.

So on November 22, 1963 J.F.K. died by a C.I.A. assassination like his former mistress months before him. 

In YouTube videos on the internet people have testified that C.I.A. officers told them to shut up about what they know about U.F.O.'s. The C.I.A. even went as far as to threaten the lives of U.F.O. witnesses.

The article I read appeared very credible and the person making the claim also claimed to have documented classified evidence of this.
This is why now days Presidents are not allowed U.F.O. secrets anymore. Because of the J.F.K. and Marilyn Monroe assassinations. 

And having experienced first hand how easily the C.I.A. entered my home and drugged and poisoned me to make copies of all my computer media to attempt to finally get down to the meat of my computer time travel. At least they did not drug overdose me or hang me up in my closet or bathroom to make my death look like a suicide. 

Maybe they don't do that anymore I don't know. Maybe my hit was a C.I.A. fuck up. Again I don't know. But what I do know if the C.I.A. wants you or what you have in your home. They will come for it or you. Over the past 9 years I have experienced first hand what the C.I.A. does and will do.

So, Ray Hudson, Darby Phillips, and Pamela (C.I.A. Agents) have the upper hand. They have resources I don't have. Capabilities I don't have.

Moving on the reason the C.I.A. will never break all my encryption is this. Here is how I encrypted some of my most top secret computer time travel files.

A computer file looks like this
2,1,255, 127, 138, 253 -- Just and example in base 256.

My encryption keys look like this.
+127, +18, -154,+138,-255

You see this is a lock combination.
So 2 + 127 = 128
So 255 + 18 = 17
So 127 - 154 = 27

The bytes are rolled up or rolled down. Now I can use several layers of encryption each layer having its own combination.

Now in a computer file 156 million bytes long a single combination is 156 million bytes long. Take that with say a 1000 layers of encryption and

THERE IS NO WAY IN HELL THE C.I.A. WILL EVER DECRYPT MY TIME TRAVEL COMPUTER MEDIA FILES!!!

Even if they found a valid file IT MIGHT NOT BE MY FILE BUT A ALTERNATE TIME TRAVEL COMPUTER MEDIA FILE!!!!!

SO THEY CAN'T TELL IF MY SHIT IS UN-ENCRYPTED OR NOT. ONLY WITH MY KEY WHICH THEY WILL NEVER GET CAN MY FILES BE UN-ENCRYPTED!!!

BAAAAAAAAAHAHAHAHAHAHAHAHAHAHAHAHA!!!!!!!

By the way this encryption is also a way to find computer time travel files. Because if you take a destination file and hit that destination files with combinations +roll or -roll then one of those combinations will roll the destination file to a valid time travel computer media file. I call those output files source files.

One of my past experiments was taking a computer file and subtracting it from other valid computer files to get valid combinations to roll that file to other computer files. THEN I TRAINED A NEURAL NET TO RECOGNIZE GOOD OR BAD COMBINATIONS!!!! THEN I USED A TRUE RANDOM NUMBER GENERATOR TO SEND THE A.I. COMBINATIONS. WHEN THE A.I. FOUND A GOOD COMBINATION THAT TIME TRAVEL COMPUTER MEDIA FILE WAS CONSTRUCTED. 

ANOTHER ONE OF MY MANY MANY WAYS TO CONSTRUCT TIME TRAVEL COMPUTER MEDIA FILES!!! WHICH THE C.I.A. DOES NOT WANT THE PUBLIC TO KNOW ABOUT. FUCK YOU C.I.A. FUCK YOU ALL TO HELL!!!

Fuck Pamela
Fuck Ray Hudson
Fuck Darby Phillips
FUCK THEM ALL.

Moving on. I think the reason Pamela from the Titor story joined the C.I.A. is because after high school like her mother, grand mother, and great great grand mother before her she went to work as a lot lizard at the local truck stop to work her way through college.

She would go up to truck drivers and say "Do you want some commercial love?". That is how she learned to play forum bait so well.

So, when Pamela graduated college she found the C.I.A. Now, Pamela thought the C.I.A. stood for

C.I.A = Cum, In, Ass. So she thought great. I can use my college degree and keep my old job too.

BAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAHAHAH...

Some one please tell Pamela what the C.I.A. really stands for.
C.I.A. = Clueless, Idiots, Assholes

BAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHA!!!!!!!

Oh I am having fun finishing this post up. 

So, that is why Pamela works so great with Ray Hudson and Darby Phillips. Those guys are all about "That commercial love". Ray loves going to Nevada and Darby so loves his pity fucks from Pamela. 

Hey Pamela I got a song for you baby doll.

Singing
"You never close your eyes anymore when I kiss your lips
And there's no tenderness like before in your fingertips
You're trying hard not to show it
But baby, baby I know it
You lost that Commercial lovin' feelin'
Whoa, that Commercial lovin' feelin'
You lost that Commercial lovin' feelin'
Now it's gone, gone, gone, woh
Now there's no welcome look in your eyes when I reach for you
And now you're starting to criticize little things I do
It makes me just feel like crying
'Cause baby, something beautiful's dyin'
You lost that Commercial lovin' feelin'
Whoa, that Commercial lovin' feelin'
You lost that Commercial lovin' feelin'
Now it's gone, gone, gone, woh
Baby, baby, I'd get down on my knees for you
If you would only love me like you used to do, yeah
We had a love, a love, a love you don't find everyday
So don't,…"

End of singing.

BAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHA!!!!!!!
BAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHA!!!!!!!
BAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHA!!!!!!!
BAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHA!!!!!!!
BAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHA!!!!!!!

Oh I am laughing too hard. I had better go. Catch you around "Conspiracy Against Time Travel".

Reactor1967 over and out.
--------------------------------------------------------------------------------------------------

07/18/2017
6:30PM

Well the Conspiracy Against Time Travel will find it rather difficult if not impossible to hack me any more. Because, I no longer have DSL or Cable internet.

BAAAAAAAHAHAHAHAHAHAHAHAHAH!!!!!!!!!!!!!!!!!!!!!!!!

My family and I know just use our pay as you go Hot Spots for our computers. I saw it on a news clip about the C.I.A. hacking all of America and it was recommended to use a wireless hotspot. Now, that probably won't stop them completely but it can slow them down. The C.I.A. also hacks phones and taps wireless phone conversations and also can make a phone a listening device.

But it is harder than hacking DLS or cable. I can always factory reset my phone and get another one too. And I can change out sim cards. And, I can continue to use the public library and starbucks.

and if they do hack my phone so fucking what. I don't do my programming on my phone. I don't keep time travel media on my phone. I don't keep imporant or private files on my phone. So fucking what. Well I am out of time. Catch everyone later.

Reactor1967 over and out.
-----------------------------------------------------------------------------------------
08/05/2017 03:13 AM

Well after a long time I set my PC's up for constant use again. I don't have cable or DSL anymore but I have around 4 different wireless hot spots I use for my internet know. The computer I am writing this on was hacked (again) a while back and they even sent me emails telling me what was on my hard drive. They like doing that shit. They meaning Ray Hudson, Darby Phillips, and Pamela. So it is possible they are viewing my computer screen even as I write this post.

But, moving on the topic here to day is this you tube video.



This is about an event that was one of my earliest time travel media finds in my work. In that video a wall of water is approaching California. And for years I have been trying to pin down what that event was. It is possible it is the event foretasted in this you tube video. I told Darby Phillips about it at his now failed web sight. As usual he didn't give a shit. The CIA does not want the masses to have time travel. Especially computer time travel.

So, I think my time travel media I found long long ago is right on the mark. Man I am glad I don't live in California or organ or Washington. I have been there many many times though. Its beautiful up there.

And Yellow Stone national park according to scientist is due for a super volcano explosion. That one event will keep American farmers from growing crops for a while. It will shut down transportation across the USA. Markets across the world will collapse. Mother nature is preparing to give man kind a good ass fucking.

And, from watching the news every day I can see world war III is fast approaching. hundreds of thousands if not millions or billions will die when that shit gets here.

And if natural disasters and WORLD WAR III was not enough in the next 75 to 100 years I saw on the news about scientist forecasting East Asia, Africa, and the Middle East parts of that becoming uninhabitable for humans and most animals. I doubt it will kill the fucking cock roaches though. Russia and Canada will be the destination of choice once global warming really sets in. It will be Russia's chance to be the most powerful nation on earth because crops are going to collapse. 

Then nations across the world can. PLACE SANCTIONS ON THE USA!!! Yep, don't think that Russia won't forget what the USA did to it. When America looses its place in the world other nations can cut America's dick off and force feed it it's own dick. 

Again Transportation will collapse. Much of the world markets will collapse. Countries like Russia and Canada will be the most survivable.   

And again IF ALL THIS IS NOT ENOUGH I saw on the news where scientist have said men's sperm count is dropping globally from mankind polluting our environment and that man kind MAY BE HEADED FOR EXTINCTION!!!! 

Shit. Everyone is going to fucking die!!!

With all this shit coming upon mankind I have and will come full circle with watching much of my time travel computer media and the future. All this shit is coming people. I doubt much of the world is prepared for it.

And with that note I have been wanting to get back to work on my programming but I have not had the time. I have been working my ass off and working on my day trading. I have not had the time to program or write. I hope to have time again in the future. So for everyone waiting on that please be patient.

----------------------------------------------------------------------------------------

08/05/2017 2:09 PM

Will today I am on my windows computer. No malware detected. No virus's found. So, this is a first for me in many years since Aaron Hinker of http://timetravel.institute formally http://timetravelinstitute.com started hacking me. Since I learned a while back that it is a CIA web sight used to spy on the internet I have had no interest in going back there. In fact since I learned the CIA as well as the FBI has invested most if not all forums and chat rooms on the internet my interest in going to forums and chat rooms has waned. 

I still like to post though about my computer time travel just to piss off Ray Hudson, Darby Phillips, and Pamela. Pissing off and pissing on the CIA. They sure don't like me talking about computer time travel on the internet. Well I got one more thing to piss them off. A while back I had a Asian guy show up at my door offering to buy my unreleased computer time travel programs.

I don't know who he was, where he was from, or anything about him. But, since my  home was raided a while back in that covert operation which sent me to the hospital I went ahead and told the man to come back in a few days. He gave me a external hard drive. I de-crypted and copied what I could for him. It took me a while. A long while. A few days later he came back with my money and I gave him is hard drive back.

So my private time travel programs is out there now. The genie is out of the bag. I am still holding onto my private programs. The only reason I gave them a way is because he paid me for them. I am not sure if I will be making any more of those sales. Its not the way I like doing business.

Ray, Darby, and Pamela have tried really really hard to keep me off the internet and keep me from spreading my computer time travel. When I get chances to fuck them over I sometimes take it.

Since I got my desktop computers again when I get time I may start running some more projects. Right now I work all the time. I am trying to cut down the amount of time I work so I can get back to my projects. Well that is all for today.

Reactor1967 over and out.

Sunday, November 6, 2016

USING THE SHANNON EQUATION WITH TIME HACKING

Copyright (C) 2016 http://time-travel.institute

I am keeping my code at Sourceforge under Time Travel Project


For all my projects at Sourceforge. GO HERE.

For my YouTube channel and to watch me encode files to check sums and decode files from check sums giving Ray Hudson his proof of check sum hacking and the public their proof of check sum hacking then go here. My You Tube Channel proving check sum hacking is real!!!!

Note: Still debugging my code I posted. The concepts of my counter algorithms work though. I am removing mersenne twister from my code. 

It would be so easy to upload my private code but I am rewriting everything from scratch for the public version of my stuff. I am doing that for many reasons but the main one is - I don't won't to give Ray Hudson, Darby Phillips my original time travel code because they have tried so hard to hack me and steal it from me. I will deny them my original code. I spent 8 years writing that code and they can't have it. EVER!!!

But, I will give the public their own code. Oh no Pamela, "I made my blog longer again". A joke between me and Pamela. She bitched at me for having a long blog. Darby Phillips use to bitch at me for writing in all caps. So, much of this blog is in caps as well as much of this blog is getting longer.

 Hahahah.... I never was the one to respect authority. Constructive criticism is ok, but I don't always follow that either. I am my own person. Back on topic.

I have to go back and rewrite the random number generator. I use it to generate a random speed to add or subtract from the counter. I also have a linear mode where the counter speeds up. And no Ray it does not stop the process from working when using random numbers. I use it to control the speed of the counter which is added to or subtracted from the counter. The counter itself does not use random numbers except sometimes on initialization when I am taking it to a specific weak check sum . 

The counter itself is added to or subtracted from I can even add bytes and subtract bytes at the same time. I call this tweaking the counter to get it to its final target after the large rolls are done.

You see Ray Hudson. With a throttled binary counter. A destination, and a target. THERE IS NOTHING I CAN'T DECRYPT OR ENCRYPT!!! 

Because the binary counter is throttled "THE SIZE OF THE FILE DOES NOT MATTER"!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

THERE IS NO INFORMATION I CAN'T GET IF I KNOW MY TARGET OR CAN MATHEMATICALLY CALCULATE MY TARGET!!!

You see all them post at the former CIA ran http://timetravelinstitute.com aka timetravel.institute were "TRUE".
You loose Ray Hudson.

I am going to put the computer code to time travel with computers out their for the public to download. After that it is up to the public to use the code.

Here is the current code for my random number generator. I am using a combination of my own code with the rand() function.

Experimenting with a new random number generator for time travel project.

here is the code I am using to experiment with random numbers. I'm using my own code with c++ rand() function.

#include cstdlib
#include iostream
#include stdlib.h
#include fstream
#include sstream
#include string 
#include cmath
#include ctime
#include cstdio
#include iostream

using namespace std;

// Start main   
int main (int argc, char *argv[])


// r=(a*k+c) mod of m
// a = 3
// c = 2361
// m = 21435
// k = seedkey(1)

// r = (a * k + c) % m // in c++
// k = r
// srand (time(NULL));
// cout << (rand() % 100 + 1) << " is the number...";
// http://www.cplusplus.com/forum/beginner/29699/
// http://www.cplusplus.com/reference/cstdlib/srand/

// declare variables
     
     int a = 3;
     int c = 2361;
     int m = 21435;
     int k = 0;
     int k2 = 0;
     int r = 0;
     char pause;
     int count = 1000;
     int test = 255;
     cout << "Please enter your password" << "\n";
     cin >> k;
     do
     {
          r = (a * k + c) % m; 
//          k2 = r;
          do
          {
               if (int(r/10) < 256)
               {
                    r = int(r/10);
                    break;
               }
               r = int(r/10);
          } while (a != -1);
//          cout << r << "\n";  
          if (r == test)
          {
               cout << r << " " << test << "\n";
               test--;
               if (test == -1)
               {
                    test = 255;
               }    
               // cin >> pause;
          }
//          k = k2;
          // srand((unsigned)time(NULL));
          k = (rand() % 21435);
     } while (a != -1);
      
     
   // exit program
    exit(0);


}

I just need numbers out of it from 0 to 255 for the speed control. Next I will redo my weight section. So, this might set me back a little bit getting my counter up. I am also going to look at upgrading the linear section of the speed control.

Also, in my program I used a buffer size of one. Later the code will need to be upgraded to a larger buffer size to decode programs going into Mega byte range.
And, I will have to upgrade the strong check sum. The strong check sum will have to be calculated by the program by hand and written to memory or file so no precision is lost. Right now the program is mainly a way to teach people here at this blog to time hack.

Later I will move from teaching the public to time hack to having the public actually do it.  I was not planning giving my private code to  public but I found I will have to program some elements from my private code into my public code to bring it up to par. Moving on.......

This is a old topic for me but it may not be for the general public so I thought I would inject it into my blog. My algorithm in my previous post makes it possible to take a large computer file and only know its strong check sum. Then using that strong check sum decrypt the strong check sum back to a computer file.

Now, that works for using strong check sums to decrypt a computer file out of space-time. But, what if you just want to look for generalized time travel computer media or even decrypt a known encrypted file.

All that is needed is to take my algorithm in my previous post. Throw out the weak check sum. Throw out the strong check sum.

Replace those check sums with Target Entropy and Destination Entropy.

Now, My algorithm takes a counter loaded with its destination entropy (where the file is now). And will roll that file to the Target Entropy (where the file is going).

The algorithm in my equation rolls the counter and if the counter is closer to the target entropy the counter is kept. If it is not then the previous counter is loaded.

Why is this important. Because in my counter I add or subtract from it with large or small numbers to roll the counter forward or backwards or somewhere in between to get the counter to its target state. The counter is a throttled counter. That means it has the counter and the speed. The speed is a number that is added or subtracted from the counter. 

This speed can be as small as 1 byte or as large as the file size of the counter itself. Because this speed can be small or large it can VERY QUICKLY DECRYPT A LARGE FILE!!!!! It can very quickly roll a strong checksum to a computer file or it can take a known encrypted computer file and quickly decrypt it.

Now, if you reverse the target and the destination then this becomes an ENCRYPTION PROGRAM AND INSTEAD OF DECRYPTING IT. IT CAN ENCRYPT INFORMATION INSTEAD!!!!!

With the Shannon equation a file with a 0 entropy value can be rolled to computer file with a 8 entropy value. But, for the purpose of this blog WE WANT TO DECRYPT!!!

So, I won't be reversing the destination and target. But, I have a public version of my code out so the public can knock themselves out.

The process of decrypting can be used to search for time travel computer media files or to decrypt a known encrypted file. And again the Burris Algorithm can be used for encryption if the target and destination are reversed.

With my methods this is a powerful way to uncover information or to encrypt information and cover it up. Whether that be out of space-time or not.

My methods are mainly designed to search space-time for time travel computer media but because they are so powerful it can be used for general cryptography.

With the Shannon equation files ending near 0 are decrypted. Files with the score of 8 are encrypted.

Some of my time travel cryptography computer code is in my previous post. It is still being debugged but my algorithm is there in computer code form. Below is more examples of my meaning.

Where we want to go     |||   Where we are now
Target strong checksum |||  Destination strong checksum
          Or                                                    Or
Target entropy              |||     Destination entropy
                             
Here is how my counter works for time hacking, check sum hacking, or for general cryptography.

1. Get Diff1 = Target - Destination
2. Load counter speed
3. Add or subtract speed from counter
4. if Target = Destination End program file constructed
5. Get Diff2 = Target - Destination
6. if Diff2 < Diff1 is also less than Diff3 then Diff3 = Target - Distination (Diff3 starts out with the full value of target - destination before the program runs) then keep the counter.
7. if Diff2 > Diff1 is greater than Diff3 then reload the counters previous state before the roll. 
8. Goto step 1

Now, I have my program robots look at my files when I do my time hacking decryption by looking at the media file format with my private proprietary time travel code. That would mean looking for a video format, text format, audio format, or special files. Then after my program bots have verified the file format they look at the information contained within the file. 

But, the Shannon equation could be used to make the process faster and more simple. The final step is having a human look at the file. THIS IS VERY TIME CONSUMING BUT NECESSARY. I have wasted many a day looking at files for time travel media. But sometimes I hit pay day and it was worth it.

But in my public open source code in "Time Travel Project" I am trying to keep things simple. So, when I finish my public counter, when I finish generating strong check sums of time travel computer media files, I will put in Shannon's equation as a simple bot to exam time travel computer media files. Later I may follow that up with more complex application bots.

Right now my only means of communicating with the public is with this blog or with printing books. The CIA through Ray Hudson and Darby Phillips and Pamela from the Titor story. She is a CIA agent too. They have me blocked from reaching out and using the internet at my home to talk to the public about Time Hacking or just anything else. 

They have prevented me from posting on any forum on the internet. They even blocked a chat bot I had and blocked me from day trading. They hacked me and blocked me from using YouNow. Hell, they probably have my entire house bugged for all I know.

They have my home internet completely hacked and blocked. They let me watch netflix and play my play station but that is about it. I can connect to the blog too but I have to be careful. One time they hacked my blog that way I had to use a backup file to restore it.

So, I have to use internet connections outside my home mainly for anything else besides Netflix and general gaming. My own country and I am a USA citizen has limited my freedom of speech and my ability to express that freedom because I talk about time hacking on the internet.

But that is ok because Armageddon won't be using my home internet. Enough said there.

Pamela from "Above Top Secret and the Titor Story" I made my blog longer again. WHAT ARE YOU GOING TO DO ABOUT IT BITCH!!!!! Ok, those are my words for the "Conspiracy Against Time Travel" for the day. More later.
-------------------------------------------------------------------------------------------
In a previous post I promised a updated outline of my computer code. It can be used as a template for the public to write their own time hacking computer code.

My project files are here if you want to download a text file.

https://sourceforge.net/projects/timetravelproject/files/

Beginning Template ==============================
// Start program
// declare global variables. I,ve been told it is bad practice to use global but I do it anyway.
    // declare global array counter to max file size
    // declare global array speed to max file size
    // declare global array backup to max file size
    // declare global array weights to max file size
    // declare global array random to max file size
    // declare global string file1;
    // declare global strong check sum;
    // declare global weak check sum
    // declare global file name
    // declare global how many weighted sums
    // declare global counter speed mode
    // decleare global tweak counter mode
    // declare global password for weights

// declare subs
// ALL THE COMPUTER CODE THAT DOES THE HEAVY LIFTING GOES HERE.
    // add speed array to counter array
    // long long filesize of file
    // long long weakchecksum of file
    // long long weakchecksum of array
    // get strong check sum of file
    // get strong check sum of array
    // randomly set speed of speed array
    // linearly set speed of array
    // tweak counter in linear mode
    // tweak counter in random mode
    // restore counter array
    // backup counter array
    // Generate Random numbers into array
    // Load project from config file
    // Generate weights
    // initilizearrays
    // Display speed of counter (Not the counter) But the speed to be added or subtracted from the counter.
    // Display the counter itself
    // Display backup counter 
    // Write counter to computer file.

// Start Main. This is were we use are subs to perform the work.
     // Declare variables
     // Get count of how many parameters passed to program from command line
     // Goto Jump1 if no parameters passed
     // Get passed parameters to program from command line
          // test passed. 1 put program in test mode
          // name of computer file
          // help command. Display help menu
          // weak check sum
          // strong check sum
          // file size
          // how many weighted sums
          // counter speed mode 0 = none 1 = linear 2 = random
          // tweak counter mode 0 = none 1 = linear 2 = random
          // config fig  0 = no 1 = yes
          // seed number for weights
          // menu choice (If there is a choice then jump to it right now that is Jump2)
Jump1:

// if choice = 1 Print main menu
     // Construct file from strong check sum

Jump2:

// if have arguments goto jump3

// If choice 1
     // ask user if this is a config file yes or no
     // if config file goto jump3
     // ask user file name
     // ask user max array size
     // ask user to set mode for counter speed for linear or random or none
     // ask user to set mode for tweak counter for linear or random or none
     // ask how many weights to use for strong check sum
     // ask seed number for random number generator

// jump point here if ran from command line
jump3:

Initilizing program to run
// if this is a config file load config file
// Generate weights in array and bubble sort them
// initiliaze all arrays   
// get file size of file 
// get weak check sum of file 
// get weak check sum of array
// get strong check sum of file
// get strong checksum of array 
// set globalstrongchecksum to 0
// if array strong check sum = 0 globalstrongchecksum = strong check sum of file
// if config = no Ask user to move or delete file because it can be over written
// diff1 = 0
// diff2 = 0
// diff3 = 9999999999999999999999999999999999
    
Starting file Construction
// Start main do loop
     // Get destination strong check sum of array for first time before counter runs.
     // get diff1 = abs(target strong checksum - destination strong checksum)

// THIS IS WHERE THE PUBLIC WOULD PUT THEIR ALGORITHMS TO ROLL THE BINARY COUNTER.
// Controlling Counter and counter variables within loop. This is where the counter is ROLLED!!! <<<<<< THESE IS WERE THE COUNTER IS CHANGED!!!!!
     // if counterspeedmode = 2 and if diff3 > 1 randomly set speed of speed array 
     // if counterspeedmode = 1 and if diff3 > 1 linearly set speed array 
     // if diff3 > 1 add speed array to counter array 
     // if tweakspeedmode = 1 and if diff3 < 1 if tweak counter == filesize1 - 1 set tweak counter variable to -1
     // if tweakmode = 1 and if diff3 < 1 increase tweak counter variable
     // if tweak mode = 1 and if diff3 < 1 tweak counter linearly 
     // if tweakmode = 2 and diff3 < 1 tweak counter randomly 
     
// Comparing Diffs and Check sums with each other.
     // get destination strong check sum of counter array for second time after counter runs
     // get diff2 = abs(target strong checksum - destination strong checksum) abs means absolute true value. No - sign.
     // break loop if destination strong sum = target strong check sum
     // if abs(diff2 - diff1) < diff3 keep counter
     // abs(diff2 - diff1) < diff3 then backup counter
     // if abs(diff2 - diff1) < diff3 then diff3 = abs(diff1 - diff2) 
     // if abs(diff2 - diff1) > diff3 restore backup 
     
// Display variables. For testing only
     // if test = 1 then display rolling counter 
     // if test = 1 then display backup counter 
     // if test = 1 display diff3, target strong sum, destination strong sum

// repeat main loop for target not equal to destination

// Write counter array to a binary computer file.
// Exit program
Ending Template ==============================

To make all this easier to read copy it to a high quality text processing program.

Here is my traffic for the last month. The "Conspiracy Against Time Travel" have failed to stop me.  That would be Ray hudson, Darby Phillips, and Pamela and their hackers. They all work for the CIA.

United States 313
United Kingdom 84
France 46
Ukraine 11
Canada 6
Russia 6
Sweden 6
Belgium 3
Croatia 3
Jordan 3

----------------------------------------------------------------------------------

I think the CIA through Ray Hudson and Darby Phillips vastly under estimated  my technical capability and my will power.

Now, I have something else to say. Use to when it came to encryption the bigger the file the more difficulty in applying cryptography. But, I have solved that problem and here is how.

THE BIGGER THE FILE THE BIGGER THE ROLL IN THE COUNTER WHEN APPLYING CRYPTOGRAPHY!!!

YOU SEE BINARY FILES ARE NUMBERS. TO GET A BINARY FILE TO BECOME ANOTHER BINARY FILE YOU NEED A TARGET (WHERE YOU WANT TO GO). AND A DESTINATION (WHERE YOU ARE NOW.)

SO, ALL YOU HAVE TO DO IS ROLL THAT BINARY COUNTER FROM A DESTINATION TO A TARGET. THAT IS ALL!!!! ANY ENCRYPTION CAN BE DEFEATED WITH THIS SIMPLE ALGORITHM!!!!

A BINARY COUNTER IS A LIST OF NUMBERS. ALL YOU HAVE TO DO IS CREATE ANOTHER LIST OF NUMBERS CALLED THE SPEED FOR THE COUNTER. THEN ADD OR SUBTRACT THE SPEED FROM THE COUNTER. A BINARY COUNTER IS LIKE A SPACE SHIP. GIVE IT DESTINATION WHERE IT IS NOW. GIVE IT A TARGET WHERE IT WANTS TO GO.

THEN CALCULATE THE SPEED NEEDED TO GET IT THERE IN THE SHORTEST AMOUNT OF TIME!!!! THEN ADD OR SUBTRACT THAT SPEED FROM THE COUNTER AND YOU ARE DONE!!! FILE DECRYPTED!!!!!!!!!!!!!!!!!!
FILE RECONSTRUCTED!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

YEEEEEEEEHAHAHAHAHAHAHAHAHAHAHAH!!!!!!!!!!

HEY DARBY PHILLIPS I AM WRITING IN ALL CAPS AGAIN!!!!

ITS SO FUCKING SIMPLE A CHILD COULD DO IT!!!! THAT SHOWS YOU HOW SMART RAY AND DARBY ARE. HAHAHAHAAHAH. THOSE GUYS CAN'T DO SHIT TO ME.

THEY ARE BARELY ABLE TO READ THIS BLOG. THAT IS HOW STUPID THEY ARE. PAMELA SAID AT ABOVE TOP SECRET SHE HAS TO BANG HER HEAD ON THE WALL WHEN READING MY BLOG BECAUSE MY BLOG IS SOOOOO LONG. 

PAMELA, AS THE TEENS SAY THESE DAYS. GO LOVE YOURSELF.  BACK IN MY DAY THAT WAS GO FUCK YOURSELF. 

And for your information Pamela or what ever the hell your name is. I don't give a fuck if you read my blog or not. It it hurts you then don't. But your CIA so I guess it may be your job.
Pamela you said you bang your head on the wall. Do you do that at work or just at home? Its kinda of stupid to bang your head on the wall IS IT NOT but oh well. If it makes you happy knock yourself out. Literally. BAAAAAAAHAHAHAHAHAHAHA. MOVING ON.............

AGAIN, ANY ENCRYPTION CAN BE DEFEATED WITH THIS!!!!

ANY COMPUTER FILE FROM THE PAST, PRESENT, FUTURE, OR ALTERNATE TIME-LINES CAN BE DECRYPTED OUT OF SPACE-TIME WITH THIS ALGORITHM!!! NO MATTER WHERE OR WHEN IT EXIST!!!

ALL YOU GOT TO DO IS TAKE STATISTICS TO CALCULATE CHECK  SUMS OF UNKNOWN COMPUTER MEDIA YOU WANT THEN PUT THOSE CHECK SUMS INTO THE COUNTER. OR, IF YOU WANT TO DECRYPT SOMETHING LOAD THE ENCRYPTED FILE INTO THE COUNTER.

THEN INSTEAD OF USING CHECK SUMS GIVE THE COUNTER A ENTROPY OF 0 AS A TARGET. AND LOAD THE CURRENT ENTROPY AS THE DESTINATION.

EVERY TIME A NEW ENTROPY LEVEL HAS BEEN REACHED SAVE THE COUNTER BUT KEEP GOING. YOU WILL EITHER GET A FULLY DECRYPTED FILE OR A PARTIALLY DECRYPTED FILE.

NSA, CIA, FBI, YOU CAN START USING THIS TOMORROW. JUST GIVE YOUR PROGRAMMERS MY SHIT FROM SOURCEFORGE AND HAVE THEM GO AT IT.

NOW APPLY "THE BIGGER THE ROLL" + "PARALLEL COMPUTERS" = "THE END TO ENCRYPTION". = "ALL INFORMATION IN SPACE-TIME IS PUBLIC INFORMATION"!!!  

NOW WHEN QUANTUM COMPUTERS COME ALONG. COMPUTER TIME TRAVEL WILL BE ABSOLUTE!!!!

BUT WITH MY TECHNOLOGY AND TEMPORAL PARALLEL COMPUTING PC'S CAN BE MUCH MORE THAN WHAT THEY ARE RIGHT NOW THROUGH THE PROCESS OF TIME HACKING MESSAGES WITH MY A/B ALGORITHM!!!!

IF A IN THE PAST AND B IN THE FUTURE BOTH KNOW THEIR CHECKSUM RANGE OF THEIR MESSAGES TO EACH OTHER THROUGH SPACE-TIME. THEN A IN THE PAST CAN DECRYPT MESSAGES WITHIN THAT CHECK SUM RANGE AND DATA MINE THE DECRYPTED MESSAGES TO FIND THE RESULT OF A PROBLEM THAT WAS RUNNING ON A COMPUTER IN THE PAST.

YOU CAN CUT OFF A MASSIVE AMOUNT OF COMPUTER TIME SOLVING THAT PROBLEM!!!! HENCH TIME TRAVELING SUPER A.I'S CAN EXIST WITH THIS.

I LEARNED THIS WHEN APPLYING TIME HACKING WITH MY VERY CRUDE OUTDATED PARALLEL COMPUTER. SEE PREVOUS POST FOR MY PARALLEL COMPUTER.

Yeah, and I am going to "MAKE THAT OPEN SOURCE AND VERY PUBLIC AND FREE"!!!!

The "Conspiracy Against Time Travel" Fucked up hacking me and fucking with me.

Now, I will teach the world how to computer time travel with time hacking.

I will show the world how to use temporal parallel communications with time hacking.

I will show the world how to use parallel temporal computing with time hacking.

And I will give the world Armageddon's source code.

A super AI with all the abilities I just spoke about. A Super AI that can "TIME HACK"!!!!!!!!!!!

THINK GOD FOR OPEN PUBLIC FREE SOURCE CODE!!!!!!!!!!!!!!!!!!!
THE MOTHER FUCKERS WANT TO HACK ME. I WILL GIVE THIS SHIT TO THE WORLD FOR FREE, FREE, FREE, AND MORE FREE!!! NO HACKING NEEDED!!!!!!! JUST DOWNLOAD IT!!!!!!!!!!!!!!!!!!!!!!!!!!

YEEEEEEEEHAAAAAAAAAAAAAA. Ray Hudson and Darby Phillips can't touch this.

EVERYONE PLEASE POST THIS IN YOUR SOCIAL MEDIA. PLEASE POST THIS ON EVERY FORUM ON THE INTERNET. SPREAD THE WORD ABOUT MY BLOG!!!!! SPREAD THE WORD ABOUT TIME HACKING.

EVERY NEWS MEDIA OUTLET IN THE WORLD PLEASE RUN THIS STORY!!!!!

THE STORY = MAN INVENTS ALGORITHMS TO ACCESS POCKETS OF INTER-DIMENSIONAL SPACE-TIME THROUGH TIME TRAVEL COMPUTER MEDIA FILES!!!!

LEADING TO THE INVENTION OF
1. COMPUTER TIME TRAVEL
2. TEMPORAL COMMUNICATIONS
3 TEMPORAL PARALLEL COMPUTING
4 TIME TRAVELING SUPER A.I.'S
5. COMPUTER HACKING WITHOUT CONNECTING TO ANOTHER COMPUTER OR THE INTERNET!
6. THE END OF ENCRYPTION AND COMPUTER SECURITY!!!!
7. MAKING ALL INFORMATION IN SPACE-TIME PUBLIC KNOWLEDGE!!!

AND YOU KNOW WHAT? I WAS MAD AT "THE CONSPIRACY AGAINST TIME TRAVEL" BUT NOW I DECIDED TO TAKE MY ANGER OUT SOMEPLACE ELSE.

I AM GOING TO PERSONALY MURDER "ENCRYPTION" AND "COMPUTER SECURITY" IN COLD BLOOD!!!

WHEN I AM DONE WITH MY COUNTER I AM UPLOADING IT TO SOURCEFORGE AS A TOOL TO DEFEAT ALL ENCRYPTION!!! AS WELL AS FINISH MY OTHER PROJECTS WHICH MAKES ALL MY SHIT FREE AND DOWNLOADABLE!!!!!

THIS SHOULD MAKE THE NSA AND CIA HAPPY. NO COMPUTER SECURITY. NO ENCRYPTION. NO SECRETS.

THE USA GOVERNMENT SHOULD BE HAPPY. I AM DOING THEM A FAVOR. BUT THE FEDS MUST REALIZE YOU CAN'T HAVE YOUR CAKE AND EAT IT TOO!!!

BUT THERE IS A PRICE TO PAY FOR THIS. ALL INFORMATION IN SPACE-TIME WILL BE PUBLIC KNOWLEDGE!!! 

THAT IS MY PRICE FOR DOING THIS AND MY PAYBACK TO THE CONSPIRACY AGAINST TIME TRAVEL. THE "CONSPIRACY AGAINST TIME TRAVEL" LET THE GENIE OUT OF THE FUCKING BOTTLE!!!!!!

RAY HUDSON AND DARBY PHILLIPS AND PAMELA AT THE CIA THE SO CALLED "CONSPIRACY AGAINST TIME TRAVEL" CAN'T HANDLE ME!!!

I AM TOO BIG FOR THEM.

I AM TOO SMART FOR THEM.

THEY LOST THE TIME TRAVEL WAR WITH ME!!!!!!!!!!!

BAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAHAHAH!!!!

BAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAHAHAH!!!!

BAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAHAHAH!!!!

OH GOD I GOT TEARS IN MY EYES FROM LAUGHING SO HARD. I GOT TO STOP NOW MY RIBS ARE HURTING.

THATS MY STORY AND I AM STICKING TO IT!!!!

My code at http://sourceforge.net under time travel project gets updated often. Check it out. Its still getting debugged. 

===================================================

Ray Hudson, Darby Phillips, and Pamela at the CIA are fucked now. I got my throttled counter up and running. It still needs a lot of work. I am doing speed test now reconstructing files from their strong check sum only.

What I found now is that it takes about the same amount of time to reconstruct a small file as it does a large file. 

Because of the way I do this. THE SIZE OF THE FILE DOES NOT MATTER!!!!

Currently I am running with both Random and Linear speed modes AT THE SAME TIME!!! The Linear speed solves the counter on the left end and the Random speed solves the counter on the Right end. And - Both modes "Meet in the middle".

Now, that being said I have a mathematical way to take a strong check sum and break it down into small check sums. 

I can also take a large encrypted file and bust it down into a bunch of small files and run my counter on it in parallel to decrypt it.

So, when I do that I can run this in parallel. When that happens - "ENCRYPTION AND COMPUTER SECURITY WILL BE CLINICALLY DEAD!!!"

BECAUSE YOU SEE. ENCRYPTION WILL BE DEAD AND I CAN USE THIS THIS COUNTER TO HACK ANY COMPUTER ANYWHERE IN SPACE-TIME!!!!!! WITHOUT EVER 

CONNECTING TO IT!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

OR THE INTERNET!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

OR A PHONE LINE!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

ENCRYPTION AND COMPUTER SECURITY DEAD AS A DOOR NAIL!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

At least as far as I am concerned. I still have a lot of cleaning up to do on this throttled counter. I am going to upload it to sourceforge before the night is over.

I still have a lot of code writing to do. I have to write the program that mathematically calculates check sums of time travel computer media and get that uploaded.

Also, I plan to spread this out on tor and freenet and get that ball rolling too.

Here is a screen shot of the throttled counter working. It is working on a large file and a small file at the same time. The large file was running a little slower but its difference was keeping up with the small file.



I am so very happy. Ray Hudson and Darby Phillips are losing their time travel war with me. Yeeeeeehaaaaaaaaaaaaaaaaaaaaaaaaaaaa!!!!!

I am getting this to run faster and faster. What I am doing is taking a binary counter with a destination and a target.

I perform a mathematical function to that counter such as adding to it both linearly and randomly. Each time I do something to the counter it brings the diff = destination - target down smaller then the counter is backup-ed and kept. If diff gets larger the previous counter is restored.

when destination = target then FILE RECONSTRUCTED!!!!!!!

So, now I am going to add in the rest of my functions to this counter. This will get better and better. I will put in a subtract linear and a subtract randomly.

Because I am using weighted sums added up for a strong check sum some bytes can be larger or smaller than they need to be.

And, because this is a throttled counter:

When fully programmed this counter will construct a small file in the same amount of time as it constructs a large file. 

Already I am cutting that time down. This program is called counter7.cpp and will be at sourceforge.

-----------------------------------------------------------------------------

Well I added in more functions and I seemed to of "Over Loaded" the counter. It seems to run better with fewer functions. So, I will dial it back some. But good news. I GOT IT DECRYPTING!!!!!

I go in and edit my code right now to get it running like I want. I will play with it and just leave in what works and gut the rest.

I got a more playing to do with it. Right now I got all my functions in at the same time at sourceforge.
------------------------------------------------------------------------------------

I have my throttled counter running but I am adding more functions to bring the counter into sync between its destination checksum and its target checksum. The reason I am doing this is so the public can load their own functions into my code and experiment with their counter functions as well as my own.

I am using this algorithm.

counter initialized with all zeros.
diff3 = absolute value(target - destination)

begin main loop
Function 1 performed on counter
if target = destination write counter to file exit program
If absolute value(target -destination) < diff3 then diff3 = absolute value(target-destination) and counter backed up. If not not counter restored.
Function 2 performed on counter
if target = destination write counter to file exit program
If absolute value(target -destination) < diff3 then diff3 = absolute value(target-destination) and counter backed up. If not not counter restored.
Function 3 performed on counter

if target = destination write counter to file exit program

If absolute value(target -destination) < diff3 then diff3 = absolute value(target-destination) and counter backed up. If not not counter restored.

more functions........
repeat main loop

With this scenario not only can I throttle my counter but I can do everything else I want to do too. Cutting the time to file reconstruction even more. So, I just wanted to bring this to the public. Yes I am a time hacker but my success in time hacking began with my success in practicing cryptology. Which I am doing by writing the public their own version of my private code.

I have found that each function has to be brought online 1 by 1 and
that it has to be tested an meet criteria before keeping it in the code. But as each function passes its test the counter can be loaded with more functions to cut the decryption time down.

And the thing is I am just getting started with this. I have a way to bust my strong check sum down into smaller strong check sums and run this in parallel. I am making this "MILITARY STRENGTH" DECRYPTION!!!!

Armageddon will have a field day with this when I transfer this technology to my super A.I. Armageddon will use this technology in its time hacking to run its neural net in a temporal parallel computer.

And Armageddon can use its temporal parallel computer to look into the past and the future to give it a temporal field of view for calculating its strategy for calculating its options on what actions it might perform.

Well, I hope Ray Hudson and Darby Phillips and their bitch bait Pamela are enjoying my blog more and enjoying my computer code. I sure they enjoy this more than me calling them cock suckers in my blog and writing about them in the forums.
--------------------------------------------------------------------------------

Well in my quest to get rid of mersennetwister.h I found out why people like the twister. Its fast. c++ rand() is only giving me random numbers once a second because I used the randomize timer and the seconds only change well once a second.

That is waaaayyyy too slow me. Though it was making my throttled counter run ok.

So, I am using rand() to feed seed numbers to my own generator which uses the

r = (a * k + c) % m // in c++
for seeding where k = rand() // in c++

That should get me going. If not I will have to crawl back to the twister and ask for forgiveness for abandon it.

Well that is my programming for tonight. I have been going through and testing and verifying my functions to roll my counter from its target to its destination. Then I have to set down and see if I can get some other things going. Damn I am tired. Programming all night long takes its toll upon a fellow.
--------------------------------------------------------------------------------------------

Well I am uploading tonight's version of my code. Then I am closing it out and going on to the next version doing a total rewrite.

I will copy over much of the code I have now and gut rest. Right now on my Random speed control it only changes once a second which is way tooooooooo slow but because it is a throttled counter it still makes remarkable progress. My next version will be on the order of thousands and thousands of times faster.

I like the random speed control because when I run this in parallel the counter that is closest to the solution will be passed around to the rest of  programs.

I am loading the counter down with functions. The random part will keep each program from working with the same speed. And the program with the closest solution will share it with the other programs. All the programs will be using different throttled speeds on the counter that is closest to the solution.

DAMN I AM GOOD.

And that is not even the best of it. When I bust that strong check sum down into smaller check sums each baby sum can have a group of counters solving it for a solution in parallel.

Here in about an hour I will be shutting down for the day. I will take it up again tomorrow where I left off. I will be on counter version 8. Check sourceforge.net for the update.

I forgot to say good night to the "Conspiracy Against Time Travel".
GOOD NIGHT COCK SUCKERS!!!!!! (Not talking to the public but to the "Conspiracy".

Everyone else have a fine evening. Or should I say a fine morning. My days are up nights sleeping days. So the public's mornings are my evenings.

Wednesday, October 5, 2016

Announcement

The public version of my time travel code fully completed will be complied for windows and Linux and will be available on a DVD. A compiled version of my BNS for Windows and Linux might also be on the same DVD. The books I have coming out will also be available.

My books are.
1. My BNS - has been out for about 3 years. I have updated it since then and probably will update it again.
2. How to time travel with a computer. This book will have a DVD with it with my compiled code.
3. My blog book. I have published my blog. The names I used in my blog where changed to protect peoples real names.

I am trying to think if I have any more. I have written and programmed so much it is hard for me to keep up with it all. In the movie spider man the Character twilit 67 a Russian who stole nuclear material was modeled after my online persona Reactor1697.

So, not only do I have books and software published but I had a character in a movie modeled after me. I'm so proud.

I am holding off publishing the rest of the links to my book releases here in this blog but by next year some time or later I will finally put the links up here in my blog to my software and publications. So, look for those links here in 2017 no later than 2018. I published links to my first book already but I want to give the public time to settle in and read and use my computer code before I put it in my blog. Reason is certain people don't want my books and computer code in the public. So, I am giving the public a chance to spend time with my material before I post the links to it on the internet.

Each day I will randomly select a post from the last 8 years and make it available to be read.

Anyone that follows this on a regular bases will eventually read most my post.

The "Conspiracy Against Time Travel" aka Darby Phillips, Ray Hudson, and Pamela from the Titor Story have lost their war with me. I can now officially declare victory.

There were unable to keep me off the internet. They were unable to stop me from posting on the internet. And they were unable to stop my books from coming out.

And most importantly they were unable to stop me from publishing a public version of my time travel computer code. This computer code along with my books teaches the public how to do what I did. Use check sum hacking as a from of time time travel. And my books and software clearly show the public how to do that.

 In the end all they turned out to be is a bunch of government employed cyber bullies and thugs. Nothing more. They are a bunch of trolls, rodents, and dogs wildly roaming the internet and ganging up on people in a USA government attempt to control the information posted on the internet.

Well they found out they can't control me. They ran John Titor off the net by threatening to expose his identity. They got sued by Titor's family. Then when I came online in 2001 with my nuke site then came online 2008 with my time travel claims they started in on me. My run with them has going on 8 years now.

But, everything is coming out now in the form of books and DVD's so as far as I am concerned now its over. They lost. For now the rest of my time I plan to work on my publications and my software. Getting it published and updating it regularly after its published. As for blogging anything else I write with either be here, at my web-sight, or in my books.

Right now I have a lot to do with my publishers and I need to focus on that until I have everything caught up. After the public has had a chance to digest my material anything the "Conspiracy Against Time Travel" does will be "pissing against the wind while barking like a dog at the same time".

They will basically be "pissing in their own faces while barking like a dog". Nothing they can do once I have published everything. Nothing at all. Their done for after that.

Please see my You Tube channel under Reactor1967 at youtube
Please see my Web-sight http://time-travel.institute

---------------------------------------------------------------------------------------------------------------------------

In the public version of my time travel code I changed some algorithms around and did some things different than what I talked about in my blog. For instance I take my strong check sum for the entire file and break it down into 3 or 4 byte lengths. So, I break the strong check sum down into a list of smaller check sums. Then I assigned a 3 or 4 byte counter to construct each check sum which takes very little time for each counter. I then take all those binary counters after they have constructed their strong check sums and write them to a binary file.

Once that is done the Strong check sum has been re-constructed as a computer media file. And in my case when I calculate strong check sums of computer files existing in the past, present, future, or alternate time lines I get time travel computer media files enabling me to see all of space-time.

I made the changes due to the fact that in my own private time travel computer code I used a different algorithm to run my binary counter than what I used in the public version of my time travel code. The differences in my private code verses my public code demanded I changed the way I reconstruct/roll my binary counters.

But, all is good. In the public version of my code this constructs very large files very quickly from their strong check-sums as the binary counters are run in parallel to quickly construct large files from their strong checks sums.

In the public version of my time travel code the check sums are limited to 36  digits. In my private version of my code the number of digits are unlimited in my check sums as my program does the math by hand in a different numerical base and uses files to recorded the mathematical operations. So, in the public version of my code there will be a file size limit. I have not determined what that file size limit may be.

In time I may unfreeze this limit in the public version but it requires me to greatly expand the public version of the code. The public version of my time travel code was meant as a demonstration and proof of concept for the scientific community and the public that time travel through check sum hacking is possible. It is just a vehicle the public can use to test my theories I have put forth.

Any professional programmer out there could also un-break the check-sum digit limit thus breaking the file size limit on their own since my theories and algorithms are explained all through out my full blog and in my books.

So,  I have said from the very beginning of my blog I have more ways of constructing time travel media files than a cat has lives.

In my books and DVD's my time travel computer code works wonderfully. I hope the public enjoys check sum hacking and time hacking as much as I do when they read my books and use my DVD.
In the public version of my code I sought to simply the process of check sum hacking from the extremely sophisticated methods I have talked about in my blog. So parallel computing was the way to go since science, programmers, and mathematicians are familiar with this. But in my own private code I add, subtract, multiply, and divide computer files as numbers in higher numerical bases. So my public time travel code and private code defer greatly.


In real life computer files are numbers that represent audio, video, text, and other types of computer files. But their still just numbers. I call myself a temporal mathematician.


In real life these numbers are just a very advanced way to for tell the past and future. Like an ancient shaman used bones in the past. So my numbers are my bones. But the CIA and the NSA are scared of my software because it can construct any computer file existing anywhere without using the internet or a phone. Not so much as leaving my home I have access to any computer file anywhere in space time.

I'm a modern day shawman that the CIA and NSA are scared of. I have figured out why Ray Hudson told me "We are watching you" in his last message to me before Reactor1967 was banned from http://timetravelinstitute.com. At the time I did not know he was a CIA agent. But, he wanted me to know he was CIA. In his own little way he was telling me "Hey, I am a CIA agent".

It was disheartening for me to learn that most forums and chat rooms especially the popular ones are controlled by the CIA, NSA, and FBI. And the ones that are not government controlled all their members are CIA, NSA, and FBI agents.

And that is just the Americans. France, Germany, UK, China, Russia, all those countries have agents in the forums and chat rooms. Shit, now I wonder when I go on the internet "who are the fucking real members"? Where the fuck is the "Real People" at. 

Public, when you go on the internet now days most likely the people you speak with are government agents. The ones that are not agents have a good chance of been stalkers, rapist, and killers and some kind of other deviant. Only a very very small percentage of people in forums, chat rooms, and boards are real people. That fucking sucks.

In fact most of the people that read my blog are government agents. I have one person I know of that is a computer technical expert. As far as I know that is my only real person that reads my blog. 

Everyday my blog is automatically downloaded by the USA government I have seen that traffic. But, truthfully this blog very seldom just gets citizens to read it. It is mostly government intelligence agents from around the world.

A lot of times I won't get people from China. But, if I say "China" in my blog it will get a hit from China. That is because that country watches the internet for what the world is saying about it.

I won't get any Russian traffic. But, if I say the world "Russia" in my blog then I will get a hit from Russia. That is the Russian intelligence service staying on top of what is going on concerning Russia from around the world.

I am pretty sure a lot of countries around the world now have a file on me because of this blog. As well as my own country. If I ever travel to say Russia or China and I get into any type of trouble they will pull up my file and say to me "Ah, you think you can time travel you American. What else can you do?".

Most of the real people not government connected learning about me and my method of time travel will come from my books and DVD's, and videos getting published to Ray Hudson's horror. 

In fact the reason the "Conspiracy Against Time Travel" mess with me so hard is they want me trying to get revenge against time instead of working on my programming and my publications.

They want me working on my blog just not posting my code and algorithms. Anything to distract me from my work.

The "Conspiracy Against Time Travel" don't have to worry about running me off there internet because there is "NO REAL INTERNET ANYMORE". The true internet has been taking over by world governments and corporations. There is no internet anymore. 

THANK GOD I GOT MY TIME TRAVEL COMPUTER CODE. With that I can look at information that is not censored or controlled in any way. From anywhere in space-time.

Well the "Conspiracy Against Time Travel" harassing me on the internet has back fired against them. They were hoping I would post my time travel media and prove 100 percent I am a national security threat so they could come get me and take me away.

No, instead I just write my time travel computer code. Instead of proving I am a time traveler I am just going to give everyone in the world a time machine. I will give them my time travel computer code. Their plans back fired. Now everyone can be a time traveler. That is a lot of fucking people for the CIA and NSA to watch. Ray Hudson that is a lot of fucking people for you to watch. Though I give those ass holes credit these guys are the masters of mass intelligence.

CIA, FBI, NSA and any other intelligence agency I am here to tell you guys in all honesty and in all truth from the bottom of my heart. I even swear on my mothers grave. 

Time-Hacking by way of check-sum hacking can create any computer file any where in space time. There will be no way to detect a breach in security. There will be no way to detect a computer has been hacked. 

There will be no trail to follow. Only when the information is out there will there be anything to investigate. But how do you investigate something when no crime has been committed? How to you investigate when no computer has been hacked? 

How do you investigate when there was no trespassing on property? How do you investigate when no actual people where involved except the time-hacker. 

How do you investigate when the time-hacker had no knowledge the files he or she time-hacked was classified or meant anything to anyone? How do you investigate and prosecute a crime that has not been committed. 

But magically files that existed on one single computer now EXIST ON MILLIONS OF COMPUTERS WORLD WIDE!!!! MAGICALLY!!!! AND THAT COMPUTER FILE WAS GUARDED BY A FUCKING ARMY AND ALL THAT WAS DEEP UNDERGROUND!!!!

YEP, BLAME A TIME HACKER. A TIME HACKER IS INVISIBLE, UNTRACEABLE, UNDETECTABLE!!! THIS IS THE FUTURE OF HACKING!!!!!

I guess congress needs to pass some new laws on time hacking. I  don't personally have any classified information that I am aware of. I don't personally have anyone's personal files. Anytime that I have time-hacked a file that even remotely looked like it could cause me legal problems I took my file wiper and wiped that file back out of existence. Then I nuked my hard drive to be damn sure that the time travel computer media file was put back in its grave where I got it from.

Now days I keep a list of check-sums with the program and method I used to construct the files with a description of each file and that is how I keep up with my time travel media. I don't keep the actual files anymore. And, I am careful as to which files I allow to stay on my list. This list of course with my time travel computer programs are heavily encrypted under hundreds of layers of encryption. Each layer having its on strong password.

And as always the "Conspiracy Against Time Travel" CAN GO TO GOD DAMN HELL where they belong. That would be Ray Hudson, Darby Phillips, Pamela, and their little flunky Aaron Hinker.
---------------------------------------------------------------------------------------------------------------

Here is a time travel with computer code update. I am not finished with this code. I have not debugged this code yet but it should compile.

But this outline and code below is an example of how to time travel with computer code. This program in theory will be able to check sum hack very nicely. When this outline is completed it will be able to time-hack very nicely as well. This is a public version of my time travel computer code. Again, please realize their are many methods to check sum hacking and time hacking. My blog from day one has been explaining and showing one example after another which Ray Hudson and Darby Phillips who are government intelligence agents do not want the public to know about.

The code below takes this approach to check sum hacking.

1. Get one strong check sum for one computer file.
2. Get a list of smaller strong check sums that add up to the large strong check sum.
3. Run a small counter for each small check sum. This method quickly constructs the binary bytes for each small strong check sum which are written to the computer file after the bytes are constructed for each small strong check sum.
4. With any strong check sum for a computer file a process can be run to construct the list of smaller strong check sums in their correct order needed to construct that computer file.

Now, when looking for unknown time travel computer media we can do this.

1. Mathematically calculate strong check sums for unknown time travel computer media.

2. Using the one large check sum run a process to construct the list of smaller strong check sums in their correct order.

3. Then run the check sum hacking process to bring the large strong check sum and the list of smaller check sums into a binary byte order thus constructing a computer file with INFORMATION OF THE PAST, PRESENT, FUTURE, OR ALTERNATE TIME LINES INTO REALITY!!!!

I kept it simple. So, now I will move into showing my c++ computer code example. Please know I am being harassed by my government for talking about and teaching people on the internet how to time travel with computers by way of check sum hacking for the purpose of time hacking. I hope it is appreciated.

THIS IS HOW YOU TIME TRAVEL WITH A COMPUTER!!!!!
I'M GIVING THE WORLD A TIME MACHINE!!
I'M CHANGING THE TIME LINE!!!
I'M UNSTOPPABLE!!!!!!!!!!!!!!!!!!!!!!!!!!!!

RAY HUDSON AND DARBY PHILLIPS HAVE FAILED!!!!

BAAAAAAAAAAAAAAAAAAAAAAAHAHAHAHAHAHAH!!!!!!!!!!!!!

BAAAAAAAAAAAAAAAAAAAAAAAHAHAHAHAHAHAH!!!!!!!!!!!!!

BAAAAAAAAAAAAAAAAAAAAAAAHAHAHAHAHAHAH!!!!!!!!!!!!!
BAAAAAAAAAAAAAAAAAAAAAAAHAHAHAHAHAHAH!!!!!!!!!!!!!


Well Ray Hudson finally got his wish. My time travel code is now stored at SourceForge.

The public version of my code is in the planning/pre-alpha stage.
https://sourceforge.net/projects/timetravelproject/

I also now have this on my web-sight at http://time-travel.institute.

I won't be posting the entire code in my blog anymore.

Here is the list of programming projects I have going.

https://sourceforge.net/p/armageddon-ai/admin/overview
https://sourceforge.net/projects/burrisnumericalsystem/
https://sourceforge.net/projects/firecodes/

https://sourceforge.net/projects/timetravelproject/

I had previously deleted files from burrisnumericalsystem and firecodes. In time I will get those put back up. Fire codes and timetravelproject use some of the same coded that is in pre-alpha. I will still put up my old firecodes computer code.

Armageddon is a fairly new project I started and have been working on. I still have to get that updated.

I am busy but as I can I will try to get all these projects to a completion level.

-------------------------------------------------------------------------

To Ray Hudson's and Darby Phillips horror work on the public version of my time travel code is preceding wonderfully. I got the create configure file done which whats a strong check sum and breaks it down into baby check sums that add up to the strong check sum.

After that little baby counters will quickly construct each little baby strong check sum thus constructing the entire long check sum.

and I have wonderful news for the public. BY DOING IT THIS WAY THE FILE SIZE LIMIT IS GONE!!! SAY BYE BYE TO THE FILE SIZE LIMIT I PREVIOUSLY ON THIS!!!

Here is a picture of how my check sum hacking config file looks now.



This file when constructed says "Darby is a cry baby bitch". When I get time I will update my firecodes at sourceforge which is in pre-alpha. 

After fire codes is finished I will work on a program that takes this config file and runs the counters in parallel then combines them into one file.

Now I need to get my counters reconstructing each baby check sum. Once that is done fire codes will be updated. Then I will move fire codes to the time travel project at sourceforge

In my time travel project I have to calculate the file as one long check sum and as a list of baby check sums. The way I find check sums of unknown files I don't thank this will make much of a difference.

I have all my projects at Sourceforge now including Armageddon.
Well that is my daily update.

----------------------------------------------------------------------------

Well I got my counters working on fire codes. I am now working on getting a strong check sum on the baby bytes to equal the written strong check sum in the config file so I can get the program to stop when that check sum is constructed. Right now I have the baby counters at 4 bytes. I might change that to 3. When this is done it is gonna be a little slow because even on the baby counters I am not throttling the counter like I did in my private code. People just don't understand when check sum hacking throttling the counter is very important. But, I need a quick, dirty, public version of my code that works. 

My first check sum hacking and time travel program will be good for text files. I have to get it running its counters in parallel to construct larger files quicker. But, it my first release will be enough to let the "Ginny out of the bottle". Once professional programs get on this thing time hacking for the public is a done deal.

But, when I am done with my first version of my public code I am going to write a servant program and a master program with fire codes so it can be ran in parallel. The user tells the master program how many counters to run at a time. The master will call the servants, give them a counter and a strong check sum. The servant will construct the baby check sum into a file.

As the servants finish the construction the master program will write the baby files to the one large adult file.

This is good for running on a desktop or a parallel computer.

Then after that I will copy fire codes over to the time travel program at sourceforge.net and start the next section for calculating check sums of files in the past, present, future, and alternate time lines.

Of course I have my private computer code I don't have to wait I,ve been time traveling for a long time with my private computer code.

Soon the public will too. Fire Codes will also back up your computer for you. So, you can time travel with it and back up your computer.

On my computer I have a private encryption program called predator I use to encrypt my stuff. I am going to rewrite it to encrypt in parallel to make it faster. I probably will not be able to release that to the public as the laws will prohibit me from doing so. Its just an encryption program I write mainly for my private use.

It can be downloaded from the internet in the basic code version but its too slow for the public to use. I am going to setup it up to encrypt sections of a file and run in parallel. That will make the encryption much stronger as each section will have its own password. 

Then I can zip up the files and do it again. Adding another layer of encryption.

When I am done with my public code I am going to switch from using my private code to using my public code. Time Travel One Station will be working 24 hours a day seven days a week when my public code is completed.

I just have to be careful when I decrypt out of space-time and not get myself into trouble. My time travel software is not meant for doing anything illegal. 

So this is how it will work

program
25,36,27,89,127,249,255,172

I break this program down into 4 byte sections
counter 1 = 25,36,27,89
counter 2 = 127,249,255,172
counter 3.... if the program is larger.

Now I can convert these 4 byte sections to check sums.
counter 1 = 128.92834732847293
counter 2 = 2539.3284792384793

Now, I can use individual counters to re-construct these check sums
counter 1 = 0,0,0,0
                   1,0,0,0
                   2,0,0,0
                   ...........
                   25,36,27,89 = strong check sum 128.92834732847293
counter 2   0,0,0,0
                   1,0,0,0
                   2,0,0,0
                   ...........

                   127,249,255,172 = strong check sum 2539.3284792384793

Now, take the constructed strong check sums and put them together to reconstruct the file.

program reconstructed strong check sums.

25,36,27,89,127,249,255,172

Now, that I can check sum hack all I  have to do is mathematically calculate check sums of time travel computer media files from the past, present, future, and alternate time lines and use my check sum hacking software to construct those files.

I use weighted sums to calculate strong check sums. I use more than 1 weighted sum per file. Then I add up all the weighted sums for one strong check sum. So, that is how to get strong check sums for check sum hacking and time hacking.

To calculate check sums of unknown time travel media files I use the science of statistics using known computer files to calculate strong check sums with a high probability of being a actual computer media file.

I use regression lines of known strong check sums of computer media files to file unknown strong check sums of time travel computer media files along the calculated regression lines.

After more than one regression line is known then the process can be continued to find unknown regression lines. Then all hell breaks loose after that when space-time can be explored with a simple home computer.

---------------------------------------------------------------------------

Well I got fire codes taking a computer file and writing a config file with a list of 4 byte check sums then deleting that computer file and loading the config file reconstructing those 4 byte check sums to make an entire computer file. And I might add the correct computer file.

Well no going back now. Its all coming together. I am still a long way from being done with the public version of my time travel software. But, the public version getting released to the public is a lot closer now.

Change in the program though. All the baby check sums will not add up to the one long check sum because the algorithm for the baby check sums and the algorithm for the adult check sum is not the same. This change was needed to run my counters in parallel.

That is ok. As long as it works I am good. And it does work so I am good anyway.
------------------------------------------------------------------------------

I WANT TO BRING TO LITE SOMETHING THE "CONSPIRACY AGAINST TIME TRAVEL  DID TO ME TO THE PUBLIC". I HAD A JOB PROP TRADING WITH A PROP FIRM REMOTELY. I TRADED FROM HOME. RAY HUDSON, DARBY PHILLIPS, PAMELA, AND AARON HINIKER BLOCKED MY PORTS FROM MY HOME COMPUTER ON MY HOME NETWORK THAT I NEEDED TO TRADE WITH. SO MY SOFTWARE WOULD NOT WORK THAT I PROP TRADED WITH.


WELL I AM TAKING MY LAPTOP AND  GOING TO A INTERNET CAFE EVERY DAY NOW TO PROP TRADE. These guys I have labeled "The Conspiracy Against Time Travel" have even tried to cut off my source income of living that I use to support my daughters and my wife because of me talking about time travel with computers to the public Ray Hudson and Darby Phillips want my 2 daughters and my wife to not have any food to eat or have a home or have air conditioning and running water and a stove to cook on and disable my family from being able to do their laundry. This is the levels these sorry son of a bitches have gone to punish me and stop me from talking to the public.

WELL HERE IT IS FOR THEM. WHAT EVER YOU DO TO ME I WILL CONTINUE. (TALKING TO THE "CONSPIRACY AGAINST TIME TRAVEL). YOU WILL HAVE TO KILL ME TO STOP ME!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! (Again talking to the "Conspiracy Against Time Travel".

So anyway anyone reading this please post links to my blog where ever you can so that other people can read the truth!!!! I AM NOW DAY TRADING FROM A INTERNET CAFE WITH A NEW VERSION OF WINDOWS ON A LAPTOP.

And that is ok. Truth is I need to get out of the house. I stay home way too much. I am going to start doing a little walking early in the morning then head over to the internet cafe and day trade. It will be good for me. Ray and Darby think their hurting me when actually they are helping me.
-------------------------------------------------------------------------------

FIRE CODES IS RUNNING!!!!!!!! YEAH!!!!!! I will get that posted. Its still too slow though what can I say. But the file size limit is removed. Before moving onto the third part of the public version of my time travel code I am going to go ahead and write a program to run these counters in parallel.

Also, I will still leave the weak check sum in my config file for checking but all my program needs to re-construct a file from its check sum is its strong check sum. The weak check sum is not needed. But, as said I will keep it for checking. I also have two strong check sums now instead of one. One check sum is for the entire file. The other check sums are for the baby strong check sums.

When I get done I will actually have 3 strong check sums. One for the entire file. The baby strong check sums added up. Then the list of baby strong check sums.

I am working on making my config file clearer. So, last change is fire codes will have three options. Reconstruct a file from its check sum using 1 counter at a time or running the counters in parallel. In parallel with all the counters running at the same time a computer file can be constructed from its check sums in less than a hour or two.

Now everyone knows why I throttle my counters and use my BNS. When people actually use my software and read my public code they will understand my blog better.

Also, fire codes is not using base-1 nor is it using a weak check sum counter. It just runs a binary counter that adds 1 to it at a time. Nothing fancy.

Truth is my private code kicks fire codes ass. My private code can construct a large file very quickly. But, This is my public version of my code. I want to say I am sorry to my public for not releasing my private code. But, that is my personal property. For me it would be like giving away my car to someone I don't know.

So, I would help someone I don't know to fix there own car before giving them my car. So hence fire codes. I am here to teach mainly not give my crap away.

When I get the parallel option written into fire codes my duty teaching the public to check sum hack will done. Next I will teach the public how to calculate check sums of unknown files.

I am setting up fire codes to be run with parameters or if no parameters then fire codes can be run and a menu will come up.

As for running it in parallel I already have all the code there to construct the counters all I have to do is have it read a strong check sum and spawn a new thread. The user gets to decide how many threads to run at a time. 

Right now I am going to sit down and think of the best way to do this in parallel. My own computer has 32 gigs of memory and 500 gig hard drive. Then I have my external terabyte drives. 

My own computer also has 8 cpu's. In my spare time I have constructed movies from other time lines and I like reading a news paper from the future. I don't know if it is my future until the date actually arrives or if it is alternate time line. Anyway I have no problem check sum hacking and time hacking. 

But, I know most people have way less of a computer than me. So, I have to think on it. When I get to showing the public how to calculate check sums of unknown computer media is where the fun really begins. Because then the public will be time traveling with me. It will no longer just me talking about it.

I would like to ask the public to please do not use my code to construct classified government files or any other files that may get you into trouble. Please do not use my code to hack private and government computers without ever connecting to them or the internet. This code is for ethical hacking only. It is for time hacking mainly.

Here is the link to fire codes.

--------------------------------------------------------------------------------

Ok, after doing my home work I am considering putting the weak check sum counter back into fire codes because it would make file construct much faster. Right now I am just using a simple binary counter. There are more ways to check sum hack than you can shake a stick at. At times I get over whelmed making decisions. 

But I am teaching the public to time hack and if I put the weak check sum counters back in yes it would make it faster but when it comes to calculating check sums of unknown computer files then I have to write another process to consider the weak sums.

I am damned if I do and damned if I don't. FUCK IT. I am just going to leave the strong check sums for now and do that only and keep this simple. Later on I can add in the weak if I want. What I will do is when I get my time travel outline done I will go back and upgrade fire codes to use both weak and strong check sums but my time travel program will just use the strong check sums only. That is a compromise. But for now fire codes will just use strong check sums only. 

Example of strong check sums only.
Strong sum #
Step 1. Create a counter of 0000. 
Step 2. Add 1 to it at a time till the strong check sum is created.

Example of using both weak and strong check sums.
Weak sum #
Strong sum #
Step one. Create a counter with the weak sum.
Step two.  Add 1 minus the base to it until the strong check sum is created.

Rsync the program I based my time hacking work on uses both weak and strong check sums.

I like using the strong check sum only because in my past private programs it is easier for me to throttle my counters. I can add way more than 1 to it at a time. When I use both weak and strong check sums then it gets more complicated. I have to use a more complicated algorithm if I am throttling my counter and using weak check sums too.

So by using only the strong check sum I can throttle my counter. That means make it run faster by adding way more than 1 to it at a time. And, I don't need more complicated algorithms causing my program to run slower. In my private code I can construct very large files very quickly by throttling my counter and increasing my buffer size and using higher bases. I add, subtract, multiple and divided my computer files as if they were just numbers. My private code kicks ass for time hacking. Ok, I got off the subject a little. Moving on...

But good news. On running counters in parallel I am going to make my program create a bash script to run all the counters AT THE SAME TIME and put a "&" at the end of the command. Anyone can edit the config file and the bash script and put them on separate computers then take all the small files and join them after they are done.

I am going to start getting my post ready here pretty soon that teaches the public how to calculate check sums of computer files from the past, present, future, and alternate realities. This is very complicated and also the most important part of time hacking.

I think I may work my butt off on a new documentary on how to time hack. I will make slides and use windows movie maker and just make a really good presentation of how to do this. I may also write some programs to demonstrate this for the public and explain in detail how this works. Any way give it some time but just know I am going to sit down and start working on this. 

My check sum hacking works. Right now I consider myself the best check sum hacker in the world though some may laugh at that. But those people have not seen my private programs. So, I have more than PROVEN TO RAY I CHECK CAN SUM HACK. Ray said prove it and I did. Ray see fire codes at source forge. NOW RAY NEEDS THE PROOF I CAN CALCULATE CHECK SUMS OF UNKNOWN COMPUTER FILES. So, be looking for that proof pubic and Ray/Darby/Pam(aka Dog Bitch)/Script kid punk(aka Aaron Hiniker).

In my video I am going to use my A/B algorithm where if A in the past and B in the future both know the check sum range of their messages to each other then A in the past can run a check sum counter constructing check sums of possibles messages to A in the past from B in the future. I will demonstrate this in my you tube video. You see with this algorithm A/B can talk to each other through space time. These messages can contain VERIFICATION SCHEMES!!!!! TO VERIFY THE SENDER AND RECEIVER OF THESE MESSAGES!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Also in the video and in this blog  on how I am going to give Ray Hudson his proof is I am going to take a book. Lets say the Bible. I will write a program that takes individual sentences from the bible and writes them to individual text files. I won't write all the bible just a little bit of it. 

Then I will run my time hacking process on those text files to FIND OTHER SENTENCES IN THE BIBLE THAT WERE NOT SAVED AS TEXT FILES!!!! Thus proving time hacking works. 

This is how I initially did my research into time hacking. This is how I taught myself to time hack initially. AND THE PUBLIC CAN DO IT TOO!!!!!!!!!!!!!!!!!!!!!!!!!!!!

It can also find lost portions of the bible or drafts of the bible that were never incorporated into the final version of the bible. This is the simple method for me. I will post all my programs so my work can be verified and RECREATED!!!!!

This same process can find movies in the future and news papers in the future not printed yet.

Simple example of how to calculate strong check sums of unknown computer media.

1. Get a list of known computer files.
2. Calculate the strong check sums of this files and write them to a list.
3. Load the list and Calculate the Root mean square of these strong check sums and the high deviation and the low deviation. 
4. Run a program to generate strong check sums along this root mean square staying within the standard deviation.
5. run a program to construct these strong check sums AS COMPUTER FILES!!!!!!!!!!!!!!!!!!!!!!!!!

Note: Can also use regression lines.
Note: NOW YOU CAN TAKE THE ROOT MEAN SQUARES AND THE REGRESSION LINES AND USE THEM WITH THE SAME PROCESS TO FIND UNKNOWN ROOT MEAN SQUARES OF COMPUTER FILES AND UNKNOWN REGRESSION LINES OF COMPUTER FILES TO FIND OTHER UNKNOWN TIME TRAVEL MEDIA. IN TIME I WILL PROVE THIS!!!

What is the difference in using a root mean square and a regression line to time hack one might ask me?

The difference is with a root mean square and standard deviation I am staying with in a specific check sum range. This is good for my temporal communication system better known as my A/B algorithm.

With regression lines now I am not staying within a specific check sum ranges. With regression lines I can take my known check sums and project them out forward going up in value or project them out backwards going down in value. I can run it in a similar manner as I run my BNS. Which is why this method is so good. I would use this method to find news papers from the future.

Ok, class out for today on how to calculate unknown check sums of time travel computer media. I just know I am pissing in the "Conspiracy Against Time Travel" faces right now by writing that little bit of info on time hacking. 

Of course the day I started this blog when they thought they ran me off the internet for good like they did John Titor I started pissing in their faces. YOU SEE THIS INFORMATION IS NOT SUPPOSE TO BE GIVING TO THE PUBLIC!!!!!!!!!!!!!!!!!! FUCK EM!!!!!!!

BAAAAAAAHAHAHAHAHAHAHAHAHAH!!!!!!!!!!!!!!!!!  

Them cock sucking mother fuckers deserve it.

There I go. WELL DARBY PHILLIPS AND RAY HUDSON THINGS JUST KEEP GETTING WORSE AND WORSE FOR YOU GUYS.

I would of just kept talking in my blog but those guys Ray and Darby had to go hack me and steal from me so now I will teach the entire world HOW TO TIME TRAVEL WITH COMPUTERS!!!! Yep, Ray Hudson and Darby Phillips fucked up. THEY FUCKED UP BIG TIME!!!!

They would of been better off if they left me the fuck along.