Showing posts with label classified technology. Show all posts
Showing posts with label classified technology. Show all posts

Sunday, May 14, 2017

HOW THE HIT ON ME WENT DOWN!!!

Copyright (C) 2017 http://time-travel.institute

05/14/2017 8:28 AM

I don't have much time this morning but I have been thinking and I should write about how the "Conspiracy Against Time Travel" performed their "Long Promised" hit on me.

It happened one morning. I had been up all night programming my time travel code. I was fixing to goto bed. As usual I poured myself a couple of drinks of vodka over a couple of cubs of ice in my favorite drinking glass. My family had just left the house for school and work. I got up to go to the kitchen to get something to eat.

I don't remember a damn thing after that. I blacked out. My vodka bottle had been drugged and poisoned!!!

I woke up later that afternoon in the floor wedged between my recliner and my refrigerator with a night stand sitting on my head. I have a aluminum night stand with wheels. When I blacked out and fell my head found its way under my night stand when I hit the floor.

I could barely move. I managed to get my cell phone and call my wife. She came home and took me to emergency clinic. The doctor ran a bunch of test on me then came to me and said "What hospital you want to go to". My EKG was crazy, my blood pressure was crazy, my sugar level was 400, the components in my blood test were off and unusual.

I don't know what was put in my Vodka. So, my wife drove me I did not take an ambulance to the hospital. It took 12 hours for the doctors to stabilize me then I was put in a room. I begged them not to put me in ICU. 4 days later I was back to normal.

The doctor told me I was diabetic type 2 and I was put on insulin. But what confused the doctors was "WHY I PASSED OUT?". They ran test and could not find a reason why I passed out. Also, why was my EKG and blood pressure crazy? Why did my blood test come back as abnormal? The doctors never figured it out.

But when I got home. I fucking figured it out real quick. MY VODKA BOTTLE WAS GONE!! MY DRINKING GLASS WAS FUCKING GONE!!!! THEM MOTHER FUCKERS TOOK THE EVIDENCE OF THEIR CRIME!!! 

My computers, laptops, thumb drives, and USB drives were still there but not where I left them. I can only assume THERE WERE FUCKING COPIED!!!

ALL MY SHIT AND BEEN GONE THROUGH!!!!!!!!!!! MY ROOM HAD BEEN SEARCHED!!!!!!!!!!!!!!!!!!

They needed me out of my house so they could copy my computers and go through all my shit. So I was drugged and poisoned. I don't know when they came in and spiked my vodka bottle. I don't know when they were there in my home coping my computers, hard drives, and thumb drives and going through all my shit.

And where ever Ray Hudson and Darby Phillips are now I THINK ONE OF THEM MOTHER FUCKERS KEPT MY DRINKING GLASS AS A TROPHY!!! You fucking dirty bastards!!! That was pay back for drinking my adult beverage while looking at my time travel media and laughing my ass off at them. I know it was. And I know that it is where they got the ideal to drug and poison me. 

They fucked up their hacking of me. My open source time travel computer code probably made them thirsty for more. So, they tried to take it with violence since their hacking me from at least 2013 was not working.

Now, it is suppose to be illegal for the USA to do this shit to their own citizens. But as I learned in my hacking the USA can do what ever the fuck they want.

So, my question is in the Snowden leaked documents the NSA paid the United Kingdom to perform operations on USA citizens. So, did the UK do this shit to me. Was it the British that drugged and poisoned my vodka bottle so they could search my home?

I have 5 dogs. That morning after my family left before I blacked out unexpectedlly I remember my dogs suddenly became very quite. Normally they are barking and playing. I was going to check on them when I went to the kitchen but I never made it. I bet they were already in the house waiting for me to go down. 
What ever kind of fucked up warrant authorized this I will never know. I do know even with the best computers in the world who ever copied my shit will have a hard time breaking the encryption.

And even if they do break it ALL THE FILES WILL JUST LOOK LIKE NORMAL FILES. BECAUSE MY MOST SECRET FILES WERE ROLLED LIKE A BINARY COUNTER TO REPRESENT OTHER FILES. I AM THE ONLY PERSON IN THE WORLD THAT CAN DECRYPT THOSE FILES!!!!!

SO GOOD FUCKEN LUCK Ray Hudson, Darby Phillips, and Pamela. YOU FUCKED UP AGAIN!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

BAAAAAAAHAHAHAHAHAHAHAHAHAHAHAHAHAH!!!!



BAAAAAAAHAHAHAHAHAHAHAHAHAHAHAHAHAH!!!!



BAAAAAAAHAHAHAHAHAHAHAHAHAHAHAHAHAH!!!!

Enjoy my drinking glass Ray Hudson, Darby Phillips, and Pamela. I will just buy myself another one. 
---------------------------------------------------------------------------------------------
05/31/2017

I have had a number of really good post I have wanted to make lately to this blog but at last I have been really busy. The "Conspiracy Against Time Travel" have been emailing me here and there either for harassment or other reasons. I don't know which. I pretty much don't give a fuck either way so I am good to go.

Developments of late I got some time in for my engineering designs on some of my physical projects. 

Receiving emails from the "Conspiracy Against Time Travel". Again "Don't Care".

In the news I saw Intel's I9 chip. It raised immersed interest with me as it could power my projects.

Being removing spyware on my machines that the "Conspiracy Against Time Travel" installed. They are intensely interested in still spying on me even after their home invasion of me and putting me in the hospital for 4 days and poising me and searching my home.

So the spyware and hacking still continue.

My post of late that I wanted to post has to do with the CIA stalking and spying on John Titor, why the Alien Reconstruction vehicle works, and improvements on current science in using cyborgs to insure immorality. 

All this stuff is of course secrets the USA/NSA/CIA does not want the public involved in. I had some other post here or there to make but I have been busy. 

My health has continued to improve at after the "Conspiracy Against Time Travel" attack on myself. So, I should be good at least for now. So that is about it.


--------------------------------------------------------------------------------------------------------------------------
06/04/2017 04:52AM

I found one thing the "Conspiracy Against Time Travel" missed when their military colvert operation team most likely sent in from the highest level of the NSA raided my home and put me in the hospital. They missed my list of handwritten BNS numbers containing a very valuable cach of my time travel software and computer media files. 

That list no longer resides in my home. And only I can decode it because I have the decode program memerized. It's not stored anywhere. And still they won't break my encryption on what they copied.

Their raid on me was futile and shows their urgency and foolish attempts after their failed hackings of my family and myself. They are desperately trying to get my propritery time travel software. And that will never happen. Not without paying me billions tax free. It will never happen. I will take my private code to my grave. 

And after that last stunt of theirs I will never negotiate with them now for the computer code. Never. I don't trust them. The unobtained code is probably why I'm still alive. My living is their only hope of getting it though their raid on me was reckless and careless. Had I hit my head when I blacked out out I would not be writing this post. And their poisening of me was equally reckless and careless. 

So their stupidity is always present in their work. And for myself I'm still in disbelief that they sent a military colvert operation into my home. It was always my belief when they came for me it would be with a legal warrent and the FBI and CIA raid where I would see my Intruders face to face. Never did I imagine I would be drugged and poisened. I still can't believe they did that to me but they did. And they tried to cover it up and tried to keep me from knowing what happened. But their raiding team was careless and rushed their job leaving behind signs of their presence and activities in my home. 

Their thugness, disception, and dishonesty is their downfall and their failure. It is why they will never get the best of my code and my files. No matter what they do to me.

Im waiting for Intel's new I-9 processor to come out. I may buy it and run my open source time travel code on it. That is a 1 teraflop processor. I got to have it. I'm looking forward to putting my Armageddon AI on that chip and running my time travel software on it. So I will get me a loan and build my dream pc. Put my best Linux on it and program like crazy searching the continuum for time travel media files. Searching the continuum for the secrets of the universe. 


That is what I do. The "Conspiracy Against Time Travel" can try to take computer travel from me. But they can never take out the time traveler from the man in me. Never.
--------------------------------------------------------------------------------------------------------------------
06/07/2017 04:37 PM

This week I was able to come across a scientific paper written by a physicits that explains gravity, tensors, and a electromagnetic component to gravity. It is scientific proof that my earlier post on gravity and UFOs derived from my computer time travel is correct. I viewed this paper online and I'm trying to get a copy of it before the NSA and the "Conspiracy Against Time Travel" erase it from existence like they have done with previous work on gravity and it's electromagnetic components.They classified it and made it disappeared. 

This is why Ray Hudson pushed me in the beginning to write a paper on computer time travel. So he could classifie it and make it disappeare. Like he does when I attempt to post on forums. Like they have been pressuring and threating me to go away all these years.

So I have been working on a way to print 3D graphin capacitors to make a capacitor bank scaled down to a drone similar to the Alien reproduction craft. Powered by a Tesla coil, statict generator, and a croften voltage multiplayer. Then when it fly's I can post the video on YouTube and laugh while drinking a beer at the conspiracy.

In other news I found a cheap board called parallela that is designed for parallel​ programming. It has 18 cores, field programmable gate arrays, and a chip built for speed. It would be heaven to put Armageddon my super AI and my computer time travel programs on. I will buy about 8 of these boards. I'm also looking at running some gravity equations on it to fine-tune my ufo drone.

On Armageddon I found some programming libs opencv and openal I hope I spelled those correctly that will help me interfaces Armageddon with a cam, speaker, and microphone. Armageddon's voice output will be wave files. I have also been reading up on hacking do I can teach Armageddon to track hackers and hack them back. In the process learning myself how the "Conspiracy Against Time Travel" hack me. 

I have devised a way to implement a VLAN firewall with intrusion detection, USB protection, and virus and malware removal. I will have to limit protocols and ports. That still leaves me with getting rid of their back doors they have built into my network. These bastards have given me a good education on network security. But they are CIA agents. I have been up against the best in the business.

I have more to say but I'm out of time for today. Reactor1967 over and out.

-------------------------------------------------------------------------------------------------------------------------

06/13/2017 0700PM

I only have a few minutes to write this post so it will be short. I spent last night reviewing Dr. Townsend's Browns work for the drone version I am building of the Alien reproduction craft. I discovered proof that the Alien Reproduction Craft is Browns work. The flat capacitor bank at the bottom is larger on bottom and slants smaller to the top at a 35 degree angle. That is Browns work using asmetrical capacitors. The military used it in a capacitor bank to make a UFO. I have much to post but not the time. I won't 3D print my cap bank I will build it by hand with carbon fiber and graphin and one hell of a dielectric. Well got to go.

----------------------------------------------------------------------------------------------
06/18/2017 08:42 AM

Here is a YouTube video with the link to the only known scientific paper relating to gravity and its electromagnetic component. All the other papers have been classified top secret by the  USA Pentagon or America's black government. I now have a copy of this paper and I have read it intently over and over.

My laptop was hacked and disabled so I had to reinstall my operating system. The "Conspiracy Against Time Travel" Ray Hudson, Darby Phillips, and Pamela (All CIA agents) have proven to me that they never sleep. Or, can they can get up out of bed on a dime to deal with me when ever I am on the internet. And, I love wasting their time.

BAAAAAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAH!!!!!!!

I am never very far from their computer screen.

Here is a "Conspiracy Against Time Travel" joke. What do you get when you get 1 stupid person + Another stupid person + another stupid person working together. That would be what do you get when you get Ray Hudson + Darby Phillips + Pamela?

Any one?

Ray Hudson + Darby Phillips + Pamela = 3 stupid people working together.

BAAAAAAAAAAAAAAAAAAAAHAHAHAHAHAH!!!!!!!!!!

Hey here is another one.

How many Ray Hudson's does it take to change a light bulb?

Anyone?

1 Ray Hudson to find the X axis.
1 Ray Hudson to find the Y axis.
1 Ray Hudson to find the Z axis.
1 Ray Hudson to determine the angler momentum.
and 1 Ray Hudson to determine which way is righty tighty and lefty loosesy.

BAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAH!!!!!!!!

It takes 5 Ray Hudson's to figure out how to change a light bulb!!!!!

BAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAHAHAHA!!!!

BAAAAAAAAAAAAAAAAHAHAHAHAHAHAH!!!!!!!!!!!!!

BAAAAAAAAAAAAAAAAAAAAAAAAAAHAHAHAHAHAHAH!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Oh god I am laughing so hard right now!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
I crack myself up.

One last thing. What is the one thing John Titor and Reactor1967 have in common?

Both of us had the CIA agent Pamela pretending to be our girl friend in the web forums. Pamela sure does get around does she not. I wonder if she hacked Titor like she did me? Pamela is a naughty bad girl.

BAAAAAAAAAAAAAAAAAAAAAHAHAHAHAHAHAH!!!!!

Here is that video I promised everyone.

BAAAAAAAAAAAAHAHAHAHAHAHAAHAHAAH..........



-------------------------------------------------------------------------------------------------

06/19/2017 05:22 PM

Last night I worked on my BNS code. I have not had time to commit my work to a finished program yet though. This is the version of my BNS I left off on before the "Conspiracy Against Time Travel" put me in the hospital and raided my home. Each BNS number codes all zeros and counts out the number being coded and when the BNS number codes a 1 then the byte has been coded into BNS and it starts off with another BNS number. 

Now when the list of BNS numbers is coded that represents a coded file the list of BNS numbers because they are a predicted number sequence can be coded into a single BNS number.

I have taken this work one step further and I can code a list of numbers in a numerical base from 0 to its base. When the number is decoded above its base then the number is finished decoding. This list of numbers can then be coded into a single BNS number using my methods. I like the BNS numbers counting the byte out better with 0's and 1's because it is simpler. 

Coding BNS numbers using predicted number sequences makes it possible to coded an unlimited amount of information into  a single small number. The amount of time it takes to code the BNS number is the amount of time it takes to decode the BNS number.

I have my methods of building a Townsend Brown capacitor bank worked out for building a drone replica of the Alien Reproduction Vehicle.

I would build my carbon plates and coat them with graphin. Then put on a layer of my dielectric. Then put another carbon/graphin plate on. The capacitor would be enclosed in its insulator. I would build these by hand and stack them up in a circle with the plates going up on their ends at a 35% angle. Making a asymmetrical capacitor bank.

I would have to build a controller that would switch power controlled by a computer from the Tesla coil powered by a cap bank that would up the voltage which is powered by a static generator. For my static generator I am looking at some options to make one hell of a static generator. My static generator would be powered by a free energy permanent magnet motor which in turn would also power the drone electronics.  

Well I went a little over my time limit so I must go. Before I do I have had more people subscribing to me on you-tube. Considering how complicated my methods and mathematics are it is a little surprising. Talk to everyone later.
------------------------------------------------------------------------------------------------------------------------------------------------------------
06/24/2017 12:58pm

I found out today why I started getting hacked by the CIA in 2013. The CIA started a new surveillance plan. Here is the journalists article I found. Since Ray Hudson is CIA Ray signed me up for this to get revenge on me for talking about him and Darby Phillips stalking me online. Here is the article.

Begin article

The CIA has been targeting wireless routers since 2012, according to newly leaked confidential documents.

Brooks Kraft

The CIA has been hacking home, office and public wireless routers for years in an effort to carry out clandestine surveillance, according to classified documents seen by CNET sister site ZDNet.

The intelligence agency had by mid-2012 developed implants "for roughly 25 different devices from 10 different manufacturers," including Asus, Belkin, D-Link, Linksys and Netgear, according to one document.

The trove of documents, part of an ongoing series of leaks released by the website WikiLeaks, could not be immediately verified. But they detail several hacking tool suites, which could allow the agency to conduct targeted exploitation of networks and computers, ZDNet reported.

WikiLeaks, the organization notorious for leaking highly secure government data, published a cache of documents in March that reportedly exposes tactics the CIA uses to hack into our devices. The leak suggested that the CIA may be equipped with a variety of tools that let it hack into your phone, smart TV, computer and router.

The CIA didn't immediately respond to a request for comment.

END Article.

More later. I got to go.

-----------------------------------------------------------------------------------------------------------------------------------------------------------------------

06/25/2017 7:07AM


Well I have decided Ray Hudson, Darby Phillips, and Pamela have a big heart. In looking after my best interest they have been signing me up for every fucking program the intelligence services have to offer. As revenge for excerising my right to free speech. 


With friends like them I don't need any enemies. Really guys (talking to the conspiracy). I'm good. You to have to go out of your way for me. Really, I'm good.

Wednesday, March 1, 2017

MILITARY STRENGTH DATA RECOVERY COMING OF AGE

COPYRIGHT(C) 2017 http://time-travel.institute 

03/0102017 10:52 AM





I'm going to give time travel project a second name. Its second name will be called Military Strength data recovery. Everything in the universe that currently exists could not exist if it was not for information. Everything in the universe has a blueprint and without that blueprint it cannot come into existence. That blueprint is information.

So all the blueprints for the universe exist in the informational universe. Those blueprints contain the technology and all the information that exists as space-time. And that information is attainable by creating and data mining binary computer files.

So the way that I have figured out how to do that is to have a destination file that remains fixed and create difference files that are added or subtracted from the destination files to create the target files around it.

The destination file can be moved up or down by adding or subtracting from it a specific number of bytes from time to time thus hitting every possible computer file that could possibly exist within space time per the file size being used.

So  this is how to computer time travel or to recover any lost file within space-time that is needed in the present.

The next few days I will update all the small files in the other folders with the files from the bin directory. I don't have people running my code for me and reporting bugs. 

With the disinformation campaign against me the c.i.a. and the n.s.a. doing their thing I have found in my work I can't rely on feedback from others So I have to test the hell out of my own code. Which I should do anyway regardless.

My next improvement currently planned is to rewrite my base power checksum to use a higher buffer. It would still be slow but it can be run in parallel. And I'm thinking of a second menu program called tools.

Now that I have the bulk of  my open source code up and running it now has become a repetitive process. Upgrade, update, debug, and repeat.

This is going to run in two modes of operations. The first mode will be the easy application. The second mode people can go out to the folders and run the programs in there and run those programs individually and manually using their own random numbers.

There will be a third world war and or natural disasters in the future that will wipe out most of what we know today. Tomorrow's world population will be far smaller than today. Canabillism, rape, slavery, and murder, and assault will rule society more than law. As well as other crimes. It will be the strongest rules and the meak serve and die at  the will of their masters. That is the law of darinism.its the law of the jungle.

It happened in Rome, it happened in Egypt, it happened in Samara , it happened in ancient South America, and it will happen here too.

And on top of all that the next ice age is still coming. No it didn't go away it is well on track to hit mankind smack in the face and knock him the f*** out when it gets here. That is if mankind is still here when it arrives.

There is a cycle with man that even the ancients knew about and is reflected in ancient writings. I have read some of those writings though it was hard as hell for me to do that. 

Mankind builds himself out of the wilderness into civilization and through war and mother nature ENDS UP BACK IN THE WILDERNESS TO START ANEW!!!! AND THIS HAPPENS OVER AND OVER AND OVER AGAIN!!!!!! Where the cycle ends is anyone's guess. 

If SpaceX has it their way this cycle will end this century. I will believe it when I see it. I still think that mankind is headed back to the wilderness to start building again.

So Later down the road data recovery software like mine will become even more important than ever. Why, because in space-time there are at least two copies of all computer files. At least one copy existing on a computer itself. And one copy existing in the informational universe.

THE INFORMATIONAL UNIVERSE IS SPACE-TIME'S RECOVERY DRIVE!!!!

This part is why the C.I.A. and the N.S.A. have a problem with me. Because every computer file in space-time has a second copy existing in the informational universe and I run and TELL EVERY F******* ONE ABOUT IT!!!!

BAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAAHAH!!!!!!!!!!!!!!!!!!!

You see the informational universe it can't be fire walled. You can't track ip adresses going to and from it. You can't identify who is using it. THERE IS NO COMPUTER SECURITY ON THE INFORMATIONAL UNIVERSE AT ALL!!!!!!!!!!!!!!!! ITS FREE, EVERYONE CAN USE IT!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

This is why any computer can be hacked without connecting to it, the internet, or a phone line. Just use methods like what I have talked about all through my blog and programmed in to my software and any computer file existing on any computer anywhere in space-time can be recovered.

And it gets so much worse. Because all information in space-time exist in the informational universe. That means computer files of audio and video and medical records you name it exist on every thing that has ever lived in space-time every where.

The informational universe is gods hard drive. And my methods of data recovery have access to that hard drive. 

So yeah above top secret won't let me post there because what I have really is above top secret. The press is not allowed to touch it. The larger internet is not allowed access to it. Your government tax dollars at work to contain the secret as big as UFO's if not bigger.

The big secret is that a simple computer can run my computer time travel military strength data recovery software such as mine and gain access to every computer file existing within space-time itself as well as all information existing within space-time. That is some really damn big news.

AND THERE IS NOT A F****** THING ANYONE CAN DO ABOUT IT. ANYONE CAN DO IT!!!! FROM THE PRIVACY OF THEIR OWN HOME!!! WITHOUT BEING TRACKED!!!!! WITHOUT BEING TRACED!!!! BECAUSE THERE IS NO COMPUTER SECURITY ON THE INFORMATIONAL UNIVERSE!!!!!!

BAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAAHAH!!!!!!!!!!!!!!!!!!!
BAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAAHAH!!!!!!!!!!!!!!!!!!!
BAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAAHAH!!!!!!!!!!!!!!!!!!!
BAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAAHAH!!!!!!!!!!!!!!!!!!!

It just keeps getting worse and worse for Ray Hudson, Darby Phillips and Pamela. I give those guys no quarter. No place to hide from the truth. No place to run from the truth. The truth is always and forever IN THEIR FACE!!!!
---------------------------------------------------------------------------------------

03/02/2017 12:33 AM

I updated the individual folders with my new code from the bin directory. I moved the individual folders containing my individual projects from the old code directory to the upper level directory. This full fills my plan to have two modes of operation for time travel project. 

I updated sourceforge.net but I will update github later. No one is downloading at github right now and github is more of a pain in the ass to update. So I only update github every so often. Sourceforge.net/projects/timetravelproject I update when I update my code.

The easy application TimeTravel.cpp people can run and people being able to go into the individual project folders and running the code and or editing the code to make it their own and running it. I want people to be able to run the easy application or run the individual projects and make the time travel code their own.

To be honest I don't give a shit what anyone does with my time travel code. I do request acknowledgement of my original work when people modify it but my computer time travel code is for the world  to do with as they f****** well please.

I want all hackers and governments and normal people from all nations on earth around the world to have and use MY COMPUTER TIME TRAVEL CODE!!!!! TAKE IT WORLD IT IS YOURS FOR FREE!!!!!!!!!!! 

AND WHY YOUR TAKING IT GIVE A BIG F****** THINKS AND APPLAUSE TO RAY HUDSON, DARBY PHILLIPS, AND PAMELA FOR MOTIVATING ME TO BRING OPEN SOURCE COMPUTER TIME TRAVEL TO THE WORLD!!!!!!!!

CLAP, CLAP, CLAP, CLAP..... THANK YOU RAY HUDSON, DARBY PHILLIPS, AND PAMELA FOR MOTIVATING REACTOR1967 TO HELP THE WORLD LEARN TO COMPUTER TIME TRAVEL!!!!!!!

THE WORLD THINKS RAY HUDSON, DARBY PHILLIPS, AND PAMELA FOR THEIR SERVICE TO THEIR COUNTRIES!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

BAAAAAAAAAAAAAAAAAAHAHAHAHAHAAHAHAHAH!!!!!

FOR THIS IS REACTOR1967'S WAY OF SHOVING HIS DICK UP YOU GUY'S (TALKING ABOUT "THE CONSPIRACY AGAINST TIME TRAVEL") ASSHOLES!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

WITH NO LOTION OR LUBRICANT OF ANY KIND!!!!!!!!!!!!!!

BAAAAAAAAAAAAAAAAAAHAHAHAHAHAAHAHAHAH!!!!!


BAAAAAAAAAAAAAAAAAAHAHAHAHAHAAHAHAHAH!!!!!




BAAAAAAAAAAAAAAAAAAHAHAHAHAHAAHAHAHAH!!!!!



TAKE IT "CONSPIRACY AGAINST TIME TRAVEL". TAKE EVERY F****** INCH OF IT!!!! 


Take this computer time travel world!!!Take it!!!!!!!!!!!!!!!!!!!!!!!!!!

Thursday, November 24, 2016

COMPUTER CODE FOR THINGS IN THIS BLOG:

download here and use the show more button.

My computer code for Time Travel Project, Burris Numerical System, Armageddon time traveling super A.I. and my other projects here: https://sourceforge.net/u/lloydburris/profile

I am working hard to make everything the "Conspiracy Against Time Travel" Stole from me in the CIA, NSA hacking of me come to the public from my public version of my software. If you want it keep up with the files at sourceforge and download it while you still can. I am posting how it works and I will be posting the computer code for it. And as time goes along I will be upgrading it as much as I can.
--------------------------------------------------------------------------------------------------------------------------

Every day I code is a day closer the public version of my time travel code and my super a.i code and the public version of bns gets a day closer for more and more people around the world to have my technology. 

BAAAAAAAAAAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAHAHAH!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

I spent the beginning of this night updating my files at sourceforge.

I am still testing my regression program. I may write more of them. I am now writing the program that takes the config file from my regression program and generates strong check-sums for time travel computer media files. It will generate files for fire codes and for counter.9.cpp. YEEEEHAAAAAAAAAA!!!!!!!!!!!!!

I have also started working on the public version of Armageddon. I have started transfiguring my technology to it and got my readme file up which explains HOW IT WORKS. I have to get into my archives and get my A.I. that will be the bases for Armageddon and get that uploaded. 

Then I got to get that upgraded then start using my regression lines there.

I have to rewrite BNS in C++ and I am importing technology there to that will make BNS usable to the world.

I also imported predator to Armageddon I will use it to self encrypt the A.I. as it runs. Once that happens the only way to kill Armageddon is to kill the computer the A.I. is on. 

Its inner workings of Armageddon will be protected with encryption. As said Armageddon will use time travel project to time travel for itself to see the future and the past and for parallel super computing and for temporal communication.

ENJOY WORLD - ALL I HAVE IS YOURS!!!!!!!!!!!!!!!!!!!!!!!!!!!

BAAAAAAAAAAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAHAHAH!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

BAAAAAAAAAAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAHAHAH!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

BAAAAAAAAAAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAHAHAH!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
==============================================
Here is the outline for the next phase of time travel project. It will not take me very long to write this. After that I am back to counter9 and my next program which will generate baby strong check-sums in the range of the target check-sums. After that counter 9 and fire codes 2 will be generating time travel computer media. Then I am onto the bots which look at these files and keeps the good ones and delete the bad ones. I also will upgrading, improving, and writing more code. Without further ado here is the outline for the next program at sourceforge.net for time travel project. I am hoping I got my mathematics correct. If not in time I will find that mistake and fix it. Right now I am just trying to get this out to the public. Again, my upgrades are already on the drawing board.
//----------------------------------------------------
// Begin outline of strgsumgenc9.cpp
// ============================================================================================     
// Readme.txt
// This program loads a calculated equation for a regression line and calculates strong check sums based on that regression line.
// This program is for Time Travel Project at sourceforge.net. It is part of a computer time travel project.
// This program will not be very long
// This program loads a config file that looks like this:
// Starting config
// y  = 1472.04615445774715964954992841740022 + -6.69876019552389287623492103147890969e-05 times 689
// y = a + bx 
// 1472.04615445774715964954992841740022 = 1472 -  ( -6.69876019552389287623492103147890969e-05 times 689 ) 
//  a = y - (b times x)
// end config
// This program then makes a counter out of X (weak check-sums) and generates strong check-sums for y by plugging in possible values of the weak check-sums.
// Counter9.cpp will be used to construct this check-sums. I am still finishing up counter 9 to use the pendulum algorithm for solving the counter for the strong check-sum. The pendulum algorithm I spoke about in my previous blog.
//  WARNING - TIME TRAVEL PROJECT MAKES ALL KNOWN AND UNKNOWN INFORMATION IN SPACE-TIME PUBLIC KNOWLEDGE!!!!!!!!!!!!!!!!!!!!!!!!!!!!
// Copyright (C) 2016 http://time-travel.institute
// ============================================================================================
 // declare includes
     #include cstdlib
     #include iostream
     #include stdlib.h
     #include fstream
     #include sstream
     #include string 
     #include cmath
     #include ctime
     #include cstdio
     #include iostream
// ============================================================================================
    // Declare namespace
    using namespace std;
// ============================================================================================     
    // declare globals
       long double y;
       long long x;
       long double a;
       long double b;
    // load regression config file
    int loadregressionconfigfile()
    {
    } 
    // Generate strong sums and write them to file
         // X = weak check sum. This is generated by a counter
         // y = strong check sum. It is computed with an equation
         // then write strong check sums to numbered config files example sch1.txt, sch2.txt, sch3.txt and so forth.
         // This will run in a loop
    int genstrchksums(long long howmanystrongchecksums)
    {
    } 
// ============================================================================================     
// declare subs
// ============================================================================================     
// declare main
    int main (int argc, char *argv[])
    { 
         // declare variables
         int dummyfile = 0;
         long long howmanystrongchecksums;
// ============================================================================================     
         // initilize program
         cout << "How many strong checksums do you want." << "\n";
         cin >> howmanystrongchecksums;
// ============================================================================================     
         // run program
         dummyfile = loadregressionconfigfile();
         dummyfile = genstrchksums(howmanystrongchecksums);
// ============================================================================================     
         // end program
         exit(0);
    } // end of main
// ============================================================================================     
// end outline
// ------------------------------------------------------- 
This program up above has been finished and is ready to download. I have updated timetravelproject.zip at sourceforgel.net

Now I am working on the pendulum algorithm for my final counter that will construct files from their strong check-sums individually then I will go to finishing the algorithm and counter that will do that in parallel.

After that then ITS ALL UPGRADES FROM HERE!!!!!!!!!!

YEEEEEEEEHHHHHHHAAAAAAAAAAAAAAAAAAA!!!!!! THIS OLD COUNTRY BOY CAN PROGRAM NOW. TIME - HACKING IS FUN!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

EVERYONE SHOULD TRY IT!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
---------------------------------------------------------------------------------
I have counter9.cpp decoding but my pendulum algorithm right now is randomly choosing a speed for the experimental counter between 1 byte up to the full byte size of the experimental counter. It rolls the experimental counter until it rolls over and rolls it again until it rolls over. The control counter continuously keeps updating as it gets closer and closer to its destination. The counter upon running creates a lock file. When that lock file is deleted the control counter is written to a file. The user can shut down the computer and reload the control counter the next day and continuing decryption.

When I get this counter uploaded it will make "TIME TRAVEL PROJECT" USABLE!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

LET ME SAY THAT AGAIN. "TIME TRAVEL PROJECT" IS USABLE!!! I'm uploading counter 9 now.

I still have a ton of work to do. I got one more counter after counter9.cpp to write. This will take a strong check-sum and generate baby strong check-sums and write them to config files for fire codes.

I have a lot of cleaning up of counter9.cpp. I will upload what I have now but I am rewritting counter9.cpp to counter 10. I am starting a whole new counter to get it cleaned up and get my upgrades in.

After tonight people can take my time travel code and start TIME-HACKING. But understand it is much an early stage of work. I still still have SO much to do AND MORE TO WRITE. I will upload this counter 9 right now.
------------------------------------------------------------------------------

Here will be the steps for someone using time travel project.
1. The user will collect a sample of known media files.
2. The user will run a program that will take that sample and create a regression line for those files and write them to a configure file. That program is fileregression2.cpp
3. The user will then run a program that takes that configure file and generate strong check-sums for time travel computer media. That program is strgsumgenc9.cpp or firecodesgen.cpp
4. Now, The user selects her/his counter she wants to use to re-construct those time travel media files. That will be counter10.cpp if used strgsumgenc9.cpp or firecodes2.cpp if used firecodesgen.cpp
5. Now the user runs either strgsumgenc9.cpp or firecodes2.cpp counters in series or parallel. I am updating the readme.txt at sourceforge. See Ray you got your wish. I am using sourceforge.net

I am taking out the password. Instead the user creates a weight file. With that weight file the user establishes how many weighted sums to use. This weight file and how many weighted sums is used across the entire time travel project. Now, when the user creates a new project she/he can use a new weight file and figure out how many weighted sums they want.

I am setting up my counters now to run in memory or run as files. Files will be easier for people that don't have a lot of memory.

I am writing counter 10 now. I have to go back and update the configure file part in my program that generates the time travel media check sums. It has to include the file size in that configure file. That won't take but a few minutes to get that in.

Then this week I will finish up counter 10 for files. Next week start on counter 10 for memory.

Then get write program that takes those generated config files and makes a fire codes project for them.

I need to start tracking bugs now too.

I am going back and setting everything up where it has to be run from the command line and finally I will write GUI for it. The programs will stop asking the user questions. Everything is ran from command line and config files and bash/bat files. When I am done I will compile this over to windows.

And, I am pretty much done writing algorithms now. From here I will mainly just be up grading algorithms.

Well Ray Hudson, Darby Phillips, Pamela, and Aaron Hiniker. I can now safely say my revenge against you guys in coming into bloom. A little hint for you guys. Time Travel Project has been uploaded to TOR!!!! Its unstoppable now. And this is being upgraded. The "CONSPIRACY AGAINST TIME TRAVEL" IS LOOSING THE TIME TRAVEL WAR!!!!! The "CONSPIRACY AGAINST TIME TRAVEL" HAS FAILED!!!!!!! 

Ray Hudson and Darby Phillips and Pamela boy the CIA and the NSA will appreciate you pushing me to make every fucking computer in the past and the future and alternate time-lines hack-able with time travel project and no way to trace the fucking hack!!! 

ENJOY - GRINNING, SMILING, MORE GRINNING.

YOU SEE RAY HUDSON WHO IS A CIA WEAPONS AND TECHNOLOGY INTELLIGENCE ANALYSIS TOLD ME TO "PROVE IT!" AT HIS HONEY POT WEBSIGHT HTTP://TIMETRAVEL.INSTITUTE. THE FAKE ONE NOT MINE.

SO HE IS A AGENT FOR THE USA GOVERNMENT. SO THE USA GOVERMENT GAVE ME PERMISSION VIA RAY HUDSON TO POST TIME TRAVEL COMPUTER CODE ON THE INTERNET THAT ALLOWS TIME TRAVEL WITH A COMPUTER AND TIME-HACKING AND HACKING COMPUTERS WITHOUT EVER CONNECTING TO THEM.

THE USA GOVERNMENT VIA RAY HUDSON GAVE ME PERRMISSION TO GIVE COMPUTER TIME TRAVEL TO THE WORLD!!!

WELL RAY I SENT THIS OFF TO OTHER GROUPS AROUND THE INTERNET. THE JENNY IS OUT OF THE BOTTLE!!!

THIS IS ON YOUR HEAD RAY HUDSON. THAT IS ON YOU!!!!!!!!!!!!!!!!!!!!!!!!(TALKING TO RAY HUDSON)

RAY HUDSON TOLD ME TO PROVE IT!!!!! AND I DID!!!!!!!

SO IF THE CIA, NSA, THE PENTAGON, AND THE DEPARTMENT OF DEFENSE HAVE A PROBLEM WITH MY TIME TRAVEL CODE BEING OPEN SOURCE PUBLIC INFORMATION  THEY CAN COME TALK TO RAY HUDSON!!!!

THAT SON A BITCH TOLD ME TO PROVE IT AND TOLD ME TO POST MY CODE SOMEPLACE ELSE OTHER THAN HIS HONEYPOT WEBSIGHT. AND I DID!!!!

BAAAAAAAAAAHAHAHAHAHAHAHAHAHAH!!!!!!!!!!!!!!

RAY HUDSON BE VERY CAREFUL WHAT YOU ASK FOR. YOU MIGHT ACTUALLY GET IT!!!

BAAAAAAAAAAAAAHAHAHAHAHAHAH!!!!!!!!!!!!!!

-------------------------------------------------------------------------------

Now that I have the regression program that plots a regression line for weak and strong check sums there is more to that program I have to get up. You see. Along each point of the regression line there is a root mean square and standard deviation with the time travel computer media check sums being mathematically calculated. So, I have to take the regression line and the sample of known computer media files to produce the root mean square and standard deviation. So, I will write a second regression program but now this one will focus on the root mean square and standard deviation producing check-sums to be reconstructed. 

Once I get that into the program more check-sums for time travel computer media can be produced that can be re-constructed into actually time travel computer media files.

And last with regression once a lot of time travel projects have been done all those regression lines can be put on a map and now statistically it is possible to plot areas of the map where other regression lines lay. So, now the more time computer time travel is done the more the time travel program can be expanded.

Later I have to go back and put in the programs in the sections where check-sums are calculated and now the check-sums will be written to a file and no digits will be lost.

The programs will be expanded to work with check-sum files or check-sum arrays.

My blog here as difficult as Pamela (the CIA's forum bait) might find to read or as difficult as others might find this blog to read this blog is actually a "HOW TO MANUAL FOR COMPUTER TIME TRAVEL". Plain and simple.  

Right now I am going to go ahead and focus on counter10 and my fire-codes-config-file-generator.cpp before doing all I mentioned above.

And now no one has just the blog to read. They can goto sourceforge and get the time travel code and experiment with computer time travel as much as their hearts desire. To Ray Hudson's and Darby Phillips horror!!!. Hahahah......
----------------------------------------------------------------------------
I won't be using the Shannon equation in my computer time travel code. Instead I am replacing the Shannon equation with randomness test and other test. I am in the mist of writing a random number generator. My code now will go to using weight files and random number files. That way users of my computer time travel code if they want can generate their own files or use my programs to generate their files. It makes my stuff more easier to use.
My random numbers will pass or should pass any randomness test. They will be cryptography strength to use in my programs.

The reason they will be cryptography strength is because I am using the randomness test to generate my random number files. I have two random number programs to write. 
1. For generating the random numbers.
2. For using the random numbers generated.

My algorithm for generating random numbers is this.
filesize / 255 = How many times in the file each number from 0 to 255 can be used. They should all occur the same number of times.

filesize / 255 = How often each number occurs. Each number from 0 to 255 should occur with the same amount of frequency.

Then of course I am going randomly pick the order of the numbers from 0 to 255 to be used in the file with their same frequency and same frequency of occurrence.

And for what I am doing this should be enough. Oh shit Pamela I made my blog longer again. Its time for Pamela to bang her head on the wall. 

BAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAH!!!!!!!!

That is a joke from Above Top Secret dot com. That is the last place the "Conspiracy Against Time Travel" ran me off from.

Hey Pamela I got one word for you.
"Beeeeeeeaaaaaaaaaaiiiiiiiiiiiiiitttttttttttcccccccccchhhhhhh!!!!!!!!!

Pamela seems like the type of women that only has all male friends and "SLEEPS WITH EVERY ONE OF THEM!!!".

BAAAAAAAAAHAHAHAHAHAHAHAHAHAHAHAHAHAH!!!

So I guess Darby Phillips gets his pity fucks and when Ray Hudson is not in Las Vegas fucking whores he gets a little. And even probably old little Aaron Hiniker sneeks him some too from time to time.

Yeah and when Pamela is not around I am sure that Ray Hudson, Darby Phillips, and Aaron Hiniker they all satisfy each other. Poor Aaron is probably the bitch in the group most of the time. I bet he is Pamela's bitch too. Poor Aaron Hiniker. He was fucked from the minute he met that group.

The "Conspiracy Against Time Travel" is just one big happy bi-sexual orgy.

BAAAAAAAAAAHAHAHAHAHAHAHAHAHAHAHA!!!!!
-------------------------------------------------------------------------------

I uploaded my Lottery A.I. to sourceforge. I will use it in time travel project to track one days news paper or news video to the next day. It will get me close then I can use my counters to clean up the file. Lottery A.I. is at http://sourceforge.net/projects/lottery-ai/
I am working on my random number generator tonight but my brother is texting the hell out of me and slowing down my work. But, im getting there.
-----------------------------------------------------------------------------
I have cryptography grade random numbers now for my counter10.cpp. The size of the speed.bin can be random or linear that is up to the user running the counter10.cpp but the numbers within that speed.bin are copied from a almost perfect random number file.

 Counte10.cpp reads a config file. Generates a random experimental counter file (so no counter has the same experimental counter file) if or when this runs in parallel. The user can do either.

I still need to set it up so each counter10.cpp so it reads the same control counter and when a closer match to the target is made that control counter is updated so all the counters have it. 

I believe I will have a lock file system in place so each counter10.cpp program can have access to the control counter 1 at a time when it needs updated. The file will look for a lock file. If not there it will create one then access the control counter and delete it when done. It will also check the control counter to make sure it is not a better match before it updates it.

And on each run each counter 10 will update its diff with the control counter so all the parallel counters are on the same page.

But each counter10.cpp has its own experimental counter which is different from all the others.

This will be bad ass for de-crypting time travel computer media files out of space-time. And can be used to decrypt or encrypt anything else. Just modify how the destination and target is used.

But, I am not writing an encryption program so if someone wants it for that they will have to modify my code. In the future this is for the purpose of killing encryption as the world knows it not saving it.

And as I go along this will get more bad ass each day. Wait until I upgrade it for unlimited file size.

As I said when the public starts computer time traveling the government can come talk to Ray Hudson about it. Its all his fault. This is on him.

Ray Hudson started it, Darby and Pamela backed him up, and I will finish it. 

Ray Hudson breaks the law and commits crimes against me for which law enforcement won't do anything because he is CIA. 

Since I am a law bidding citizen and I don't have hackers and other people helping me and the tax payers money at my beck and call so this is the best way for me to get my revenge. I am getting my revenge by bringing this to the world. Then if anyone or anything that has a problem with this can go talk to Ray Hudson.

Before I am done programming tonight counter10.cpp what I have of it will be setting at time travel project at sourceforge.net

I am bringing computer time travel to the world.
I am bringing super time traveling A.I.'s to the world.

Then, let the world judge the "Conspiracy Against Time Travel" for who and what they really are. A bunch of thugs and criminals working for the CIA.

And finally no information in space-time is safe from any one or anything. 

Everyone can have access to it. Everyone can have access to "GODS COMPUTER FILES".
-------------------------------------------------------------------------------
Well I got as far as I am going to go tonight. I finished up my random number generator(it works good but I have more upgrades planned for it), Got a good start on counter10.cpp, and created the c++ file for fire codes 2 project generator. Fire codes project 2 generator with a strong check sum make a fire codes 2 project out of it by busting the adult strong check sum into many little baby strong check sums and load them into config files that can be loaded and processed by fire codes 2. 

Then fire codes 2 will take those small strong check sums and reconstruct them as file fragments. Then all the file fragments will be joined into one large file using the cat command linux. I decided not to write a lot of routines that linux already has. Window users will have to try to find like commands in windows or buy third party software. That is why I am not a fan of windows. Windows sucks in my book.

Now counter 10 can work with one large check sum or baby check sums. 

Both fire codes 2 and counter 10 can be ran in parallel or just a single instance of the program.

fire codes 2 will be able to use counter 10 to reconstruct its baby check sums or it can use linear counters on its check sums to reconstruct them.

Fire codes 2 has to have the strong check sum busted down into baby check sums to reconstruct the time travel computer media file but counter 10 does not. 

So, I may make fire codes project generator, fire codes 2 and counter 10 my only counters in time travel project since they can all work together to get a computer time travel project hammered out in a short amount of time. I am setting up some more versatility in counter 10 and above. That counter will be the die hard, configurable and a counter that can have functions easily added to it or configured.

I will for myself get strong check sums from my file regression programs and pass them off to both counter 10, and fire codes project generator then to fire codes 2 and have all my bases covered. I will let it all run and see how finishes first and what is best.

Time Travel Project is a project people can check-sum hack or time hack with. They can take my code and play with everything I have talked about in this blog over the years or make their own experiments. If I can get Time Travel Project up to production speed I am sure I can lure a few people to play with check-sum hacking and time hacking like I have over the years.

I got a message for the "Conspiracy Against Time Travel". That would be Ray Hudson, Darby Phillips, and oh yes you too miss Pamela I would not want to leave you out. Here we goooo.

Playing music - "Ohhhh what you going to dooooooo?" Ohhhhhh what you going to dooooooooo?" Ohhhhh..............

BAAAAAAAAAAAAAAAAAAAAAAAAHAHAHAHAHAHAH!!!!!!!!!!!
-------------------------------------------------------------------------------
Tonight I decided to take all my most used subroutines and make a header file out of them. When  I need to upgrade then I can upgrade my functions that I wrote my header file with instead of going back through every damn program and upgrading each program individually with their subroutines. I will end up rewriting my main programs to use the header file.

I found this out when I kept copying subroutines over from one program to the next and I told myself just make a damn header file then include the file and I'm good.

Once I get that down I can go back and rewrite my main code. Then from there its all gravy when I change stuff.

Anyone using time travel project can use counter 9 right now until I get a upgraded throttled counter. I don't have fire codes generator up just yet. So, I am going to get that header file programmed and tested out. Then finish counter 11. Then goto fire codes configure files generator and the other programs in this project

Well most of my code now will be header files and or libraries. The main program in my code will now get mighty small. My progress on this time travel project will speed up tremendously since any upgrades I do will be to my headers and libraries only.

I have to write a make file for compiling this project too. I am hoping I can get all my functions into 1 header file only. I am pretty sure I can. I can write my whole time travel project into a header file if I want. I am going to call this header file 

timecheckhacking.h

Then when I upgrade I just upgrade the h file and the function.cpp files. Boy, this just keeps getting worse and worse for Ray Hudson and Darby Phillips and Pamela. I should of done this all along but I got lazy. Damn - I am going to write most of Armageddon's functions into a Armageddon.h file. Then use that in my artificial intelligence files. Armageddon is going to be really bad ass when I get time travel project done for the public. 

Boy its cyber monday. I almost bought a AMD FX9590 processor with a expensive mother board AM3+ and water cooler with a expensive power supply and a expensive case with 32 gigs of ram and a expensive video card and a damn big hard drive. I was going to make it another one of my time hacking computers. But, Tigerdirect would not take paypal. Use too they would. Oh well. I need another computer like I need Ray Hudson and Darby Phillips poking around my home network. Moving on....

For the most part I have my algorithms figured out for running time travel project. Though when I am done and people start using this I am sure there will be a lot of people pissed off because my project can construct any computer file existing anywhere in space-time WITHOUT CONNECTING TO THE COMPUTER THAT HAS THAT FILE!!!! Hell that file don't even have to ever be created time hacking can create it anyway. A good example is videos of dinosaurs in their natural environment. Time hacking can do that shit.

Well all I got to say is if anyone has a problem with time hacking they can go talk to Ray Hudson. He started all this shit. Its all his fault. I tried to keep my code private but NO THAT STUPID MOTHER FUCKER RAY HUDSON WANTED TO HACK ME. Now I AM FORCED TO GIVE IT TO EVERYONE ELSE TOO BECAUSE I CAN'T LET THIS FALL INTO ANY ONE PERSON'S, AGENCY, OR COUNTRIES HANDS. AGAIN ITS ALL RAY HUDSON'S FAULT. 

So who ever what ever gets time-hacked they can take it up with Ray Hudson!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

So anyone got a problem with this go talk to RAY HUDSON!!!!
He hacked me so I had to give it to the public to make things right.

Ray Hudson is a EVIL BASTERED!!!! HE WAS TRAINED BY THE CIA'S MKULTRA SCIENTIST THAT FUCKS WITH PEOPLES HEADS FOR A LIVING.

HE WAS TRAINED TO BE AN EVIL BASTERED BY THE BEST OF ALL EVIL BASTEREDS.

ALL THE HELL ARMAGEDDON AND TIME HACKING RECKS ON PLANET EARTH IS RAY HUDSON'S FAULT!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
---------------------------------------------------------------------------------

Well I am really doing good now. All those subroutines I was putting in my files and copying all those routines from program to the other those days are over. All my check-sum hacking/Time-hacking routines will in a header file called timecheckhacking.h.
I declare my routines in my header file only but in the bulk of the code is in the f1.cpp, f2.pp, f3.cpp and so forth. When I compile the main with my header file everything is compiled into the main program.

My final timecheckhack.h will contain all one needs to check-sum hack and time hack. The header file will able run my binary counters, it will generate random numbers, it will generate weights for calculating strong check sums, It is going to do it all. What ever is needed for check-sum hacking and time hacking. All one needs is to put it in a main program and call the functions. I will try to document it well. 

Fire Codes 1 all ready works. So, I won't fix what is not broken. So, I won't mess with fire codes 1. But the rest of my work will include my new header file in the future.

My final counters and programs will put it all out there for the public to see. Then since my public version of my time travel code is out there I can keep what ever the "Conspiracy Against Time Travel" failed to steal from my proprietary code secret.

Then I can finally get back to time-hacking again. This time when Ray and Darby are in my home network with their malware and virus I will reimage my computers and keep on running my time hacking code. Not giving a shit. I have been working on a way to put up a lot of damn fire walls between us.

And Ray Hudson and Darby Phillips would of lost yet again against me. They will never win their little war against me. Ever.

When I am done with my public open source time travel code and super A.I. Armageddon code, when all my books hit the shelves, hell, I may even send in my scientific paper.

There will be very little the "Conspiracy Against Time Travel" can do to disprove my claims and to disprove me out right. Ray Hudson is accountable because of his criminal activity against me. And I will go back to my old life time hacking and running Armageddon and what ever else I want to do.
----------------------------------------------------------------------------------
When I get "Time Travel Project" to a good stopping point I will setup bash scripts and start and start programs on a schedule on my linux desktop. And guess what. It won't be hooked up to the internet. I will have all the information in space-time at my finger-tips and no way for the "Conspiracy Against Time Travel" to hack me except WITH MY OWN TIME TRAVEL CODE. 

But, that is what my time travel code is for. To end privacy and make all computers in space-time public information.

But, I think the "Conspiracy Against Time Travel" is too stupid to use my software. Even if they came into my home and took my shit it is so damn encrypted those SOB's still wouldn't have a chance.

Hell, I win either way. Everyone be looking for my books in your nearest book store. Well, I got programming to do tonight so I had better get to it.
---------------------------------------------------------------------------------
timecheckhacking.h is for the most part mostly finished. From time to time it will be upgraded and re-written. But, now people can experiment with check-sum hacking and time-hacking by using my header file and using the functions in their main programs.

Boy, it just keeps getting worse and worse for Ray Hudson, Darby Phillips, and Pamela.
BAAAAAAAAAAAAAAHAHAHAHAHAHAHAHA!!!!!!!!!!!

Now I am back to writing counters and strong check sum reconstruction programs for the purpose of check-sum hacking and TIME HACKING!!!!! 

Downloads at https://sourceforge.net/projects/timetravelproject/

YEEEEEEEEEEHHHHHHHHHAAAAAAAAAAAAAAAAA!!!!
----------------------------------------------------------------------------------