home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   alt.celebrities      We're supposed to give a shit about them      3,205 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 3,045 of 3,205   
   crazywax3@gmail.com to All   
   Technologies for Warfare & Stories Perta   
   29 Jun 13 18:48:09   
   
   Two kids in a supermarket were roaming around to have irresponsible fun. They   
   grabbed two swordfish saying, in Order to mock your enemy you must stab them   
   with a swordfish. In which they grabbed liquor and took off to the pickup   
   truck to rip the city's    
   backsides. There were 3 other dudes in the back of the pickup truck armed with   
   Baseball bats..one of them was considered 'The Disk Dude'..in which the car   
   recycled 3 tracks:    
      
   1)Danzig's Mother    
   2)Billie Holiday    
   3)Revolting Cocks    
      
   The car repeated the 3 tracks to set the tempo as they inconspicuously entered   
   a Latino neighbor filled with the worst scum which was 70% asshole per   
   capita.. The dudes in the back of the pickup truck said, "Hey you fucking   
   Cantelopes! Come and get it!"    
   They threw cantelopes at the Latinos with minimal speed in which they   
   sidetracked the Latinos..then the driver an AOL user (AssholesOnline) pressed   
   the accelerator to a good 30mph..the dudes in the back readied their baseball   
   bats and measured it    
   according to Danzig that was now playing. Then the Latinos In the area jolted   
   after the pickup armed with knives though some of them weren't armed at all.   
   So the driver slowed down to a good 20mph as the Latinos being fast runners   
   caught up to the back    
   of the pickup truck in which the 3 dudes swung their bats at those within   
   range whacking their Noses off..they had more people catch up to the moving   
   truck as they Whacked their noses Off.    
   The car kept on moving and the track switched to Billie Holiday. It was a   
   night of irresponsible Fun.    
      
   Cause if there was no Hell life would have no restraints and mortality would   
   be exploited.    
      
   Irresponsible Fun and the Argument- by Seung Bum Kim   
      
   Now by using Gaits to track and confirm patterns as to a person's web    
   activity, then the Gaits can be used to bundle associated names and    
   then to relay all Turin Associated superstring elements that are    
   inextricably linked to detected Gait patterns causing an activation of    
   the bomb through various terminals and precisely the terminals that    
   belong to all people associated with the dominant string variable so    
   that it causes Phone extermination of friends and associates.    
      
   Gaits Sent in Multi-directions - by Seung Bum Kim (c)opyright 2012    
      
   Now if users swift Name detection through slick manuevers where    
   Winston could be spelled Win5ton Gaits can be used to track names. In    
   which Gaits should be added to read specific patterns where Turin    
   Association of Patterns can lead to name retrieval by causing pattern    
   ID. In which through this if a user goes under a secret name their    
   identity can be tracked through Gait detection of internet activity.    
      
   Secretized User ID for Computer Bomb Tracking Device- by Seung Bum Kim    
      
   Now this is not made use of there is yet value..but the use of it    
   through Praxis would create infinite more value for the project..I am    
   doing this to make a scientific breakthru that is more than theory    
   since computers operate semantically anyways. But with this work, the    
   use of it though it is my invention is a matter of the user's personal    
   choice not mine..I am presenting controversial knowledge and to use it    
   would not imply that I held a gun to his face in order to pressure him    
   to use it..and if it used in mass numbers then it actually reveals the    
   nature of Americans..so it is out of my hands.    
      
   Final Word on the Computer Bomb Script -by Seung Bum Kim    
      
   Now I already know it's not within my rights to do this, but I don't    
   give a hoot about rights since martyrs don't have rights either. So    
   fuck and free for all. If it hindges against Truth, then I don't want    
   to have anything to do with Truth anyways..so Make the software,    
   distribute it, and Use it.    
   -sEung b. kim    
   Botnet usage can allow you to make dummy system do your bidding only    
   if you initially disease the computer through botnet. In which    
   through Onion Router relay of the script if the script is made to be    
   sent through the dummy system by suspension of derivative relay    
   information from the main system through the Onion Router where it is    
   amnesaically registered to Onion Router on a live application where    
   FireFox is used to cause masking through $SYS$ firefox then the dummy    
   computer is framed and you can use the Turin approach to blame it on    
   numerous systems by causing the dummy system to connect with other    
   dummy systems through amnesiac programming rather than systems that    
   are live and hence suspectible to be logged by headquarter systems.    
   And if this is activated by use of a cellphone device that ties    
   numerous lines together through cellphone connection to the terminal    
   and the specific access # that activates a pre-set directive to    
   launch    
   the script the launch is done inconspicuously since the source would    
   evidently be the cellphone where thus if you put two wifi signals    
   together it jams wifi readings completely as through this there is no    
   evidence of your script activated on many or numerous systems.    
   Botnet and Cellphone Entry for Covert Operation -by Seung Bum Kim    
   Futhermore, cracking the computer bomb script can be done where it    
   various related programs are installed as a bunch of hidden programs    
   in the machine where despite daily inspection the installed data is    
   hidden. This can be done by downloading a DVD image, burning it,    
   sticking it in the website and then to boot it while holding downa    
   bunch of different keys at the same time which can be complied as a    
   function for the computer bomb script as then many items sended can    
   be    
   installed into systems to hatch the computer while yet hidden as God    
   playing Dice where it cannot be seen. Superstring data can be tied    
   for    
   name association as eg. Egg = Sunnyside. So that the software can    
   work    
   in name association to superstring location through equivalency.    
   Now for another addage to the computer bomb software one should make    
   the name of your fireFox program into $SYS$ fireFox since any program    
   under the name $SYS$ is invisible to the operating system as it    
   becomes invisible to Windows and thus invisible to network's    
   snoopware. Covert use of the computer bomb must be through Onion    
   Routers that pass website information through onion layers as it is    
   passed to each layer of the onion until it reaches you so guise web    
   communication activity even of the activated computer bomb. This way    
   addresses or naughty addresses aren't detected on the blacklist. And    
   the script should cause SMS transference of information so that it    
      
   [continued in next message]   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca