Forums before death by AOL, social media and spammers... "We can't have nice things"
|    alt.celebrities    |    We're supposed to give a shit about them    |    3,205 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 3,045 of 3,205    |
|    crazywax3@gmail.com to All    |
|    Technologies for Warfare & Stories Perta    |
|    29 Jun 13 18:48:09    |
      Two kids in a supermarket were roaming around to have irresponsible fun. They       grabbed two swordfish saying, in Order to mock your enemy you must stab them       with a swordfish. In which they grabbed liquor and took off to the pickup       truck to rip the city's        backsides. There were 3 other dudes in the back of the pickup truck armed with       Baseball bats..one of them was considered 'The Disk Dude'..in which the car       recycled 3 tracks:               1)Danzig's Mother        2)Billie Holiday        3)Revolting Cocks               The car repeated the 3 tracks to set the tempo as they inconspicuously entered       a Latino neighbor filled with the worst scum which was 70% asshole per       capita.. The dudes in the back of the pickup truck said, "Hey you fucking       Cantelopes! Come and get it!"        They threw cantelopes at the Latinos with minimal speed in which they       sidetracked the Latinos..then the driver an AOL user (AssholesOnline) pressed       the accelerator to a good 30mph..the dudes in the back readied their baseball       bats and measured it        according to Danzig that was now playing. Then the Latinos In the area jolted       after the pickup armed with knives though some of them weren't armed at all.       So the driver slowed down to a good 20mph as the Latinos being fast runners       caught up to the back        of the pickup truck in which the 3 dudes swung their bats at those within       range whacking their Noses off..they had more people catch up to the moving       truck as they Whacked their noses Off.        The car kept on moving and the track switched to Billie Holiday. It was a       night of irresponsible Fun.               Cause if there was no Hell life would have no restraints and mortality would       be exploited.               Irresponsible Fun and the Argument- by Seung Bum Kim              Now by using Gaits to track and confirm patterns as to a person's web        activity, then the Gaits can be used to bundle associated names and        then to relay all Turin Associated superstring elements that are        inextricably linked to detected Gait patterns causing an activation of        the bomb through various terminals and precisely the terminals that        belong to all people associated with the dominant string variable so        that it causes Phone extermination of friends and associates.               Gaits Sent in Multi-directions - by Seung Bum Kim (c)opyright 2012               Now if users swift Name detection through slick manuevers where        Winston could be spelled Win5ton Gaits can be used to track names. In        which Gaits should be added to read specific patterns where Turin        Association of Patterns can lead to name retrieval by causing pattern        ID. In which through this if a user goes under a secret name their        identity can be tracked through Gait detection of internet activity.               Secretized User ID for Computer Bomb Tracking Device- by Seung Bum Kim               Now this is not made use of there is yet value..but the use of it        through Praxis would create infinite more value for the project..I am        doing this to make a scientific breakthru that is more than theory        since computers operate semantically anyways. But with this work, the        use of it though it is my invention is a matter of the user's personal        choice not mine..I am presenting controversial knowledge and to use it        would not imply that I held a gun to his face in order to pressure him        to use it..and if it used in mass numbers then it actually reveals the        nature of Americans..so it is out of my hands.               Final Word on the Computer Bomb Script -by Seung Bum Kim               Now I already know it's not within my rights to do this, but I don't        give a hoot about rights since martyrs don't have rights either. So        fuck and free for all. If it hindges against Truth, then I don't want        to have anything to do with Truth anyways..so Make the software,        distribute it, and Use it.        -sEung b. kim        Botnet usage can allow you to make dummy system do your bidding only        if you initially disease the computer through botnet. In which        through Onion Router relay of the script if the script is made to be        sent through the dummy system by suspension of derivative relay        information from the main system through the Onion Router where it is        amnesaically registered to Onion Router on a live application where        FireFox is used to cause masking through $SYS$ firefox then the dummy        computer is framed and you can use the Turin approach to blame it on        numerous systems by causing the dummy system to connect with other        dummy systems through amnesiac programming rather than systems that        are live and hence suspectible to be logged by headquarter systems.        And if this is activated by use of a cellphone device that ties        numerous lines together through cellphone connection to the terminal        and the specific access # that activates a pre-set directive to        launch        the script the launch is done inconspicuously since the source would        evidently be the cellphone where thus if you put two wifi signals        together it jams wifi readings completely as through this there is no        evidence of your script activated on many or numerous systems.        Botnet and Cellphone Entry for Covert Operation -by Seung Bum Kim        Futhermore, cracking the computer bomb script can be done where it        various related programs are installed as a bunch of hidden programs        in the machine where despite daily inspection the installed data is        hidden. This can be done by downloading a DVD image, burning it,        sticking it in the website and then to boot it while holding downa        bunch of different keys at the same time which can be complied as a        function for the computer bomb script as then many items sended can        be        installed into systems to hatch the computer while yet hidden as God        playing Dice where it cannot be seen. Superstring data can be tied        for        name association as eg. Egg = Sunnyside. So that the software can        work        in name association to superstring location through equivalency.        Now for another addage to the computer bomb software one should make        the name of your fireFox program into $SYS$ fireFox since any program        under the name $SYS$ is invisible to the operating system as it        becomes invisible to Windows and thus invisible to network's        snoopware. Covert use of the computer bomb must be through Onion        Routers that pass website information through onion layers as it is        passed to each layer of the onion until it reaches you so guise web        communication activity even of the activated computer bomb. This way        addresses or naughty addresses aren't detected on the blacklist. And        the script should cause SMS transference of information so that it               [continued in next message]              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca