Forums before death by AOL, social media and spammers... "We can't have nice things"
|    alt.celebrities    |    We're supposed to give a shit about them    |    3,205 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 3,060 of 3,205    |
|    crazywax3@gmail.com to All    |
|    5 Diabolical Breakthrus (Letters to Cleo    |
|    12 Jan 14 05:56:32    |
      Cultural chaos is a growing phenomenon due to the loosened grip of religion       and mass consumerism. In which cultural chaos manifested during the initial       stages of warfare. It was considered the secondary culture in the MiddleAges       but in higher quarters        it was considered formless and even barbaric. It is now fueled mainly by       Foxnews media in which the tv is a Simulacra device. And we celebrate       tragedies where we were complicit with the Attacks. And cultural chaos which       is the phenomenon of the Beast        and disorder is Quintessentially found in Disneyland. -sEung b. kim       Now by using Gaits to track and confirm patterns as to a person's web        activity, then the Gaits can be used to bundle associated names and        then to relay all Turin Associated superstring elements that are        inextricably linked to detected Gait patterns causing an activation of        the bomb through various terminals and precisely the terminals that        belong to all people associated with the dominant string variable so        that it causes Phone extermination of friends and associates.               Gaits Sent in Multi-directions - by Seung Bum Kim (c)opyright 2012               Now if users swift Name detection through slick manuevers where        Winston could be spelled Win5ton Gaits can be used to track names. In        which Gaits should be added to read specific patterns where Turin        Association of Patterns can lead to name retrieval by causing pattern        ID. In which through this if a user goes under a secret name their        identity can be tracked through Gait detection of internet activity.               Secretized User ID for Computer Bomb Tracking Device- by Seung Bum Kim               Now this is not made use of there is yet value..but the use of it        through Praxis would create infinite more value for the project..I am        doing this to make a scientific breakthru that is more than theory        since computers operate semantically anyways. But with this work, the        use of it though it is my invention is a matter of the user's personal        choice not mine..I am presenting controversial knowledge and to use it        would not imply that I held a gun to his face in order to pressure him        to use it..and if it used in mass numbers then it actually reveals the        nature of Americans..so it is out of my hands.               Final Word on the Computer Bomb Script -by Seung Bum Kim               Now I already know it's not within my rights to do this, but I don't        give a hoot about rights since martyrs don't have rights either. So        fuck and free for all. If it hindges against Truth, then I don't want        to have anything to do with Truth anyways..so Make the software,        distribute it, and Use it.        -sEung b. kim        Botnet usage can allow you to make dummy system do your bidding only        if you initially disease the computer through botnet. In which        through Onion Router relay of the script if the script is made to be        sent through the dummy system by suspension of derivative relay        information from the main system through the Onion Router where it is        amnesaically registered to Onion Router on a live application where        FireFox is used to cause masking through $SYS$ firefox then the dummy        computer is framed and you can use the Turin approach to blame it on        numerous systems by causing the dummy system to connect with other        dummy systems through amnesiac programming rather than systems that        are live and hence suspectible to be logged by headquarter systems.        And if this is activated by use of a cellphone device that ties        numerous lines together through cellphone connection to the terminal        and the specific access # that activates a pre-set directive to        launch        the script the launch is done inconspicuously since the source would        evidently be the cellphone where thus if you put two wifi signals        together it jams wifi readings completely as through this there is no        evidence of your script activated on many or numerous systems.        Botnet and Cellphone Entry for Covert Operation -by Seung Bum Kim        Futhermore, cracking the computer bomb script can be done where it        various related programs are installed as a bunch of hidden programs        in the machine where despite daily inspection the installed data is        hidden. This can be done by downloading a DVD image, burning it,        sticking it in the website and then to boot it while holding downa        bunch of different keys at the same time which can be complied as a        function for the computer bomb script as then many items sended can        be        installed into systems to hatch the computer while yet hidden as God        playing Dice where it cannot be seen. Superstring data can be tied        for        name association as eg. Egg = Sunnyside. So that the software can        work        in name association to superstring location through equivalency.        Now for another addage to the computer bomb software one should make        the name of your fireFox program into $SYS$ fireFox since any program        under the name $SYS$ is invisible to the operating system as it        becomes invisible to Windows and thus invisible to network's        snoopware. Covert use of the computer bomb must be through Onion        Routers that pass website information through onion layers as it is        passed to each layer of the onion until it reaches you so guise web        communication activity even of the activated computer bomb. This way        addresses or naughty addresses aren't detected on the blacklist. And        the script should cause SMS transference of information so that it        fills the memory of the cellphone and causes it to 'choke' on the        routine operations causing system freeze again I add so that this can        be done on computer systems to cause time elapsed freezing in which        an        alternate and internal source of energy can be used to cause        necessary        hatching of the script even if the powerplug is pulled temporarily        causing an irrefutability effect.        Invisibility Cloak for Computer Bomb Script with Irrefutability        Freezing Process - by Seung bum Kim        By using gait dodging script addages one can evade security detection        absolutely. In which by causing patternistic combinations of those on        websites or to use combinatory mathematical unification of matrix        sets        the combined pattern made into fractal form would cause pattern        confusion through combined gait patterns or a 'collection' of        internet        record entries. This can be done using botnet so that dummy systems        can in their gait pattern records could be meshed to form a singular        pattern of internet activity thus causing a blur in which gaits        cannot        detect your activity online with further ramifications where pop-up               [continued in next message]              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca