Recent content by Reactor1967

  1. Reactor1967

    Time-Hacking with computers and algorithms

    To help clarify how to find files it is possible to take a sample of known files and using the weak and strong check-sums plot a line on a x,y chart. This line is called a regression line. Now, files that are like the files in the sample that I don't have their check-sums will be along that...
  2. Reactor1967

    Time-Hacking with computers and algorithms

    1. A binary counter uses all possible bytes. A text counter only runs with text or the bytes used to display text. 2. When scanning for emails with a text counter that email can exist in the past, present, future, or alternate time lines. I have to use statistics to calculate the check-sum range...
  3. Reactor1967

    One man building his time machine with computers and algorithms

    In Einstein’s space-time all space-time exist at the same time. Since all space-time exist at the same time that means all computer files exist at the same time. By using a science of check-sum hacking files can be reconstructed with their check-sums. So, a programmed binary counter that can...
  4. Reactor1967

    Time-Hacking with computers and algorithms

    Now, as I was trying to explain. The counter becomes the 5th dimension for which time travel is possible and allowed by the laws of physics. And now, on the counter after it is mathematically organized time travel media becomes points of travel, destinations to visit, on the counter. A time...
  5. Reactor1967

    Time-Hacking with computers and algorithms

    The out come of my experiments have varied from time to time. I have been able to get some pretty good stuff but also at times it was a struggle to get anything at all. Practice and more practice was the key. I learned a few lessons about files and check-sums. Things that I never expected. Like...
  6. Reactor1967

    Time-Hacking with computers and algorithms

    Now using the counter has a hacking device the counter turns into a 5th dimensional simulator since time becomes the thing that is hacked. Now, physics holds true that time travel is possible through the 5th dimension. So, using the counter as a 5th dimensional simulator with the proper...
  7. Reactor1967

    Time-Hacking with computers and algorithms

    First starters BNS stores and retrieves numbers mathematically in space and time using the concepts of a reference point observing its event which is carrying information and with each place value in a number being a pointer to its previous place value. This is so only the last place value in...
  8. Reactor1967

    Time-Hacking with computers and algorithms

    There is so much already in my blog and on my sight. First starters I suggest you start there I also have abook which you can google if your interested. Im working on finishing up a commercial program for my BNS which I still have a lot of work to go to get it to production grade. BNS will...
  9. Reactor1967

    Time-Hacking with computers and algorithms

    A long time ago I tried an experiment with a text counter and email. I first used the counter to generate text in what was to be email messages to my hard drive but I did not read them. The next day I sent a simple email to myself within the parameters of the counter I was running. Then I...

Top