Menu
Forums
New posts
Search forums
What's new
New posts
New profile posts
Latest activity
Vault
Time Travel Schematics
T.E.C. Time Archive
The Why Files
Have You Seen...?
Chronovisor
TimeTravelForum.tk
TimeTravelForum.net
ParanormalNetwork.net
Paranormalis.com
ConspiracyCafe.net
Streams
Live streams
Featured streams
Multi-Viewer
Members
Current visitors
New profile posts
Search profile posts
Log in
Register
What's new
Search
Search
Search titles only
By:
New posts
Search forums
Menu
Log in
Register
Navigation
Install the app
Install
More options
Contact us
Close Menu
Forums
Time Travel Forum
Time Machines & Experiments
Time-Hacking with computers and algorithms
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="Reactor1967" data-source="post: 147129" data-attributes="member: 4543"><p>1. A binary counter uses all possible bytes. A text counter only runs with text or the bytes used to display text.</p><p>2. When scanning for emails with a text counter that email can exist in the past, present, future, or alternate time lines. I have to use statistics to calculate the check-sum range of the emails I want to look for then run counters that only construct check-sums within those ranges. Usually I use a destination check-sum which is the state of the counter as it rolls. The Target check-sum is the state of the counter I want to go to. When the target check-sum is hit the counter itself is the file or email being looked for. If I can get a sample file or sample of files of the emails I want that helps me out a whole lot finding the unknown emails.</p><p>3. Well my second book to my BNS is out and I wrote my 3rd book how to time travel with computers is out. And I started publishing my blogs as books too. Go to <a href="http://sourceforge.net/projects/timetravelproject" target="_blank">Time Travel Project</a> I wrote a regression line code. If you want you can test it and report back here what you found because I still need to finish testing it myself to see if I got my math right. Also if you go to <a href="http://sourceforge.net/projects/firecodes/" target="_blank">Fire Codes</a> you should see a you tube video showing fire codes get a check-sum for a file then me deleting the file and using fire codes to reconstruct the computer file. Fire codes does run in parallel. I have some new code coming that can construct a computer file from a check-sum without using a binary counter at all. It will be my fastest program publicly available that can construct files from their check-sums. </p><p></p><p>So, use statistics to calculate check-sums of unknown computer files. Then use the process of constructing computer files from their check-sums to bring those computer files into existence. This is called time-hacking and it is a from of computer time travel. It is real and I have actually done it though 99% of all people I talk to don't believe me and that is actually very ok with me. I am more interested in teaching people the math and computer code of how this works then having people believe my story.</p></blockquote><p></p>
[QUOTE="Reactor1967, post: 147129, member: 4543"] 1. A binary counter uses all possible bytes. A text counter only runs with text or the bytes used to display text. 2. When scanning for emails with a text counter that email can exist in the past, present, future, or alternate time lines. I have to use statistics to calculate the check-sum range of the emails I want to look for then run counters that only construct check-sums within those ranges. Usually I use a destination check-sum which is the state of the counter as it rolls. The Target check-sum is the state of the counter I want to go to. When the target check-sum is hit the counter itself is the file or email being looked for. If I can get a sample file or sample of files of the emails I want that helps me out a whole lot finding the unknown emails. 3. Well my second book to my BNS is out and I wrote my 3rd book how to time travel with computers is out. And I started publishing my blogs as books too. Go to [URL="http://sourceforge.net/projects/timetravelproject"]Time Travel Project[/URL] I wrote a regression line code. If you want you can test it and report back here what you found because I still need to finish testing it myself to see if I got my math right. Also if you go to [URL="http://sourceforge.net/projects/firecodes/"]Fire Codes[/URL] you should see a you tube video showing fire codes get a check-sum for a file then me deleting the file and using fire codes to reconstruct the computer file. Fire codes does run in parallel. I have some new code coming that can construct a computer file from a check-sum without using a binary counter at all. It will be my fastest program publicly available that can construct files from their check-sums. So, use statistics to calculate check-sums of unknown computer files. Then use the process of constructing computer files from their check-sums to bring those computer files into existence. This is called time-hacking and it is a from of computer time travel. It is real and I have actually done it though 99% of all people I talk to don't believe me and that is actually very ok with me. I am more interested in teaching people the math and computer code of how this works then having people believe my story. [/QUOTE]
Insert quotes…
Verification
Post reply
Forums
Time Travel Forum
Time Machines & Experiments
Time-Hacking with computers and algorithms
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.
Accept
Learn more…
Top