Menu
Forums
New posts
Search forums
What's new
New posts
New profile posts
Latest activity
Vault
Time Travel Schematics
T.E.C. Time Archive
The Why Files
Have You Seen...?
Chronovisor
TimeTravelForum.tk
TimeTravelForum.net
ParanormalNetwork.net
Paranormalis.com
ConspiracyCafe.net
Streams
Live streams
Featured streams
Multi-Viewer
Members
Current visitors
New profile posts
Search profile posts
Log in
Register
What's new
Search
Search
Search titles only
By:
New posts
Search forums
Menu
Log in
Register
Navigation
Install the app
Install
More options
Contact us
Close Menu
Forums
Time Travel Forum
Time Machines & Experiments
Time-Hacking with computers and algorithms
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="Reactor1967" data-source="post: 76971" data-attributes="member: 4543"><p>First starters BNS stores and retrieves numbers mathematically in space and time using the concepts of a reference point observing its event which is carrying information and with each place value in a number being a pointer to its previous place value. This is so only the last place value in the number is stored and kept while the rest of the number is mathematically stored in time via the concepts of causality. I can also use BNS to embed file attachments in my messages to and from my self when I search for messages to myself and from myself in the time-line from the future or the past.</p><p></p><p>The counters themselves are run of the mill counters used for hacking except with a twist. They are improved for getting a counter quicker to its results. That happens with better algorithms for running the counter and for good data mining bots to search the results off those counters for positive results.</p><p>My current method and I have tried and used many methods is by simple addition or subtraction to the counter to skip a specific number of steps to make the counter run faster. It works to get the counter closer to its result. Later after the result is saved a counter can further be used to take the result and find a clearer file or the result can be used to perform calculations to find a better location on the counter for the file and the counter sent to that location to search for a better file.</p><p></p><p>On counters there are many ways to use them. In parallel with brute force. Also with files like dictionary files which can be binary or text where sections of good bytes are rolled to create a file which is a intelligent counter. What ever the methods used the concepts are same.</p><p></p><p>1. Thing thing to be hacked is the time-line. (That is the foremost and most important goal and concept.)</p><p>2. Creating a counter that can get those results for the goal.</p><p>3. Searching methods for searching the results off the counter.</p><p>4. Methods for calculating where on the counter time-travel media can be found.</p><p>5. Being able to use the counter like map. Having the counter going from section to section on that map where time travel media may exist.</p><p></p><p>A counter is viewed as a medium for travel to find computer media like 3d space is used for travel. So, the counter has to be broken down into working mathematical concepts to achieve these goals.</p></blockquote><p></p>
[QUOTE="Reactor1967, post: 76971, member: 4543"] First starters BNS stores and retrieves numbers mathematically in space and time using the concepts of a reference point observing its event which is carrying information and with each place value in a number being a pointer to its previous place value. This is so only the last place value in the number is stored and kept while the rest of the number is mathematically stored in time via the concepts of causality. I can also use BNS to embed file attachments in my messages to and from my self when I search for messages to myself and from myself in the time-line from the future or the past. The counters themselves are run of the mill counters used for hacking except with a twist. They are improved for getting a counter quicker to its results. That happens with better algorithms for running the counter and for good data mining bots to search the results off those counters for positive results. My current method and I have tried and used many methods is by simple addition or subtraction to the counter to skip a specific number of steps to make the counter run faster. It works to get the counter closer to its result. Later after the result is saved a counter can further be used to take the result and find a clearer file or the result can be used to perform calculations to find a better location on the counter for the file and the counter sent to that location to search for a better file. On counters there are many ways to use them. In parallel with brute force. Also with files like dictionary files which can be binary or text where sections of good bytes are rolled to create a file which is a intelligent counter. What ever the methods used the concepts are same. 1. Thing thing to be hacked is the time-line. (That is the foremost and most important goal and concept.) 2. Creating a counter that can get those results for the goal. 3. Searching methods for searching the results off the counter. 4. Methods for calculating where on the counter time-travel media can be found. 5. Being able to use the counter like map. Having the counter going from section to section on that map where time travel media may exist. A counter is viewed as a medium for travel to find computer media like 3d space is used for travel. So, the counter has to be broken down into working mathematical concepts to achieve these goals. [/QUOTE]
Insert quotes…
Verification
Post reply
Forums
Time Travel Forum
Time Machines & Experiments
Time-Hacking with computers and algorithms
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.
Accept
Learn more…
Top